Linux Kernel Networking takes you on a guided in-depth tour of the current Linux networking implementation and the theory behind it. Linux kernel networking is a complex topic, so the book won´t burden you with topics not directly related to networking. This book will also not overload you with cumbersome line-by-line code walkthroughs not directly related to what you´re searching for; you´ll find just what you need, with in-depth explanations in each chapter and a quick reference at the end of each chapter. Linux Kernel Networking is the only up-to-date reference guide to understanding how networking is implemented, and it will be indispensable in years to come since so many devices now use Linux or operating systems based on Linux, like Android, and since Linux is so prevalent in the data center arena, including Linux-based virtualization technologies like Xen and KVM.
Unlike some operating systems, Linux doesn t try to hide the important bits from you it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does. In this completely revised second edition of the perennial best seller How Linux Works, author Brian Ward makes the concepts behind Linux internals accessible to anyone curious about the inner workings of the operating system. Inside, you ll find the kind of knowledge that normally comes from years of experience doing things the hard way. You ll learn: How Linux boots, from boot loaders to init implementations (systemd, Upstart, and System V) How the kernel manages devices, device drivers, and processes How networking, interfaces, firewalls, and servers work How development tools work and relate to shared libraries How to write effective shell scripts You ll also explore the kernel and examine key system ta
If you´ve ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols - or if you just want to learn about modern networking through real-life examples - Understanding Linux Network Internals is for you. Like the popular O´Reilly book, Understanding the Linux Kernel, this book clearly explains the underlying concepts and teaches you how to follow the actual C code that implements it. Although some background in the TCP/IP protocols is helpful, you can learn a great deal from this text about the protocols themselves and their uses. And if you already have a base knowledge of C, you can use the book´s code walkthroughs to figure out exactly what this sophisticated part of the Linux kernel is doing. Part of the difficulty in understanding networks - and implementing them - is that the tasks are broken up and performed at many different times by different pieces of code. One of the strengths of this book is to integrate the pieces and reveal the relationships between far-flung functions and data structures. Understanding Linux Network Internals is both a big-picture discussion and a no-nonsense guide to the details of Linux networking. Topics include: - Key problems with networking - Network interface card (NIC) device drivers - System initialization - Layer 2 (link-layer) tasks and implementation - Layer 3 (IPv4) tasks and implementation - Neighbor infrastructure and protocols (ARP) - Bridging - Routing - ICMP Author Christian Benvenuti, an operating system designer specializing in networking, explains much more than how Linux code works. He shows the purposes of major networking features and the trade-offs involved in choosing one solution over another. A large number of flowcharts and other diagrams enhance the book´s understandability.
You´ve experienced the shiny, point-and-click surface of your Linux computer now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you´ll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more. In addition to that practical knowledge, author William Shotts reveals the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix supercomputers of yore. As you make your way through the book´s short, easily-digestible chapters, you´ll learn how to: Create and delete files, directories, and symlinks Administer your system, including networking, package installation, and process management Use standard input and output, red
The Definitive Guide to Building Firewalls with Linux As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. In Linux® Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive Linux firewall guide to cover the important advances in Linux security. An indispensable working resource for every Linux administrator concerned with security, this guide presents comprehensive coverage of both iptables and nftables. Building on the solid networking and firewalling foundation in previous editions, it also adds coverage of modern tools and techniques for detecting exploits and intrusions, and much more. Distribution neutral throughout, this edition is fully updated for today´s Linux kernels, and includes current code examples and support scripts for Red Hat/Fedora, Ubuntu, and Debian implementations. If you´re a Linux professional, it will help you establish an understanding of security for any Linux system, and for networks of all sizes, from home to enterprise. Inside, you´ll find just what you need to * Install, configure, and update a Linux firewall running either iptables or nftables * Migrate to nftables, or take advantage of the latest iptables enhancements * Manage complex multiple firewall configurations * Create, debug, and optimize firewall rules * Use Samhain and other tools to protect filesystem integrity, monitor networks, and detect intrusions * Harden systems against port scanning and other attacks * Uncover exploits such as rootkits and backdoors with chkrootkit
Your one-stop guide to Linux--fully revised and expanded Get in-depth coverage of all Linux features, tools, and utilities from this thoroughly updated and comprehensive resource, designed for all Linux distributions. Written by Linux expert Richard Petersen, this book explains how to get up-and-running on Linux, use the desktops and shells, manage applications, deploy servers, implement security measures, and handle system and network administration tasks. With full coverage of the latest platform, Linux: The Complete Reference, Sixth Edition includes details on the very different and popular Debian (Ubuntu) and Red Hat/Fedora software installation and service management tools used by most distributions. This is a must-have guide for all Linux users. * Install, configure, and administer any Linux distribution * Work with files and folders from the BASH, TCSH, and Z shells * Use the GNOME and KDE desktops, X Windows, and display managers * Set up office, database, Internet, and multimedia applications * Secure data using SELinux, netfilter, SSH, and Kerberos * Encrypt network transmissions with GPG, LUKS, and IPsec * Deploy FTP, Web, mail, proxy, print, news, and database servers * Administer system resources using HAL, udev, and virtualization (KVM and Xen) * Configure and maintain IPv6, DHCPv6, NIS, networking, and remote access * Access remote files and devices using NFSv4, GFS, PVFS, NIS, and SAMBA
Docker is quickly changing the way that organizations are deploying software at scale. But understanding how Linux containers fit into your workflowand getting the integration details rightare not trivial tasks. With this practical guide, youll learn how to use Docker to package your applications with all of their dependencies, and then test, ship, scale, and support your containers in production.Two Lead Site Reliability Engineers at New Relic share much of what they have learned from using Docker in production since shortly after its initial release. Their goal is to help you reap the benefits of this technology while avoiding the many setbacks they experienced.Learn how Docker simplifies dependency management and deployment workflow for your applicationsStart working with Docker images, containers, and command line toolsUse practical techniques to deploy and test Docker-based Linux containers in productionDebug containers by understanding their composition and internal processesDeploy production containers at scale inside your data center or cloud environmentExplore advanced Docker topics, including deployment tools, networking, orchestration, security, and configuration
See how privileges, passwords, vulnerabilities, and exploits can be leveraged as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if , but when your organization will be breached. Attackers target the perimeter network, but in recent years have refocused their efforts on the path of least resistance: users and their privileges. In decades past an entire enterprise might be sufficiently managed through just a handful of credentials. Today´s environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. There is not one silver bullet to provide the protection you need against all vectors and stages of an attack. And while some new and innovative solutions will help protect against or detect the initial infection, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vector s details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact. What You´ll Learn Know how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and auditing strategies to mitigate the threats and risk Understand a 12-step privileged account management Implementation plan Consider deployment and scope, including risk, auditing, regulations, and oversight solutions Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privileged escalation threats
Red Hat RHCE®/RHCSA? 7 Cert Guide has a single goal: to help students pass the newest versions of Red Hat´s RHCE and RHCSA exams for Red Hat Enterprise Linux 7. The most comprehensive and time-efficient RHCE 7 / RHCSA 7 prep guide available, it´s an extraordinarily cost-effective alternative to expensive training. Written by a leading Red Hat trainer, consultant, and speaker, it presents focused, straight-to-the-point coverage of every exam topic. Product Description Red Hat RHCE®/RHCSA? 7 Cert Guide has a single goal: to help you pass the newest versions of Red Hat´s RHCE and RHCSA exams for Red Hat Enterprise Linux 7. The most comprehensive and time-efficient RHCE 7 / RHCSA 7 prep guide available, it´s an extraordinarily cost-effective alternative to expensive training. Authored by a leading Red Hat trainer, consultant, and speaker, it presents focused, straight-to-the-point coverage of every exam topic. Coverage includes: RHCSA: RHEL 7 Server installation, tools, file/folder management, text files, connectivity, users/groups, permissions, networking, processes, VMs, software installation, tasks, logging, partitions, LVMs, kernel management, Kickstart, boot procedures/troubleshooting, HTTP, SELinux, firewalls, FTP, and NTP RHCE: Connecting to iSCSI SANs, performance reporting, server optimization, log servers, routing configuration, authentication, command-line firewall management, SELinux services, web services, DNS, FTP, NFS, SMB, SMTP, SSH, and NTP From start to finish, this guide is organized to help you focus your study time where you need the most help, so you can retain more, and earn higher scores. It offers: Step-by-step chapter labs to help you practice what you´ve just learned