Unlike some operating systems, Linux doesn t try to hide the important bits from you it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does. In this completely revised second edition of the perennial best seller How Linux Works, author Brian Ward makes the concepts behind Linux internals accessible to anyone curious about the inner workings of the operating system. Inside, you ll find the kind of knowledge that normally comes from years of experience doing things the hard way. You ll learn: How Linux boots, from boot loaders to init implementations (systemd, Upstart, and System V) How the kernel manages devices, device drivers, and processes How networking, interfaces, firewalls, and servers work How development tools work and relate to shared libraries How to write effective shell scripts You ll also explore the kernel and examine key system ta
You´ve experienced the shiny, point-and-click surface of your Linux computer now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you´ll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more. In addition to that practical knowledge, author William Shotts reveals the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix supercomputers of yore. As you make your way through the book´s short, easily-digestible chapters, you´ll learn how to: Create and delete files, directories, and symlinks Administer your system, including networking, package installation, and process management Use standard input and output, red
Your one-stop guide to Linux--fully revised and expanded Get in-depth coverage of all Linux features, tools, and utilities from this thoroughly updated and comprehensive resource, designed for all Linux distributions. Written by Linux expert Richard Petersen, this book explains how to get up-and-running on Linux, use the desktops and shells, manage applications, deploy servers, implement security measures, and handle system and network administration tasks. With full coverage of the latest platform, Linux: The Complete Reference, Sixth Edition includes details on the very different and popular Debian (Ubuntu) and Red Hat/Fedora software installation and service management tools used by most distributions. This is a must-have guide for all Linux users. * Install, configure, and administer any Linux distribution * Work with files and folders from the BASH, TCSH, and Z shells * Use the GNOME and KDE desktops, X Windows, and display managers * Set up office, database, Internet, and multimedia applications * Secure data using SELinux, netfilter, SSH, and Kerberos * Encrypt network transmissions with GPG, LUKS, and IPsec * Deploy FTP, Web, mail, proxy, print, news, and database servers * Administer system resources using HAL, udev, and virtualization (KVM and Xen) * Configure and maintain IPv6, DHCPv6, NIS, networking, and remote access * Access remote files and devices using NFSv4, GFS, PVFS, NIS, and SAMBA
Leading embedded systems developer Rudolf Streif gives readers a solid grounding in the basics, then guides them through more advanced topics -- ranging from building board support packages to managing compliance. Students master the Yocto Project toolbox by working through the entire development lifecycle on a realistic project: a distributed home automation system consisting of multiple embedded devices with diverse functionality, all communicating via networking infrastructure.
This book is your complete guide to studying for the Linux Professional Institute´s Server Professional (LPIC-1) certification. Every concept, principle, process, and resource that might make an appearance on the exam is fully represented. You will understand every concept by rolling up your sleeves, opening up a terminal, and trying it all yourself. You will find suggestions for practical tasks along with ´´test-yourself´´ quizzes at the end of each chapter. Whether you´ve decided to earn the Linux Professional Institute´s Server Professional certification or you simply want to learn more about Linux administration, this book is a great choice. Right now, Linux administration skills are opening doors to some of the hottest job markets. And with the ongoing explosive growth of the cloud computing world - the vast majority of which is being built with Linux - the scope of the opportunities will only increase. Whether or not you end up taking the exam, if you manage to learn this material, you´ll have done yourself a real favor. What You Will Learn Basic Linux system administration and package management Device and desktop management Bash scripting Networking fundamentals Security administration Who This Book Is For Most potential readers will already have a decent idea of what Linux is and what kinds of things can be done with it, and are looking to acquire or formalize a more structured and complete ability to confidently administrate Linux systems.
Your complete guide to preparing for the LPIC-1 Linux Professional Institute Certification Exams 101-400 and 102-400The LPIC-1 Linux Professional Institute Certification Study Guide, 4th Edition is your one-stop resource for complete coverage of Exams 101-400 and 102- 400. This Sybex Study Guide covers 100% of all exam 101-400 and 102-400 objectives. You´ll prepare for the exams smarter and faster with Sybex thanks to superior content including, assessment tests that check exam readiness, objective map, real-world scenarios, hands-on exercises, key topic exam essentials, and challenging chapter review questions. Reinforce what you have learned with the exclusive Sybex online learning environment, assessable across multiple devices. Get prepared for the LPIC-1 Exams 101-400 and 102-400 with Sybex.Coverage of 100% of all exam objectives in this Study Guide means you´ll be ready for:Managing Software Configuring Hardware Managing Files Booting Linux and Editing Files Configuring the X Window System Configuring Basic Networking Writing Scripts, Configuring Email, and Using DatabasesCovers 100% of exam objectives, including system architecture, GNU and UNIX commands, shells, scripting, and data management, administrative tasks, system services, networking, and much more...Includes interactive online learning environment with: Custom practice exams 150 electronic flashcards Searchable key term glossaryInteractive learning environment Take your exam prep to the next level with Sybex´s superior interactive online tools. To access the learning environment, simply visit: http://sybextestbanks.wiley.com, type in your unique PIN and instantly gain access to:Interactive online learning environment and test bank covering both LPIC-1 exams, including 200 chapter review questions and two 50-question bonus exams.150 Electronic Flashcards to reinforce learning and provide last minute prep before the exam.Comprehensive searchable glossary in PDF format gives you instant access to the key terms so you are fully prepared.
As the embedded world expands, developers must have a strong grasp of many complex topics in order to make faster, more efficient and more powerful microprocessors to meet the public´s growing demand. Embedded Software: The Works covers all the key subjects embedded engineers need to understand in order to succeed, including Design and Development, Programming, Languages including C/C++, and UML, Real Time Operating Systems Considerations, Networking, and much more. New material on Linux, Android, and multi-core gives engineers the up-to-date practical know-how they need in order to succeed. Colin Walls draws upon his experience and insights from working in the industry, and covers the complete cycle of embedded software development: its design, development, management, debugging procedures, licensing, and reuse. For those new to the field, or for experienced engineers looking to expand their skills, Walls provides the reader with detailed tips and techniques, and rigorous explanations of technologies. Key features include: New chapters on Linux, Android, and multi-core - the cutting edge of embedded software development! Introductory roadmap guides readers through the book, providing a route through the separate chapters and showing how they are linked About the Author Colin Walls has over twenty-five years experience in the electronics industry, largely dedicated to embedded software. A frequent presenter at conferences and seminars and author of numerous technical articles and two books on embedded software, he is a member of the marketing team of the Mentor Graphics Embedded Software Division. He writes a regular blog on the Mentor website (blogs.mentor.com/colinwalls). New chapters on Linux, Android, and multi-core - the cutting edge of embedded software development! Introductory roadmap guides readers through the book, providing a route through the separate chapters and showing how they are linked
See how privileges, passwords, vulnerabilities, and exploits can be leveraged as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if , but when your organization will be breached. Attackers target the perimeter network, but in recent years have refocused their efforts on the path of least resistance: users and their privileges. In decades past an entire enterprise might be sufficiently managed through just a handful of credentials. Today´s environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. There is not one silver bullet to provide the protection you need against all vectors and stages of an attack. And while some new and innovative solutions will help protect against or detect the initial infection, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vector s details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact. What You´ll Learn Know how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and auditing strategies to mitigate the threats and risk Understand a 12-step privileged account management Implementation plan Consider deployment and scope, including risk, auditing, regulations, and oversight solutions Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privileged escalation threats
Serverumgebungen planen, verwalten und Probleme beheben Erläuterungen zu allen Themen der aktuellen CompTIA-Server+-Prüfung SKO-004 Aktuell, verständlich, praxistauglich Die CompTIA Server+-Prüfung teilt sich in mehrere Fachgebiete auf. In der aktuellen Fassung der Prüfung SKO-004 lauten sie: Serverarchitektur Serveradministration Speicher Sicherheit Networking Wiederherstellung im Notfall Fehlersuche Die Autoren erläutern Ihnen diese Themen ausführlich und vermitteln Ihnen so das für die Zertifizierung benötigte Fachwissen. Darüber möchten Sie Ihnen praxistaugliches Verständnis der Thematik nahebringen. Das beginnt damit, dass Server nicht einfach aufgerüstete PCs sind und sich insbesondere in Konfiguration und Einsatz unterscheiden. Sie lernen in diesem Buch die Eigenschaften und Einsatzgebiete, sowohl was die Hardware als auch was die spezifischen Betriebssysteme und Applikationen von Servern anbelangt, gründlich kennen. Nicht zuletzt befassen sich die Autoren mit Themenvon der Planung über die physischen Umgebungsbedingungen bis hin zu aktuellen Themen wie der Virtualisierung, verschiedenen Fragen der Sicherheit, der Datensicherung und dem Disaster Recovery. Dieses Lehrmittel wurde für das CompTIA Authorized Curriculum geprüft und ist CAQC-zertifiziert. Weitere Informationen zu dieser Qualifizierung erhalten Sie unter: dem Inhalt: Server-Hardware: Prozessoren, Arbeitsspeicher, BIOS/UEFI Storagelösungen und -technologien: SSD, SAS, SATA, Fibre Channel, iSCSI Fehlertoleranz: RAID, Energieversorgung Server installieren und aktualisieren Hardware im Netzwerk: Kabel, Netzwerkkarten, Übertragungsgeräte TCP/IP: IPv4 und IPv6 Serverrollen: Datei- und Druckdienste, Internet- und Maildienste, Netzwerkdienste Netzwerkbetriebssysteme: Windows Server, UNIX/Linux und deren Installation Konfigurationsbetrachtungen: Dateisystem, Kontingentierung, Verzeichnisdienste, Gruppenrichtlinien Server Management: Remote-Verbindungen, Ereignisprotokolle, Monitoring, SNMP, WBEM Deployment- und Virtualisierungsszenarien Physische, technische und organisatorische Sicherheit Datensicherung in der Praxis Disaster Recovery Planning Unterhalt und Troubleshooting in der Praxis Die CompTIA Server+-Prüfung: Fragen, Antworten, Simulationstest
IPv6 Security Protection measures for the next Internet Protocol As the world´s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world´s leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today´s best solutions. IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today´s networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them. The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection. The authors also turn to Cisco® products and protection mechanisms. You learn how to use Cisco IOS® and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today´s best practices and easy to adapt to virtually any IPv6 environment. Scott Hogg, CCIE® No. 5133, is Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI). He is responsible for setting the company´s technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force. Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years´ experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely. Understand why IPv6 is already a latent threat in your IPv4-only network Plan ahead to avoid IPv6 security problems before widespread deployment Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills Understand each high-level approach to securing IPv6 and learn when to use each Protect service provider networks, perimeters, LANs, and host/server connections Harden IPv6 network devices against attack Utilize IPsec in IPv6 environments Secure mobile IPv6 networks Secure transition mechanisms in use during the migration from IPv4 to IPv6 Monitor IPv6 security Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure Protect your network against large-scale threats by using perimeter filtering techniques and service provider?focused security practices Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each This security book is part of the Cisco...