Linux Security - Simple Steps to Win, Insights and Opportunities for Maxing Out Success: Gerard Blokdijk
Linux System Administration - Simple Steps to Win, Insights and Opportunities for Maxing Out Success: Gerard Blokdijk
Linux Kernel in a Nutshell covers the entire range of kernel tasks, starting with downloading the source and making sure that the kernel is in sync with the versions of the tools you need. In addition to configuration and installation steps, the book offers reference material and discussions of related topics such as control of kernel options at runtime.
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you´re new to the job or have years of experience. With Linux Networking Cookbook, you´ll dive straight into the gnarly hands-on work of building and maintaining a computer network.Running a network doesn´t mean you have all the answers. Networking is a complex subject with reams of reference material that´s difficult to keep straight, much less remember. If you want a book that lays out the steps for specific tasks, that clearly explains the commands and configurations, and does not tax your patience with endless ramblings and meanderings into theory and obscure RFCs, this is the book for you.You will find recipes for:Building a gateway, firewall, and wireless access point on a Linux networkBuilding a VoIP server with AsteriskSecure remote administration with SSHBuilding secure VPNs with OpenVPN, and a Linux PPTP VPN serverSingle sign-on with Samba for mixed Linux/Windows LANsCentralized network directory with OpenLDAPNetwork monitoring with Nagios or MRTGGetting acquainted with IPv6Setting up hands-free networks installations of new systemsLinux system administration via serial consoleAnd a lot more. Each recipe includes a clear, hands-on solution with tested code, plus a discussion on why it works. When you need to solve a network problem without delay, and don´t have the time or patience to comb through reference books or the Web for answers, Linux Networking Cookbook gives you exactly what you need.
This audiobook is the third in a series on how to use Linux for programming. It guides you through the steps of getting started with using the Python programming language to get started with Linux. Python is the ideal Linux programming language, at least for beginners, partially because it so closely resembles human language. It is one of the most accessible and easy to learn. And like Linux, it is open source! Anyone can view the source code and submit changes. This audiobook begins by explaining in detail what Python is and why it is best suited for Linux programming, even though the Linux kernel is written in a different programming language (C). It gives you some tips and tricks for how to use Python with Linux without any confusion between the two languages. It then explains some of the most basic features of Python, such as the syntax it uses, what loops are, Boolean expressions, and writing out simple codes. From there, it gives you some tips and tricks on how to use Python to program with Linux, such as using it in a command line terminal, in an integrated development environment (IDLE), to build and edit applications, and to write patches. This audiobook is a great resource for Python and Linux beginners, and those who have some working knowledge but want a firmer foundation to build off of. By the time you finish this audiobook, you will have a working knowledge of how to use Python. You will be able to build on that knowledge as you continue to develop your skills as a programmer. 1. Language: English. Narrator: William Bahl. Audio sample: http://samples.audible.de/bk/acx0/110888/bk_acx0_110888_sample.mp3. Digital audiobook in aax.
This audiobook contains proven steps and strategies on how to become a proficient Linux programmer. Through the course of this audiobook, you’re going to learn strategies to think like a programmer. You’ll learn how to program in Python and Java, as well as how to write scripts for the Linux command line. By the end, you’re going to have a masterful grip on how to write efficient and strong programs. I’ve been programming for a while, and this audiobook is based on the method that I’ve found to be most effective in teaching people how to program; a programmer isn’t worth anything if he or she doesn’t understand the underlying logic. So in this audiobook, we cover the underlying logic and then examine how it applies to three different important Linux programming platforms. 1. Language: English. Narrator: William Bahl. Audio sample: http://samples.audible.de/bk/acx0/116102/bk_acx0_116102_sample.mp3. Digital audiobook in aax.
Hacking will demand your full dedication and interest and also a desire and a craving for knowledge and constant advancement. If your goal is to be a hacker, this is the audiobook to start with! This audiobook contains proven steps and strategies on how to hack a wireless network, carry out a penetration test, and so much more. It gives an insight to the most used hacking techniques and how to develop your basic skills. Here is a preview of what you´ll learn.... What is hacking? How to crack wireless networks Kali Linux Linux hacking tools Penetration test Your first hack: WEP network And basically everything you need to help you to start your hacking career Download your copy today! 1. Language: English. Narrator: Matt Montanez. Audio sample: http://samples.audible.de/bk/acx0/109222/bk_acx0_109222_sample.mp3. Digital audiobook in aax.
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system--and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard's security defenses, what attacks aren't; and how to best handle those weaknesses. The honeymoon is over. Prepare yourself to thwart Mac attacks. Where security is concerned, Macs have long led a charmed existence. No more. If you manage security for a network that includes OS X machines, this update on the strengths and weaknesses of Mac OS X is required reading. Beginning with the core differences between Mac OS X and Windows or Linux, this book follows the steps an attacker would take. You will learn the tools needed to find vulnerabilities, the techniques used to exploit them, and the means by which attackers maintain control once they gain access. When you know how they get in, you´ll know how to keep them out. * See what makes Mac OS(r) X unique, what security improvements were added with Leopard(r), and where vulnerabilities lie * Explore uncommon protocols-Bonjour(r), the QuickTime(r) file format, and RTSP * Look for bugs in Apple´s source code or use a black box technique such as fuzzing * Examine stack overflow and heap overflow attacks directed at PowerPC and x86 architectures, as well as shellcodes and payloads * Learn to inject code into running processes and how attackers use this technique * Understand Mac OS X-specific rootkit techniques
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst´s Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: * How volatile memory analysis improves digital investigations * Proper investigative steps for detecting stealth malware and advanced threats * How to use free, open source tools for conducting thorough memory forensics * Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.