linux PDF: 31 to 40 of 1000 results fetched - page 4 [ec]

Zoolz is the only cloud solution that keeps your data even when you disconnect your drives
Now you can translate your PDF documents automatically to dozens of languages.

Fundamentals of Linux

https://www.ebooks.com/cj.asp?IID=96302378&fc=GB&cjsku=96302378...
Develop a solid understanding of the important command-line tools and utilities in Linux About This Book Delve into the fundamentals of Linux Explore and work with virtualization, command lines, and Bash shell scripts Use special file permission flags such as setuid and setgid Who This Book Is For Fundamentals of Linux is for individuals looking to work as a Linux system administrator. What You Will Learn Explore basic and advanced command-line concepts Install Linux, work with VirtualBox, and install CentOS 7 in VirtualBox Work with the command line efficiently and learn how to navigate through the Linux filesystem Create file and user group permissions and edit files Use Sticky bit to secure your Linux filesystem Define and remove ACL from Linux files In Detail Linux is a Unix-like operating system assembled under the model of free and open source software development and distribution. Fundamentals of Linux will help you learn all the essentials of the Linux command line required to get you started. The book will start by teaching you how to work with virtualization software and install CentOS 7 Linux as a VM. Then, you will get to grips with the workings of various command line operations, such as cursor movement, commands, options, and arguments. As you make your way through the chapters, the book will not only focus on the most essential Linux commands but also give an introduction to Bash shell scripting. Finally, you will explore advanced topics, such as networking and troubleshooting your system, and you will get familiar with the advanced file permissions: ACL, setuid, and setgid. Fundamentals of Linux includes real-world tasks, use cases, and problems that, as a system administrator, you might encounter in your day-to-day activities. Style and approach A step-by-step guide filled with real-world examples that will cover the fundamentals of Linux
Category: COMPUTERS. ISBN:

Linux Multimedia Hacks

https://www.ebooks.com/cj.asp?IID=540785&fc=GB&cjsku=540785...
The fact that Linux has more multimedia application choices than Mac OS X and Windows combined may come as a surprise to many, but not to those who know Linux well. In Linux Multimedia Hacks, author Kyle Rankin showcases the best available multimedia tools so you can maximize the entertainment capabilities of your favorite OS. Included are tips and tricks for connecting to iPods, creating MP3s and Oggs, watching and making DVDs, turning your Linux box into a Tivo ala MythTV, and much more. You don't have to be a Linux server guru to make use of this book. Linux Multimedia Hacks takes the best of Linux's multimedia tools and with step-by-step instructions shows even novice users how to do cool and useful things with images, audio, and video. It includes entry level hacks that nearly all Linux users will want, such as installing codecs for audio and video playback and managing thousands of photographs. Later, you'll find hacks that cover a variety of advanced projects, from ripping and organizing media files with metatags, to editing video and audio tracks, to creating your own DVDs. Basic or advanced, each hack stands on its own, so you can feel free to jump around to only the sections that interest you. The book is divided into five easy-to-understand chapters: Images: tips range from basic image edits to automated image manipulation Audio: hacks include audio format conversion and tweaking metadata within audio files Video: learn how to covert between video formats, plus how to create your own VCDs and DVDs Broadcast Media: tips include how to access and create you own web broadcasts as well as watch and record TV Web: learn how to make your multimedia creations available to the world As one of the most powerful multimedia platforms around, Linux has far more capabilities and features than meets the eye. This latest Hacks book gives you the technical chops to enjoy them all.
Category: COMPUTERS. ISBN:

Managing RAID on Linux

https://www.ebooks.com/cj.asp?IID=443501&fc=CA&cjsku=443501...
Redundant Array of Independent Disks (RAID) technology is becoming a standard feature of computer systems that support mission-critical services like file sharing, mail exchange, or Web servers. RAID offers two benefits to these essential systems: improved I/O performance and fail-safe data storage.Although bandwidth problems on networks are well documented, the internal data transfer bottleneck that exists at the hardware level in each system can also leave you with perplexing performance issues. RAID is a cost-effective and easy-to-manage way to alleviate this bandwidth problem by distributing the I/O load seamlessly across multiple disks and controllers.RAID also provides uninterrupted data access through disk mirroring and parity algorithms. That means systems can remain online even during a disk or controller failure. RAID is scalable, making it robust enough for large, high-traffic sites and small, critical systems. By using RAID, system administrators can combine single disks into terabytes worth of data storage.Managing RAID on Linux covers everything system administrators need to know to put together a system that can support RAID. You will learn about the different types of RAID, along with associated technologies and issues, and how to choose the best RAID system for your needs. With a step-by-step, hands-on approach, the author guides you through the installation of either Linux software RAID or a hardware RAID card. The book shows how to build an array and optionally install a high-performance file system. Contents include: An introduction to RAID and Linux Planning and architecture of your RAID system Building a software RAID Software RAID tools and references Building a hardware RAID Performance and tuning of your RAID system RAID has become the low-cost solution of choice to deal with the ever-increasing demand for data storage space. Written for system administrators, power users, tech managers, and anyone who wants to learn about RAID technology, Managing RAID on Linux sidesteps the often-confusing vendor-specific approach you'll find elsewhere to give you the straight story on RAID. Even non-Linux users will find this book full of valuable material.
Category: COMPUTERS. ISBN:

Linux Pocket Guide

https://www.ebooks.com/cj.asp?IID=2603360&fc=CA&cjsku=2603360...
If you use Linux in your day-to-day work, this popular pocket guide is the perfect on-the-job reference. The third edition features new commands for processing image files and audio files, running and killing programs, reading and modifying the system clipboard, and manipulating PDF files, as well as other commands requested by readers. You’ll also find powerful command-line idioms you might not be familiar with, such as process substitution and piping into bash. Linux Pocket Guide provides an organized learning path to help you gain mastery of the most useful and important commands. Whether you’re a novice who needs to get up to speed on Linux or an experienced user who wants a concise and functional reference, this guide provides quick answers. Selected topics include: The filesystem and shell File creation and editing Text manipulation and pipelines Backups and remote storage Viewing and controlling processes User account management Becoming the superuser Network connections Audio and video Installing software Programming with shell scripts
Category: COMPUTERS. ISBN:

Managing RAID on Linux

https://www.ebooks.com/cj.asp?IID=443501&fc=AU&cjsku=443501...
Redundant Array of Independent Disks (RAID) technology is becoming a standard feature of computer systems that support mission-critical services like file sharing, mail exchange, or Web servers. RAID offers two benefits to these essential systems: improved I/O performance and fail-safe data storage.Although bandwidth problems on networks are well documented, the internal data transfer bottleneck that exists at the hardware level in each system can also leave you with perplexing performance issues. RAID is a cost-effective and easy-to-manage way to alleviate this bandwidth problem by distributing the I/O load seamlessly across multiple disks and controllers.RAID also provides uninterrupted data access through disk mirroring and parity algorithms. That means systems can remain online even during a disk or controller failure. RAID is scalable, making it robust enough for large, high-traffic sites and small, critical systems. By using RAID, system administrators can combine single disks into terabytes worth of data storage.Managing RAID on Linux covers everything system administrators need to know to put together a system that can support RAID. You will learn about the different types of RAID, along with associated technologies and issues, and how to choose the best RAID system for your needs. With a step-by-step, hands-on approach, the author guides you through the installation of either Linux software RAID or a hardware RAID card. The book shows how to build an array and optionally install a high-performance file system. Contents include: An introduction to RAID and Linux Planning and architecture of your RAID system Building a software RAID Software RAID tools and references Building a hardware RAID Performance and tuning of your RAID system RAID has become the low-cost solution of choice to deal with the ever-increasing demand for data storage space. Written for system administrators, power users, tech managers, and anyone who wants to learn about RAID technology, Managing RAID on Linux sidesteps the often-confusing vendor-specific approach you'll find elsewhere to give you the straight story on RAID. Even non-Linux users will find this book full of valuable material.
Category: COMPUTERS. ISBN:

Linux Pocket Guide

https://www.ebooks.com/cj.asp?IID=2603360&fc=AU&cjsku=2603360...
If you use Linux in your day-to-day work, this popular pocket guide is the perfect on-the-job reference. The third edition features new commands for processing image files and audio files, running and killing programs, reading and modifying the system clipboard, and manipulating PDF files, as well as other commands requested by readers. Youâll also find powerful command-line idioms you might not be familiar with, such as process substitution and piping into bash. Linux Pocket Guide provides an organized learning path to help you gain mastery of the most useful and important commands. Whether youâre a novice who needs to get up to speed on Linux or an experienced user who wants a concise and functional reference, this guide provides quick answers. Selected topics include: The filesystem and shell File creation and editing Text manipulation and pipelines Backups and remote storage Viewing and controlling processes User account management Becoming the superuser Network connections Audio and video Installing software Programming with shell scripts
Category: COMPUTERS. ISBN:

CompTIA Linux+ Certification Guide

https://www.ebooks.com/cj.asp?IID=138615328&fc=AU&cjsku=138615328...
Master the concepts and techniques that will help you gain the LX0-103 and LX0-104 certifications on your first attempt Key Features Get a clear understanding of how to achieve the Linux+ certification Explore system architecture, shell scripts, data management, and Linux security Work through practice and mock tests to pass both LX0-103 and LX0-104 exams Book Description Linux+ certification demonstrates technical competency and provides a broad awareness of Linux operating systems. Professionals who have achieved the Linux+ certification exhibit all-important knowledge of installation, operation, administration, and troubleshooting services. The CompTIA Linux+ Certification Guide is an overview of the certification that gives you insights into the system architecture. You'll understand how to install and uninstall Linux distributions, followed by working with various package managers. Once you've grasped all this, you'll move on to manipulating files and processes at command-line interface (CLI) and creating, monitoring, killing, restarting, and modifying processes. As you progress, you'll be equipped to work with display managers and learn how to create, modify, and remove user accounts and groups, as well as understand how to automate tasks. The last set of chapters helps you configure dates and set up local and remote system logging. In addition to this, you'll explore different internet protocols, along with discovering network configuration, security administration, Shell scripting, and SQL management. By the end of this book, you'll not only have got to grips with all the modules using practice questions and mock exams, but you'll also be well prepared to pass the LX0-103 and LX0-104 certification exams. What you will learn Understand the Linux system architecture Install, upgrade, and manage Linux system packages Configure devices and maintain the Linux filesystem Manage the Shell environment, write scripts, and manage data Set user interfaces and desktops in the Linux operating system Automate system admin tasks and manage essential system services Manage SQL server on Linux and log locally and remotely with rsyslogd Administer network and local security Who this book is for The CompTIA Linux+ Certification Guide is for you if you want to gain the CompTIA Linux+ certificate. This guide is also for system administrators and rookie Linux professionals interested in enhancing their Linux and Shell scripting skills. No prior knowledge of Linux is needed, although some understanding of Shell scripting would be helpful.
Category: COMPUTERS. ISBN:

Kali Linux 2018

https://www.ebooks.com/cj.asp?IID=209520336&fc=AU&cjsku=209520336...
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition Key Features Rely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-edge wireless penetration tools and features Book Description Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement. This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning, vulnerability assessment, and exploitation. You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You'll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks. By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings. What you will learn Conduct the initial stages of a penetration test and understand its scope Perform reconnaissance and enumeration of target networks Obtain and crack passwords Use Kali Linux NetHunter to conduct wireless penetration testing Create proper penetration testing reports Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing Carry out wireless auditing assessments and penetration testing Understand how a social engineering attack such as phishing works Who this book is for This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linux operating systems. Prior knowledge of information security will help you understand the concepts in this book
Category: COMPUTERS. ISBN:

Practical Linux Security Cookbook

https://www.ebooks.com/cj.asp?IID=96393897&fc=AU&cjsku=96393897...
Enhance file system security and learn about network attack, security tools and different versions of Linux build. Key Features Hands-on recipes to create and administer a secure Linux system Enhance file system security and local and remote user authentication Use various security tools and different versions of Linux for different tasks Book Description Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security ?aws, and these security ?aws allow attackers to get into your system and modify or even destroy your important data. But there's no need to panic, since there are various mechanisms by which these ?aws can be removed, and this book will help you learn about different types of Linux security to create a more secure Linux system. With a step-by-step recipe approach, the book starts by introducing you to various threats to Linux systems. Then, this book will walk you through customizing the Linux kernel and securing local files. Next, you will move on to managing user authentication both locally and remotely and mitigating network attacks. Later, you will learn about application security and kernel vulnerabilities. You will also learn about patching Bash vulnerability, packet filtering, handling incidents, and monitoring system logs. Finally, you will learn about auditing using system services and performing vulnerability scanning on Linux. By the end of this book, you will be able to secure your Linux systems and create a robust environment. What you will learn Learn about vulnerabilities and exploits in relation to Linux systems Configure and build a secure kernel and test it Learn about file permissions and how to securely modify files Authenticate users remotely and securely copy files on remote systems Review different network security methods and tools Perform vulnerability scanning on Linux machines using tools Learn about malware scanning and read through logs Who this book is for This book is intended for all those Linux users who already have knowledge of Linux file systems and administration. You should be familiar with basic Linux commands. Understanding information security and its risks to a Linux system is also helpful in understanding the recipes more easily.
Category: COMPUTERS. ISBN:

Essential Linux Device Drivers

https://www.ebooks.com/cj.asp?IID=726318&fc=AU&cjsku=726318...
âProbably the most wide ranging and complete Linux device driver book Iâve read.â --Alan Cox, Linux Guru and Key Kernel Developer âVery comprehensive and detailed, covering almost every single Linux device driver type.â --Theodore Tsâo, First Linux Kernel Developer in North America and Chief Platform Strategist of the Linux Foundation The Most Practical Guide to Writing Linux Device Drivers Linux now offers an exceptionally robust environment for driver development: with todayâs kernels, what once required years of development time can be accomplished in days. In this practical, example-driven book, one of the worldâs most experienced Linux driver developers systematically demonstrates how to develop reliable Linux drivers for virtually any device. Essential Linux Device Drivers is for any programmer with a working knowledge of operating systems and C, including programmers who have never written drivers before. Sreekrishnan Venkateswaran focuses on the essentials, bringing together all the concepts and techniques you need, while avoiding topics that only matter in highly specialized situations. Venkateswaran begins by reviewing the Linux 2.6 kernel capabilities that are most relevant to driver developers. He introduces simple device classes; then turns to serial buses such as I2C and SPI; external buses such as PCMCIA, PCI, and USB; video, audio, block, network, and wireless device drivers; user-space drivers; and drivers for embedded Linuxâone of todayâs fastest growing areas of Linux development. For each, Venkateswaran explains the technology, inspects relevant kernel source files, and walks through developing a complete example. ⢠Addresses drivers discussed in no other book, including drivers for I2C, video, sound, PCMCIA, and different types of flash memory ⢠Demystifies essential kernel services and facilities, including kernel threads and helper interfaces ⢠Teaches polling, asynchronous notification, and I/O control ⢠Introduces the Inter-Integrated Circuit Protocol for embedded Linux drivers ⢠Covers multimedia device drivers using the Linux-Video subsystem and Linux-Audio framework ⢠Shows how Linux implements support for wireless technologies such as Bluetooth, Infrared, WiFi, and cellular networking ⢠Describes the entire driver development lifecycle, through debugging and maintenance ⢠Includes reference appendixes covering Linux assembly, BIOS calls, and Seq files
Category: COMPUTERS. ISBN:
Previous123 [4] 5678Next