Systemy operacyjne
Christopher Duffy, Mohit Raj, Cameron Buchanan, Andrew...
Cybercriminals are always one step ahead, when it comes to tools and techniques. This means you need to use the same tools and adopt the same mindset to properly secure your software. This course shows you how to do just that, demonstrating how effective Python can be for powerful pentesting that keeps your software safe. Comprising of three key modules, follow each one to push your Python and security skills to the next level.In the first module, we’ll show you how to get to grips with the fundamentals. This means you’ll quickly find out how to tackle some of the common challenges facing pentesters using custom Python tools designed specifically for your needs. You’ll also learn what tools to use and when, giving you complete confidence when deploying your pentester tools to combat any potential threat.In the next module you’ll begin hacking into the application layer. Covering everything from parameter tampering, DDoS, XXS and SQL injection, it will build on the knowledge and skills you learned in the first module to make you an even more fluent security expert.Finally in the third module, you’ll find more than 60 Python pentesting recipes. We think this will soon become your trusted resource for any pentesting situation.This Learning Path combines some of the best that Packt has to offer in one complete, curated package. It includes content from the following Packt products:? Learning Penetration Testing with Python by Christopher Duffy? Python Penetration Testing Essentials by Mohit? Python Web Penetration Testing Cookbook by Cameron Buchanan,Terry Ip, Andrew Mabbitt, Benjamin May and Dave Mound
React Native Cookbook. Recipes for solving common React Native development problems - Second Edition
Daniel Ward
If you are a developer looking to create mobile applications with maximized code reusability and minimized cost, React Native is what you need. With this practical guide, you’ll be able to build attractive UIs, tackle common problems in mobile development, and achieve improved performance in mobile environments.This book starts by covering the common techniques for React Native customization and helps you set up your development platforms. Over the course of the book, you’ll work through a wide variety of recipes that help you create, style, and animate your apps with built-in React Native and custom third-party components. You’ll also develop real-world browser-based authentication, build a fully functional audio player, and integrate Google Maps in your apps. This book will help you explore different strategies for working with data, including leveraging the popular Redux library and optimizing your app’s dataflow. You’ll also learn how to write native device functionality for new and existing React Native projects and how app deployment works.By the end of this book, you'll be equipped with tips and tricks to write efficient code and have the skills to build full iOS and Android applications using React Native.
Miguel Pérez Colino, Pablo Iranzo Gómez, Scott...
Whether in infrastructure or development, as a DevOps or site reliability engineer, Linux skills are now more relevant than ever for any IT job, forming the foundation of understanding the most basic layer of your architecture. With Red Hat Enterprise Linux (RHEL) becoming the most popular choice for enterprises worldwide, achieving the Red Hat Certified System Administrator (RHCSA) certification will validate your Linux skills to install, configure, and troubleshoot applications and services on RHEL systems. Complete with easy-to-follow tutorial-style content, self-assessment questions, tips, best practices, and practical exercises with detailed solutions, this book covers essential RHEL commands, user and group management, software management, networking fundamentals, and much more. You'll start by learning how to create an RHEL 8 virtual machine and get to grips with essential Linux commands. You'll then understand how to manage users and groups on an RHEL 8 system, install software packages, and configure your network interfaces and firewall. As you advance, the book will help you explore disk partitioning, LVM configuration, Stratis volumes, disk compression with VDO, and container management with Podman, Buildah, and Skopeo. By the end of this book, you'll have covered everything included in the RHCSA EX200 certification and be able to use this book as a handy, on-the-job desktop reference guide. This book and its contents are solely the work of Miguel Pérez Colino, Pablo Iranzo Gómez, and Scott McCarty. The content does not reflect the views of their employer (Red Hat Inc.). This work has no connection to Red Hat, Inc. and is not endorsed or supported by Red Hat, Inc.
Rejestr Windows 7. Praktyczne przykłady
Witold Wrotek
Zajrzyj pod maskę systemu Windows 7 Poznaj budowę rejestru systemowego Naucz się edytować klucze i modyfikować wartości Odkryj potężne możliwości dostosowywania środowiska do swoich potrzeb Rejestr Windows jest bazą danych konfiguracyjnych, za pomocą których można kontrolować każdy aspekt działania systemu operacyjnego. Zawiera on informacje na temat zainstalowanego w komputerze sprzętu i oprogramowania, a także ustawienia związane z poszczególnymi użytkownikami środowiska. Edytując wpisy przechowywane w rejestrze, można w znacznym stopniu dostosować wygląd i sposób funkcjonowania systemu do własnych potrzeb oraz zoptymalizować jego pracę w celu zwiększenia ogólnej wydajności komputera. Aby osiągnąć odpowiednie efekty, niczego przy okazji nie psując, trzeba oczywiście dysponować wiedzą, przez niektórych uważaną za niemal magiczną. Dzięki książce "Rejestr Windows 7. Praktyczne przykłady " również Ty możesz dołączyć do grona osób wtajemniczonych. Dowiesz się z niej, jak zbudowany jest ów rejestr i jaką rolę pełnią poszczególne jego elementy. Nauczysz się zabezpieczać go przed awariami i właściwie reagować w sytuacjach, gdy mimo wszystko wystąpi jakiś błąd. Poznasz możliwości drzemiące w rejestrze i metody wykorzystywania ich w celu modyfikacji interfejsu środowiska czy działania dostępnych w nim narzędzi. Odkryjesz również sposoby optymalizacji i defragmentacji rejestru, a wszystko to bez konieczności wczytywania się w techniczną nowomowę i przebijania przez niezrozumiałą dokumentację. Szybko, łatwo, praktycznie. Struktura i funkcje rejestru systemu Windows 7 Sposoby dodawania oraz edytowania kluczy i wartości Zabezpieczanie rejestru przed awariami i postępowanie w przypadku ich wystąpienia Dostosowywanie interfejsu systemu do swoich potrzeb Kontrolowanie działania aplikacji i narzędzi systemowych Zarządzanie usługami z poziomu rejestru Utrzymywanie rejestru w dobrej kondycji
Scripting. Automation with Bash, PowerShell, and Python
Rheinwerk Publishing, Inc, Michael Kofler
This comprehensive scripting guide empowers system administrators, developers, and power users to automate repetitive IT tasks across platforms using three major scripting languages: Bash, PowerShell, and Python. The book opens with foundational scripting concepts and showcases what you can accomplish with just ten lines of code. It continues with in-depth chapters on each language, emphasizing syntax, control structures, error handling, and modularity.Readers will explore practical techniques for managing files, parsing text, utilizing regular expressions, and working with JSON, XML, and INI formats. The book dives into job automation with cron and Task Scheduler, secure communication via SSH, and scripting in professional environments with tools like Visual Studio Code and Git.The final section applies scripting to real-world cases, including system backups, image processing, web scraping, API consumption, database interactions, cloud integration, and virtual machine automation. With this book, readers build a strong scripting toolkit to efficiently manage modern IT workflows.
SELinux System Administration. Effectively secure your Linux systems with SELinux - Second Edition
Sven Vermeulen
Do you have the crucial job of protecting your private and company systems from malicious attacks and undefined application behavior? Are you looking to secure your Linux systems with improved access controls? Look no further, intrepid administrator! This book will show you how to enhance your system’s secure state across Linux distributions, helping you keep application vulnerabilities at bay. This book covers the core SELinux concepts and shows you how to leverage SELinux to improve the protection measures of a Linux system. You will learn the SELinux fundamentals and all of SELinux’s configuration handles including conditional policies, constraints, policy types, and audit capabilities. These topics are paired with genuine examples of situations and issues you may come across as an administrator. In addition, you will learn how to further harden the virtualization offering of both libvirt (sVirt) and Docker through SELinux. By the end of the book you will know how SELinux works and how you can tune it to meet your needs.
Sven Vermeulen
Linux is a dominant player in many organizations and in the cloud. Securing the Linux environment is extremely important for any organization, and Security-Enhanced Linux (SELinux) acts as an additional layer to Linux system security. SELinux System Administration covers basic SELinux concepts and shows you how to enhance Linux system protection measures. You will get to grips with SELinux and understand how it is integrated. As you progress, you’ll get hands-on experience of tuning and configuring SELinux and integrating it into day-to-day administration tasks such as user management, network management, and application maintenance. Platforms such as Kubernetes, system services like systemd, and virtualization solutions like libvirt and Xen, all of which offer SELinux-specific controls, will be explained effectively so that you understand how to apply and configure SELinux within these applications. If applications do not exert the expected behavior, you’ll learn how to fine-tune policies to securely host these applications. In case no policies exist, the book will guide you through developing custom policies on your own.By the end of this Linux book, you’ll be able to harden any Linux system using SELinux to suit your needs and fine-tune existing policies and develop custom ones to protect any app and service running on your Linux systems.