Linux

17
Eлектронна книга

CentOS 7 Linux Server Cookbook. Get your CentOS server up and running with this collection of more than 80 recipes created for CentOS 7 - essential for Linux fans! - Second Edition

Oliver Pelz, Jonathan Hobson

This book will provide you with a comprehensive series of starting points that will give you direct access to the inner workings of the latest CentOS version 7 and help you trim the learning curve to master your server.You will begin with the installation and basic configuration of CentOS 7, followed by learning how to manage your system, services and software packages. You will then gain an understanding of how to administer the file system, secure access to your server and configure various resource sharing services such as file, printer and DHCP servers across your network. Further on, we cover advanced topics such as FTP services, building your own DNS server, running database servers, and providing mail and web services. Finally, you will get a deep understanding of SELinux and you will learn how to work with Docker operating-system virtualization and how to monitor your IT infrastructure with Nagios.By the end of this book, you will have a fair understanding of all the aspects of configuring, implementing and administering CentOS 7 Linux server and how to put it in control.

18
Eлектронна книга

CentOS 7 Server Deployment Cookbook

Timothy Boronczyk

CentOS is derived from Red Hat Enterprise Linux (RHEL) sources and is widely used as a Linux server. This book will help you to better configure and manage Linux servers in varying scenarios and business requirements. Starting with installing CentOS, this book will walk you through the networking aspects of CentOS. You will then learn how to manage users and their permissions, software installs, disks, filesystems, and so on. You’ll then see how to secure connection to remotely access a desktop and work with databases. Toward the end, you will find out how to manage DNS, e-mails, web servers, and more. You will also learn to detect threats by monitoring network intrusion. Finally, the book will cover virtualization techniques that will help you make the most of CentOS.

19
Eлектронна книга

Certified Information Systems Security Professional (CISSP) Exam Guide. Master CISSP with hands-on bonus content and practical coverage of all eight exam domains

Ted Jordan, Ric Daza, Hinne Hettema

The (ISC)2 CISSP exam evaluates the competencies required to secure organizations, corporations, military sites, and government entities. The comprehensive CISSP certification guide offers up-to-date coverage of the latest exam syllabus, ensuring you can approach the exam with confidence, fully equipped to succeed.Complete with interactive flashcards, invaluable exam tips, and self-assessment questions, this CISSP book helps you build and test your knowledge of all eight CISSP domains. Detailed answers and explanations for all questions will enable you to gauge your current skill level and strengthen weak areas.This guide systematically takes you through all the information you need to not only pass the CISSP exam, but also excel in your role as a security professional. Starting with the big picture of what it takes to secure the organization through asset and risk management, it delves into the specifics of securing networks and identities. Later chapters address critical aspects of vendor security, physical security, and software security.By the end of this book, you'll have mastered everything you need to pass the latest CISSP certification exam and have this valuable desktop reference tool for ongoing security needs.

20
Eлектронна книга

CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version

Ted Jordan

The CISSP exam is for security professionals who understand that poor security can put a company out of business. The exam covers eight important security domains - risk management, security architecture, data security, network security, identity management, auditing, security operations, and software development security. Designed to cover all the concepts tested in the CISSP exam, CISSP (ISC)2 Certification Practice Exams and Tests will assess your knowledge of information security and introduce you to the tools you need to master to pass the CISSP exam (version May 2021). With more than 100 questions for every CISSP domain, this book will test your understanding and fill the gaps in your knowledge with the help of descriptive answers and detailed explanations. You'll also find two complete practice exams that simulate the real CISSP exam, along with answers. By the end of this book, you'll be ready to take and pass the (ISC)2 CISSP exam and achieve the Certified Information Systems Security Professional certification putting you in the position to build a career as a security engineer, security manager, or chief information security officer (CISO)

21
Eлектронна книга

CompTIA Linux+ Certification Guide. A comprehensive guide to achieving LX0-103 and LX0-104 certifications with mock exams

Philip Inshanally

The Linux+ certification provides a broad awareness of Linux operating systems, while giving professionals an upper hand in the IT industry. With this certification, you’ll be equipped with the all-important knowledge of installation, operation, administration, and troubleshooting services.This CompTIA Linux+ Certification Guide will give you an overview of the system architecture. You’ll understand how to install and uninstall Linux distributions, followed by working with various package managers. You’ll then move on to manipulating files and processes at the command-line interface (CLI) and creating, monitoring, killing, restarting, and modifying processes.As you progress, you’ll be equipped to work with display managers and learn how you can create, modify, and remove user accounts and groups, as well as understand how to automate tasks. The last set of chapters will help you configure dates and set up local and remote system logging. In addition to this, you’ll explore different internet protocols, and delve into network configuration, security administration, Shell scripting, and SQL management.By the end of this book, you’ll not only have got to grips with all the modules you need to study for the LX0-103 and LX0-104 certification exams, but you’ll also be able to test your understanding with practice questions and mock exams.

22
Eлектронна книга

CompTIA Security+ Practice Tests SY0-501. Practice tests in 4 different formats and 6 cheat sheets to help you pass the CompTIA Security+ exam

Ian Neil

CompTIA Security+ is a core security certification that will validate your baseline skills for a career in cybersecurity. Passing this exam will not only help you identify security incidents but will also equip you to resolve them efficiently. This book builds on the popular CompTIA Security+ Certification Guide, which mirrors the SY0-501 exam pattern.This practice test-based guide covers all six domains of the Security+ SY0-501 exam: threats, attacks, and vulnerabilities; technologies and tools; architecture and design; identity and access management; cryptography and PKI; and risk management. You’ll take six mock tests designed as per the official Security+ certification exam pattern, each covering significant aspects from an examination point of view. For each domain, the book provides a dedicated cheat sheet that includes important concepts covered in the test. You can even time your tests to simulate the actual exam. These tests will help you identify gaps in your knowledge and discover answers to tricky exam questions.By the end of this book, you’ll have developed and enhanced the skills necessary to pass the official CompTIA Security+ exam.

23
Eлектронна книга

CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition

Ian Neil

The CompTIA Security+ certification validates the fundamental knowledge required to perform core security functions and pursue a career in IT security. Authored by Ian Neil, a world-class CompTIA certification trainer, this book is a best-in-class study guide that fully covers the CompTIA Security+ 601 exam objectives.Complete with chapter review questions, realistic mock exams, and worked solutions, this guide will help you master the core concepts to pass the exam the first time you take it. With the help of relevant examples, you'll learn fundamental security concepts from certificates and encryption to identity and access management (IAM). As you progress, you'll delve into the important domains of the exam, including cloud security, threats, attacks and vulnerabilities, technologies and tools, architecture and design, risk management, cryptography, and public key infrastructure (PKI).You can access extra practice materials, including flashcards, performance-based questions, practical labs, mock exams, key terms glossary, and exam tips on the author's website at securityplus.training.By the end of this Security+ book, you'll have gained the knowledge and understanding to take the CompTIA exam with confidence.

24
Eлектронна книга

Containerization with LXC. Build, manage, and configure Linux containers

Konstantin Ivanov

In recent years, containers have gained wide adoption by businesses running a variety of application loads. This became possible largely due to the advent of kernel namespaces and better resource management with control groups (cgroups). Linux containers (LXC) are a direct implementation of those kernel features that provide operating system level virtualization without the overhead of a hypervisor layer. This book starts by introducing the foundational concepts behind the implementation of LXC, then moves into the practical aspects of installing and configuring LXC containers. Moving on, you will explore container networking, security, and backups. You will also learn how to deploy LXC with technologies like Open Stack and Vagrant. By the end of the book, you will have a solid grasp of how LXC is implemented and how to run production applications in a highly available and scalable way.

25
Eлектронна книга

Continuous Delivery with Docker and Jenkins. Delivering software at scale

Rafał Leszko

The combination of Docker and Jenkins improves your Continuous Delivery pipeline using fewer resources. It also helps you scale up your builds, automate tasks and speed up Jenkins performance with the benefits of Docker containerization. This book will explain the advantages of combining Jenkins and Docker to improve the continuous integration and delivery process of app development. It will start with setting up a Docker server and configuring Jenkins on it. It will then provide steps to build applications on Docker files and integrate them with Jenkins using continuous delivery processes such as continuous integration, automated acceptance testing, and configuration management. Moving on you will learn how to ensure quick application deployment with Docker containers along with scaling Jenkins using Docker Swarm. Next, you will get to know how to deploy applications using Docker images and testing them with Jenkins. By the end of the book, you will be enhancing the DevOps workflow by integrating the functionalities of Docker and Jenkins.

26
Eлектронна книга

Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity

Dr. Erdal Ozkaya

It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time.This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications.By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field.

27
Eлектронна книга

Debian Linux. System operacyjny dla każdego. Pierwsze starcie

Sylwester Zdanowski

Przestań płacić za programy -- przestaw się na Linuksa! Co to jest Debian Linux i czy warto z niego korzystać? Jak uruchomić system i używać podstawowych narzędzi? Na czym polega przewaga Linuksa nad produktami konkurencji? O systemie Linux słyszał chyba każdy użytkownik komputera, a jednak nie każdy z niego korzysta -- mimo dobrych opinii w środowisku informatyków. Ten zastanawiający fakt można zapewne wytłumaczyć niechęcią do oswajania się z nowym systemem, brakiem bliższych informacji na temat zalet Linuksa, różnorodności jego dystrybucji i możliwości dodatkowego oprogramowania. Dziś system ten -- zaopatrzony w przyjazny interfejs użytkownika i wszelkie pomoce dodatkowe -- staje się jedynym logicznym wyborem dla wszystkich, którzy cenią sobie bezpieczeństwo oraz niezawodność i nie lubią przepłacać! Debian to jedna z trzech podstawowych dystrybucji Linuksa, którą zainstalować można na każdym -- zarówno najstarszym, jak i najnowszym -- komputerze. W książce "Debian Linux. Pierwsze starcie" zawarto wszelkie informacje dotyczące tej właśnie wersji systemu. Dowiesz się z niej, jak zainstalować i uruchomić system, poznasz tajniki konfiguracji oraz nauczysz się korzystać z oprogramowania -- od obsługi programów biurowych, po administrowanie systemem oraz siecią. W razie problemów będziesz mógł zajrzeć do rozdziałów traktujących o zaawansowanych ustawieniach, możliwych modyfikacjach oraz dodatkowym oprogramowaniu. Przeczytasz także o zasadach bezpieczeństwa podczas pracy przy komputerze. Krótko mówiąc, znajdziesz tu wszystko, by od zaraz zacząć swoją przygodę z Linuksem! Instalacja systemu Podstawowe czynności Narzędzia biurowe -- OpenOffice, pakiet KDE, KOffice Pliki PDF i drukowanie Nagrywanie płyt Administracja systemem Administracja siecią Graficzne narzędzia administratora Narzędzia programisty Jądro systemu SAMBA, serwer LAMP, NAGIOS, BIND Zabezpieczanie systemu Nazwy programów w systemie Linux Najczęściej używane polecenia Poznaj dobry i bezpłatny system -- Debian Linux!

28
Eлектронна книга

Deployment with Docker. Apply continuous integration models, deploy applications quicker, and scale at large by putting Docker to work

Srdjan Grubor

Deploying Docker into production is considered to be one of the major pain points in developing large-scale infrastructures, and the documentation available online leaves a lot to be desired. With this book, you will learn everything you wanted to know to effectively scale your deployments globally and build a resilient, scalable, and containerized cloud platform for your own use.The book starts by introducing you to the containerization ecosystem with some concrete and easy-to-digest examples; after that, you will delve into examples of launching multiple instances of the same container. From there, you will cover orchestration, multi-node setups, volumes, and almost every relevant component of this new approach to deploying services. Using intertwined approaches, the book will cover battle-tested tooling, or issues likely to be encountered in real-world scenarios, in detail. You will also learn about the other supporting components required for a true PaaS deployment and discover common options to tie the whole infrastructure together.At the end of the book, you learn to build a small, but functional, PaaS (to appreciate the power of the containerized service approach) and continue to explore real-world approaches to implementing even larger global-scale services.

29
Eлектронна книга

Developing with Docker. Learn to automate your deployments with Docker

Jaroslaw Krochmalski, Jarosław Krochmalski

This fast-paced practical guide will get you up and running with Docker. Using Docker, you will be able to build, ship, and run many distributed applications in real time. You will start with quickly installing Docker and start working with images and containers. We will present different types of containers and their applications, and show you how to find and build images. You will learn how you can contribute to the image repository by publishing different images. This will familiarize you with the image building process and you will be able to successfully run your programs within containers.By finishing this book, you will be well equipped in deploying your applications using Docker and will have a clear understanding of concepts, techniques, and practical methods to get it running in production systems.

30
Eлектронна книга

Digital Forensics with Kali Linux. Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x - Second Edition

Shiva V. N. Parasram

Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. It has a wide range of tools to help for digital forensics investigations and incident response mechanisms.This updated second edition of Digital Forensics with Kali Linux covers the latest version of Kali Linux and The Sleuth Kit. You'll get to grips with modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, hex editor, and Axiom. Updated to cover digital forensics basics and advancements in the world of modern forensics, this book will also delve into the domain of operating systems. Progressing through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also show you how to create forensic images of data and maintain integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, operating system memory, and quantum cryptography.By the end of this book, you'll have gained hands-on experience of implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation, all using Kali Linux tools.

31
Eлектронна книга

Digital Forensics with Kali Linux. Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools

Shiva V. N. Parasram

Kali Linux is a Linux-based distribution used mainly for penetration testing and digital forensics. It has a wide range of tools to help in forensics investigations and incident response mechanisms. You will start by understanding the fundamentals of digital forensics and setting up your Kali Linux environment to perform different investigation practices. The book will delve into the realm of operating systems and the various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also teach you to create forensic images of data and maintain integrity using hashing tools. Next, you will also master some advanced topics such as autopsies and acquiring investigation data from the network, operating system memory, and so on. The book introduces you to powerful tools that will take your forensic abilities and investigations to a professional level, catering for all aspects of full digital forensic investigations from hashing to reporting. By the end of this book, you will have had hands-on experience in implementing all the pillars of digital forensics—acquisition, extraction, analysis, and presentation using Kali Linux tools.

32
Eлектронна книга

Docker Deep Dive. Zero to Docker in a single book - Fourth Edition

Nigel Poulton

This book begins by introducing Docker, its transformative role in modern application development, and why containerization has become essential in the tech industry. The first part builds a strong foundation by explaining core concepts such as containers, images, and the benefits of cloud-native development. Readers will also learn the history of Docker, its comparison to virtual machines, and how it is shaping emerging technologies like AI, WebAssembly, and Kubernetes.The second part dives deep into hands-on technical skills. Readers will explore Docker Engine architecture, work with images, containers, and multi-container apps, and use Docker Compose for real-world scenarios. Topics like container orchestration with Docker Swarm, advanced networking, overlay networks, and persistent storage are explained in detail. Readers will also gain practical knowledge on security, debugging containers, and vulnerability scanning with Docker Scout.By the end, readers will have a comprehensive understanding of Docker, from setup to scaling production-grade applications. Whether deploying AI-based apps, containerizing existing workloads, or mastering orchestration, this book provides the skills needed to thrive in a rapidly evolving tech landscape.