Linux

129
Ebook

Linux System Programming Techniques. Become a proficient Linux system programmer using expert recipes and techniques

Jack-Benny Persson

Linux is the world's most popular open source operating system (OS). Linux System Programming Techniques will enable you to extend the Linux OS with your own system programs and communicate with other programs on the system.The book begins by exploring the Linux filesystem, its basic commands, built-in manual pages, the GNU compiler collection (GCC), and Linux system calls. You'll then discover how to handle errors in your programs and will learn to catch errors and print relevant information about them. The book takes you through multiple recipes on how to read and write files on the system, using both streams and file descriptors. As you advance, you'll delve into forking, creating zombie processes, and daemons, along with recipes on how to handle daemons using systemd. After this, you'll find out how to create shared libraries and start exploring different types of interprocess communication (IPC). In the later chapters, recipes on how to write programs using POSIX threads and how to debug your programs using the GNU debugger (GDB) and Valgrind will also be covered.By the end of this Linux book, you will be able to develop your own system programs for Linux, including daemons, tools, clients, and filters.

130
Ebook

Linux w biurze i nie tylko

Sergiusz Flanczewski

Zbadaj Linuksa od podszewki! Pierwsze koty za płoty, czyli zasady działania i sposób instalacji Linuksa Jak to ugryźć, czyli obsługa plików i katalogów oraz konfiguracja środowiska KDE Poskromić system, czyli sieci lokalne, Internet i podłączanie urządzeń zewnętrznych Dyskusja o wyższości Linuksa nad Windowsem — i odwrotnie — przypomina tę o wyższości świąt Wielkanocy nad świętami Bożego Narodzenia, czyli zwyczajnie nie ma sensu. Jeśli jednak interesuje Cię sposób działania Linuksa albo masz w planach pracę na komputerze z tym właśnie systemem, ten poradnik z pewnością okaże się niezwykle potrzebny. Na pewno wiesz już, że ten system operacyjny jest odporniejszy na wirusy, bardziej elastyczny i tworzony przez całą społeczność użytkowników, gotowych w razie potrzeby pospieszyć z pomocą. Niewykluczone jednak, że przeraża Cię jego pozorne skomplikowanie i potrzebujesz rzetelnych informacji, by w końcu rozgryźć jego tajemnicę. Książka "Linux w biurze i nie tylko" dostarczy Ci wszelkich wiadomości o tym właśnie systemie, a konkretnie o jednej z jego odmian: Kubuntu, czyli Ubuntu ze środowiskiem graficznym KDE 4. Dzięki niej dowiesz się, na czym polega istota działania Linuksa, jak zainstalować system (z dołączonej płyty CD), skonfigurować grafikę, wykonywać operacje na plikach i katalogach, korzystać z urządzeń zewnętrznych i sieci. Bez trudu opanujesz także obsługę systemu zarówno w trybie konsoli, jak i przy użyciu interfejsu graficznego. I zanim się obejrzysz, Linux stanie się niezastąpionym narzędziem w Twojej codziennej pracy. Informacje podstawowe, czyli Linux w pigułce Instalacja systemu i pierwsze uruchomienie Kubuntu Konfiguracja KDE — wskaźnik myszy, pulpit, plasmoidy Obsługa plików i katalogów — katalog domowy, Dolphin, Konqueror Sieć lokalna i połączenia komputerów o różnych systemach operacyjnych Internet — podłączanie, używane programy i ich konfiguracja Drukarki i skanery — instalacja i udostępnianie Narzędzia internetowe — przeglądarki, programy pocztowe, Adobe Flash Player Zacznij w końcu korzystać z bogactwa możliwości Linuksa!

131
Ebook

Linux. Wiersz poleceń i skrypty powłoki. Biblia. Wydanie IV

Christine Bresnahan, Richard Blum

Odkąd systemy linuksowe mają atrakcyjne interfejsy graficzne, wielu administratorów wykonuje swoje zadania za pomocą myszy. Wiersz poleceń jest o wiele trudniejszym interfejsem, ten sposób pracy jednak pozwala na wykorzystanie pełnego potencjału Linuksa i uzyskanie dostępu do funkcji, które w inny sposób byłyby nieosiągalne. Umiejętność pisania skryptów wiersza poleceń i powłoki Linuksa wciąż jest niezwykle ważna dla każdego administratora, któremu zależy na efektywnym działaniu systemu. Ta książka, podobnie jak inne z serii "Biblia", zawiera zarówno niezbędne teoretyczne informacje, jak i mnóstwo praktycznych wskazówek i instrukcji, dzięki czemu jest znakomitą pomocą w nauce pisania skryptów dla Linuksa. Pokazano tu, kiedy efektywniej jest używać interfejsu graficznego, a kiedy lepiej sięgnąć do wiersza poleceń. Opisano elementy systemu Linux i przedstawiono podstawowe informacje o powłoce, a także o pracy w wierszu poleceń. Zaprezentowano techniki przetwarzania danych użytkownika w skryptach, pracę z systemami plików, wreszcie - sposoby instalacji i aktualizacji oprogramowania. Sporo miejsca poświęcono pracy z wyrażeniami regularnymi i zaawansowanym metodom manipulacji danymi, pokazano też, jak zmodyfikować skrypty powłoki, aby działały w innych powłokach Linuksa. Najciekawsze zagadnienia: tworzenie praktycznych skryptów i narzędzi skryptowych i zarządzanie nimi alternatywne powłoki, takie jak dash i zsh edytory gawk i sed podstawowe i rozszerzone wyrażenia regularne tworzenie skryptów powłoki dla pulpitów graficznych w środowiskach KDE i GNOME pisanie podstawowych i zaawansowanych funkcji Wiersz poleceń: oto pełny potencjał Linuksa!

132
Ebook

Machine Learning with Swift. Artificial Intelligence for iOS

Alexander Sosnovshchenko, Oleksandr Baiev

Machine learning as a field promises to bring increased intelligence to the software by helping us learn and analyse information efficiently and discover certain patterns that humans cannot. This book will be your guide as you embark on an exciting journey in machine learning using the popular Swift language. We’ll start with machine learning basics in the first part of the book to develop a lasting intuition about fundamental machine learning concepts. We explore various supervised and unsupervised statistical learning techniques and how to implement them in Swift, while the third section walks you through deep learning techniques with the help of typical real-world cases. In the last section, we will dive into some hard core topics such as model compression, GPU acceleration and provide some recommendations to avoid common mistakes during machine learning application development. By the end of the book, you'll be able to develop intelligent applications written in Swift that can learn for themselves.

133
Ebook

Managing and Visualizing Your BIM Data. Understand the fundamentals of computer science for data visualization using Autodesk Dynamo, Revit, and Microsoft Power BI

Ernesto Pellegrino, Manuel André Bottiglieri, Gavin Crump, Luisa Cypriano Pieper, ...

Business intelligence software has rapidly spread its roots in the AEC industry during the last few years. This has happened due to the presence of rich digital data in BIM models whose datasets can be gathered, organized, and visualized through software such as Autodesk Dynamo BIM and Power BI.Managing and Visualizing Your BIM Data helps you understand and implement computer science fundamentals to better absorb the process of creating Dynamo scripts and visualizing the collected data on powerful dashboards. This book provides a hands-on approach and associated methodologies that will have you productive and up and running in no time. After understanding the theoretical aspects of computer science and related topics, you will focus on Autodesk Dynamo to develop scripts to manage data. Later, the book demonstrates four case studies from AEC experts across the world. In this section, you’ll learn how to get started with Autodesk Dynamo to gather data from a Revit model and create a simple C# plugin for Revit to stream data on Power BI directly. As you progress, you’ll explore how to create dynamic Power BI dashboards using Revit floor plans and make a Power BI dashboard to track model issues.By the end of this book, you’ll have learned how to develop a script to gather a model’s data and visualize datasets in Power BI easily.

134
Ebook

Manjaro Linux User Guide. Gain proficiency in Linux through one of its best user-friendly Arch-based distributions

Atanas Georgiev Rusev

Manjaro Linux, renowned for its smooth installation, user-friendly interface, and robust security features, is an Arch-based fast Linux distro enhanced with multiple graphical environments, GUI modules, and a full application setup, resulting in a top Linux distribution. This book is your guide to unlocking its full potential.Starting with an overview of the different editions and detailed installation instructions, the initial section offers insights into the GUI modules and features of each official edition. You’ll then explore the regular software, work with the Terminal, and cover topics such as package management, filesystems, automounts, storage, backups, and encryption. The subsequent chapters will help you get to grips with data sharing, security and networking, firewalls, VPNs, and SSH in depth. Finally, you’ll become well-versed in service and user management, troubleshooting, scripting, automation, and kernel switching.The book’s modular structure allows you to quickly navigate to the specific information you need, and by its end, you’ll have gained an appreciation of what sets Manjaro Linux apart.

135
Ebook

Mastering Assembly Programming. From instruction set to kernel module with Intel processor

Alexey Lyashko

The Assembly language is the lowest level human readable programming language on any platform. Knowing the way things are on the Assembly level will help developers design their code in a much more elegant and efficient way. It may be produced by compiling source code from a high-level programming language (such as C/C++) but can also be written from scratch. Assembly code can be converted to machine code using an assembler.The first section of the book starts with setting up the development environment on Windows and Linux, mentioning most common toolchains. The reader is led through the basic structure of CPU and memory, and is presented the most important Assembly instructions through examples for both Windows and Linux, 32 and 64 bits. Then the reader would understand how high level languages are translated into Assembly and then compiled into object code. Finally we will cover patching existing code, either legacy code without sources or a running code in same or remote process.

136
Ebook

Mastering Bash. A Step-by-Step Guide to working with Bash Programming and Shell Scripting

Giorgio Zarrelli

System administration is an everyday effort that involves a lot of tedious tasks, and devious pits. Knowing your environment is the key to unleashing the most powerful solution that will make your life easy as an administrator, and show you the path to new heights. Bash is your Swiss army knife to set up your working or home environment as you want, when you want.This book will enable you to customize your system step by step, making your own real, virtual, home out of it. The journey will take you swiftly through the basis of the shell programming in Bash to more interesting and challenging tasks. You will be introduced to one of the most famous open source monitoring systems—Nagios, and write complex programs with it in any languages. You’ll see how to perform checks on your sites and applications.Moving on, you’ll discover how to write your own daemons so you can create your services and take advantage of inter-process communication to let your scripts talk to each other. So, despite these being everyday tasks, you’ll have a lot of fun on the way. By the end of the book, you will have gained advanced knowledge of Bash that will help you automate routine tasks and manage your systems.

137
Ebook

Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

Cesar Bravo, Darren Kitchen

Every organization has its own data and digital assets that need to be protected against an ever-growing threat landscape that compromises the availability, integrity, and confidentiality of crucial data. Therefore, it is important to train professionals in the latest defensive security skills and tools to secure them. Mastering Defensive Security provides you with in-depth knowledge of the latest cybersecurity threats along with the best tools and techniques needed to keep your infrastructure secure.The book begins by establishing a strong foundation of cybersecurity concepts and advances to explore the latest security technologies such as Wireshark, Damn Vulnerable Web App (DVWA), Burp Suite, OpenVAS, and Nmap, hardware threats such as a weaponized Raspberry Pi, and hardening techniques for Unix, Windows, web applications, and cloud infrastructures. As you make progress through the chapters, you'll get to grips with several advanced techniques such as malware analysis, security automation, computer forensics, and vulnerability assessment, which will help you to leverage pentesting for security.By the end of this book, you'll have become familiar with creating your own defensive security tools using IoT devices and developed advanced defensive security skills.

138
Ebook

Mastering Docker Enterprise. A companion guide for agile container adoption

Mark Panthofer

While known mostly as the open source engine behind tens of millions of server nodes, Docker also offers commercially supported enterprise tooling known as the Docker Enterprise. This platform leverages the deep roots from Docker Engine - Community (formerly Docker CE) and Kubernetes, but adds support and tooling to efficiently operate a secure container platform at scale. With hundreds of enterprises on board, best practices and adoption patterns are emerging rapidly. These learning points can be used to inform adopters and help manage the enterprise transformation associated with enterprise container adoption. This book starts by explaining the case for Docker Enterprise, as well as its structure and reference architecture. From there, we progress through the PoC,pilot and production stages as a working model for adoption, evolving the platform’s design and configuration for each stage and using detailed application examples along the way to clarify and demonstrate important concepts.The book concludes with Docker’s impact on other emerging software technologies, such as Blockchain and Serverless computing.By the end of this book, you’ll have a better understanding of what it takes to get your enterprise up and running with Docker Enterprise and beyond.

139
Ebook

Mastering Embedded Linux Programming. Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell) - Third Edition

Frank Vasquez, Chris Simmonds

If you’re looking for a book that will demystify embedded Linux, then you’ve come to the right place. Mastering Embedded Linux Programming is a fully comprehensive guide that can serve both as means to learn new things or as a handy reference.The first few chapters of this book will break down the fundamental elements that underpin all embedded Linux projects: the toolchain, the bootloader, the kernel, and the root filesystem. After that, you will learn how to create each of these elements from scratch and automate the process using Buildroot and the Yocto Project. As you progress, the book will show you how to implement an effective storage strategy for flash memory chips and install updates to a device remotely once it’s deployed.You’ll also learn about the key aspects of writing code for embedded Linux, such as how to access hardware from apps, the implications of writing multi-threaded code, and techniques to manage memory in an efficient way. The final chapters demonstrate how to debug your code, whether it resides in apps or in the Linux kernel itself.You’ll also cover the different tracers and profilers that are available for Linux so that you can quickly pinpoint any performance bottlenecks in your system.By the end of this Linux book, you’ll be able to create efficient and secure embedded devices using Linux.

140
Ebook

Mastering Embedded Linux Programming. Unleash the full potential of Embedded Linux with Linux 4.9 and Yocto Project 2.2 (Morty) Updates - Second Edition

Chris Simmonds

Embedded Linux runs many of the devices we use every day, from smart TVs to WiFi routers, test equipment to industrial controllers - all of them have Linux at their heart. Linux is a core technology in the implementation of the inter-connected world of the Internet of Things.The comprehensive guide shows you the technologies and techniques required to build Linux into embedded systems. You will begin by learning about the fundamental elements that underpin all embedded Linux projects: the toolchain, the bootloader, the kernel, and the root filesystem. You’ll see how to create each of these elements from scratch, and how to automate the process using Buildroot and the Yocto Project. Moving on, you’ll find out how to implement an effective storage strategy for flash memory chips, and how to install updates to the device remotely once it is deployed. You’ll also get to know the key aspects of writing code for embedded Linux, such as how to access hardware from applications, the implications of writing multi-threaded code, and techniques to manage memory in an efficient way. The final chapters show you how to debug your code, both in applications and in the Linux kernel, and how to profile the system so that you can look out for performance bottlenecks.By the end of the book, you will have a complete overview of the steps required to create a successful embedded Linux system.

141
Ebook

Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition

Vijay Kumar Velu, Robert Beggs

This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters.To start with, you'll use a laboratory environment to validate tools and techniques, along with an application that supports a collaborative approach for pentesting. You'll then progress to passive reconnaissance with open source intelligence and active reconnaissance of the external and internal infrastructure. You'll also focus on how to select, use, customize, and interpret the results from different vulnerability scanners, followed by examining specific routes to the target, which include bypassing physical security and the exfiltration of data using a variety of techniques. You'll discover concepts such as social engineering, attacking wireless networks, web services, and embedded devices.Once you are confident with these topics, you'll learn the practical aspects of attacking user client systems by backdooring with fileless techniques, followed by focusing on the most vulnerable part of the network – directly attacking the end user. By the end of this book, you'll have explored approaches for carrying out advanced pentesting in tightly secured environments, understood pentesting and hacking techniques employed on embedded peripheral devices.

142
Ebook

Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition

Vijay Kumar Velu

This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers. We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network—directly and bypassing the controls, attacking the end user and maintaining persistence access through social media.You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing

143
144
Ebook

Mastering Linux Administration. A comprehensive guide to installing, configuring, and maintaining Linux systems in the modern data center

Alexandru Calcatinge, Julian Balog

Linux plays a significant role in modern data center management and provides great versatility in deploying and managing your workloads on-premises and in the cloud. This book covers the important topics you need to know about for your everyday Linux administration tasks.The book starts by helping you understand the Linux command line and how to work with files, packages, and filesystems. You'll then begin administering network services and hardening security, and learn about cloud computing, containers, and orchestration. Once you've learned how to work with the command line, you'll explore the essential Linux commands for managing users, processes, and daemons and discover how to secure your Linux environment using application security frameworks and firewall managers. As you advance through the chapters, you'll work with containers, hypervisors, virtual machines, Ansible, and Kubernetes. You'll also learn how to deploy Linux to the cloud using AWS and Azure.By the end of this Linux book, you'll be well-versed with Linux and have mastered everyday administrative tasks using workflows spanning from on-premises to the cloud. If you also find yourself adopting DevOps practices in the process, we'll consider our mission accomplished.