Beginning Linux Programming, Fourth Edition continues its unique approach to teaching UNIX programming in a simple and structured way on the Linux platform.
LPI Linux Certification in a Nutshell,Second Edition is an invaluable resource for determining what you needto practice to pass the Linux Professional Institute exams.
Change the way your organization deploys software at scale with this fast-paced guide to the world of DockerAbout This BookCut through the noise and in simple terms learn to package your applications and test, ship, and scale your containersFind and build images and successfully run your programs within containersBuild, deploy, and test your Docker containers and put them to work in productionWho This Book Is ForThis book is for IT professionals, system administrators, and DevOps professionals or anyone looking to quickly develop and deploy software to production at scale.
A practical handbook that will help you bridge the gap between Windows and Linux to develop apps that leverage the best features across both ecosystems with seamless interoperabilityKey FeaturesConfigure and control WSL to suit your needs and preferencesDiscover tips for working seamlessly between Windows and WSL Linux distrosLearn how to work effectively with containers in WSL, as well as how to containerize your development environments with Visual Studio Code to isolate your dependenciesBook DescriptionWindows Subsystem for Linux (WSL) allows you to run native Linux tools alongside traditional Windows applications.
The Art of UNIX Programming poses the belief that understanding the unwritten UNIX engineering tradition and mastering its design patterns will help programmers of all stripes to become better programmers.
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilitiesConduct a preliminary assessment of attack surfaces and run exploits in your labExplore new tools in the Kali Linux ecosystem for web penetration testingBook DescriptionWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure.
Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive in their coding.
For system administrators, programmers, and end users, shell command or carefully crafted shell script can save you time and effort, or facilitate consistency and repeatability for a variety of common tasks.
The term "e;peer-to-peer"e; has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project.
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hackedExplore a variety of advanced Linux security techniques with the help of hands-on labsMaster the art of securing a Linux environment with this end-to-end practical guideBook DescriptionFrom creating networks and servers to automating the entire working environment, Linux has been extremely popular with system administrators for the last couple of decades.
Take the latest editions of the challenging RHCSA and RHCE certification exams with confidenceThis comprehensive self-study guide clearly explains what you need to know and gets you fully prepared for the RHCSA and RHCE certification exams.
Discover best practices and troubleshooting solutions when working on ROSKey FeaturesDevelop complex robotic applications using ROS to interface robot manipulators and mobile robotsGain insight into autonomous navigation in mobile robots and motion planning in robot manipulatorsDiscover best practices and troubleshooting solutionsBook DescriptionIn this day and age, robotics has been gaining a lot of traction in various industries where consistency and perfection matter.
Ubuntu Server is a complete, free server operating system that just works, with the extra Ubuntu polish, innovation, and simplicity that administrators love.
Written by a leading developer and maintainer of the Linux kernel,Linux Kernel in a Nutshell is a comprehensiveoverview of kernel configuration and building, a critical task forLinux users and administrators.
Boost your C++ skills by working through realistic examples and exploring system specificationsKey FeaturesMaster essential skills to build robust Linux systemsExplore hands-on examples to demystify crucial development concepts, upskilling your system programming abilitiesMaster the art of creating software for Linux systems and supercharge your C++ skillsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionAround 35 million Linux and almost 2 billion Android users rely on C++ for everything from the simplest embedded and IoT devices to cloud services, supercomputing, and space exploration.
Your one-stop guide to Linux--fully revised and expandedGet in-depth coverage of all Linux features, tools, and utilities from this thoroughly updated and comprehensive resource, designed for all Linux distributions.
Deploy functions efficiently using different cloud-based serverless offeringsKey FeaturesUnderstand the concept of Function-as-a-ServiceImplement Serverless solutions using AWS Lambda, Azure Functions and Google Cloud FunctionsPractical approach towards choosing the best tool for your serverless environmentBook DescriptionServerless applications and architectures are gaining momentum and are increasingly being used by companies of all sizes.
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedingsKey FeaturesLearn the core techniques of computer forensics to acquire and secure digital evidence skillfullyConduct a digital forensic examination and document the digital evidence collectedPerform a variety of Windows forensic investigations to analyze and overcome complex challengesBook DescriptionA computer forensics investigator must possess a variety of skills, including the ability to answer legal questions, gather and document evidence, and prepare for an investigation.
Discover advanced virtualization techniques and strategies to deliver centralized desktop and application servicesKey FeaturesLeverage advanced desktop virtualization techniques and strategies to transform your organization Build better virtualized services for your users with VMware Horizon 7.
Perl is a versatile, powerful programming language used in a variety of disciplines, ranging from system administration to web programming to database manipulation.
The fact that Linux has more multimedia application choices than Mac OS X and Windows combined may come as a surprise to many, but not to those who know Linux well.
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA-IN ONE BOOK From the basics to advanced techniques: no Linux security experience necessaryRealistic examples & step-by-step activities: practice hands-on without costly equipmentThe perfect introduction to Linux-based security for all students and IT professionals Linux distributions are widely used to support mission-critical applications and manage crucial data.
Free as in Freedom interweaves biographical snapshots of GNU project founder Richard Stallman with the political, social and economic history of the free software movement.
There are lots of introductory C books, but this is the first one that has the no-nonsense, practical approach that has made Nutshell Handbooks famous.
Discover expert guidance for moving on-premises virtual machines running on Linux servers to Azure by implementing best practices and optimizing costsKey FeaturesWork with real-life migrations to understand the dos and don'ts of the processDeploy a new Linux virtual machine and perform automation and configuration managementGet to grips with debugging your system and collecting error logs with the help of hands-on examplesBook DescriptionWith cloud adoption at the core of digital transformation for organizations, there has been a significant demand for deploying and hosting enterprise business workloads in the cloud.