Discover advanced virtualization techniques and strategies to deliver centralized desktop and application servicesKey FeaturesLeverage advanced desktop virtualization techniques and strategies to transform your organization Build better virtualized services for your users with VMware Horizon 7.
The most comprehensive guide to ethical hacking and penetration testing with Kali Linux, from beginner to professionalKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using advanced real-life hacker techniquesUse Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environmentPurchase of the print or Kindle book includes a free eBook in the PDF formatBook DescriptionKali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry.
Written by a leading developer and maintainer of the Linux kernel,Linux Kernel in a Nutshell is a comprehensiveoverview of kernel configuration and building, a critical task forLinux users and administrators.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackersAbout This BookConduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate any ongoing infestationsCustomize Kali Linux with this professional guide so it becomes your pen testing toolkitWho This Book Is ForIf you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you.
Dive in to the cutting edge techniques of Linux KVM virtualization, and build the virtualization solutions your datacentre demandsAbout This BookBecome an expert in Linux virtualizationMigrate your virtualized datacenter to the cloudFind out how to build a large scale virtualization solution that will transform your organizationWho This Book Is ForLinux administrators - if you want to build incredible, yet manageable virtualization solutions with KVM this is the book to get you there.
SUSE Linux: A Complete Guide to Novell's Community Distribution will get you up to speed quickly and easily on SUSE, one of the most friendly and usable Linux distributions around.
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience.
Redundant Array of Independent Disks (RAID) technology is becoming a standard feature of computer systems that support mission-critical services like file sharing, mail exchange, or Web servers.
Build Complete Embedded Linux Systems Quickly and Reliably Developers are increasingly integrating Linux into their embedded systems: It supports virtually all hardware architectures and many peripherals, scales well, offers full source code, and requires no royalties.
Learn, prepare, and practice for Red Hat RHCE 8 EX294 exam success with this Cert Guide from Pearson IT Certification, a leader in IT certification learning.
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilitiesConduct a preliminary assessment of attack surfaces and run exploits in your labExplore new tools in the Kali Linux ecosystem for web penetration testingBook DescriptionWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure.
Ubuntu Server is a complete, free server operating system that just works, with the extra Ubuntu polish, innovation, and simplicity that administrators love.
Discover best practices and troubleshooting solutions when working on ROSKey FeaturesDevelop complex robotic applications using ROS to interface robot manipulators and mobile robotsGain insight into autonomous navigation in mobile robots and motion planning in robot manipulatorsDiscover best practices and troubleshooting solutionsBook DescriptionIn this day and age, robotics has been gaining a lot of traction in various industries where consistency and perfection matter.
Dieses Buch erleichtert den Einstieg in die spanische Wirtschaftssprache: Sprachliche und inhaltliche Informationen ermöglichen das Verständnis und den Gebrauch der grundlegenden spanischen Wirtschaftstermini.
Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services.
If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you.
Explore the core functionality of containerizing your applications and making them production-readyKey FeaturesGrasp basic to advanced Docker concepts with this comprehensive guideGet acquainted with Docker containers, Docker images, orchestrators, cloud integration, and networkingLearn to simplify dependencies and deploy and test containers in productionBook DescriptionContainers enable you to package an application with all the components it needs, such as libraries and other dependencies, and ship it as one package.
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedingsKey FeaturesLearn the core techniques of computer forensics to acquire and secure digital evidence skillfullyConduct a digital forensic examination and document the digital evidence collectedPerform a variety of Windows forensic investigations to analyze and overcome complex challengesBook DescriptionA computer forensics investigator must possess a variety of skills, including the ability to answer legal questions, gather and document evidence, and prepare for an investigation.
Deploy functions efficiently using different cloud-based serverless offeringsKey FeaturesUnderstand the concept of Function-as-a-ServiceImplement Serverless solutions using AWS Lambda, Azure Functions and Google Cloud FunctionsPractical approach towards choosing the best tool for your serverless environmentBook DescriptionServerless applications and architectures are gaining momentum and are increasingly being used by companies of all sizes.
Beginning Linux Programming, Fourth Edition continues its unique approach to teaching UNIX programming in a simple and structured way on the Linux platform.
The most comprehensive guide to ethical hacking and penetration testing with Kali Linux, from beginner to professionalKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using advanced real-life hacker techniquesUse Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environmentPurchase of the print or Kindle book includes a free eBook in the PDF formatBook DescriptionKali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry.
The World's Easiest Perl 5 Tutorial-Updated for Today's Applications and "e;Modern Perl"e; Best Practices "e;When I look at my bookshelf, I see eleven books on Perl programming.
Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive in their coding.
This handy cookbook teaches new-to-intermediate Linux users the essential skills necessary to manage a Linux system, using both graphical and command-line tools.
The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services.
Python Essential Reference is the definitive reference guide to the Python programming language - the one authoritative handbook that reliably untangles and explains both the core Python language and the most essential parts of the Python library.