Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail.
In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users.
This book provides thorough knowledge of Linux TCP/IP stack and kernel framework for its network stack, including complete knowledge of design and implementation.
Beginning Linux Programming, Fourth Edition continues its unique approach to teaching UNIX programming in a simple and structured way on the Linux platform.
The World's Easiest Perl 5 Tutorial-Updated for Today's Applications and "e;Modern Perl"e; Best Practices "e;When I look at my bookshelf, I see eleven books on Perl programming.
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hackedExplore a variety of advanced Linux security techniques with the help of hands-on labsMaster the art of securing a Linux environment with this end-to-end practical guideBook DescriptionFrom creating networks and servers to automating the entire working environment, Linux has been extremely popular with system administrators for the last couple of decades.
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedingsKey FeaturesLearn the core techniques of computer forensics to acquire and secure digital evidence skillfullyConduct a digital forensic examination and document the digital evidence collectedPerform a variety of Windows forensic investigations to analyze and overcome complex challengesBook DescriptionA computer forensics investigator must possess a variety of skills, including the ability to answer legal questions, gather and document evidence, and prepare for an investigation.
The most comprehensive guide to ethical hacking and penetration testing with Kali Linux, from beginner to professionalKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using advanced real-life hacker techniquesUse Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environmentPurchase of the print or Kindle book includes a free eBook in the PDF formatBook DescriptionKali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry.
Discover advanced virtualization techniques and strategies to deliver centralized desktop and application servicesKey FeaturesLeverage advanced desktop virtualization techniques and strategies to transform your organization Build better virtualized services for your users with VMware Horizon 7.
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratchKey FeaturesGet up and running with Kali Linux 2019.
Master the concepts and techniques that will help you gain the LX0-103 and LX0-104 certifications on your first attempt Key FeaturesGet a clear understanding of how to achieve the Linux+ certificationExplore system architecture, shell scripts, data management, and Linux securityWork through practice and mock tests to pass both LX0-103 and LX0-104 examsBook DescriptionLinux+ certification demonstrates technical competency and provides a broad awareness of Linux operating systems.
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilitiesConduct a preliminary assessment of attack surfaces and run exploits in your labExplore new tools in the Kali Linux ecosystem for web penetration testingBook DescriptionWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure.
Get up and running with system programming concepts in LinuxKey FeaturesAcquire insight on Linux system architecture and its programming interfacesGet to grips with core concepts such as process management, signalling and pthreadsPacked with industry best practices and dozens of code examplesBook DescriptionThe Linux OS and its embedded and server applications are critical components of today's software infrastructure in a decentralized, networked universe.
Complete coverage of the newest exam release from the Linux Professional Institute, and the first step toward LPIC-1 and CompTIA Linux+Linux Essentials All-in-One Exam Guide covers this "e;first-of-its-kind"e; program intended for the academic sector, aspiring IT professionals, and anyone new to the world of Linux and open source technology.
Your one-stop guide to Linux--fully revised and expandedGet in-depth coverage of all Linux features, tools, and utilities from this thoroughly updated and comprehensive resource, designed for all Linux distributions.
The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services.
Learn, prepare, and practice for Red Hat RHCSA 8 (EX200) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.
Learn, prepare, and practice for Red Hat RHCE 8 EX294 exam success with this Cert Guide from Pearson IT Certification, a leader in IT certification learning.
Learn, prepare, and practice for Red Hat RHCE 8 EX294 exam success with this Cert Guide from Pearson IT Certification, a leader in IT certification learning.
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA-IN ONE BOOK From the basics to advanced techniques: no Linux security experience necessaryRealistic examples & step-by-step activities: practice hands-on without costly equipmentThe perfect introduction to Linux-based security for all students and IT professionals Linux distributions are widely used to support mission-critical applications and manage crucial data.
The Most Useful Tutorial and Reference, with Hundreds of High-Quality Examples for Every Popular Linux Distribution "e;First Sobell taught people how to use Linux .
The Most Useful Tutorial and Reference, with Hundreds of High-Quality Examples for Every Popular Linux Distribution "e;First Sobell taught people how to use Linux .
Transition to Microservices and DevOps to Transform Your Software Development Effectiveness Thanks to the tech sector's latest game-changing innovations-the Internet of Things (IoT), software-enabled networking, and software as a service (SaaS), to name a few-there is now a seemingly insatiable demand for platforms and architectures that can improve the process of application development and deployment.
Transition to Microservices and DevOps to Transform Your Software Development Effectiveness Thanks to the tech sector's latest game-changing innovations-the Internet of Things (IoT), software-enabled networking, and software as a service (SaaS), to name a few-there is now a seemingly insatiable demand for platforms and architectures that can improve the process of application development and deployment.
Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services.
Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services.
Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threatsPurchase of the print or Kindle book includes a free eBook in PDF format.