Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
Packt Publishing - ebooki
-
In an era plagued by hacking and security breaches, this book navigates you through Kali Linux's latest version, adeptly addressing critical security dimensions. From confidentiality and integrity to availability and access control, empower yourself with efficient Kali Linux-based solutions.
- PDF + ePub pkt
The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition
-
With this new edition, get to grips with Linux kernel development on the long-term 6.1 (S)LTS kernel in a hands-on way with the help of brilliant code examples. Linux Kernel Programming 2E teaches you how to write high-quality kernel modules suitable for real-world products, following industry best practices and with security awareness. It covers e
- PDF + ePub pkt
Linux Kernel Programming. A comprehensive and practical guide to kernel internals, writing modules, and kernel synchronization - Second Edition Linux Kernel Programming. A comprehensive and practical guide to kernel internals, writing modules, and kernel synchronization - Second Edition
-
Dive into the world of password security with our comprehensive Kali Linux course, designed to equip you with cutting-edge techniques for password cracking and defense, essential for modern cybersecurity.
- PDF + ePub pkt
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Explore how you can use the Linux command line to supercharge your day-to-day work as a software developer. You’ll take a hands-on approach to learn Linux command-line skills and get comfortable with the concepts you need to understand during local development and remote deployment of your software.
- PDF + ePub pkt
The Software Developer's Guide to Linux. A practical, no-nonsense guide to using the Linux command line and utilities as a software developer The Software Developer's Guide to Linux. A practical, no-nonsense guide to using the Linux command line and utilities as a software developer
-
This Oracle Linux Cookbook offers an exhaustive review of the Oracle Linux ecosystem and practical guidance for setting up, configuring, and managing your systems effectively. It will help you transition to a more robust ecosystem while maintaining the highest standards for performance and security.
- PDF + ePub pkt
Oracle Linux Cookbook. Embrace Oracle Linux and master Linux Server Management Oracle Linux Cookbook. Embrace Oracle Linux and master Linux Server Management
Erik Benner, Erik B. Thomsen, Jonathan Spindel, Robert G. Shimp
-
This comprehensive guidebook provides a detailed overview of 100 essential Linux commands that every system administrator should know. With clear explanations and practical examples, this book is an invaluable resource for improving your skills and expertise in Linux administration. From package management and file manipulation to networking and ma
- PDF + ePub pkt
Essential Linux Commands. 100 Linux commands every system administrator should know Essential Linux Commands. 100 Linux commands every system administrator should know
-
This book will introduce you to the versatility of Manjaro Linux and its advantages and functionality. You’ll learn how to install, use, and maintain the operating system with a focus on security and privacy protection. Whether you're a Linux novice or an experienced user, this book will help you unlock the full potential of Manjaro.
- PDF + ePub pkt
Manjaro Linux User Guide. Gain proficiency in Linux through one of its best user-friendly Arch-based distributions Manjaro Linux User Guide. Gain proficiency in Linux through one of its best user-friendly Arch-based distributions
-
Mobile DevOps Playbook is a comprehensive guide covering how to build, test, release, and monitor mobile applications. It is for everyone involved in mobile app development and provides practical knowledge and tools to implement mobile DevOps in your organization.
- PDF + ePub pkt
Mobile DevOps Playbook. A practical guide for delivering high-quality mobile applications like a pro Mobile DevOps Playbook. A practical guide for delivering high-quality mobile applications like a pro
-
Understanding and implementing Linux I/O stack is a challenging adventure and even the most experienced engineers often struggle with its complexities. With the help of the Architecture and Design of Linux Storage Stack, you’ll gain a better understanding of the Linux I/O stack and learn how an I/O request travels through the system, enablin
- PDF + ePub pkt
Architecture and Design of the Linux Storage Stack. Gain a deep understanding of the Linux storage landscape and its well-coordinated layers Architecture and Design of the Linux Storage Stack. Gain a deep understanding of the Linux storage landscape and its well-coordinated layers
-
Low latency applications have very strict performance requirements, which demands a deep understanding of such apps and the C++ programming language constructs. This book will help you learn about the business impact of reduced latencies and the engineering principles and C++ programming techniques required to achieve the lowest latencies possible.
- PDF + ePub pkt
Building Low Latency Applications with C++. Develop a complete low latency trading ecosystem from scratch using modern C++ Building Low Latency Applications with C++. Develop a complete low latency trading ecosystem from scratch using modern C++
-
Design patterns is a library of reusable components designed for software architecture, not for concrete implementation. In this book, you’ll learn to recognize and apply various C++ design patterns and idioms. In this second edition, you’ll gain a deep understanding of design patterns and become empowered to create robust, reusable,
- PDF + ePub pkt
Hands-On Design Patterns with C++. Solve common C++ problems with modern design patterns and build robust applications - Second Edition Hands-On Design Patterns with C++. Solve common C++ problems with modern design patterns and build robust applications - Second Edition
-
Zed Attack Proxy Cookbook covers detailed recipes to strengthen the security posture of your organization using practical web app penetration and testing techniques. The book will help you integrate ZAP into your CI/CD pipeline and ensure hitch-free assessments.
- PDF + ePub pkt
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
This book helps you understand how to design and implement a federated learning (FL) system. Using solid coding examples, you’ll be able to acquire the essential skills needed to develop and support machine learning applications empowered by FL that can protect data privacy, increase learning efficiency, and reduce computational resources an
- PDF + ePub pkt
Federated Learning with Python. Design and implement a federated learning system and develop applications using existing frameworks Federated Learning with Python. Design and implement a federated learning system and develop applications using existing frameworks
-
Flutter developers already building mobile apps and developers working with Dart will find this book useful for constructing exquisite, interactive, and native-like web applications. The book makes it easy to learn how to build and deploy web apps using identical Flutter and Dart codebase that you may already be acquainted with.
- PDF + ePub pkt
Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web
-
Mastering Ubuntu Server is a book that teaches you everything you need to know in order to plan, build, and maintain real Ubuntu Server deployments on physical hardware as well as the cloud. By the end of this book, you will be able to make the most of Ubuntu’s advanced functionalities.
- PDF + ePub pkt
Mastering Ubuntu Server. Explore the versatile, powerful Linux Server distribution Ubuntu 22.04 with this comprehensive guide - Fourth Edition Mastering Ubuntu Server. Explore the versatile, powerful Linux Server distribution Ubuntu 22.04 with this comprehensive guide - Fourth Edition
-
Linux Kernel Debugging is a modern up-to-date take on the key topic of kernel debugging. It covers in detail powerful open source tools and many advanced techniques (including and far beyond the printk!) to debug kernel modules, device drivers, and the kernel itself. This is a key skill that any professional developer must learn and possess.
- PDF + ePub pkt
Linux Kernel Debugging. Leverage proven tools and advanced techniques to effectively debug Linux kernels and kernel modules Linux Kernel Debugging. Leverage proven tools and advanced techniques to effectively debug Linux kernels and kernel modules
-
This book focuses on developing a capacity to manage cybersecurity incidents by practically implementing methodologies, platforms, and tools through step-by-step exercises. You'll learn how to respond to cybersecurity incidents using intelligence-based threat hunting techniques.
- PDF + ePub pkt
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
Linux kernel is a complex, portable, modular, and widely used piece of software that currently runs on around 80% of servers and embedded systems, in more than half of devices throughout the world. This book will introduce you to device driver development and the most-used concepts that kernel developers need to know.
- PDF + ePub pkt
Linux Device Driver Development. Everything you need to start with device driver development for Linux kernel and embedded Linux - Second Edition Linux Device Driver Development. Everything you need to start with device driver development for Linux kernel and embedded Linux - Second Edition
-
Using the command line in Linux is one of the most common approaches to system administration. This book covers everything you need to implement it and use it as part of the shell scripting process.
- PDF + ePub pkt
Linux Command Line and Shell Scripting Techniques. Master practical aspects of the Linux command line and then use it as a part of the shell scripting process Linux Command Line and Shell Scripting Techniques. Master practical aspects of the Linux command line and then use it as a part of the shell scripting process
-
In the modern world, cyber threats have increased exponentially and a complex web of global data privacy regulations has made security and compliance difficult. This book will help you to understand what is happening in the digital landscape and deploy both timeless best practices and modernized approaches to overcome cybersecurity challenges.
- PDF + ePub pkt
The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks
-
While the practice of administration has evolved heavily over the decades, it still requires a high level of expertise and focus to perform safely and well. This book will show you how to approach the role of a Linux system administrator and to think about Linux by gaining a clear understanding of decision making, risk, and business context.
- PDF + ePub pkt
Linux Administration Best Practices. Practical solutions to approaching the design and management of Linux systems Linux Administration Best Practices. Practical solutions to approaching the design and management of Linux systems
-
This book will guide you in improving your security posture and building robust and predictable security operations. You'll learn to design processes for the changing landscape of security operations, from designing defensive architectures to passive defense, blue and purple teaming, threat intelligence agility, measuring business values, and more.
- PDF + ePub pkt
Agile Security Operations. Engineering for agility in cyber defense, detection, and response Agile Security Operations. Engineering for agility in cyber defense, detection, and response
-
Complete with step-by-step explanations of essential concepts, practical examples, and self-assessment questions, this Linux server book will guide you through systemd in depth – as well as all aspects of managing a systemd system.
- PDF + ePub pkt
Linux Service Management Made Easy with systemd. Advanced techniques to effectively manage, control, and monitor Linux systems and services Linux Service Management Made Easy with systemd. Advanced techniques to effectively manage, control, and monitor Linux systems and services
-
Mastering Defensive Security helps you to learn about the latest tools, techniques, and hands-on labs to ensure that you have the skills required to tackle the most complex and ever-evolving cybersecurity threats. If you want to consolidate your cybersecurity knowledge or grow to become a CISO, this book is for you!
- PDF + ePub pkt
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
Security assessment in the ICS environment is often a challenging task that requires divergent thinking. Pentesting Industrial Control Systems covers the nuts and bolts of specifically what to look for when securing an industrial control system.
- PDF + ePub pkt
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Smart Robotics Projects with LEGO BOOST teaches a range of interesting robotics projects with detailed building instructions. You'll learn how to use motors, sensors, and Scratch programming to build modern-day smart robots while developing your STEM skills in a fun way.
- PDF + ePub + Mobi pkt
Build and Code Creative Robots with LEGO BOOST. Unleash your creativity and imagination by building exciting robotics projects Build and Code Creative Robots with LEGO BOOST. Unleash your creativity and imagination by building exciting robotics projects
-
Managing and Visualizing Your BIM Data is the perfect guide if you want to learn essential computer science topics to create incredible building information modeling (BIM) dashboards. With this book, you’ll be able to learn how to use Autodesk Dynamo for data gathering and Power BI for data visualization.
- PDF + ePub + Mobi pkt
Managing and Visualizing Your BIM Data. Understand the fundamentals of computer science for data visualization using Autodesk Dynamo, Revit, and Microsoft Power BI Managing and Visualizing Your BIM Data. Understand the fundamentals of computer science for data visualization using Autodesk Dynamo, Revit, and Microsoft Power BI
Ernesto Pellegrino, Manuel André Bottiglieri, Gavin Crump, Luisa Cypriano Pieper, Dounia Touil
-
Widely used for deploying network services, working knowledge of Linux networking techniques is essential for anyone managing a modern, enterprise-level network. Using real-world examples, this book will help you get an in-depth understanding of Linux network configurations, tools, and services to securely operate in a corporate IT environment.
- PDF + ePub + Mobi pkt
Linux for Networking Professionals. Securely configure and operate Linux network services for the enterprise Linux for Networking Professionals. Securely configure and operate Linux network services for the enterprise
-
Red Hat Enterprise Linux 8 is the standard for enterprise Linux used from datacenters to the cloud by companies around the world. Complete with self-assessment questions, tips, and mock exams with detailed solutions, this book will help you to prepare for the Red Hat Certified System Administrator (RHCSA 8) certification exam that validates your sy
- PDF + ePub + Mobi pkt
Red Hat Enterprise Linux 8 Administration. Master Linux administration skills and prepare for the RHCSA certification exam Red Hat Enterprise Linux 8 Administration. Master Linux administration skills and prepare for the RHCSA certification exam
-
This second edition of Industrial Cybersecurity is a practical guide to implementing a comprehensive and solid security program for the ICS environment. This book shows anyone new to industrial security or professionals looking to extend their industrial security posture how to effectively monitor their ICS environment.
- PDF + ePub + Mobi pkt
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
With this Micronaut book, developers working with microservices will be able to put their knowledge to work effectively. The book follows a hands-on approach to all the aspects of building microservices such as development, testing, and maintenance, as well as associated methodologies that will have you up and running and productive in no time.
- PDF + ePub + Mobi pkt
Building Microservices with Micronaut(R). A quick-start guide to building high-performance reactive microservices for Java developers Building Microservices with Micronaut(R). A quick-start guide to building high-performance reactive microservices for Java developers
-
With over 1000 practice questions, explanations of all 8 domains, and 2 full exams, this book is a fantastic exam prep solution. Take the CISSP exam (version May 2021) confidently with the help of mock questions and detailed solutions and validate your skills with the CISSP (ISC)2 certification.
- PDF + ePub + Mobi pkt
CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version
-
Migrating Linux to Microsoft Azure is your guide to maximizing the existing investments in Linux and becoming sustainable with efficient migration of existing Linux workloads to Azure.
- PDF + ePub + Mobi pkt
Migrating Linux to Microsoft Azure. A hands-on guide to efficiently relocating your Linux workload to Azure Migrating Linux to Microsoft Azure. A hands-on guide to efficiently relocating your Linux workload to Azure
-
Linux is an omnipresent operating system running on many computing platforms, including personal computers, smartphones, servers, IoT devices, and cloud infrastructures. Mastering Linux Administration will help you become a proficient sysadmin and quickly adapt to the challenges of modern server and cloud administration technologies.
- PDF + ePub + Mobi pkt
Mastering Linux Administration. A comprehensive guide to installing, configuring, and maintaining Linux systems in the modern data center Mastering Linux Administration. A comprehensive guide to installing, configuring, and maintaining Linux systems in the modern data center
-
With five new chapters added to this updated third edition, you’ll be able to leverage Linux and other premier open-source software such as Buildroot and the Yocto Project to speed up your product development cycle. As you advance, you will also learn how to design, implement, and maintain a custom embedded Linux image for your device.
- PDF + ePub + Mobi pkt
Mastering Embedded Linux Programming. Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell) - Third Edition Mastering Embedded Linux Programming. Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell) - Third Edition
-
Linux System Programming Techniques will help you to gain a deeper understanding of how Linux programming works. You will be able to create your own programs and shared libraries, along with finding appropriate solutions for all your queries related to Linux System programming.
- PDF + ePub + Mobi pkt
Linux System Programming Techniques. Become a proficient Linux system programmer using expert recipes and techniques Linux System Programming Techniques. Become a proficient Linux system programmer using expert recipes and techniques
-
This book will help you get to grips with Linux kernel development in a hands-on way using helpful code examples. Linux Kernel Programming teaches you how to write high-quality kernel modules with industry best practices and security awareness. The book covers essential kernel internals, the latest 5.4 LTS kernel, and kernel synchronization.
- PDF + ePub + Mobi pkt
Linux Kernel Programming. A comprehensive guide to kernel internals, writing kernel modules, and kernel synchronization Linux Kernel Programming. A comprehensive guide to kernel internals, writing kernel modules, and kernel synchronization
-
This book will help you get to grips with Linux kernel development in a hands-on way using helpful code examples. Linux Kernel Programming teaches you how to write high-quality kernel modules with industry best practices and security awareness. The book covers essential kernel internals, the latest 5.4 LTS kernel, and kernel synchronization.
- PDF + ePub + Mobi pkt
Linux Kernel Programming. A comprehensive guide to kernel internals, writing kernel modules, and kernel synchronization Linux Kernel Programming. A comprehensive guide to kernel internals, writing kernel modules, and kernel synchronization
-
This book follows on from Linux Kernel Programming, helping you explore the Linux character device driver framework and enables you to write 'misc' class drivers. You'll learn how to efficiently interface with user apps, perform I/O on hardware memory, handle hardware interrupts, and leverage kernel delays, timers, kthreads, and workqueues.
- PDF + ePub + Mobi pkt
Linux Kernel Programming Part 2 - Char Device Drivers and Kernel Synchronization. Create user-kernel interfaces, work with peripheral I/O, and handle hardware interrupts Linux Kernel Programming Part 2 - Char Device Drivers and Kernel Synchronization. Create user-kernel interfaces, work with peripheral I/O, and handle hardware interrupts
-
Ghidra is the NSA’s state-of-the-art reverse engineering framework. It is open source, allowing the community to extend it with impressive range of features. This book offers a comprehensive introduction to anyone new to the Ghidra reverse engineering framework and malware reverse engineering.
- PDF + ePub + Mobi pkt
Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems
-
Linux is a fast-growing OS shipped with around 80 percent of the embedded and connected devices around the world. With its improved support for a range of devices, the demand for embedded developers is high. This book offers up-to-date coverage of the complex Linux Kernel framework to help you ease strategic technology decision-making and reduce de
- PDF + ePub + Mobi pkt
Mastering Linux Device Driver Development. Write custom device drivers to support computer peripherals in Linux operating systems Mastering Linux Device Driver Development. Write custom device drivers to support computer peripherals in Linux operating systems
-
Mastering Ubuntu Server, Third Edition not only strengthens your server fundamentals but also equips you with the advanced concepts of Ubuntu 20.04 LTS. It polishes and expands your skill set to prepare you for better business opportunities.
- PDF + ePub + Mobi pkt
Mastering Ubuntu Server. Gain expertise in the art of deploying, configuring, managing, and troubleshooting Ubuntu Server - Third Edition Mastering Ubuntu Server. Gain expertise in the art of deploying, configuring, managing, and troubleshooting Ubuntu Server - Third Edition
-
The CompTIA Security+: SY0-601 Certification Guide makes the most complex Security+ concepts easy to understand even for those who have no prior knowledge. Complete with exam tips, practical exercises, mock exams, and exam objective mappings, this is the perfect study guide to help you obtain Security+ certification.
- PDF + ePub + Mobi pkt
CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition
-
Security-Enhanced Linux is a comprehensive security solution for Linux, supported by many Linux distributions. SELinux System Administration uses easy-to-follow examples to provide end-to-end coverage of everything from what SELinux is to effectively applying SELinux. You’ll also learn how to fine-tune SELinux, including gradual policy devel
- PDF + ePub + Mobi pkt
SELinux System Administration. Implement mandatory access control to secure applications, users, and information flows on Linux - Third Edition SELinux System Administration. Implement mandatory access control to secure applications, users, and information flows on Linux - Third Edition
-
This book follows a hands-on approach to using WSL effectively. You’ll learn Windows Subsystem for Linux, understand how to configure WSL and Windows Terminal to suit your preferences, and use Visual Studio Code for building robust apps with WSL.
- PDF + ePub + Mobi pkt
Windows Subsystem for Linux 2 (WSL 2) Tips, Tricks, and Techniques. Maximise productivity of your Windows 10 development machine with custom workflows and configurations Windows Subsystem for Linux 2 (WSL 2) Tips, Tricks, and Techniques. Maximise productivity of your Windows 10 development machine with custom workflows and configurations
-
If you think Linux is a sophisticated operating system that only hackers and geeks know how to use, this book will surprise you! With Learn Linux Quickly, you’ll see how easy it is to get started with Linux. This book teaches you Linux in an engaging and enjoyable way, helping you to enhance your skills as you explore the power of Linux.
- PDF + ePub + Mobi pkt
Learn Linux Quickly. A beginner-friendly guide to getting up and running with the world's most powerful operating system Learn Linux Quickly. A beginner-friendly guide to getting up and running with the world's most powerful operating system
-
Kali Linux is considered as a reliable source for penetration testing and digital forensics. This book will give readers hands-on experience in utilizing Kali Linux tools to implement all the pillars of digital forensics such as acquisition, extraction, analysis, and presentation.
- PDF + ePub + Mobi pkt
Digital Forensics with Kali Linux. Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x - Second Edition Digital Forensics with Kali Linux. Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x - Second Edition
-
Hardening a Linux system can make it much more difficult for an attacker to exploit it. This book will enable system administrators and network engineers to protect their Linux systems, and the sensitive data on those systems.
- PDF + ePub + Mobi pkt
Mastering Linux Security and Hardening. Protect your Linux systems from intruders, malware attacks, and other cyber threats - Second Edition Mastering Linux Security and Hardening. Protect your Linux systems from intruders, malware attacks, and other cyber threats - Second Edition
-
This book is an ideal resource for Linux administrators who want to work on Azure as well as Microsoft professionals looking to explore open source application development. Starting with an introduction to the Azure cloud, the book covers all the concepts you need to learn to efficiently manage Linux-based workloads in Azure, right from creating an
- PDF + ePub + Mobi pkt
Hands-On Linux Administration on Azure. Develop, maintain, and automate applications on the Azure cloud platform - Second Edition Hands-On Linux Administration on Azure. Develop, maintain, and automate applications on the Azure cloud platform - Second Edition
-
Anyone responsible for a Linux server infrastructure will be able to improve the reliability of their environment and efficiency of their operations with this book, “Hands-on Enterprise Automation on Linux”. This, in turn, will help to reduce operating costs and the stresses and workload placed on those responsible for the environment
- PDF + ePub + Mobi pkt
Hands-On Enterprise Automation on Linux. Efficiently perform large-scale Linux infrastructure automation with Ansible Hands-On Enterprise Automation on Linux. Efficiently perform large-scale Linux infrastructure automation with Ansible
-
The CompTIA Security+ exam is a valuable qualification for those seeking a career in Cybersecurity. This book is a great resource to test whether your knowledge base and skills align with the exam objectives.
- PDF + ePub + Mobi pkt
CompTIA Security+ Practice Tests SY0-501. Practice tests in 4 different formats and 6 cheat sheets to help you pass the CompTIA Security+ exam CompTIA Security+ Practice Tests SY0-501. Practice tests in 4 different formats and 6 cheat sheets to help you pass the CompTIA Security+ exam
-
The current trend of various hacking and security breaches displays how important it has become to pentest your environment, to ensure end point protection. This book will take you through the latest version of Kali Linux to efficiently deal with various crucial security aspects such as confidentiality, integrity, access control and authentication.
- PDF + ePub + Mobi pkt
Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
-
A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF). This book teaches you various penetration testing techniques in order to become
- PDF + ePub + Mobi pkt
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
Device drivers play a critical role in how the system performs and ensures that the device works in the intended way.With a recipe based approach this book gives you practical recipes on character drivers and related kernel internals. It shows you how to start writing Linux device drivers and tools to understand, debug or modify them.
- PDF + ePub + Mobi pkt
Linux Device Driver Development Cookbook. Learn kernel programming and build custom drivers for your embedded Linux applications Linux Device Driver Development Cookbook. Learn kernel programming and build custom drivers for your embedded Linux applications
-
Cybersecurity jobs confines from basic configuration to advanced systems analysis and defense assessment. Cybersecurity: The Beginner's Guide provides thefundamental information you need to understand the basics of the field, identify your place within it, and start your Cybersecurity career.
- PDF + ePub + Mobi pkt
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
The cloud is gaining more popularity than ever, and every organization is looking to shift its infrastructure to it. AWS particularly rules the roost with its market share. This book gets pentesters and sysadmins hands-on with pentesting AWS services using Kali Linux, covering detailed screenshots and custom scripts for automating the process.
- PDF + ePub + Mobi pkt
Hands-On AWS Penetration Testing with Kali Linux. Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation Hands-On AWS Penetration Testing with Kali Linux. Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation
-
When it comes to an architectural job role, that particular individual should be able to understand any infrastructure and should be capable of designing an efficient environment. This book will help you understand and achieve the level of knowledge required to architect and implement various IT solutions based on Linux.
- PDF + ePub + Mobi pkt
Hands-On Linux for Architects. Design and implement Linux-based IT solutions Hands-On Linux for Architects. Design and implement Linux-based IT solutions
-
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities.
- PDF + ePub + Mobi pkt
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
Top industry analysts have identified Docker Enterprise as the leader of enterprise container platform software suites. In a very short time, the Docker Enterprise platform gained more than 700 enterprise customers who now manage production workloads with this commercially supported platform. This book will help you to understand what Docker Enterp
- PDF + ePub + Mobi pkt
Mastering Docker Enterprise. A companion guide for agile container adoption Mastering Docker Enterprise. A companion guide for agile container adoption
-
This is a comprehensive guide to help you understand the current threats faced by the financial cyberspace and how to go about it and secure your financial landscape. The book will take you on a journey from identifying the attackers to securing your financial transactions and assets. The book then take you through the updates needed for procedures
- PDF + ePub + Mobi pkt
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
React Native is perfect for creating mobile applications with maximized code reusability and cost saving. With this practical solutions guide by your side, you can build amazing UIs, tackle mobile development-related issues, and build high-performance apps for mobile environments.
- PDF + ePub + Mobi pkt
React Native Cookbook. Recipes for solving common React Native development problems - Second Edition React Native Cookbook. Recipes for solving common React Native development problems - Second Edition
-
Mastering Kali Linux for Advanced Penetration Testing, Third Edition will guide you through proven techniques to test your infrastructure security using Kali Linux. From selecting the most effective tools to carrying out advanced pentesting in highly secure environments, this book will help you gain the expertise you need to advance in your career.
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Shell scripting is one of the most common and powerful ways to automate tasks in a Linux / Unix environment. With the help of real-world exercises, you will learn to leave the GUI behind, automate tasks, and unlock the true power of Bash.
- PDF + ePub + Mobi pkt
Learn Linux Shell Scripting - Fundamentals of Bash 4.4. A comprehensive guide to automating administrative tasks with the Bash shell Learn Linux Shell Scripting - Fundamentals of Bash 4.4. A comprehensive guide to automating administrative tasks with the Bash shell
-
C++ is a general-purpose programming language with a bias towards systems programming. This book provides a detailed walkthrough of the C, C++ and POSIX standards and enables a firm understanding of various system calls for UNIX systems. Topics include console and file IO, memory management, sockets, time interface, process and thread management
- PDF + ePub + Mobi pkt
Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17 Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17
-
PowerShell Core for Linux Administrators Cookbook will take you through a complete tour of understanding .NET Core, PowerShell in general, PowerShell on Linux for management and automation. This book will also cover advanced concepts on how to use PowerShell and manage Docker containers, Cloud, VMware and SQL databases.
- PDF + ePub + Mobi pkt
PowerShell Core for Linux Administrators Cookbook. Use PowerShell Core 6.x on Linux to automate complex, repetitive, and time-consuming tasks PowerShell Core for Linux Administrators Cookbook. Use PowerShell Core 6.x on Linux to automate complex, repetitive, and time-consuming tasks
-
Twenty five years ago, as often happens in our industry, pundits laughed at and called Linux a joke. To say that view has changed is a massive understatement. This book will cement for you both the conceptual 'why' and the practical 'how' of systems programming on Linux, and covers Linux systems programming on the latest 4.x kernels.
- PDF + ePub + Mobi pkt
Hands-On System Programming with Linux. Explore Linux system programming interfaces, theory, and practice Hands-On System Programming with Linux. Explore Linux system programming interfaces, theory, and practice
-
Apache Mesos is an open source cluster manager which provides efficient resource isolation and sharing across distributed applications. You will learn how Mesos works and then develop applications. You will learn to make full utilization of machines and simplify the maintenance of a data center with Mesos.
- PDF + ePub + Mobi pkt
Learn Apache Mesos. A beginner’s guide to scalable cluster management and deployment Learn Apache Mesos. A beginner’s guide to scalable cluster management and deployment
-
Reverse engineering is a tool used for analyzing software, to exploit its weaknesses and strengthen its defenses. Hackers use reverse engineering as a tool to expose security flaws and questionable privacy practices. This book helps you to master the art of using reverse engineering.
- PDF + ePub + Mobi pkt
Mastering Reverse Engineering. Re-engineer your ethical hacking skills Mastering Reverse Engineering. Re-engineer your ethical hacking skills
-
This book is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques. It offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today's digital age.
- PDF + ePub + Mobi pkt
Kali Linux 2018: Assuring Security by Penetration Testing. Unleash the full potential of Kali Linux 2018, now with updated tools - Fourth Edition Kali Linux 2018: Assuring Security by Penetration Testing. Unleash the full potential of Kali Linux 2018, now with updated tools - Fourth Edition
Shiva V. N. Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali
-
This second edition of Kali Linux 2: Windows Penetration Testing provides approaches and solutions to the issues of modern penetration testing for a Microsoft Windows environment. As a pen tester, you need to be able to understand and use the best available tools - this book addresses these needs with maximum in a cost and time efficient way.
- PDF + ePub + Mobi pkt
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
CompTIA certified professionals have always had the upper hand in the information technology industry. This book will be your ideal guide to passing and achieving the Linux+ certification efficiently. Learn from industry experts and implement their practices to resolve complex IT issues.
- PDF + ePub + Mobi pkt
CompTIA Linux+ Certification Guide. A comprehensive guide to achieving LX0-103 and LX0-104 certifications with mock exams CompTIA Linux+ Certification Guide. A comprehensive guide to achieving LX0-103 and LX0-104 certifications with mock exams
-
Android Things allows you to build your own smart, connected devices for consumers and industrial use. This book will help you unleash the power of Android Things enabling you to build your own smart devices. We will cover the basics right from installation to advanced topics like Analog Sensors, Digital input/output and Rainbow HAT.
- PDF + ePub + Mobi pkt
Android Things Quick Start Guide. Build your own smart devices using the Android Things platform Android Things Quick Start Guide. Build your own smart devices using the Android Things platform
-
Kali Linux is the most popular open-source penetration toolkit used for effective web penetration testing. This book will teach you, in the form of step-by-step recipes, how to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and ultimately buffer attackable surfaces so applications are more secure.
- PDF + ePub + Mobi pkt
Kali Linux Web Penetration Testing Cookbook. Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x - Second Edition Kali Linux Web Penetration Testing Cookbook. Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x - Second Edition
-
Linux is often treated as a highly secure operating system. However, the reality is that Linux too has its own share of security flaws. These flaws allow attackers to get into your system and modify or even destroy your important data. This book will work as a practical guide for administrators and help them configure a more secure machine.
- PDF + ePub + Mobi pkt
Practical Linux Security Cookbook. Secure your Linux environment from modern-day attacks with practical recipes - Second Edition Practical Linux Security Cookbook. Secure your Linux environment from modern-day attacks with practical recipes - Second Edition
-
This book is designed to help you learn the basics, it assumes that you have no prior knowledge in hacking, and by the end of it you'll be at a high intermediate level being able launch attacks and hack computer systems just like black-hat hackers do, not only that but you'll also learn how to secure systems from these attacks.
- PDF + ePub + Mobi pkt
Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing
-
These days, containers and container management are two of the most important software delivery technologies. This book gives you knowledge and hands-on experience to design, build, and operate OpenShift Origin and its underlying software and services not only in the lab, but in production environments as well.
- PDF + ePub + Mobi pkt
Learn OpenShift. Deploy, build, manage, and migrate applications with OpenShift Origin 3.9 Learn OpenShift. Deploy, build, manage, and migrate applications with OpenShift Origin 3.9
-
Serverless applications and architectures are gaining momentum and are increasingly being used by companies of all sizes to solve the problems of developers. This book teaches you how to quickly and securely develop applications without the hassle of configuring and maintaining infrastructure on three public cloud platforms.
- PDF + ePub + Mobi pkt
Hands-On Serverless Computing. Build, run and orchestrate serverless applications using AWS Lambda, Microsoft Azure Functions, and Google Cloud Functions Hands-On Serverless Computing. Build, run and orchestrate serverless applications using AWS Lambda, Microsoft Azure Functions, and Google Cloud Functions
-
Linux is a Unix-like computer operating system assembled under the model of free and open-source software development and distribution. This book will teach all the important command-line tools and utilities using real-world examples. You'll learn everything you need to know as a new Linux system administrator.
- PDF + ePub + Mobi pkt
Fundamentals of Linux. Explore the essentials of the Linux command line Fundamentals of Linux. Explore the essentials of the Linux command line
-
Ubuntu is a Debian-based Linux distribution with versions available for both desktops as well as servers. The Server edition, Ubuntu Server, has set the industry standard for Linux in the data center as well as the cloud. Organizations, inventors, and hobbyists alike will benefit from its flexible configuration, fast deployment, and a plethora of t
- PDF + ePub + Mobi pkt
Mastering Ubuntu Server. Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server 18.04 - Second Edition Mastering Ubuntu Server. Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server 18.04 - Second Edition
-
Linux has been one of the widely adopted and popular OS when it comes to leveraging scripting and automating common tasks. With this book, readers will get to grips with shell scripting, automating repetitive tasks, text processing, regular expressions, pattern matching, backup and restore, and much more. The end goal of this book is to get you up
- PDF + ePub + Mobi pkt
Learning Linux Shell Scripting. Leverage the power of shell scripts to solve real-world problems - Second Edition Learning Linux Shell Scripting. Leverage the power of shell scripts to solve real-world problems - Second Edition
-
Docker has entirely changed the picture of the software development life cycle and helped organizations deploy and secure software at scale. Containerization has gradually taken over the industry. This book guides the reader step by step through every important concept related to containerization and orchestration.
- PDF + ePub + Mobi pkt
Learn Docker - Fundamentals of Docker 18.x. Everything you need to know about containerizing your applications and running them in production Learn Docker - Fundamentals of Docker 18.x. Everything you need to know about containerizing your applications and running them in production
-
Shell scripting is a quick method to prototype a complex application or a problem by automating tasks when working on Linux-based systems. This book will make use of both simple one-line commands and command sequences and complex problems can be solved with ease, from text processing to backing up sysadmin tools.
- PDF + ePub + Mobi pkt
Mastering Linux Shell Scripting. A practical guide to Linux command-line, Bash scripting, and Shell programming - Second Edition Mastering Linux Shell Scripting. A practical guide to Linux command-line, Bash scripting, and Shell programming - Second Edition
-
Kubernetes provides a means to describe what your application needs and how it should run by orchestrating containers on your behalf to operate your software across a single, dozens, or hundreds of machines. Originally created and open sourced from Google, you can use their technology to help run, test, and scale your applications regardless of whi
- PDF + ePub + Mobi pkt
Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers
-
Machine learning has become a hot topic for developers who want to impart intelligent functionality to their applications. In this book, we'll show you how to incorporate various machine learning libraries available for iOS developers. You’ll quickly get acquainted with the machine learning fundamentals and implement various algorithms with
- PDF + ePub + Mobi pkt
Machine Learning with Swift. Artificial Intelligence for iOS Machine Learning with Swift. Artificial Intelligence for iOS
-
In today’s era, robotics has been gaining a lot of traction in various industries where consistency and perfection matters most. Automation plays a major role in our world, and most of this is achieved via robotic applications and various platforms that support robotics. The Robot Operating System (ROS) is a modular software platform to deve
- PDF + ePub + Mobi pkt
Mastering ROS for Robotics Programming. Design, build, and simulate complex robots using the Robot Operating System - Second Edition Mastering ROS for Robotics Programming. Design, build, and simulate complex robots using the Robot Operating System - Second Edition
-
The Yocto Project has become the de facto distribution build framework for reliable and robust embedded systems with a reduced time to market.
- PDF + ePub + Mobi pkt
Embedded Linux Development Using Yocto Project Cookbook. Practical recipes to help you leverage the power of Yocto to build exciting Linux-based systems - Second Edition Embedded Linux Development Using Yocto Project Cookbook. Practical recipes to help you leverage the power of Yocto to build exciting Linux-based systems - Second Edition
-
For the past couple of decades, Linux has been extremely popular with systems administrators, for everything from creating networks and servers to automating their entire working environment. However, security has always been the major concern. With not many resources available in the Linux security domain, this book will be an invaluable resource
- PDF + ePub + Mobi pkt
Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats
-
Kali Linux is used mainly for penetration testing and digital forensics. This book will help you explore and unleash the tools available in Kali Linux for effective digital forensics investigations. Using practical examples, you will be able to make the most of forensics process such as investigation, evidence acquisition, and analysis.
- PDF + ePub + Mobi pkt
Digital Forensics with Kali Linux. Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools Digital Forensics with Kali Linux. Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
-
Microservices and containers are here to stay and in today's world, Docker is emerging as the de-facto standard for scalability. Deploying Docker into production is considered to be one of the major pain points in developing large-scale infrastructures; however, the documentation available online leaves a lot to be desired.
- PDF + ePub + Mobi pkt
Deployment with Docker. Apply continuous integration models, deploy applications quicker, and scale at large by putting Docker to work Deployment with Docker. Apply continuous integration models, deploy applications quicker, and scale at large by putting Docker to work
-
Developers are increasingly integrating Linux into their embedded systems because it supports virtually all hardware architectures and many peripherals; it also scales well and offers the full source code. Yocto Project makes it much easier to customize Linux for embedded systems. This book gives you a profound insight into Yocto Project’s b
- PDF + ePub + Mobi pkt
Embedded Linux Development using Yocto Projects. Learn to leverage the power of Yocto Project to build efficient Linux-based products - Second Edition Embedded Linux Development using Yocto Projects. Learn to leverage the power of Yocto Project to build efficient Linux-based products - Second Edition
-
Linux kernel is a complex, portable, modular, and widely used piece of software, running on around 80% of servers and embedded systems in more than half of devices throughout the World.
- PDF + ePub + Mobi pkt
Linux Device Drivers Development. Develop customized drivers for embedded Linux Linux Device Drivers Development. Develop customized drivers for embedded Linux
-
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book will be packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) as per your requirements and move on to core functionalities.
- PDF + ePub + Mobi pkt
Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions
-
Great designs are predicated on the fabric of geometry – there is a high level of ease and comprehension that one experiences when exploring great designs. The Linux Kernel, which possesses a kind of collective intelligence deriving from its scores of contributors, has managed to remain serene at its core and displays the efficiency of its g
- PDF + ePub + Mobi pkt
Mastering Linux Kernel Development. A kernel developer's reference manual Mastering Linux Kernel Development. A kernel developer's reference manual
-
The Assembly language is the lowest level human readable programming language on any platform. Knowing the way things are on the Assembly level will help developers design their code in a much more elegant and efficient way. This book will take readers on a journey to mastering the Assembly language.
- PDF + ePub + Mobi pkt
Mastering Assembly Programming. From instruction set to kernel module with Intel processor Mastering Assembly Programming. From instruction set to kernel module with Intel processor
-
Go is a modern systems programming language, which allows the creation of systems applications and modules just above any kernel, e.g. Linux, and container, e.g. Docker. This book explains thread-safe and concurrent Go, and goes into writing server, cloud and systems-level applications. No more C style memory management, for instance. If you want t
- PDF + ePub + Mobi pkt
Go Systems Programming. Master Linux and Unix system level programming with Go Go Systems Programming. Master Linux and Unix system level programming with Go
-
The combination of Docker and Jenkins will help you scale up your builds, automate tasks and speed up Jenkins performance with the benefits of Docker containerization. The book is for system operations engineers and developers who want to speed up software releases using fewer server resources, improve quality with acceptance tests integrated into
- PDF + ePub + Mobi pkt
Continuous Delivery with Docker and Jenkins. Delivering software at scale Continuous Delivery with Docker and Jenkins. Delivering software at scale
-
Terraform is a tool used to efficiently build, configure, and improve production infrastructure. It can manage existing infrastructure as well as create custom in-house solutions.This book shows you when and how to implement Infrastructure as Code practices (IaC) with Terraform. It covers everything necessary to set up complete management of infras
- PDF + ePub + Mobi pkt
Getting Started with Terraform. Manage production infrastructure as a code - Second Edition Getting Started with Terraform. Manage production infrastructure as a code - Second Edition
-
Linux Shell Scripting Bootcamp will help the readers learn about shell scripting and will help improve their efficiency and practical skills. It will be a fast-paced guide that takes you through the fundamentals of Linux Shell, general commands and then will teach you how to perform complex scripting tasks with ease.
- PDF + ePub + Mobi pkt
Linux Shell Scripting Bootcamp. The fastest way to learn Linux shell scripting Linux Shell Scripting Bootcamp. The fastest way to learn Linux shell scripting
-
Linux is a highly-respected open source operating system that can scale from small devices to large supercomputers. This book describes how to employ Linux at the bottom end of the scale to create efficient, secure, and cost-effective products.
- PDF + ePub + Mobi pkt
Mastering Embedded Linux Programming. Unleash the full potential of Embedded Linux with Linux 4.9 and Yocto Project 2.2 (Morty) Updates - Second Edition Mastering Embedded Linux Programming. Unleash the full potential of Embedded Linux with Linux 4.9 and Yocto Project 2.2 (Morty) Updates - Second Edition
-
Mastering Kali Linux for Advanced Penetration Testing will provide you with a number or proven techniques to defeat the latest defences on the networks using Kali Linux. From selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
System administration is an everyday effort that involves a lot of tedious tasks, and devious pits. Knowing your environment is the key to unleashing the most powerful solution that will make your life easy as an administrator, and show you the path to new heights. Bash is your Swiss army knife to set up your working or home environment as you want
- PDF + ePub + Mobi pkt
Mastering Bash. A Step-by-Step Guide to working with Bash Programming and Shell Scripting Mastering Bash. A Step-by-Step Guide to working with Bash Programming and Shell Scripting
-
Virtualization technologies such as KVM allow for better control over the available server resources, by deploying multiple virtual instances on the same physical host, or clusters of compute resources. With KVM it is possible to run various workloads in isolation with the hypervisor layer providing better tenant isolation and higher degree of secu
- PDF + ePub + Mobi pkt
KVM Virtualization Cookbook. Learn how to use KVM effectively in production KVM Virtualization Cookbook. Learn how to use KVM effectively in production
-
Linux is everywhere and with such broad usage, the demand for Linux specialists is ever growing. For the engineers out there, this means being able to develop, interconnect, and maintain Linux environments. This book is for developers who already know the basics of Linux and want to sharpen their skills. The readers will be able to double their ter
- PDF + ePub + Mobi pkt
Working with Linux - Quick Hacks for the Command Line. Command line power like you've never seen Working with Linux - Quick Hacks for the Command Line. Command line power like you've never seen
-
The use of SDN (Software Defined Networking) to program network layers is well-known. OpenDayLight , an open source SDN controller, is helping to accelerate the adoption of SDN and Network Functions Virtualization (NVF). This book, through its step-by-step tutorials, will give you a strong foundation in SDN, NVF, and OpenDayLight.
- PDF + ePub + Mobi pkt
Learning OpenDaylight. A gateway to SDN (Software-Defined Networking) and NFV (Network Functions Virtualization) ecosystem Learning OpenDaylight. A gateway to SDN (Software-Defined Networking) and NFV (Network Functions Virtualization) ecosystem
-
Linux servers are frequently selected over other server operating systems for their stability, security and flexibility advantages.This Learning Path will teach you how to get up and running with three of the most popular Linux server distros: Ubuntu Server, CentOS 7 Server, and RHEL 7 Server.
- PDF + ePub + Mobi pkt
Linux: Powerful Server Administration. Recipes for CentOS 7, RHEL 7, and Ubuntu Server Administration Linux: Powerful Server Administration. Recipes for CentOS 7, RHEL 7, and Ubuntu Server Administration
-
Born from it predecessor, Kali Linux 2.0 is the most popular Linux distribution designed for security professionals who build defensive strategies around their systems with an offensive mindset. This book aims at introducing you to the most common and not -so- common pre-installed penetration testing tools and create custom complex images in the fo
- PDF + ePub + Mobi pkt
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
- PDF + ePub + Mobi pkt
Containerization with LXC. Build, manage, and configure Linux containers Containerization with LXC. Build, manage, and configure Linux containers
-
- PDF + ePub + Mobi pkt
-
- PDF + ePub + Mobi pkt
Mastering Swift 3 - Linux. Click here to enter text Mastering Swift 3 - Linux. Click here to enter text
-
This book will show you how to improve your system’s secure state across Linux distributions and prevent application vulnerabilities using SELinux. From essential concepts to important techniques, this second edition will get you up to speed.
- PDF + ePub + Mobi pkt
SELinux System Administration. Effectively secure your Linux systems with SELinux - Second Edition SELinux System Administration. Effectively secure your Linux systems with SELinux - Second Edition
-
- PDF + ePub + Mobi pkt
Developing with Docker. Learn to automate your deployments with Docker Developing with Docker. Learn to automate your deployments with Docker
-
- PDF + ePub + Mobi pkt
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
Christopher Duffy, Mohit Raj, Cameron Buchanan, Andrew Mabbitt, Terry Ip, Dave Mound, Benjamin May
-
- PDF + ePub + Mobi pkt
Mastering VMware Horizon 7. Virtualization that can transform your organization - Second Edition Mastering VMware Horizon 7. Virtualization that can transform your organization - Second Edition
-
- PDF + ePub + Mobi pkt
-
- PDF + ePub + Mobi pkt
Mastering Ubuntu Server. Upgrade your Ubuntu skills Mastering Ubuntu Server. Upgrade your Ubuntu skills
-
- PDF + ePub + Mobi pkt
Mastering Mesos. The ultimate guide to managing, building, and deploying large-scale clusters with Apache Mesos Mastering Mesos. The ultimate guide to managing, building, and deploying large-scale clusters with Apache Mesos
-
- PDF + ePub + Mobi pkt
CentOS 7 Linux Server Cookbook. Get your CentOS server up and running with this collection of more than 80 recipes created for CentOS 7 - essential for Linux fans! - Second Edition CentOS 7 Linux Server Cookbook. Get your CentOS server up and running with this collection of more than 80 recipes created for CentOS 7 - essential for Linux fans! - Second Edition
-
- PDF + ePub + Mobi pkt
-
- PDF + ePub + Mobi pkt
Linux Shell Scripting Essentials. Learn shell scripting to solve complex shell-related problems and to efficiently automate your day-to-day tasks Linux Shell Scripting Essentials. Learn shell scripting to solve complex shell-related problems and to efficiently automate your day-to-day tasks
-
- PDF + ePub + Mobi pkt
Mastering Linux Network Administration. Master the skills and techniques that are required to design, deploy, and administer real Linux-based networks Mastering Linux Network Administration. Master the skills and techniques that are required to design, deploy, and administer real Linux-based networks