Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threatsKey Features:Discover security techniques to prevent malware from infecting a Linux system, and detect itPrevent unauthorized people from breaking into a Linux systemProtect important and sensitive data from being revealed to unauthorized personsBook Description:The third edition of Mastering Linux Security and Hardening is an updated, comprehensive introduction to implementing the latest Linux security measures, using the latest versions of Ubuntu and AlmaLinux.In this new edition, you will learn how to set up a practice lab, create user accounts with appropriate privilege levels, protect sensitive data with permissions settings and encryption, and configure a firewall with the newest firewall technologies. You'll also explore how to use sudo to set up administrative accounts with only the privileges required to do a specific job, and you'll get a peek at the new sudo features that have been added over the past couple of years. You'll also see updated information on how to set up a local certificate authority for both Ubuntu and AlmaLinux, as well as how to automate system auditing. Other important skills that you'll learn include how to automatically harden systems with OpenSCAP, audit systems with auditd, harden the Linux kernel configuration, protect your systems from malware, and perform vulnerability scans of your systems. As a bonus, you'll see how to use Security Onion to set up an Intrusion Detection System.By the end of this new edition, you will confidently be able to set up a Linux server that will be secure and harder for malicious actors to compromise.What You Will Learn:Prevent malicious actors from compromising a production Linux systemLeverage additional features and capabilities of Linux in this new versionUse locked-down home directories and strong passwords to create user accountsPrevent unauthorized people from breaking into a Linux systemConfigure file and directory permissions to protect sensitive dataHarden the Secure Shell service in order to prevent break-ins and data lossApply security templates and set up auditingWho this book is for:This book is for Linux administrators, system administrators, and network engineers interested in securing moderate to complex Linux environments. Security consultants looking to enhance their Linux security skills will also find this book useful. Working experience with the Linux command line and package management is necessary to understand the concepts covered in this book.
This book is designed as an Ubuntu 22.04 LTS Server administration and reference source, covering the Ubuntu servers and their support applications. Server tools are covered as well as the underlying configuration files and system implementations. The emphasis is on what administrators will need to know to perform key server support and management tasks. Coverage of the systemd service management system is integrated into the book. Topics covered include software management, systemd service management, AppArmor security, OpenSSH, the Chrony time server, and Ubuntu cloud services. Key servers are examined, including Web, FTP, CUPS printing, NFS, and Samba Windows shares. Network support servers and applications covered include the Squid proxy server, the Domain Name System (BIND) server, DHCP, distributed network file systems, nftables firewalls, and cloud computing.The book is organized into five parts: getting started, services, shared resources, network support, and shells.Part 1 focuses on basic tasks such as installing the Ubuntu Live Server, configuring networking with Netplan, systemd-networkd, and NetworkManager, managing software from the Ubuntu Snap and APT repositories, and basic usage for the desktop and the command line interfaces. Part 2 examines Internet servers as well as how services are managed by systemd using unit files. Configuration and implementation of the Postfix mail server, the vsftpd FTP server, the Apache Web server, as well as news and database servers are covered in detail.Part 3 deals with servers that provide shared resources on a local network or the Internet. Services examined include the CUPS printing server, NFS Linux network file server, and Samba Windows file and printing server, clustering, and cloud computing services supported by Ubuntu.Part 4 covers servers that provide network support, like the Squid proxy server, the Bind Domain Name System (DNS) server, DHCP servers, and the nftables firewall along with the configuration firewall tools FirewallD and UFW. Key networking operations are also examined like IPv6 auto-configuration, TPC/IP networking, and network monitoring tools.Part 5 provides a review of shell commands, including those used for managing files, as well as shell scripts, variables, and configuration files. The Ubuntu Live Server only installs a command line interface, with no desktop. To manage your system and its files you will have to know the shell commands.
This book is designed as an Ubuntu 22.04 LTS Server administration and reference source, covering the Ubuntu servers and their support applications. Server tools are covered as well as the underlying configuration files and system implementations. The emphasis is on what administrators will need to know to perform key server support and management tasks. Coverage of the systemd service management system is integrated into the book. Topics covered include software management, systemd service management, AppArmor security, OpenSSH, the Chrony time server, and Ubuntu cloud services. Key servers are examined, including Web, FTP, CUPS printing, NFS, and Samba Windows shares. Network support servers and applications covered include the Squid proxy server, the Domain Name System (BIND) server, DHCP, distributed network file systems, nftables firewalls, and cloud computing.
Begin your programming journey with C++ , starting with the basics and progressing through step-by-step examples that will help you become a proficient C++ programmer. This book includes new features from the C++23 standard. All you need are Beginning C++23 and any recent C++ compiler and you'll soon be writing real C++ programs. There is no assumption of prior programming knowledge. All language concepts that are explained in the book are illustrated with working program examples, and all chapters include exercises for you to test and practice your knowledge. Free source code downloads are provided for all examples from the text and solutions to the exercises. This latest edition has been fully updated to the latest version of the language, C++23, and to all conventions and best practices of modern C++. This book also introduces elements of the C++ Standard Library that provide essential support for C++23. After completing this book, you will have the knowledge and skills needed to build your first C++ applications. What You Will LearnBegin programming with the C++23 standardCarry out modular programming in C++Work with arrays and loops, pointers and references, strings, and moreWrite your own functions, types, and operatorsDiscover the essentials of object-oriented programmingUse overloading, inheritance, virtual functions, and polymorphismWrite generic function and class templates, and make them safer using concepts Learn the ins and outs of containers, algorithms, and rangesUse auto type declarations, exceptions, move semantics, lambda expressions, and much moreWho This Book Is ForProgrammers new to C++ and those who may be looking for a refresh primer on C++ in general.
Go beyond the basics and build complete applications using the Rust programming language. The applications in this book include a high-performance web client, a microcontroller (for a robot, for example), a game, an app that runs on Android, and an application that incorporates AI and machine learning. Each chapter will be organized in the following format: what this kind of application looks like; requirements and user stories of our example program; an introduction to the Rust libraries used; the actual implementation of the example program, including common pitfalls and their solutions; and a brief comparison of libraries for building each application, if there is no clear winner.Practical Rust Projects will open your eyes to the world of practical applications of Rust. After reading the book, you will be able to apply your Rust knowledge to build your own projects. What You Will Learn Write Rust code that runs on microcontrollers Build a 2D game Create Rust-based mobile Android applications Use Rust to build AI and machine learning applications Who This Book Is ForSomeone with basic Rust knowledge, wishing to learn more about how to apply Rust in a real-world scenario.
Investing in engineering documentation (Docs) means investing in community user experience. This book teaches readers how mastering the docs-as-code ecosystem empowers communities to understand better their favorite products and Open-Source (OSS) technologies better.Author Alejandra Quetzalli believes that ¿docs-as-ecosystem¿ represents a more comprehensive and collaborative approach to documentation development than ¿docsas- code¿ because it recognizes that documentation is more than just code. Docs involve technical writing, design, community feedback, community management, accessibility, SEO, UX, and today¿ even Artificial Intelligence tools! The word ecosystem promotes a paradigm where we treat documentation as a complex and dynamic system that must be managed and nurtured.In this book, yoüll acquire practical skills such as creating public style guides, incorporating responsive and accessible design, designing user flows and information architecture, retrieving user feedback, and setting up Docs analytics. Yoüll learn to identify the difference in work processes between maintaining Docs for a product versus an OSS technology. Yoüll discover the secrets to managing technical writers and OSS contributions, all while building a thriving Docs community. To end on a futuristic note, yoüll discover why technical writers who harness Artificial Intelligence (AI) tools (i.e., ChatGPT) need not fear a robot uprising anytime soon. What You'll LearnExamine accessibility and the user experienceUnderstand Information architecture Review docs-as-ecosystem processes Manage technical writersOversee OSS Docs contributions Retrieve and integrate user feedback Build Docs and Education communities Who This Book is ForDevelopers of all levels, VPs of Product/Engineering, Product Managers, and Designers,
This book covers the Ubuntu 22.04 LTS (Jammy Jellyfish) release, focusing on applications and administrative tools. The emphasis here is on what users will face when using Ubuntu, covering topics like installation, applications, software management for Snap and APT, the Ubuntu desktops (GNOME, MATE, and KDE), shell commands, network connections, and system administration tasks. There are four parts: Getting Started, Applications, Desktops, and Administration. Part 1 focuses on getting started, covering Ubuntu information and resources, using the Ubuntu Live DVD/USB drive, installing and setting up Ubuntu, upgrading Ubuntu, basic use of the desktop interface, and connecting to wired and wireless networks. Repositories and their use are covered in detail, along with the new Snap system for managing Snap packages. Ubuntu Snap package management with Ubuntu Software, the snap command, the Snap Store are examined, as well as APT package management with Gnome Software, the Synaptic Package Manager, and the apt and apt-get commands.Part 2 keys in on office, multimedia, mail, Internet, and social media applications. Part 3 covers the Ubuntu, Kubuntu, Ubuntu MATE, Xubuntu, and Lubuntu desktops. as well as the BASH shell. The Ubuntu desktop, which uses GNOME, is examined in detail. Part 4 deals with administration topics, first discussing system tools like the GNOME system monitor, the Disk Usage Analyzer, Seahorse, and Disk Utility. Then a detailed chapter on Ubuntu system administration tools is presented, covering tasks such as managing users and file systems, Bluetooth setup, network folder sharing, backups, and printing. The network connections chapter covers a variety of network tasks, including manual configuration of wired and wireless connections, and firewalls.
Gain the skills and knowledge to manage your core network services on Red Hat Enterprise Linux with help of self-tests and practical use casesKey Features:Get the EX358 certification with this easy-to-follow guide while preparing for real-life challengesLearn everything you need to know about Linux system administration and automation using Ansible 2.9Use practical use cases and exam-focused questions to prepare for the certification examBook Description:If you're ready to take the next step in your system engineering career with the EX358, then this book is for you. Packed with all the knowledge and skills that you need to configure and maintain services and applications on the Red Hat Linux 8 (RHEL OS 8) platform, this book will help you ace the exam and thrive at work.Red Hat Certified Specialist in Service Management and Automation will help you build a solid foundation of the most recent and up-to-date exam requirements and practice questions.Throughout the course of the book, you'll get hands-on experience with different technical processes needed to fully administer a Red Hat Enterprise Linux 8 system. This will include file storage, database management, direct configuration of applications, such as SMB shares, networking. You'll be well equipped with the configuration of essential components like firewall, SELinux, and iSCSI while learning how to automate these tasks using Ansible Automation 2.9 in order to alleviate the burden of completing them by hand.By the end of this book, you'll have covered all essential topics to ace the Red Hat EX358 certification exam and add another feather to your career as a Red Hat Certified Specialist.What You Will Learn:Attain the skills to take and pass the Red Hat EX358 certification examBecome familiar with the ways of leveraging Ansible Core 2.9Gain deeper knowledge of the Red Hat Linux Networking with DNS, DHCP, and IP addressingCreate your own link and master the networking domain through link aggregation creationSet up printers and email services through Linux serversGet up and running with MariaDB SQL databasesExplore how to create and control web trafficWho this book is for:This book is for you if you want to advance your career by adding the essential Red Hat certificate to your resume. It will be particularly useful for system administrators responsible for managing large enterprise environments, network services and Red Hat Certified Engineers interested in becoming a Red Hat Certified Architect (RHCA). Before reading this book, you must have a working knowledge of Red Hat Enterprise Linux and Ansible Automation and command line usage of Red Hat Enterprise Linux systems administration.
Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer. This book will show you how to effectively manipulate and monitor different conversations and perform statistical analysis of these conversations to identify the IP and TCP information of interest.Next, you'll be walked through a review of the different methods malware uses, from inception through the spread across and compromise of a network of machines. The process from the initial ¿click¿ through intrusion, the characteristics of Command and Control (C2), and the different types of lateral movement will be detailed at the packet level.In the final part of the book, you'll explore the network capture file and identification of data for a potential forensics extraction, including inherent capabilities for the extraction of objects such as file data and other corresponding components in support of a forensics investigation.After completing this book, you will have a complete understanding of the process of carving files from raw PCAP data within the Wireshark tool.What You Will LearnUse Wireshark to identify intrusions into a networkExercise methods to uncover network data even when it is in encrypted formAnalyze malware Command and Control (C2) communications and identify IOCsExtract data in a forensically sound manner to support investigationsLeverage capture file statistics to reconstruct network eventsWho This Book Is ForNetwork analysts, Wireshark analysts, and digital forensic analysts.
Navigate through the Kubernetes landscape to create and deploy container-based applications. This book will show you how to choose between the various available container-based operating systems, and how to design a better continuous integration pipeline for your container images, where to store them, and how to scan and secure them. In the first half of the book, you'll learn the practical tips on how to setup the system for visibility and troubleshooting, how to reduce the attack vector and reduce risks. The second half of the book focuses on Kubernetes, the popular container orchestration system. You'll see how to setup your Kubernetes for practical applications such as show/chargeback using tagging, efficient use of namespaces and pods, various isolation layers. It also shows you how to integrate with popular implementations of K8S such as AWS EKS (Elastic Container Service), GCP Google Kubernetes Engine (GKE) in touch points such as authentication and authorization, optimization, logging and troubleshooting tools, etc.By practicing the scenarios given in this book, you will be able to make better design choices that are appropriate for the constraints you are working with. Deploy Container Applications Using Kubernetes is your go-to resource for an optimal deployment of workloads using containers and Kubernetes in both public and private cloud settings. What You'll LearnUnderstand the various design choices, their pros and consBuild a better CI/CD pipeline for your containers and KubernetesDeploy your first container application in a public cloud K8S engineImprove your existing K8S deployment for efficiency and eleganceWho This Book Is ForIT Platform Architects, System Engineers/, and System Administrators
A must-have Kubernetes book to learn key concepts for succeeding in any production environment, be it a greenfield Kubernetes environment or your cloud-native journeyKey Features:Advance in your Kubernetes journey with guidance from a seasoned k8s practitioner and trainerDiscover best practices for implementing Kubernetes in any production environmentGo beyond the basics and work with Kubernetes applications in every environmentBook Description:Kubernetes is a trending topic among engineers, CTOs, CIOs, and other technically sound professionals. Due to its proliferation and importance for all cloud technologies, DevOps engineers nowadays need a solid grasp of key Kubernetes concepts to help their organization thrive.This book equips you with all the requisite information about how Kubernetes works and how to use it for the best results. You'll learn everything from why cloud native is important to implementing Kubernetes clusters to deploying applications in production. This book takes you on a learning journey, starting from what cloud native is and how to get started with Kubernetes in the cloud, on-premises, and PaaS environments such as OpenShift. Next, you'll learn about deploying applications in many ways, including Deployment specs, Ingress Specs, and StatefulSet specs. Finally, you'll be comfortable working with Kubernetes monitoring, observability, and security. Each chapter of 50 Kubernetes Concepts Every DevOps Engineer Should Know is built upon the previous chapter, ensuring that you develop practical skills as you work through the code examples in GitHub, allowing you to follow along while giving you practical knowledge.By the end of this book, you'll be able to implement Kubernetes in any environment, whether it's an existing environment, a greenfield environment, or your very own lab running in the cloud or your home.What You Will Learn:Find out how Kubernetes works on-premises, in the cloud, and in PaaS environmentsWork with networking, cluster management, and application deploymentUnderstand why cloud native is crucial for Kubernetes applicationsDeploy apps in different states, including Stateless and StatefulMonitor and implement observability in your environmentExplore the functioning of Kubernetes security at the cluster, user, and application levelWho this book is for:This book is for cloud engineers, developers, DevOps engineers, and infrastructure engineers responsible for inheriting a Kubernetes environment or creating a greenfield Kubernetes environment. If you are a professional who wants to get started with cloud-native applications and implement k8s best practices, then this book is a must-read. If you have engineered environments in the cloud and on-premises and understand how to deploy applications with a solid tenure in a developer role, this book will help you further your skills.
Beginning-Intermediate user level
This guide covers all aspects of Linux system administration, from user maintenance, backups, filesystem housekeeping, storage management, and network setup to hardware and software troubleshooting and some application management. It's both a practical daily reference manual for sysadmins and IT pros and a handy study guide for those taking Linux certification exams.
"What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves. It's an extraordinary platform for building a whole new generation of security, observability, and networking tools. This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works. Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves"--
Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code. This book is ideal for Linux desktop and cloud developers. Using the latest version of Debian, yoüll focus on the foundations of the diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems, memory forensics, malware, and vulnerability analysis. This requires an understanding of x64 Intel assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations yoüll need in order to master internal Linux program structure and behavior. It consists of practical step-by-step exercises of increasing complexity with explanations and ample diagrams. Yoüll also work with the GDB debugger and use it for disassembly and reversing. By the end of the book, you will have a solid understanding of how Linux C and C++ compilers generate binary code. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. Foundations of Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of ARM64 Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity.What You'll LearnReview the basics of x64 assembly languageExamine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patternsSee how pointers in C and C++ are implemented and usedWho This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without Intel x64 assembly language background, beginners learning Linux software reverse engineering techniques, and engineers coming from non-Linux environments.
Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations yoüll need to understand internal Linux program structure and behavior. Foundations of ARM64 Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. What You'll LearnReview the basics of ARM64 assembly languageExamine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patternsSee how pointers in C and C++ are implemented and usedWho This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without ARM64 assembly language background, and beginners learning Linux software reverse engineering techniques.
Learn the value that OpenTelemetry can bring to organizations that aim to implement observability best practices, and gain a deeper understanding of how different building blocks interact with each other to bring out-of-the-box, vendor-neutral instrumentation to your stack. With examples in Java, this book shows how to use OpenTelemetry APIs and configure plugins and SDKs to instrument services and produce valuable telemetry data. Yoüll learn how to maximize adoption of OpenTelemetry and encourage the change needed in debugging workflows to reduce cognitive load for engineers troubleshooting production workloads.Adopting observability best practices across an organization is challenging. This book begins with a discussion of how operational monitoring processes widely followed for decades fall short at providing the insights needed for debugging cloud-native, distributed systems in production. The book goes on to show how the Cloud Native Computing Foundation¿s OpenTelemetry project helps you standardize instrumentation and transport of telemetry signals, providing a common language for all observability tooling.You Will LearnWhy observability is a necessity in modern distributed systemsThe value of OpenTelemetry for engineers and organizations OpenTelemetry component specification and general designTracing, metrics, and logs APIs and SDKs, with examples in JavaOpenTelemetry Collectors and recommended transport and processing pipelinesHow to adopt observability standards across an organizationWho This Book Is ForSoftware engineers familiar with cloud-native technologies and operational monitoring who want to instrument and export telemetry data from their services; observability leads who want to roll out OpenTelemetry standards and bestpractices across their organizations; and Java developers who want a book with OpenTelemetry examples in that language
Develop the skills required to administer your RHEL environment on-premises and in the cloud while preparing for the RHCSA examPurchase of the print or Kindle book includes a free eBook in PDF formatKey Features- Become a pro at system administration from installation to container management- Secure and harden your Linux environment using SSH, SELinux, firewall, and system permissions- Gain confidence to pass the RHCSA exam with the help of practice testsBook DescriptionWith Red Hat Enterprise Linux 9 becoming the standard for enterprise Linux used from data centers to the cloud, Linux administration skills are in high demand. With this book, you'll learn how to deploy, access, tweak, and improve enterprise services on any system on any cloud running Red Hat Enterprise Linux 9.Throughout the book, you'll get to grips with essential tasks such as configuring and maintaining systems, including software installation, updates, and core services. You'll also understand how to configure the local storage using partitions and logical volumes, as well as assign and deduplicate storage. You'll learn how to deploy systems while also making them secure and reliable.This book provides a base for users who plan to become full-time Linux system administrators by presenting key command-line concepts and enterprise-level tools, along with essential tools for handling files, directories, command-line environments, and documentation for creating simple shell scripts or running commands. With the help of command line examples and practical tips, you'll learn by doing and save yourself a lot of time.By the end of the book, you'll have gained the confidence to manage the filesystem, users, storage, network connectivity, security, and software in RHEL 9 systems on any footprint.What You Will Learn- Become well versed with the fundamentals of RHEL9-from system deployment to user management- Secure a system by using SELinux policies and configuring firewall rules- Understand LVM to manage volumes and maintain VDO deduplication- Manage a system remotely using SSH and public key authentication- Get the hang of the boot process and kernel tunable to adjust your systems- Automate simple tasks using scripts or Ansible PlaybooksWho this book is forThis book is for Red Hat Enterprise Linux system administrators and Linux system administrators. It's also a good resource for any IT professional who wants to learn system administration. RHCSA certification candidates will find this book useful in their preparation for the certification exam.Table of Contents- Getting RHEL Up and Running- RHEL 9 Advanced Installation Options- Basic Commands and Simple Shell Scripts- Tools for Regular Operations- Securing Systems with Users, Groups, and Permissions- Enabling Network Connectivity- Adding, Patching, and Managing Software- Administering Systems Remotely- Securing Network Connectivity with firewalld- Keeping Your System Hardened with SELinux- System Security Profiles with OpenSCAP- Managing Local Storage and Filesystems- Flexible Storage Management with LVM- Advanced Storage Management with Stratis and VDO- Understanding the Boot Process- Kernel Tuning and Managing Performance Profiles with tuned- Managing Containers with Podman, Buildah, and Skopeo- Practice Exercises - 1- Practice Exercises - 2
Learn, prepare, and practice for Red Hat RHCSA 9 (EX200) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.Master Red Hat RHCSA 9 EX200 exam topicsAssess your knowledge with chapter-ending quizzes and labsReview key concepts with exam-preparation tasksPractice with four unique practice testsLearn from two full hours of video training from the author's Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video CourseRed Hat RHCSA 9 Cert Guide: EX200 is a comprehensive exam study guide. Leading Linux consultant, author, and instructor Sander van Vugt shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. The material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy, and chapter-ending Exam Preparation Tasks help you drill deep on key concepts you must know thoroughly to pass the exam. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan.The companion website also contains two additional practice tests plus two full hours of personal video training from the author's Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video Course.Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time, includingBasic system management: Installation, tools, file management, text files, RHEL9 connections, user/group management, permissions, and network configurationOperating running systems: Managing software, processes, storage, and advanced storage; working with Systemd; scheduling tasks; and configuring loggingAdvanced system administration: Managing the kernel and boot procedures, essential troubleshooting, bash shell scriptingManaging network services: Configuring SSH, firewalls, and time services; managing Apache HTTP services and SE Linux; accessing network storage; and managing containersCompanion WebsiteThe website contains two complete practice exams and more than an hour of video training from the author's Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video Course.Includes Exclusive Offer for 70% Off the full Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video Course.
Sie möchten testen, wie sicher Ihr IT-System ist? Dann hilft Ihnen dieses Buch! Es zeigt Ihnen Schritt für Schritt, wie Sie Ihre Systeme mit Kali Linux auf Herz und Nieren prüfen. Sie lernen, wie Passwörter geknackt werden, wie Sie Schwachstellen von Websites finden, die Konfigurationen von Webservern überprüfen und vieles mehr. Außerdem führen die Autoren Sie in Wireless Attacks, Sniffing, Spoofing und IT-Forensik-Analysen ein. Endlose Theorie? Fehlanzeige! Unter Anleitung ausgewiesener IT-Security-Experten lernen Sie aus der Sicht von Hackern zu denken und Ihre IT-Infrastruktur entsprechend zu sichern.
With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn waysto identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. What You'll LearnReview Wireshark analysis and network forensicsStudy traffic capture and its analytics from mobile devicesAnalyze various access technology and cloud trafficWrite your own dissector for any new or proprietary packet formatsCapture secured application traffic for analysisWho This Book Is ForIT Professionals, Cloud Architects, Infrastructure Administrators, and Network/Cloud Operators
Journey into the world of Web3-based application development, its related protocols, and its usage in developing decentralized applications. This book will explain how programmable blockchains are revolutionizing the world of web applications, which can be run on decentralized platforms or peer-to-peer networks like IPFS.You'll start with an introduction to decentralization with a focus on blockchain implementations like Ethereum and Bitcoin. You'll then learn to develop simple decentralized applications (dApps) using Solidity, the language used for developing apps with Ethereum as well as smart contracts, wallets, gateways and NFTs. This book also covers how security and scale are addressed by L2 networks for scaling Bitcoin and Ethereum blockchains. A Brief Introduction to Web3 is your go-to guide for setting up simple Web3 applications using the Ethereum blockchain programming model.WhatYou Will Learn Build NFT tokensExamine Web3 differs from Web2-based applicationsUnderstand the fundamentals of blockchain and the corresponding data structures around itSee how consensus and trustless computing can be performed using blockchain Use Solidity and Truffle to build Web3 applications Who This Book Is ForSoftware developers and architects who are looking to hone their skills in dApps and web3 applications developed on sound principles of decentralized computing.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.