Linux
When you search for a book on Linux programming, you are aiming to get the best deal. In a technological world that is progressing quickly, you need to understand Linux. The question is whether you can carve out enough time to read lengthy books on Linux that are filled to the brim with a lot of unnecessary details and jargon and take a great a deal of time to read and understand.You need a book that is clear, concise, and easy to digest, and now you have one! Imagine having a book that you can finish on a two hours flight. That's a promise! This book guarantees to save you time and is written clearly and concisely. You will find Linux commands and brief explanations that are easy to digest and you'll be able to practice them on the go.If you have an interview at an IT firm in a few days and you are learning Linux from scratch, this book will help you learn the commands and scripting techniques and understand them quickly. You can review the entire book in a single day, learn new things, or refresh your memory of long forgotten, but important commands.In this book you will discover...- A detailed overview of the origins of the Linux operating system- How to install the Linux operating system- Linux commands and shell scripting- File navigation commands- Directory navigation commands- Keyboard tricks and shortcuts- Completion commands and how to search the history- An overview of the most prominent Linux editors- The most important commands to operate editors like a pro- Linux shell scripting techniques, including if-then statements, the for loops, the while loops, and the until command.- Lots of basic shell script examples- An A to Z table filled with useful Linux commands, with syntax and a description.Now is your chance to learn Linux command lines and shell scripting with ease. This book will remove the mystery and confusion and you'll be left with knowledge and expertise to implement shell scripting and command lines easily.
Linux
Have you always used the Windows operating system and want a change? Have you heard the term Linux before and wondered what it is? Have you ever feared implementing Linux as an operating system just because it's free? Do you also have a misconception that free software is never really what it's cracked up to be? If you have ever asked yourself these questions, then you've come to the right place. This book will answer everything you want to know about Linux, and make you wonder why you haven't made the change already.This book is designed for beginners of the Linux operating system and includes guides to download and install the Ubuntu operating system along with images. Ubuntu is a comfortable distribution of Linux for first-time users. The book will also introduce you to the Linux operating system's command line, which is essential when using Linux. In this book, you will: - Learn the history of Linux and the Ubuntu distribution of Linux- Be able to easily follow the steps you need to download and install Ubuntu Linux- Discover the many features and applications of Ubuntu Linux- Gain a deep knowledge of the Linux command line- Investigate Shell Scripting in Linux- See examples of the Linux Boot process- And so much more...This book has been written so that you can learn Linux from the fundamental level. With each chapter, you will fall in love with Linux and transition smoothly over from Windows or macOS. The book includes code snippets with images to give you a practical experience of Linux as you progress with each chapter. So, what are you waiting for?
Linux
Did you wonder what the Linux operating system is and how you can install it on your system? Do you want to learn how to separate the Linux operating system from the main operating system used? Have you been trying to learn how to perform penetration testing or other ethical hacking processes to determine the security of the server or network? If you answered yes to these questions, then you have come to the right place. Linux is an operating system used by system administrators and hackers to manage the server or network's security. You can use the operating system to address business demands, including network administration, system administration, and database management. In this book, you will learn more about the different techniques to help you protect the system from a security breach and how you can protect the files and data you have on your system. In this book, you will first learn about how you can use Linux on virtual machines. You will also learn about the different tools you can use to harden the network and server's security. You will learn about the different permissions and accesses and how you can use it to enhance the security of setting the security. You will also learn about how you can perform a penetration test, or an ethical hack, to scan the system and see what you can do to improve the settings. Over the course of this book, you will discover how to: ● Installing Linux on your system and accessing it using a virtual machine ● Secure user accounts using passwords and ACLs● Secure the server using a firewall and other methods● Learn to decrypt and encrypt data sent over the network ● Explore various methods to prevent hackers from accessing information in your system ● Perform tests to identify any vulnerabilities in the network and server, and more!
Red Hat Enterprise Linux 9 Essentials
Arguably one of the most highly regarded and widely used enterprise-level operating systems available today is the Red Hat Enterprise Linux (typically shortened to RHEL and pronounced rell) distribution. Not only is it considered to be among the most stable and reliable operating systems, but it is also backed by the considerable resources and technical skills of Red Hat, Inc. Red Hat Enterprise Linux 9 Essentials is designed to provide detailed information on the installation, use, and administration of the Red Hat Enterprise Linux 9 distribution. For beginners, the book covers topics such as operating system installation, the basics of the GNOME desktop environment, configuring email and web servers, and installing packages and system updates using App Streams. Additional installation topics, such as dual booting with Microsoft Windows, are also covered, together with all important security topics, such as configuring a firewall and user and group administration. For the experienced user, topics such as remote desktop access, the Cockpit web interface, logical volume management (LVM), disk partitioning, swap management, KVM virtualization, Secure Shell (SSH), Linux Containers, and file sharing using both Samba and NFS are covered in detail to provide a thorough overview of this enterprise class operating system.
Fuzzing Against the Machine
Find security flaws in any architecture effectively through emulation and fuzzing with QEMU and AFLPurchase of the print or Kindle book includes a free PDF eBookKey Features: Understand the vulnerability landscape and useful tools such as QEMU and AFLExplore use cases to find vulnerabilities and execute unknown firmwareCreate your own firmware emulation and fuzzing environment to discover vulnerabilitiesBook Description: Emulation and fuzzing are among the many techniques that can be used to improve cybersecurity; however, utilizing these efficiently can be tricky. Fuzzing Against the Machine is your hands-on guide to understanding how these powerful tools and techniques work. Using a variety of real-world use cases and practical examples, this book helps you grasp the fundamental concepts of fuzzing and emulation along with advanced vulnerability research, providing you with the tools and skills needed to find security flaws in your software.The book begins by introducing you to two open source fuzzer engines: QEMU, which allows you to run software for whatever architecture you can think of, and American fuzzy lop (AFL) and its improved version AFL++. You'll learn to combine these powerful tools to create your own emulation and fuzzing environment and then use it to discover vulnerabilities in various systems, such as iOS, Android, and Samsung's Mobile Baseband software, Shannon. After reading the introductions and setting up your environment, you'll be able to dive into whichever chapter you want, although the topics gradually become more advanced as the book progresses.By the end of this book, you'll have gained the skills, knowledge, and practice required to find flaws in any firmware by emulating and fuzzing it with QEMU and several fuzzing engines.What You Will Learn: Understand the difference between emulation and virtualizationDiscover the importance of emulation and fuzzing in cybersecurityGet to grips with fuzzing an entire operating systemDiscover how to inject a fuzzer into proprietary firmwareKnow the difference between static and dynamic fuzzingLook into combining QEMU with AFL and AFL++Explore Fuzz peripherals such as modemsFind out how to identify vulnerabilities in OpenWrtWho this book is for: This book is for security researchers, security professionals, embedded firmware engineers, and embedded software professionals. Learners interested in emulation, as well as software engineers interested in vulnerability research and exploitation, software testing, and embedded software development will also find it useful. The book assumes basic knowledge of programming (C and Python); operating systems (Linux and macOS); and the use of Linux shell, compilation, and debugging.
Practical Linux System Administration
This essential guide covers all aspects of Linux system administration, from user maintenance, backups, filesystem housekeeping, storage management, and network setup to hardware and software troubleshooting and some application management. It's both a practical daily reference manual for sysadmins and IT pros and a handy study guide for those taking Linux certification exams. You'll turn to it frequently, not only because of the sheer volume of valuable information it provides but because of the real-world examples within and the clear, useful way the information is presented. With this book at your side, you'll be able to: Install Linux and perform initial setup duties, such as connecting to a network Navigate the Linux filesystem via the command line Install software from repositories and source and satisfy dependencies Set permissions on files and directories Create, modify, and remove user accounts Set up networking Format and mount filesystems Perform basic troubleshooting on hardware and software Create and manage logical volumes Work with SELinux Manage a firewall and iptables Shut down, reboot, and recover a system Perform backups and restores
Windows 11 Inside Out
Conquer Windows 11 -- from the inside out! Dive into Windows 11 and really put your Windows expertise to work. Focusing on the most powerful and innovative features of Windows 11, this supremely well-organized reference packs hundreds of time-saving solutions, up-to-date tips, and workarounds. From personalizing your Windows user experience to maximizing security and privacy, you'll discover how experts tackle today's essential tasks. Make the most of Microsoft's latest Windows enhancements as you challenge yourself to new levels of mastery. Install, configure, and secure the latest versions of Windows 11 in any environment Use new Windows features to minimize distractions and maximize productivity Create an aesthetically pleasing workspace that syncs to all your Windows 11 devices Make the most of built-in apps and safely get more apps through the Microsoft Store Stay up-to-date with news, weather, and your personal commitments via the Widgets pane Leverage the Microsoft Edge browser's advanced security, privacy, and tracking prevention Protect your devices and data, and block malware and intruders Manage local and cloud storage, sync and share content, and make the most of File Explorer Fine-tune access controls with user accounts, passwords, and biometrics Reliably connect to and configure Windows networks Explore PowerShell and advanced administration tools, and manage Windows in the enterprise Run Windows 11 in a virtual machine or in the cloud Use Android apps from the Amazon Appstore Perform expert-level troubleshooting, optimization, and recovery
Prometheus: Up & Running
Get up to speed with Prometheus, the metrics-based monitoring system used in production by tens of thousands of organizations. This updated second edition provides site reliability engineers, Kubernetes administrators, and software developers with a hands-on introduction to the most important aspects of Prometheus, including dashboarding and alerting, direct code instrumentation, and metric collection from third-party systems with exporters. Prometheus server maintainer Julien Pivotto and core developer Brian Brazil demonstrate how you can use Prometheus for application and infrastructure monitoring. This book guides you through Prometheus setup, the Node Exporter, and the Alertmanager, and then shows you how to use these tools for application and infrastructure monitoring. You'll understand why this open source system has continued to gain popularity in recent years. You will: Know where and how much instrumentation to apply to your application code Monitor your infrastructure with Node Exporter and use new collectors for network system pressure metrics Get an introduction to Grafana, a popular tool for building dashboards Use service discovery and the new HTTP SD monitoring system to provide different views of your machines and services Use Prometheus with Kubernetes and examine exporters you can use with containers Discover Prom's new improvements and features, including trigonometry functions Learn how Prometheus supports important security features including TLS and basic authentication
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801
Ace the AZ 801 exam and master advanced Windows Server and Infrastructure-as-a-Service workload administration with this comprehensive guidePurchase of the print or Kindle book includes a free PDF eBookKey Features: Gain practical knowledge to conquer the AZ-801 certification and tackle real-world challengesLearn to secure Windows Server in on-premises and hybrid infrastructuresLeverage hands-on examples to monitor and troubleshoot Windows Server environmentsBook Description: Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 helps you master various cloud and data center management concepts in detail, helping you grow your expertise in configuring and managing Windows Server in on-premises, hybrid, and cloud-based workloads. Throughout the book, you'll cover all the topics needed to pass the AZ-801 exam and use the skills you acquire to advance in your career.With this book, you'll learn how to secure your on-premises Windows Server resources and Azure IaaS workloads. First, you'll explore the potential vulnerabilities of your resources and learn how to fix or mitigate them. Next, you'll implement high availability Windows Server virtual machine workloads with Hyper-V Replica, Windows Server Failover Clustering, and Windows File Server.You'll implement disaster recovery and server migration of Windows Server in on-premises and hybrid environments. You'll also learn how to monitor and troubleshoot Windows Server environments.By the end of this book, you'll have gained the knowledge and skills required to ace the AZ-801 exam, and you'll have a handy, on-the-job desktop reference guide.What You Will Learn: Understand the core exam objectives and successfully pass the AZ-801 examSecure Windows Server for on-premises and hybrid infrastructures using security best practicesImplement, manage, and monitor Windows Server high availability features successfullyConfigure and implement disaster recovery services using Hyper-V features, Azure Recovery Services, and Azure Site RecoveryExplore how to migrate various servers, workloads, and tools from previous versions of Windows Server to 2022Monitor and troubleshoot Windows Server environments in both on-premises and cloud workloads using Windows Server tools, Windows Admin Center, and Azure servicesWho this book is for: This book is for Cloud and Datacenter Management administrators and engineers, Enterprise Architects, Microsoft 365 Administrators, Network Engineers, and anyone seeking to gain additional working knowledge with Windows Server operating systems and managing on-premises, hybrid and cloud workloads with administrative tools. To get started, you'll need to have a basic understanding of how to configure advanced Windows Server services utilizing existing on-premises technology in combination with hybrid and cloud technologies.
Embedded Linux Development Using Yocto Projects - Third Edition
Elevate your Linux-powered system with Yocto Projects, enhancing its stability and resilience efficiently and economically - now upgraded to the latest Yocto Project versionPurchase of the print or Kindle book includes a free PDF eBookKey Features: - Optimize your Yocto Project tools to develop efficient Linux-based projects- Follow a practical approach to learning Linux development using Yocto Project- Employ the best practices for embedded Linux and Yocto Project developmentBook Description: The Yocto Project is the industry standard for developing dependable embedded Linux projects. It stands out from other frameworks by offering time-efficient development with enhanced reliability and robustness.With Embedded Linux Development Using Yocto Project, you'll acquire an understanding of Yocto Project tools, helping you perform different Linux-based tasks. You'll gain a deep understanding of Poky and BitBake, explore practical use cases for building a Linux subsystem project, employ Yocto Project tools available for embedded Linux, and uncover the secrets of SDK, recipe tool, and others. This new edition is aligned with the latest long-term support release of the aforementioned technologies and introduces two new chapters, covering optimal emulation in QEMU for faster product development and best practices.By the end of this book, you'll be well-equipped to generate and run an image for real hardware boards. You'll gain hands-on experience in building efficient Linux systems using the Yocto Project.What You Will Learn: - Understand the basic Poky workflows concepts along with configuring and preparing the Poky build environment- Learn with the help of up-to-date examples in the latest version of Yocto Project- Configure a build server and customize images using Toaster- Generate images and fit packages into created images using BitBake- Support the development process by setting up and using Package feeds- Debug Yocto Project by configuring Poky- Build an image for the BeagleBone Black, RaspberryPi 4, and Wandboard, and boot it from an SD cardWho this book is for: If you are an embedded Linux developer and want to broaden your knowledge about the Yocto Project with examples of embedded development, then this book is for you. Professionals looking for new insights into working methodologies for Linux development will also find plenty of helpful information in this book.Table of Contents- Meeting the Yocto Project- Baking Our First Poky Based System- Using Toaster to Bake an Image- Meeting the BitBake tool- Grasping the BitBake Tool- Detailing the Temporary Build Directory- Assimilating Packaging Support- Diving into BitBake Metadata- Developing with the Yocto Project- Debugging with the Yocto Project- Exploring External Layers- Creating Custom Layers- Customizing Existing Recipes- Achieving GPL Compliance- Booting Our Custom Embedded Linux- Speeding Up Product Development Through Emulation - QEMU- Best Practices
IoT and OT Security Handbook
Leverage Defender for IoT for understanding common attacks and achieving zero trust for IoT and OT devicesPurchase of the print or Kindle book includes a free PDF eBookKey Features: Identify and resolve cybersecurity challenges in the IoT and OT worldsFamiliarize yourself with common attack vectors in the IoT and OT domainsDive into Defender for IoT, understand its capabilities, and put it to practiceBook Description: The Fourth Industrial Revolution, or Industry 4.0, is all about digital transformation, manufacturing, and production. The connected world we live in today, including industries, comes with several cybersecurity challenges that need immediate attention. This book takes you through the basics of IoT and OT architecture and helps you understand and mitigate these security challenges.The book begins with an overview of the challenges faced in managing and securing IoT and OT devices in Industry 4.0. You'll then get to grips with the Purdue model of reference architecture, which will help you explore common cyber attacks in IoT and OT environments. As you progress, you'll be introduced to Microsoft Defender for IoT and understand its capabilities in securing IoT and OT environments. Finally, you will discover best practices for achieving continuous monitoring and vulnerability management, as well as threat monitoring and hunting, and find out how to align your business model toward zero trust.By the end of this security book, you'll be equipped with the knowledge and skills to efficiently secure IoT and OT environments using Microsoft Defender for IoT.What You Will Learn: Discover security challenges faced in IoT and OT environmentsUnderstand the security issues in Industry 4.0Explore Microsoft Defender for IoT and learn how it aids in securing the IoT/OT industryFind out how to deploy Microsoft Defender for IoT along with its prerequisitesUnderstand the importance of continuous monitoringGet familiarized with vulnerability management in the IoT and OT worldsDive into risk assessment as well as threat monitoring and huntingAchieve zero trust for IoT devicesWho this book is for: This book is for industrial security, IoT security, and IT security professionals. Security engineers, including pentesters, security architects, and ethical hackers, who want to ensure the security of their organization's data when connected with the IoT will find this book useful.
Network Programming and Automation Essentials
Unleash the power of automation by mastering network programming fundamentals using Python and Go best practicesPurchase of the print or Kindle book includes a free PDF eBookKey Features: Understand the fundamentals of network programming and automationLearn tips and tricks to transition from traditional networking to automated networksSolve everyday problems with automation frameworks in Python and GoBook Description: Network programming and automation, unlike traditional networking, is a modern-day skill that helps in configuring, managing, and operating networks and network devices. This book will guide you with important information, helping you set up and start working with network programming and automation.With Network Programming and Automation Essentials, you'll learn the basics of networking in brief. You'll explore the network programming and automation ecosystem, learn about the leading programmable interfaces, and go through the protocols, tools, techniques, and technologies associated with network programming. You'll also master network automation using Python and Go with hands-on labs and real network emulation in this comprehensive guide.By the end of this book, you'll be well equipped to program and automate networks efficiently.What You Will Learn: Understand the foundation of network programmingExplore software-defined networks and related familiesRecognize the differences between Go and Python through comparisonLeverage the best practices of Go and PythonCreate your own network automation testing framework using network emulationAcquire skills in using automation frameworks and strategies for automationWho this book is for: This book is for network architects, network engineers, and software professionals looking to integrate programming into networks. Network engineers following traditional techniques can use this book to transition into modern-day network automation and programming. Familiarity with networking concepts is a prerequisite.
Learning Ebpf
What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves. It's an extraordinary platform for building a whole new generation of security, observability, and networking tools. This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works. Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves. With this book, you will: Learn why eBPF has become so important in the past couple of years Write basic eBPF code, and manipulate eBPF programs and attach them to events Explore how eBPF components interact with Linux to dynamically change the operating system's behavior Learn how tools based on eBPF can instrument applications without changes to the apps or their configuration Discover how this technology enables new tools for observability, security, and networking
Linux Commands from A to Z
Comprehensive Guide for BeginnersAre you still clicking, or already typing? With this book you will go from being a mouse pusher to a keyboard connoisseur! You will learn the most important commands, get tips and tricks for the daily work on your Linux computer.From the Contents: This book shows how efficient and fun working on the command line can be. It contains an alphabetically sorted list of the most important Linux commands, an overview of frequently used parameters, and many practical examples: Introduction to the shell (Bash)Shell prompt and environment variablesTab completion and Bash historyWildcards and regular expressionsOver 180 commandsNavigating through directoriesWorking with filesStarting and ending processesAdministration of the Linux systemAlphabetical index at the end of the bookAbout the Author: Heike Jurzik is a copywriter and author. She has been writing about the free operating system Linux, and other Open Source topics for over 20 years. Her first articles on the Linux command line appeared in the late 1990s-when Linux itself was still relatively new. Since then, she has written many books, technical articles, blog posts and manuals in both German and English.Linux Commands from A to Z: Have some Fun in the ShellCommand reference, all important Linux commands for beginners, overview of frequently used parameters and options, easy-to-understand explanations and practical examples, tips and tricks from a Linux expert. Working on the console is so much fun!
Macos in Easy Steps
Ideal for newcomers to the stylish world of Apple Macs and for those seeking to get more from their Mac computer. Illustrated using macOS Ventura.Discover the true potential of the stylish world of Apple computers with macOS in easy steps. Using macOS Ventura to illustrate, this primer will have you up and running, and getting more out of your Mac in no time. Areas covered include: Getting around your Mac, iMac or MacBook and setting it up to suit the way you work, including how to use the Finder and the Dock.Apps to help with everyday tasks and for communication: Contacts, Calendar, News, Reminders, Notes, Mail, and Messaging.Browsing the internet with Safari web browser.The digital lifestyle: photos, music, TV, videos, podcasts, and books.Using iCloud to back up and share items.Utilizing Stage Manager to get productive.Security, maintenance, and troubleshooting.Ideal for newcomers as well as those seeking to get more from their Mac computer.
RHCSA Red Hat Enterprise Linux 9
RHCSA Red Hat Enterprise Linux 9: Training and Exam Preparation Guide, Third Edition provides an in-depth coverage of the latest RHCSA (version 9) EX200 exam objectives. The most definitive guide available on the subject, this book explains concepts, analyzes configuration files, describes command outputs, shows step-by-step procedures (includes screenshots of actual commands executed and outputs they produced), and challenges the readers' comprehension of the concepts and procedures by presenting plenty of supplementary labs and sample realistic exam tasks to perform on their own.This book has 22 chapters that are organized logically, from building a lab environment to the fundamentals of Linux to sophisticated Linux administration topics. The book covers the topics on local RHEL 9 installation; initial interaction with the system; essential Linux commands; file compression and archiving; file editing and manipulation; standard and special permissions; file searching and access controls; user monitoring and authentication files; users, groups, and password aging; bash shell features and startup files; processes and job scheduling; basic and advanced software administration techniques; system boot process and bootloader; kernel management and system initialization; logging and system tuning; basic and advanced storage management tools and solutions; local file systems and swap regions; network device and connection configuration; hostname resolution and time synchronization; remote file systems and automounting; the secure shell service; firewall and SELinux controls; bash shell scripting; and operating system virtualization using containers.Each chapter highlights the major topics and relevant exam objectives at the beginning and ends with several review questions & answers and Do-It-Yourself challenge labs. Throughout the book, figures, tables, screenshots, examples, warnings, notes, and exam tips are furnished to support explanation and exam preparation. There are four sample RHCSA exams that are expected to be performed using the knowledge and skills attained from reading the material, following the in-chapter exercises, and completing the end-of-chapter challenge labs. The labs and the sample exams include hints to relevant topics and/or exercises.This book may be used as a self-learning guide by RHCSA 9 exam aspirants, a resource by instructors and students to follow in physical and virtual training sessions, an on-the-job resource for reference, and an easy-to-understand guide by novice and non-RHEL administrators.
Learning Microsoft Intune
Updated and expanded with new content for 2023, this book is your essential Intune ramp-up guide!Microsoft Intune (previously known as Microsoft Endpoint Manager) has rapidly become the tool of choice for IT professionals around the world for managing corporate and personal desktop and mobile devices, but the learning curve can be steep. Updated with the latest concepts and guidance, this book will fast-track your understanding of Intune by laying out concepts in an easy-to-read way, with examples and tips for the real world, along with guided lab exercises.In this book you will learn: Microsoft Intune - What it is and how to use itHow to set up your own learning labMobile Device Management (MDM) for iOS, macOS, Android & Windows 10/11Enrollment concepts for personal and corporate devices including Windows Autopilot, Apple Automated Device Enrollment (ADE), and Google Zero TouchEndpoint Security configuration in Intune including device Compliance and Conditional Access across Microsoft Cloud Products and services - Microsoft Endpoint Configuration Manager, Azure Active Directory, Microsoft Defender for Endpoint, and Office 365Deploying, protecting, and configuring mobile and desktop applications
Mastering Linux Security and Hardening - Third Edition
Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threatsKey Features: Discover security techniques to prevent malware from infecting a Linux system, and detect itPrevent unauthorized people from breaking into a Linux systemProtect important and sensitive data from being revealed to unauthorized personsBook Description: The third edition of Mastering Linux Security and Hardening is an updated, comprehensive introduction to implementing the latest Linux security measures, using the latest versions of Ubuntu and AlmaLinux.In this new edition, you will learn how to set up a practice lab, create user accounts with appropriate privilege levels, protect sensitive data with permissions settings and encryption, and configure a firewall with the newest firewall technologies. You'll also explore how to use sudo to set up administrative accounts with only the privileges required to do a specific job, and you'll get a peek at the new sudo features that have been added over the past couple of years. You'll also see updated information on how to set up a local certificate authority for both Ubuntu and AlmaLinux, as well as how to automate system auditing. Other important skills that you'll learn include how to automatically harden systems with OpenSCAP, audit systems with auditd, harden the Linux kernel configuration, protect your systems from malware, and perform vulnerability scans of your systems. As a bonus, you'll see how to use Security Onion to set up an Intrusion Detection System.By the end of this new edition, you will confidently be able to set up a Linux server that will be secure and harder for malicious actors to compromise.What You Will Learn: Prevent malicious actors from compromising a production Linux systemLeverage additional features and capabilities of Linux in this new versionUse locked-down home directories and strong passwords to create user accountsPrevent unauthorized people from breaking into a Linux systemConfigure file and directory permissions to protect sensitive dataHarden the Secure Shell service in order to prevent break-ins and data lossApply security templates and set up auditingWho this book is for: This book is for Linux administrators, system administrators, and network engineers interested in securing moderate to complex Linux environments. Security consultants looking to enhance their Linux security skills will also find this book useful. Working experience with the Linux command line and package management is necessary to understand the concepts covered in this book.
Ubuntu 22.04 LTS Server
This book is designed as an Ubuntu 22.04 LTS Server administration and reference source, covering the Ubuntu servers and their support applications. Server tools are covered as well as the underlying configuration files and system implementations. The emphasis is on what administrators will need to know to perform key server support and management tasks. Coverage of the systemd service management system is integrated into the book. Topics covered include software management, systemd service management, AppArmor security, OpenSSH, the Chrony time server, and Ubuntu cloud services. Key servers are examined, including Web, FTP, CUPS printing, NFS, and Samba Windows shares. Network support servers and applications covered include the Squid proxy server, the Domain Name System (BIND) server, DHCP, distributed network file systems, nftables firewalls, and cloud computing.The book is organized into five parts: getting started, services, shared resources, network support, and shells.Part 1 focuses on basic tasks such as installing the Ubuntu Live Server, configuring networking with Netplan, systemd-networkd, and NetworkManager, managing software from the Ubuntu Snap and APT repositories, and basic usage for the desktop and the command line interfaces. Part 2 examines Internet servers as well as how services are managed by systemd using unit files. Configuration and implementation of the Postfix mail server, the vsftpd FTP server, the Apache Web server, as well as news and database servers are covered in detail.Part 3 deals with servers that provide shared resources on a local network or the Internet. Services examined include the CUPS printing server, NFS Linux network file server, and Samba Windows file and printing server, clustering, and cloud computing services supported by Ubuntu.Part 4 covers servers that provide network support, like the Squid proxy server, the Bind Domain Name System (DNS) server, DHCP servers, and the nftables firewall along with the configuration firewall tools FirewallD and UFW. Key networking operations are also examined like IPv6 auto-configuration, TPC/IP networking, and network monitoring tools.Part 5 provides a review of shell commands, including those used for managing files, as well as shell scripts, variables, and configuration files. The Ubuntu Live Server only installs a command line interface, with no desktop. To manage your system and its files you will have to know the shell commands.
Ubuntu 22.04 LTS Desktop
This book covers the Ubuntu 22.04 LTS (Jammy Jellyfish) release, focusing on applications and administrative tools. The emphasis here is on what users will face when using Ubuntu, covering topics like installation, applications, software management for Snap and APT, the Ubuntu desktops (GNOME, MATE, and KDE), shell commands, network connections, and system administration tasks. There are four parts: Getting Started, Applications, Desktops, and Administration. Part 1 focuses on getting started, covering Ubuntu information and resources, using the Ubuntu Live DVD/USB drive, installing and setting up Ubuntu, upgrading Ubuntu, basic use of the desktop interface, and connecting to wired and wireless networks. Repositories and their use are covered in detail, along with the new Snap system for managing Snap packages. Ubuntu Snap package management with Ubuntu Software, the snap command, the Snap Store are examined, as well as APT package management with Gnome Software, the Synaptic Package Manager, and the apt and apt-get commands.Part 2 keys in on office, multimedia, mail, Internet, and social media applications. Part 3 covers the Ubuntu, Kubuntu, Ubuntu MATE, Xubuntu, and Lubuntu desktops. as well as the BASH shell. The Ubuntu desktop, which uses GNOME, is examined in detail. Part 4 deals with administration topics, first discussing system tools like the GNOME system monitor, the Disk Usage Analyzer, Seahorse, and Disk Utility. Then a detailed chapter on Ubuntu system administration tools is presented, covering tasks such as managing users and file systems, Bluetooth setup, network folder sharing, backups, and printing. The network connections chapter covers a variety of network tasks, including manual configuration of wired and wireless connections, and firewalls.
Ubuntu 22.04 LTS Server
This book is designed as an Ubuntu 22.04 LTS Server administration and reference source, covering the Ubuntu servers and their support applications. Server tools are covered as well as the underlying configuration files and system implementations. The emphasis is on what administrators will need to know to perform key server support and management tasks. Coverage of the systemd service management system is integrated into the book. Topics covered include software management, systemd service management, AppArmor security, OpenSSH, the Chrony time server, and Ubuntu cloud services. Key servers are examined, including Web, FTP, CUPS printing, NFS, and Samba Windows shares. Network support servers and applications covered include the Squid proxy server, the Domain Name System (BIND) server, DHCP, distributed network file systems, nftables firewalls, and cloud computing.
Red Hat Certified Specialist in Services Management and Automation EX358 Exam Guide
Gain the skills and knowledge to manage your core network services on Red Hat Enterprise Linux with help of self-tests and practical use casesKey Features: Get the EX358 certification with this easy-to-follow guide while preparing for real-life challengesLearn everything you need to know about Linux system administration and automation using Ansible 2.9Use practical use cases and exam-focused questions to prepare for the certification examBook Description: If you're ready to take the next step in your system engineering career with the EX358, then this book is for you. Packed with all the knowledge and skills that you need to configure and maintain services and applications on the Red Hat Linux 8 (RHEL OS 8) platform, this book will help you ace the exam and thrive at work.Red Hat Certified Specialist in Service Management and Automation will help you build a solid foundation of the most recent and up-to-date exam requirements and practice questions.Throughout the course of the book, you'll get hands-on experience with different technical processes needed to fully administer a Red Hat Enterprise Linux 8 system. This will include file storage, database management, direct configuration of applications, such as SMB shares, networking. You'll be well equipped with the configuration of essential components like firewall, SELinux, and iSCSI while learning how to automate these tasks using Ansible Automation 2.9 in order to alleviate the burden of completing them by hand.By the end of this book, you'll have covered all essential topics to ace the Red Hat EX358 certification exam and add another feather to your career as a Red Hat Certified Specialist.What You Will Learn: Attain the skills to take and pass the Red Hat EX358 certification examBecome familiar with the ways of leveraging Ansible Core 2.9Gain deeper knowledge of the Red Hat Linux Networking with DNS, DHCP, and IP addressingCreate your own link and master the networking domain through link aggregation creationSet up printers and email services through Linux serversGet up and running with MariaDB SQL databasesExplore how to create and control web trafficWho this book is for: This book is for you if you want to advance your career by adding the essential Red Hat certificate to your resume. It will be particularly useful for system administrators responsible for managing large enterprise environments, network services and Red Hat Certified Engineers interested in becoming a Red Hat Certified Architect (RHCA). Before reading this book, you must have a working knowledge of Red Hat Enterprise Linux and Ansible Automation and command line usage of Red Hat Enterprise Linux systems administration.
Windows Server Automation with PowerShell Cookbook - Fifth Edition
Use over 100 PowerShell 7.2 recipes to deepen your understanding of Windows Server 2022 and see how to automate common administrative tasks with easePurchase of the print or Kindle book includes a free eBook in PDF formatKey Features: New edition updated to the latest version of PowerShell 7.2 and Windows Server 2022Discover new ways to optimize your PowerShell code by working through easy-to-follow recipesLearn PowerShell best practices to automate common tasks and manage DHCP in Microsoft Windows Server, objects in Active Directory, Hyper-V, and AzureBook Description: The Windows Server Automation with PowerShell Cookbook is back with a new edition, featuring over 100 PowerShell recipes that will make your day-to-day work easier. This book is designed to help you learn how to install, configure and use PowerShell 7.2 effectively.To start with, the book looks at how to install and configure PowerShell 7.2, along with useful new features and optimizations, and shows you how the PowerShell compatibility solution bridges the gap to older versions of PowerShell. We'll also be covering a wide range of fundamental and more advanced use cases.As you progress, you'll explore topics like using PowerShell to manage networking and DHCP in Windows Server, objects in Active Directory, Hyper-V, and Azure. We'll also take a closer look at WSUS, containers and see how to handle modules that are not directly compatible with PowerShell 7. Finally, you'll also learn how to use some powerful tools to diagnose and resolve issues with Windows Server.By the end of this PowerShell book, you'll know how to use the PowerShell 7.2 to automate tasks on Windows Server 2022 with ease, helping your windows environment to run faster and smoother.What You Will Learn: Perform key admin tasks on Windows ServerKeep your organization secure with JEA, group policies, logs, and Windows DefenderUse the .NET Framework for administrative scriptingManage data and storage on Windows, including disks, volumes, and filesystemsReport system performance using built-in cmdlets and WMI to obtain single measurementsApply the right tools and modules to troubleshoot and debug Windows ServerCreate, manage, and back up a second VM using the subnetwork in AzureLearn how to set up a VPN in Azure with PowerShellWho this book is for: This book is for systems administrators, software architects, developers, consultants, and engineers working with Windows Server 2022 who want to automate tasks more effectively with PowerShell 7.2. You'll need to have conquered the basics of PowerShell and have a rudimentary understanding of PowerShell scripting before you can get started with this book.
Graph Theory and Its Applications
Graph Theory and its Applications, Third Edition is the latest edition of the bestselling textbook for undergraduate courses in graph theory, yet expansive enough to be used for graduate courses. It takes a comprehensive, accessible approach to graph theory that integrates classical developments with emerging methods, models, an
50 Kubernetes Concepts Every DevOps Engineer Should Know
A must-have Kubernetes book to learn key concepts for succeeding in any production environment, be it a greenfield Kubernetes environment or your cloud-native journeyKey Features: Advance in your Kubernetes journey with guidance from a seasoned k8s practitioner and trainerDiscover best practices for implementing Kubernetes in any production environmentGo beyond the basics and work with Kubernetes applications in every environmentBook Description: Kubernetes is a trending topic among engineers, CTOs, CIOs, and other technically sound professionals. Due to its proliferation and importance for all cloud technologies, DevOps engineers nowadays need a solid grasp of key Kubernetes concepts to help their organization thrive.This book equips you with all the requisite information about how Kubernetes works and how to use it for the best results. You'll learn everything from why cloud native is important to implementing Kubernetes clusters to deploying applications in production. This book takes you on a learning journey, starting from what cloud native is and how to get started with Kubernetes in the cloud, on-premises, and PaaS environments such as OpenShift. Next, you'll learn about deploying applications in many ways, including Deployment specs, Ingress Specs, and StatefulSet specs. Finally, you'll be comfortable working with Kubernetes monitoring, observability, and security. Each chapter of 50 Kubernetes Concepts Every DevOps Engineer Should Know is built upon the previous chapter, ensuring that you develop practical skills as you work through the code examples in GitHub, allowing you to follow along while giving you practical knowledge.By the end of this book, you'll be able to implement Kubernetes in any environment, whether it's an existing environment, a greenfield environment, or your very own lab running in the cloud or your home.What You Will Learn: Find out how Kubernetes works on-premises, in the cloud, and in PaaS environmentsWork with networking, cluster management, and application deploymentUnderstand why cloud native is crucial for Kubernetes applicationsDeploy apps in different states, including Stateless and StatefulMonitor and implement observability in your environmentExplore the functioning of Kubernetes security at the cluster, user, and application levelWho this book is for: This book is for cloud engineers, developers, DevOps engineers, and infrastructure engineers responsible for inheriting a Kubernetes environment or creating a greenfield Kubernetes environment. If you are a professional who wants to get started with cloud-native applications and implement k8s best practices, then this book is a must-read. If you have engineered environments in the cloud and on-premises and understand how to deploy applications with a solid tenure in a developer role, this book will help you further your skills.
Customizable and Adaptive Quantum Processors
The book reviews the concept of quantum unitary, binary and ternary quantum operators as well as the computation implied by each operator. It provides details of the quantum processor, providing its architecture, which is validated via execution simulation of some quantum instructions.
Practical Paranoia macOS 13 Security Essentials
New edition, completely updated December 14, 2022 for macOS 13 Ventura. The best-selling, easiest, step-by-step, most comprehensive guide to securing your home or business macOS computers, data, and communications.Official workbook for the Practical Paranoia Security Essentials Workshop, STEM and college cybersecurity courses. Designed for instructor-led, self-study, and DIY. The entire course is contained within the book. Includes all instructor presentations, hands-on assignments, links to all software, and security checklist.You don't need to be paranoid to know they are out there to get your computer, data, and identity.- 2,000,000 laptops were stolen or lost in the US last year.- Only 3% of stolen computers are ever recovered.- Malware attacks on macOS have become commonplace.- Hundreds of eyes may be able to see your name and password, along with the contents of every email you send.- It may take the bad guy under one minute to bypass your password to gain access to all your data.- With a slight bit of social engineering, your iCloud, Facebook, LinkedIn, Google, and other social media accounts, along with all your data, is freely accessible.- Through PRISM and other avenues, our government has access to your online browsing and email history.You don't need to be an Apple Genius to protect your system!In this easy, step-by-step guide, CIO, Security Specialist, and Apple Certified Technical Coordinator Marc L. Mintz takes any macOS user-from the novice with no technical skills, to experienced IT professional-through the process of fully encrypting and hardening the security of their computer, data, email, documents, network, instant messaging, storage devices, iCloud, browsing, and entire Internet experience.Guaranteed to be the easiest to follow and most comprehensive macOS cybersecurity book available.
OpenBSD Mastery
"Many users assume that their advanced filesystem is better than UFS because they have so many features-snapshots, checksums, compression, sophisticated caching algorithms, and so on-while all UFS has ever done is muck about putting data on disk. But, conversely, UFS users believe their filesystem is better for exactly the same reasons."-Hitchhikers Guide to OpenBSDDisk management is the core of system administration. Nobody can tell you how large that database is going to grow or how many files that archive must eventually support, but for everything else there's OpenBSD Mastery: Filesystems. This guide takes you through the latest in OpenBSD storage management, including: - OpenBSD's cross-platform storage stack- MBR, GPT, and disklabel partitions- The Unix File System- Growing, removing, and repairing filesystems- Memory file systems- The Buffer Cache- Why you need swap, and how to live with it- Coping with FAT, NTFS, EXT, and more- The Network File System- iSCSI- Software RAID- Encrypted filesystems- Encrypted installsAnd more! Partition yourself for success and grab OpenBSD Mastery: Filesystems now.
OpenBSD Mastery
"Many users assume that their advanced filesystem is better than UFS because they have so many features-snapshots, checksums, compression, sophisticated caching algorithms, and so on-while all UFS has ever done is muck about putting data on disk. But, conversely, UFS users believe their filesystem is better for exactly the same reasons."-Hitchhikers Guide to OpenBSDDisk management is the core of system administration. Nobody can tell you how large that database is going to grow or how many files that archive must eventually support, but for everything else there's OpenBSD Mastery: Filesystems. This guide takes you through the latest in OpenBSD storage management, including: - OpenBSD's cross-platform storage stack- MBR, GPT, and disklabel partitions- The Unix File System- Growing, removing, and repairing filesystems- Memory file systems- The Buffer Cache- Why you need swap, and how to live with it- Coping with FAT, NTFS, EXT, and more- The Network File System- iSCSI- Software RAID- Encrypted filesystems- Encrypted installsAnd more! Partition yourself for success and grab OpenBSD Mastery: Filesystems now.
Accelerated macOS Core Dump Analysis, Third Edition
The full transcript of Software Diagnostics Services training with 12 step-by-step exercises. Learn how to analyze app crashes and freezes, navigate through process core memory dump space and diagnose corruption, memory leaks, CPU spikes, blocked threads, deadlocks, wait chains, and much more. We use a unique and innovative pattern-driven analysis approach to speed up the learning curve. The training consists of practical step-by-step exercises using Xcode and LLDB environments, highlighting more than 30 analysis patterns from Software Diagnostics Institute diagnosed in ARM64 process core memory dumps. The training also includes an overview of relevant similarities and differences between Windows and macOS user space memory dump analysis useful for engineers with a Wintel background and the relevant ARM64 disassembly tutorial. The course is thoroughly updated for the latest macOS version and M2 platform. The primary audience for this training is software technical support and escalation engineers who analyze crash reports and memory dumps, quality assurance and software engineers who test and debug macOS software, security and vulnerability researchers, and malware and memory forensics analysts who have never used LLDB for the analysis of computer memory.
Dell VxRail System Design and Best Practices
Design, build, and protect your clusters with ease with VxRail, Dell's hyper-converged infrastructure solution, and this comprehensive in-depth guideKey Features: Combine your virtualization systems into one with this comprehensive guide to VxRailProtect against data loss with a variety of backup, replication, and recovery optionsTake your virtualization skills to the next level thanks to Dell's hyper-converged infrastructureBook Description: Virtualized systems are well established now, and their disparate components can be found bundled together in hyper-converged infrastructures, such as VxRail from Dell EMC. Dell VxRail System Design and Best Practices will take you, as a system architect or administrator, through the process of designing and protecting VxRail systems.While this book assumes a certain level of knowledge of VMware, vSphere 7.x, and vCenter Server, you'll get a thorough overview of VxRail's components, features, and architecture, as well as a breakdown of the benefits of this hyper-converged system. This guide will give you an in-depth understanding of VxRail, as well as plenty of practical examples and self-assessment questions along the way to help you plan and design every core component of a VxRail system - from vSAN storage policies to cluster expansion. It's no good having a great system if you lose everything when it breaks, so you'll spend some time examining advanced recovery options, such as VMware Site Recovery Manager and Veeam Backup and Replication.By the end of this book, you will have got to grips with Dell's hyper-converged VxRail offering, taking your virtualization proficiency to the next level.What You Will Learn: Design vSAN storage policiesScale-out and expand clustersDesign stretched clustersProtect your system with VMware Site Recovery ManagerDiscover how to configure EMC RecoverPoint for Virtual MachinesIntegrate Veeam Backup and Replication with VxRailSet up a vSAN 2-node clusterWho this book is for: This book is for system architects, system administrators, or consultants involved in planning and designing VxRail HCI. The reader is expected to have equivalent knowledge and administration experience with VMware vSphere 7. x and vCenter Server 7.x.
Cybersecurity and Privacy Law Handbook
Get to grips with cybersecurity and privacy laws to protect your company's data and comply with international privacy standardsKey Features: Comply with cybersecurity standards and protect your data from hackersIdentify the gaps in your company's security posture using gap analysis and business impact analysisUnderstand what you need to do for security and privacy without needing to pay consultantsBook Description: Cybercriminals are incessantly coming up with new ways to compromise online systems and wreak havoc, creating an ever-growing need for cybersecurity practitioners in every organization across the globe who understand international security standards, such as the ISO27k family of standards.If you're looking to ensure that your company's data conforms to these standards, Cybersecurity and Privacy Law Handbook has got you covered. It'll not only equip you with the rudiments of cybersecurity but also guide you through privacy laws and explain how you can ensure compliance to protect yourself from cybercrime and avoid the hefty fines imposed for non-compliance with standards.Assuming that you're new to the field, this book starts by introducing cybersecurity frameworks and concepts used throughout the chapters. You'll understand why privacy is paramount and how to find the security gaps in your company's systems. There's a practical element to the book as well-you'll prepare policies and procedures to prevent your company from being breached. You'll complete your learning journey by exploring cloud security and the complex nature of privacy laws in the US.By the end of this cybersecurity book, you'll be well-placed to protect your company's data and comply with the relevant standards.What You Will Learn: Strengthen the cybersecurity posture throughout your organizationUse both ISO27001 and NIST to make a better security frameworkUnderstand privacy laws such as GDPR, PCI CSS, HIPAA, and FTCDiscover how to implement training to raise cybersecurity awarenessFind out how to comply with cloud privacy regulationsExamine the complex privacy laws in the USWho this book is for: If you're a seasoned IT security or cybersecurity pro, this book isn't for you. This book is for novices, freshers, students, experts in other fields, as well as managers who want to learn the workings and management of a security function. Although this book will teach you how to build and manage a security function on your own, you'll also find it valuable if you want to supervise a team devoted to implementing cybersecurity and privacy practices in an organization.
Administering Windows Server Hybrid Core Infrastructure AZ-800 Exam Guide
Breeze through the AZ-800 certification with this up-to-date practical guide and gain valuable skills that will help you in your day-to-day administrationKey Features: Develop a solid base of all the essentials necessary to pass AZ-800 certification exam on your first attemptGo beyond exam prep by working on practical examples that will prepare you for the work aheadSimplify and automate your workflows with Windows Admin Center, PowerShell, Azure Arc, and IaaS VMBook Description: Written by an Azure MVP and Microsoft Certified Trainer with 20 years of experience in data center infrastructure, this AZ-800 study guide is an essential preparation tool for administrators who want to take the exam and acquire key skills that will help them thrive in their careers.This book will guide you through all the ways Windows Server can be used to manage hybrid solutions on-premises and in the cloud, starting with deploying and managing Active Directory Domain Services (AD DS) in on-premises and cloud environments. You'll then dive into managing virtual machines and containers and progress to implementing and managing an on-premises and hybrid networking infrastructure.The later parts of the book focus on managing storage and file services, concluding with a detailed overview of all the knowledge needed to pass the AZ-800 exam with practical examples throughout the chapters. In the final chapter, you'll be able to test your understanding of the topics covered with the help of practice exams to make sure that you're completely prepared for the contents and structure of the exam.By the end of the book, you'll have gained the knowledge, both practical and conceptual, that's required to administer Windows Server hybrid core infrastructure confidently.What You Will Learn: Deploy and manage AD DS on-premises and in cloud environmentsImplement and manage hybrid core infrastructure solutions for compute, storage, networking, identity, and managementDiscover expert tips and tricks to achieve your certification in the first goMaster the hybrid implementation of Windows Server running as virtual machines and containersManage storage and file services with easeWork through hands-on exercises to prepare for the real worldWho this book is for: This book is for Windows Server administrators who want to pass the AZ-800 and implement hybrid infrastructure on premises and in the cloud. Azure administrators, enterprise architects, Microsoft 365 administrators, and network engineers will also get plenty of useful insights from this book. You'll need a solid understanding of the Windows Server to get started with this book, especially if you're preparing for the exam.
Linux Mint 21
Linux mint 21 (Vanessa) is based on the Ubuntu 22.04 LTR (Long Term Release). The Cinnamon and Mate desktops are examined in detail. Cinnamon and Mate have custom Mint menus to manage access to applications and devices. Advanced components are also examined such as the LightDM Display Manager, Warpinator, Timeshift, NetworkManager, the Samba server, and Mint software management applications (Software Manager and Update Manager). The Linux Mint X-Apps are also reviewed, including Xed, Xviewer, and Timeshift. Administration topics include system tools, managing users, file systems, Bluetooth setup (Blueman), printer configuration, and network folder and file sharing. In addition, configuration of wired and wireless connections, firewalls, and service management using systemd are covered. Shared resources are also examined, including the CUPS printing server, the NFS Linux network file server, and Samba Windows file server.
9front the Golden Age of Ballooning
9front is a fork of the Plan 9 from Bell Labs operating system. This publication is a print edition of the 9front Dash 1 manual. It is very likely outdated.
Linux All-In-One for Dummies
Linux is for everyone! Linux All-in-One For Dummies breaks down the ever-popular operating system to its basics and trains users on the art of Linux. This handy reference covers all the latest updates and operating system features. It presents content on Linux desktops, applications, and more. With eight books in one, you'll have access to the most comprehensive overview of Linux around. Explore the inner workings of Linux machines, so you'll know Linux front to back. This all-inclusive handbook also walks you through solving Linux problems--complete with hands-on examples--so you'll be a Linux whiz before you know it. Get familiar with Linux as you install and customize the operating system Learn how to navigate the file system, use the Linux shell, and get online Become a Linux guru with server hosting, scripting, and security how-tos Study for your Linux certification by using this complete guide as your referenceThis book is a massive source of support for beginning and intermediate Linux users, as well as those looking to brush up on their knowledge for certification. And, thanks to the signature Dummies approach, it's also a lot of fun.
Red Hat Enterprise Linux 9 Administration - Second Edition
Develop the skills required to administer your RHEL environment on-premises and in the cloud while preparing for the RHCSA examPurchase of the print or Kindle book includes a free eBook in PDF formatKey Features- Become a pro at system administration from installation to container management- Secure and harden your Linux environment using SSH, SELinux, firewall, and system permissions- Gain confidence to pass the RHCSA exam with the help of practice testsBook DescriptionWith Red Hat Enterprise Linux 9 becoming the standard for enterprise Linux used from data centers to the cloud, Linux administration skills are in high demand. With this book, you'll learn how to deploy, access, tweak, and improve enterprise services on any system on any cloud running Red Hat Enterprise Linux 9.Throughout the book, you'll get to grips with essential tasks such as configuring and maintaining systems, including software installation, updates, and core services. You'll also understand how to configure the local storage using partitions and logical volumes, as well as assign and deduplicate storage. You'll learn how to deploy systems while also making them secure and reliable.This book provides a base for users who plan to become full-time Linux system administrators by presenting key command-line concepts and enterprise-level tools, along with essential tools for handling files, directories, command-line environments, and documentation for creating simple shell scripts or running commands. With the help of command line examples and practical tips, you'll learn by doing and save yourself a lot of time.By the end of the book, you'll have gained the confidence to manage the filesystem, users, storage, network connectivity, security, and software in RHEL 9 systems on any footprint.What You Will Learn- Become well versed with the fundamentals of RHEL9-from system deployment to user management- Secure a system by using SELinux policies and configuring firewall rules- Understand LVM to manage volumes and maintain VDO deduplication- Manage a system remotely using SSH and public key authentication- Get the hang of the boot process and kernel tunable to adjust your systems- Automate simple tasks using scripts or Ansible PlaybooksWho this book is forThis book is for Red Hat Enterprise Linux system administrators and Linux system administrators. It's also a good resource for any IT professional who wants to learn system administration. RHCSA certification candidates will find this book useful in their preparation for the certification exam.Table of Contents- Getting RHEL Up and Running- RHEL 9 Advanced Installation Options- Basic Commands and Simple Shell Scripts- Tools for Regular Operations- Securing Systems with Users, Groups, and Permissions- Enabling Network Connectivity- Adding, Patching, and Managing Software- Administering Systems Remotely- Securing Network Connectivity with firewalld- Keeping Your System Hardened with SELinux- System Security Profiles with OpenSCAP- Managing Local Storage and Filesystems- Flexible Storage Management with LVM- Advanced Storage Management with Stratis and VDO- Understanding the Boot Process- Kernel Tuning and Managing Performance Profiles with tuned- Managing Containers with Podman, Buildah, and Skopeo- Practice Exercises - 1- Practice Exercises - 2
Salesforce for Beginners - Second Edition
Learn how to leverage the Salesforce platform for sales, service, marketing, and automating business activities from a 360-degree perspective.Purchase of the print or Kindle book includes a free eBook in the PDF format.Key Features: Enhanced with reader feedback and updated with the latest UI for efficient learningLearn how to use Salesforce Flow, the new replacement for workflow rules and process builders on the Salesforce platformBecome familiar with the basics of Salesforce administration and mobile app setupBook Description: Salesforce is the world's leading Customer Relationship Management (CRM) software, helping businesses connect with their constituents and partners. This book will give you a comprehensive introduction to managing sales, marketing, customer relationships, and overall administration for your organization. You'll learn how to configure and use Salesforce for maximum efficiency and return on investmentThis book will teach you how to create activities, manage leads, manage users, set up security, customize your UX, work with third-party applications, build flows, develop your prospects and sales pipeline using opportunities and accounts, understand how you can enhance marketing activities using campaigns and much more. Packed with real-world business use cases, this Salesforce book will show you how to analyze your business information accurately to make productive decisions for your business. As you advance, you'll learn how to build various reports and dashboards in Salesforce to derive valuable business insights. Finally, you'll explore tools such as Flows, Approval Processes, and Assignment Rules to achieve business process automation and set out on the path to becoming a successful Salesforce administratorBy the end of the book, you will know how to manipulate Salesforce to achieve your business goalsWhat You Will Learn: Explore business development with leads, accounts and contacts in SalesforceFind out how stages and sales processes help you manage your opportunity pipelineAchieve marketing goals using Salesforce campaignsPerform business analysis using reports and dashboardsPractice automating with Flows, the main automation tool for SalesforceGain a high-level overview of the items in the administration sectionGrasp the different aspects needed to build an effective Salesforce security modelWho this book is for: If you are new to Salesforce and want to learn it from scratch, an administrator looking to build your Salesforce skills, or a student looking to start a career in Salesforce, this book is for you. No prior knowledge of the Salesforce is required to get started with this book
Certified Kubernetes Administrator (CKA) Exam Guide
Develop a deep understanding of Kubernetes and the cloud native ecosystem, and pass the CKA exam with confidence with this end-to-end study guideKey Features: Get to grips with the core concepts of Kubernetes API primitivesDeploy, configure, manage, and troubleshoot Kubernetes clustersCement your credibility in the job market by becoming a Certified Kubernetes AdministratorBook Description: Kubernetes is the most popular container orchestration tool in the industry. The Kubernetes Administrator certification will help you establish your credibility and enable you to efficiently support the business growth of individual organizations with the help of this open source platform.The book begins by introducing you to Kubernetes architecture and the core concepts of Kubernetes. You'll then get to grips with the main Kubernetes API primitives, before diving into cluster installation, configuration, and management. Moving ahead, you'll explore different approaches while maintaining the Kubernetes cluster, perform upgrades for the Kubernetes cluster, as well as backup and restore etcd. As you advance, you'll deploy and manage workloads on Kubernetes and work with storage for Kubernetes stateful workloads with the help of practical scenarios. You'll also delve into managing the security of Kubernetes applications and understand how different components in Kubernetes communicate with each other and with other applications. The concluding chapters will show you how to troubleshoot cluster- and application-level logging and monitoring, cluster components, and applications in Kubernetes.By the end of this Kubernetes book, you'll be fully prepared to pass the CKA exam and gain practical knowledge that can be applied in your day-to-day work.What You Will Learn: Understand the fundamentals of Kubernetes and its toolsGet hands-on experience in installing and configuring Kubernetes clustersManage Kubernetes clusters and deployed workloads with easeGet up and running with Kubernetes networking and storageManage the security of applications deployed on KubernetesFind out how to monitor, log, and troubleshoot Kubernetes clusters and apps among othersWho this book is for: This book is for application developers, DevOps engineers, data engineers, and cloud architects who want to pass the CKA exam and certify their Kubernetes Administrator skills in the market. Basic knowledge of Kubernetes is recommended to get the most out of this book.
Ubuntu 22.04 LTS Desktop
This book covers the Ubuntu 22.04 LTS (Jammy Jellyfish) release, focusing on applications and administrative tools. The emphasis here is on what users will face when using Ubuntu, covering topics like installation, applications, software management for Snap and APT, the Ubuntu desktops (GNOME, MATE, and KDE), shell commands, network connections, and system administration tasks. There are four parts: Getting Started, Applications, Desktops, and Administration.Part 1 focuses on getting started, covering Ubuntu information and resources, using the Ubuntu Live DVD/USB drive, installing and setting up Ubuntu, upgrading Ubuntu, basic use of the desktop interface, and connecting to wired and wireless networks. Repositories and their use are covered in detail, along with the new Snap system for managing Snap packages. Ubuntu Snap package management with Ubuntu Software, the snap command, the Snap Store are examined, as well as APT package management with Gnome Software, the Synaptic Package Manager, and the apt and apt-get commands.Part 2 keys in on office, multimedia, mail, Internet, and social media applications. Part 3 covers the Ubuntu, Kubuntu, Ubuntu MATE, Xubuntu, and Lubuntu desktops. as well as the BASH shell. The Ubuntu desktop, which uses GNOME, is examined in detail. Part 4 deals with administration topics, first discussing system tools like the GNOME system monitor, the Disk Usage Analyzer, Seahorse, and Disk Utility. Then a detailed chapter on Ubuntu system administration tools is presented, covering tasks such as managing users and file systems, Bluetooth setup, network folder sharing, backups, and printing. The network connections chapter covers a variety of network tasks, including manual configuration of wired and wireless connections, and firewalls.
Mastering Ubuntu Server - Fourth Edition
Your one-stop resource to learn, configure and use Ubuntu 22.04 for your day-to-day operations and deployments.Purchase of the print or Kindle book includes a free eBook in PDF format.Key FeaturesGet well-versed with newly added features in Ubuntu 22.04Master the art of installing, managing, and troubleshooting Ubuntu ServerLeverage the improved performance and security-related aspects of Ubuntu Server 22.04Book DescriptionUbuntu Server is taking the server world by storm - and for a good reason! The server-focused spin of Ubuntu is a stable, flexible, and powerful enterprise-class distribution of Linux with a focus on running servers both small and large. Mastering Ubuntu Server is a book that will teach you everything you need to know in order to manage real Ubuntu-based servers in actual production deployments. This book will take you from initial installation to deploying production-ready solutions to empower your small office network, or even a full data center. You'll see examples of running an Ubuntu Server in the cloud, be walked through set up popular applications (such as Nextcloud), host your own websites, and deploy network resources such as DHCP, DNS, and others. You'll also see how to containerize applications via LXD to maximize efficiency and learn how to build Kubernetes clusters. This new fourth edition updates the popular book to cover Ubuntu 22.04 LTS, which takes advantage of the latest in Linux-based technologies. By the end of this Ubuntu book, you will have gained all the knowledge you need in order to work on real-life Ubuntu Server deployments and become an expert Ubuntu Server administrator who is well versed in its feature set.What you will learnInstall Ubuntu Server on physical servers and on the Raspberry PiDeploy Ubuntu Server in the cloud and host websites on your own serverDeploy your applications to their own containers and scale your infrastructureSet up popular applications such as NextcloudAutomate deployments and configuration with Ansible to save timeContainerize applications via LXD to maximize efficiencyDiscover best practices and troubleshooting techniquesWho this book is forThis book is for System Administrators, Site Reliability Engineers, DevOps professionals, enthusiasts, as well as for individuals looking to make a career change and learn the skills they'll need to work with Ubuntu servers. Prior knowledge of Ubuntu is not required but a basic understanding of basic computing concepts is assumed. Some IT administration, Linux, and shell scripting experience is preferred, although the first several chapters will bring newcomers up to speed as well.Table of ContentsDeploying Ubuntu ServerManaging Users and PermissionsManaging Software PackagesNavigating and Essential CommandsManaging Files and DirectoriesBoosting Your Command-line EfficiencyControlling and Managing ProcessesMonitoring System ResourcesManaging Storage VolumesConnecting to NetworksSetting Up Network ServicesSharing and Transferring FilesManaging DatabasesServing Web ContentAutomating Server Configuration with AnsibleVirtualizationRunning ContainersContainer OrchestrationDeploying Ubuntu in the CloudAutomating Cloud Deployments with TerraformSecuring Your ServerTroubleshooting Ubuntu ServersPreventing Disasters
Windows XP in a Nutshell
Windows XP in a Nutshell, Second Edition documents everything there is to know about the world's most widely used operating system. Updated to include information on Service Pack 2 (SP2), this compact guide is the ultimate resource for IT professionals and Windows XP power users everywhere. Written in O'Reilly's time-tested in a Nutshell format, Windows XP in a Nutshell, Second Edition cuts through the hype and delivers practical details in a no-nonsense manner. At the heart of the book is an invaluable 200-plus-page section titled Windows XP Application and Tools. In it, readers will find: A list of available commands and utilities, including Start Menu accessories, command prompt tools, and hidden system administration utilities A Task and Setting Index for quick access to hundreds of XP settings A complete reference to XP's command prompt, including advanced commands and scripting features Windows XP in a Nutshell, Second Edition also includes a primer on files, folders, and windows; control panels and built-in applications; how to set up a PC for Internet use; and the standard Windows rituals of troubleshooting, installation, and upgrading. And, of course, this greatly expanded second edition also includes all the need-to-know details about the security technologies featured in SP 2, so you can better defend yourself against viruses, worms, and hackers. Readers even receive guidelines and instructions for installing SP2 on their PC, or across a network of computers. With its wealth of tips, careful instruction, and expert advice, this must-have desktop reference is dedicated to making your time at the computer safer, easier, and more fun.
Knoppix Pocket Reference
Knoppix is a portable Linux distribution replete with hundreds of valuable programs and utilities -- a veritable Swiss Army knife in bootable CD form. It includes Linux software and desktop environments, automatic hardware detection and hundreds of other quality open source programs. Whether you're a system administrator or power user, you can use Knoppix for many different purposes. Knoppix boots and runs completely from a single CD so you don't need to install anything to your hard drive. Due to on-the-fly decompression, the CD can have up to 2 GB of executable software installed on it. What you do need, however, is a comprehensive reference guide so you can benefit from all that Knoppix has to offer. The Knoppix Pocket Reference from O'Reilly fits the bill. This handy book shows you how to use Knoppix to troubleshoot and repair your computer, how to customize the Knoppix CD, running RAM memory checks, recovering data from a damaged hard drive, cloning hard drives, using Knoppix as a Terminal Server, using Knoppix as a kiosk OS, scanning for viruses on a Windows system, editing the Registry of a Windows system, and much more. If you want more information than the average Knoppix user, Knoppix Pocket Reference is an absolutely essential addition to your personal library.
Managing Kubernetes Resources Using Helm - Second Edition
Reduce the complexity of managing applications on Kubernetes and develop an enterprise pattern for application deliveryKey Features: Learn best practices from the core maintainer of Helm for application delivery and life cycle managementManage applications deployed in Kubernetes effectively using HelmGo beyond the basics when using Helm with key security considerations and management optionsBook Description: Containerization is one of the best ways to implement DevOps, and learning how to execute it effectively is an essential part of a developer's skillset. Kubernetes is the current industry standard for container orchestration. This book will help you discover the efficiency of managing applications running on Kubernetes with Helm.Starting with a brief introduction to Helm and its impact on users working with containers and Kubernetes, you'll delve into the primitives of Helm charts and their architecture and use cases. From there, you'll understand how to write Helm charts in order to automate application deployment on Kubernetes and work your way toward more advanced strategies. These enterprise-ready patterns are focused on concepts beyond the basics so that you can use Helm optimally, looking at topics related to automation, application development, delivery, lifecycle management, and security.By the end of this book, you'll have learned how to leverage Helm to build, deploy, and manage applications on Kubernetes.What You Will Learn: Understand how to deploy applications on Kubernetes with easePackage dynamic applications for deployment on KubernetesIntegrate Helm into an existing software release processDevelop an enterprise automation strategy on Kubernetes using HelmUse Helm within a Helm Kubernetes operatorLeverage Helm in a secure and stable manner that fits the enterpriseDiscover the ins and outs of automation with HelmWho this book is for: This book is for Kubernetes developers or administrators who are interested in learning Helm to provide automation for app development on Kubernetes. Although no prior knowledge of Helm is required, basic knowledge of Kubernetes application development will be useful.
Ansible for Real-Life Automation
Learn how to automate and manage your IT infrastructure and applications using AnsibleKey Features: Develop Ansible automation use cases by automating day-to-day IT and application operationsUse Ansible to automate private and public cloud, application containers, and container platformsImprove your DevOps workflow with AnsibleBook Description: Get ready to leverage the power of Ansible's wide applicability to automate and manage IT infrastructure with Ansible for Real-Life Automation. This book will guide you in setting up and managing the free and open source automation tool and remote-managed nodes in the production and dev/staging environments.Starting with its installation and deployment, you'll learn automation using simple use cases in your workplace. You'll go beyond just Linux machines to use Ansible to automate Microsoft Windows machines, network devices, and private and public cloud platforms such as VMWare, AWS, and GCP. As you progress through the chapters, you'll integrate Ansible into your DevOps workflow and deal with application container management and container platforms such as Kubernetes. This Ansible book also contains a detailed introduction to Red Hat Ansible Automation Platform to help you get up to speed with Red Hat AAP and integration with CI/CD and ITSM.What's more, you'll implement efficient automation solutions while learning best practices and methods to secure sensitive data using Ansible Vault and alternatives to automate non-supported platforms and operations using raw commands, command modules, and REST API calls.By the end of this book, you'll be proficient in identifying and developing real-life automation use cases using Ansible.What You Will Learn: Explore real-life IT automation use cases and employ Ansible for automationDevelop playbooks with best practices for production environmentsApproach different automation use cases with the most suitable methodsUse Ansible for infrastructure management and automate VMWare, AWS, and GCPIntegrate Ansible with Terraform, Jenkins, OpenShift, and KubernetesManage container platforms such as Kubernetes and OpenShift with AnsibleGet to know the Red Hat Ansible Automation Platform and its capabilitiesWho this book is for: This book is for DevOps and systems engineers looking to adopt Ansible as their automation tool. To get started with this book, basic knowledge of Linux is necessary, along with an understanding of how tasks are done the manual way before setting out to automate them.
Azure for Developers - Second Edition
Develop cloud applications based on the most popular Azure services, including hosting web applications, running containers, storing data using both relational and non-relational databases, and much moreKey Features: - Take a modern approach to Azure Cloud development and management- Get a detailed introduction to services such as web hosting, databases, and serverless platforms- Get the hang of cloud services with this practical, developer-centric guide for Azure developersBook Description: Microsoft Azure is currently one of the fastest growing public cloud service providers thanks to its sophisticated set of services for building fault-tolerant and scalable cloud-based applications.This second edition of Azure for Developers will take you on a journey through the various PaaS services available in Azure, including Azure App Service, Azure Functions, and Azure SQL Databases, showing you how to build a complete and reliable system with ease. Throughout the book, you'll discover ways to enhance your skills when building cloud-based solutions leveraging different SQL/NoSQL databases, serverless and messaging components, containerized solutions, and even search engines such as Azure Cognitive Search. That's not all!! The book also covers more advanced scenarios such as scalability best practices, serving static content with Azure CDN, and distributing loads with Azure Traffic Manager, Azure Application Gateway, and Azure Front Door.By the end of this Azure book, you'll be able to build modern applications on the Azure cloud using the most popular and promising technologies to make your solutions reliable, stable, and efficient.What You Will Learn: - Identify the Azure services that can help you get the results you need- Implement PaaS components - Azure App Service, Azure SQL, Traffic Manager, CDN, Notification Hubs, and Azure Cognitive Search- Work with serverless components- Integrate applications with storage- Put together messaging components (Event Hubs, Service Bus, and Azure Queue Storage)- Use Application Insights to create complete monitoring solutions- Secure solutions using Azure RBAC and manage identities- Develop fast and scalable cloud applicationsWho this book is for: This book is for developers and IT professionals who want to learn Microsoft Azure by developing applications based on various cloud services. Prior knowledge of software development and the basics of software architecture and Azure services give you an advantage.Table of Contents- Web Applications in Azure- Using Azure Container Registry for Storing and Managing Images- Deploying Web Applications as Containers- Using Azure Container Instances for Ad Hoc Application Hosting- Building a Search Engine with Azure Cognitive Search- Mobile Notifications with Notification Hubs- Serverless and Azure Functions- Durable Functions- Integrating Different Components with Logic Apps- Swiss Army Knife- Reactive Architecture with Event Grid- Using Azure Storage- Big Data Pipeline- Real-Time Data Analysis- Enterprise Integration- Using Application Insights to Monitor Your Applications- SQL in Azure- Big Data Storage- Scaling Azure Applications- Serving Static Content Using Azure CDN- Managing APIs with Azure API Management- Building a Scalable Entry Point for Your Service with Azure Front Door- Azure Application Gateway as a Web Traffic Load Balancer- Distributing Load with Azure Traffic Manager- Tips and Tricks for Azure
Windows Server 2022 Administration Fundamentals - Third Edition
Deploy, set up, and deliver network services with Windows Server 2022, along with exploring Microsoft's role-based certificationsKey FeaturesGet started with server installation, performance monitoring, and server maintenanceDevelop the skills necessary to manage an enterprise environmentImplement networking and security best practices in your Windows Server environmentBook DescriptionThis third edition gets you up and running with Windows Server 2022, Microsoft's new server operating system, as part of the Windows NT family of operating systems, developed concurrently with Windows 10, version 21H2.The book begins by introducing computer networking and Windows Server concepts, gradually moving towards Windows Server 2022. With the help of step-by-step instructions and easy-to-understand graphics, you'll become well versed with the roles, features, and functionalities of Windows Server 2022. Topics such as the installation process, upgrades, post-installation tasks, and initial server configuration are covered in detail. As you make progress, you'll explore roles, features, and role services such as Active Directory, DNS, Hyper-V, remote access, storage, and printers, among others. The book then takes you through maintenance and troubleshooting tasks to guide you in efficiently managing Windows Server 2022. Finally, by working with numerous questions in each chapter and detailed answers at the end, you can test your understanding of the concepts covered.By the end of this Windows Server book, you'll be equipped with the knowledge needed to update, maintain, and troubleshoot servers to ensure business continuity by relying on best practices and using step-by-step graphic-driven examples.What you will learnGrasp the fundamentals of Windows Server 2022Understand how to deploy Windows Server 2022Discover Windows Server post-installation tasksAdd roles to your Windows Server environmentApply Windows Server 2022 GPOs to your networkDelve into virtualization and Hyper-V conceptsTune, maintain, update, and troubleshoot Windows Server 2022Get familiar with Microsoft's role-based certificationsWho this book is forIf you are an IT professional who wants to deploy and configure Windows Server 2022, then this book is for you. You can also use this book to learn about Microsoft's role-based certifications if you're planning to enroll in a course. No prior experience with Windows Server operating systems or familiarity with networking concepts is required.Table of ContentsGetting Started with Windows ServerIntroducing Windows Server 2022Installing Windows Server 2022Post-Installation Tasks in Windows Server 2022Directory Services in Windows Server 2022Adding Roles to Windows Server 2022Group Policy in Windows Server 2022Virtualization with Windows Server 2022Storing Data in Windows Server 2022Tuning and Maintaining Windows Server 2022Updating and Troubleshooting Windows Server 2022Preparing for Microsoft Certifications