|Browse by Catagory:
Civil Rights & Liberties
War & Peace
Cajun & Creole Cooking
Caribbean & West Indian Cooking
Diabetic & Sugar-Free Cooking
Low Fat Cooking
Middle Eastern Cooking
Pacific Rim Cooking
Home & Garden
Literature & Fiction
Sheet Music & Scores
Environmental & Natural Resources Law
Ethics & Professional Responsibility
Procedures & Litigation
Water Supply & Land Use
Lawyer and Crimal Humor
Outdoors & Nature
Hiking & Camping
Hunting & Fishing
Beer & Beer Making
Health & Fitness
Diets & Weight Loss
Children's Science & Nature
Vitamins & Supplements
Psychology and Counseling
Philosophy of Psychology
Physiological Aspects of Psychology
Psychology of Sexuality
Psychology Testing & Measurement
Chaos & Systems
Geometry & Topology
Logic & Brain Teasers
Chaos & Systems
Geometry & Topology
Probability & Statistics
Experiments, Instruments & Measurement
Chaos & Systems
Fusion & Fission
Nuclear Magnetic Resonance
Waves & Wave Mechanics
Administration & Policy
Allied Health Professions
Medical Education & Training
Endocrinology & Metabolism
Physician & Patient
Insects & Spiders
Fish & Aquariums
Mobile & Wireless Computing: Programming
Linux Kernel & Peripherals
Linux Networking & Administration
State & Local History
Sci Fi Calendars
Bujold, Lois McMaster
Card, Orson Scott
Chalker, Jack L.
Heinlein, Robert A.
McKillip, Patricia A.
Nye, Jody Lynn
Linux Networking & Administration
|SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
Lowest new price: $16.82
Lowest used price: $18.67
List price: $19.95
Author: Michael W Lucas
Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job and improves security.
This book saves you from sifting a decade of obsolete online tutorials and quickly gets you running:SSH with the OpenSSH server and the PuTTY and OpenSSH clients. You will:
* Eliminate passwords.
* Manage access to your SSH server by users, groups, addresses, and more
* Securely move files around your network
* Forward graphic displays from one host to another
* Forward TCP/IP connections
* Centrally manage host keys and client configurations
* Use SSH as a secure transport for other applications
* Secure applications run over SSH
* Build Virtual Private Networks with OpenSSH
And more! This book quickly and painlessly simplifies life for anyone using SSH.
|Puppet 3 Cookbook
Lowest new price: $40.49
Lowest used price: $54.29
List price: $44.99
Author: John Arundel
Build reliable, scalable, secure, and high-performance systems to fully utilize the power of cloud computing
- Use Puppet 3 to take control of your servers and desktops, with detailed step-by-step instructions
- Covers all the popular tools and frameworks used with Puppet: Dashboard, Foreman, and more
- Teaches you how to extend Puppet with custom functions, types, and providers
- Packed with tips and inspiring ideas for using Puppet to automate server builds, deployments, and workflows
A revolution is happening in web operations. Configuration management tools can build servers in seconds, and automate your entire network. Tools like Puppet are essential to taking full advantage of the power of cloud computing, and building reliable, scalable, secure, high-performance systems. More and more systems administration and IT jobs require some knowledge of configuration management, and specifically Puppet.
"Puppet 3 Cookbook" takes you beyond the basics to explore the full power of Puppet, showing you in detail how to tackle a variety of real-world problems and applications. At every step it shows you exactly what commands you need to type, and includes full code samples for every recipe.
The book takes the reader from a basic knowledge of Puppet to a complete and expert understanding of Puppet’s latest and most advanced features, community best practices, writing great manifests, scaling and performance, and extending Puppet by adding your own providers and resources. It starts with guidance on how to set up and expand your Puppet infrastructure, then progresses through detailed information on the language and features, external tools, reporting, monitoring, and troubleshooting, and concludes with many specific recipes for managing popular applications.
The book includes real examples from production systems and techniques that are in use in some of the world’s largest Puppet installations, including a distributed Puppet architecture based on the Git version control system. You’ll be introduced to powerful tools that work with Puppet such as Hiera. The book also explains managing Ruby applications and MySQL databases, building web servers, load balancers, high-availability systems with Heartbeat, and many other state-of-the-art techniques
What you will learn from this book
- Installing and setting up Puppet for the first time
- Producing eye-catching reports and information for management
- Understanding common error messages and troubleshooting common problems
- Managing large networks
- Taking control of configuration data with Hiera and encrypting secrets with GnuPG
- Producing reliable, clean, maintainable code to community standards with puppet-lint and rspec-puppet
- Using classes and inheritance to write powerful Puppet code
- Deploying configuration files and templates for lightning-fast installations
- Using virtual machines to build test and staging environments, and production systems on cloud platforms such as EC2
- Automating every aspect of your systems including provisioning, deployment and change management
- Making Puppet reliable, performant, and scalable
|Linux Device Drivers, 3rd Edition
Lowest new price: $22.68
Lowest used price: $12.21
List price: $39.95
Author: Jonathan Corbet
Device drivers literally drive everything you're interested in--disks, monitors, keyboards, modems--everything outside the computer chip and memory. And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic Linux Device Drivers from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices.
Over the years the book has helped countless programmers learn:
- how to support computer peripherals under the Linux operating system
- how to develop and write software for new hardware under Linux
- the basics of Linux operation even if they are not expecting to write a driver
The new edition of Linux Device Drivers
is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.
Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.
Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many application areas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.
|Web Penetration Testing with Kali Linux
Lowest new price: $44.99
Lowest used price: $60.15
List price: $49.99
Author: Joseph Muniz
A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux
- Learn key reconnaissance concepts needed as a penetration tester
- Attack and exploit key features, authentication, and sessions on web applications
- Learn how to protect systems, write reports, and sell web penetration testing services
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities.
Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications.
"Web Penetration Testing with Kali Linux" looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises.
You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls.
On the completion of this book, you will have the skills needed to use Kali Linux for web penetration tests and expose vulnerabilities on web applications and clients that access them.
What you will learn from this book
- Perform vulnerability reconnaissance to gather information on your targets
- Expose server vulnerabilities and take advantage of them to gain privileged access
- Exploit client-based systems using web application protocols
- Learn how to use SQL and cross-site scripting (XSS) attacks
- Steal authentications through session hijacking techniques
- Harden systems so other attackers do not exploit them easily
- Generate reports for penetration testers
- Learn tips and trade secrets from real world penetration testers
"Web Penetration Testing with Kali Linux" contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user.
|Guide to UNIX Using Linux (Networking (Course Technology))
Lowest new price: $119.99
Lowest used price: $41.80
List price: $176.95
Author: Michael Palmer
Brand: Brand: Cengage Learning
Written with a clear, straightforward writing style and packed with step-by-step projects for direct, hands-on learning, Guide to UNIX Using Linux, 4E is the perfect resource for learning UNIX and Linux from the ground up. Through the use of practical examples, end-of-chapter reviews, and interactive exercises, novice users are transformed into confident UNIX/Linux users who can employ utilities, master files, manage and query data, create scripts, access a network or the Internet, and navigate popular user interfaces and software. The updated 4th edition incorporates coverage of the latest versions of UNIX and Linux, including new versions of Red Hat, Fedora, SUSE, and Ubuntu Linux. A new chapter has also been added to cover basic networking utilities, and several other chapters have been expanded to include additional information on the KDE and GNOME desktops, as well as coverage of the popular OpenOffice.org office suite. With a strong focus on universal UNIX and Linux commands that are transferable to all versions of Linux, this book is a "must-have" for anyone seeking to develop their knowledge of these systems.
- Illustrations and updated screen captures clarify key concepts
- Syntax/Dissection boxes for every command offer readers a summarization of the syntax, its use, and its commonly used command options, to provide a study aid and quick reference
- Hands-on projects at the end of each chapter provide clear, step-by-step practice for applying what has been learned
- Discovery Exercises at the end of each chapter range from easy to challenging to encourage readers to continue to further their knowledge
- Free copy of most current distribution of Fedora Core (Linux) included to complete hands-on projects and Discovery Exercises
|Linux Kernel Networking: Implementation and Theory
Lowest new price: $41.66
Lowest used price: $56.54
List price: $59.99
Author: Rami Rosen
Linux Kernel Networking takes you on a guided in-depth tour of the current Linux networking implementation and the theory behind it. Linux kernel networking is a complex topic, so the book won't burden you with topics not directly related to networking. This book will also not overload you with cumbersome line-by-line code walkthroughs not directly related to what you're searching for; you'll find just what you need, with in-depth explanations in each chapter and a quick reference at the end of each chapter.
Linux Kernel Networking is the only up-to-date reference guide to understanding how networking is implemented, and it will be indispensable in years to come since so many devices now use Linux or operating systems based on Linux, like Android, and since Linux is so prevalent in the data center arena, including Linux-based virtualization technologies like Xen and KVM.
What youll learn•Kernel networking basics, including socket buffers
•How key protocols like ARP, Neighbour Discovery and ICMP are implemented
•In-depth looks at both IPv4 and IPv6
•Everything you need to know about Linux routing
•How netfilter and IPsec are implemented
•Linux wireless networking
•Additional topics like Network Namespaces, NFC, IEEE 802.15.4, Bluetooth, InfiniBand and more
Who this book is for
Software developers and architects, project managers, CTOs, network admins and architects, network security professionals, computer science researchers, and Linux kernel hackers. A basic knowledge of C and networking is required; basic knowledge of the Linux kernel is helpful but not mandatory.
Table of Contents1. Introduction
2. Netlink Sockets
3. ICMP: Internet Control Message Protocol
5. The IPv4 Routing Subsystem
6. Advanced Routing
7. Linux Neighboring Subsystem
11. Layer 4 Protocols
12. Wireless in Linux
14. Advanced Topics
Appendix A: Linux API
Appendix B: Network Administration
Appendix C: Glossary
|BackTrack 5 Wireless Penetration Testing Beginner's Guide
Lowest new price: $42.74
Lowest used price: $28.93
List price: $49.99
Author: Vivek Ramachandran
Written in Packt's Beginner's Guide format, you can easily grasp the concepts and understand the techniques to perform wireless attacks in your lab. Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.
|Essential System Administration: Tools and Techniques for Linux and Unix Administration, 3rd Edition
Lowest new price: $29.98
Lowest used price: $5.00
List price: $59.99
Author: Æleen Frisch
Brand: Brand: O'Reilly Media
Essential System Administration,3rd Edition is the definitive guide for Unix system administration, covering all the fundamental and essential tasks required to run such divergent Unix systems as AIX, FreeBSD, HP-UX, Linux, Solaris, Tru64 and more. Essential System Administration provides a clear, concise, practical guide to the real-world issues that anyone responsible for a Unix system faces daily.
The new edition of this indispensable reference has been fully updated for all the latest operating systems. Even more importantly, it has been extensively revised and expanded to consider the current system administrative topics that administrators need most. Essential System Administration,3rd Edition covers: DHCP, USB devices, the latest automation tools, SNMP and network management, LDAP, PAM, and recent security tools and techniques.
Essential System Administration is comprehensive. But what has made this book the guide system administrators turn to over and over again is not just the sheer volume of valuable information it provides, but the clear, useful way the information is presented. It discusses the underlying higher-level concepts, but it also provides the details of the procedures needed to carry them out. It is not organized around the features of the Unix operating system, but around the various facets of a system administrator's job. It describes all the usual administrative tools that Unix provides, but it also shows how to use them intelligently and efficiently.
Whether you use a standalone Unix system, routinely provide administrative support for a larger shared system, or just want an understanding of basic administrative functions, Essential System Administration is for you. This comprehensive and invaluable book combines the author's years of practical experience with technical expertise to help you manage Unix systems as productively and painlessly as possible.
- Used Book in Good Condition
|Understanding Linux Network Internals
Lowest new price: $24.94
Lowest used price: $20.99
List price: $59.99
Author: Christian Benvenuti
If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you.
Like the popular O'Reilly book, Understanding the Linux Kernel, this book clearly explains the underlying concepts and teaches you how to follow the actual C code that implements it. Although some background in the TCP/IP protocols is helpful, you can learn a great deal from this text about the protocols themselves and their uses. And if you already have a base knowledge of C, you can use the book's code walkthroughs to figure out exactly what this sophisticated part of the Linux kernel is doing.
Part of the difficulty in understanding networks -- and implementing them -- is that the tasks are broken up and performed at many different times by different pieces of code. One of the strengths of this book is to integrate the pieces and reveal the relationships between far-flung functions and data structures. Understanding Linux Network Internals is both a big-picture discussion and a no-nonsense guide to the details of Linux networking. Topics include:
- Key problems with networking
- Network interface card (NIC) device drivers
- System initialization
- Layer 2 (link-layer) tasks and implementation
- Layer 3 (IPv4) tasks and implementation
- Neighbor infrastructure and protocols (ARP)
Author Christian Benvenuti, an operating system designer specializing in networking, explains much more than how Linux code works. He shows the purposes of major networking features and the trade-offs involved in choosing one solution over another. A large number of flowcharts and other diagrams enhance the book's understandability.
|Pro Oracle Database 11g RAC on Linux
Lowest new price: $43.18
Lowest used price: $38.85
List price: $69.99
Author: Martin Bach
Pro Oracle Database 11g RAC on Linux provides full-life-cycle guidance on implementing Oracle Real Application Clusters in a Linux environment. Real Application Clusters, commonly abbreviated as RAC, is Oracle’s industry-leading architecture for scalable and fault-tolerant databases. RAC allows you to scale up and down by simply adding and subtracting inexpensive Linux servers. Redundancy provided by those multiple, inexpensive servers is the basis for the failover and other fault-tolerance features that RAC provides.
Written by authors well-known for their talent with RAC, Pro Oracle Database 11g RAC on Linux gives you a rock-solid and technically flawless foundation on which to build your RAC-management skills. Authors Julian Dyke and Steve Shaw share their hard-won experience in building RAC clusters, showing you how to build for success using the very latest Oracle technologies, such as Automatic Storage Management (ASM) and Oracle Clusterware. You’ll learn to troubleshoot performance and other problems. You’ll even learn how to correctly deploy RAC in a virtual-machine environment based upon Oracle VM, which is the only virtualization solution supported by Oracle Corporation.
RAC is a complex and powerful technology. It demands expertise in its deployment. You can’t just “wing it” in creating a RAC solution. Julian and Steve have earned the right to term themselves expert—in Pro Oracle Database 11g RAC on Linux, they offer a rigorous and technically-correct treatment of RAC that helps you build a solid foundation of expertise and achieve success.
- Rigorous and technically accurate content
- Complete coverage of RAC, from planning to implementation to rollout to ongoing maintenance and troubleshooting
- Up-to-date with the very latest RAC features
What you’ll learn
- Plan the architecture for a successful RAC installation
- Implement failover and other fault-tolerant features
- Scale RAC clusters up and down as needed to achieve performance targets
- Consolidate RAC clusters using Oracle’s virtualization solution
- Manage RAC proactively so as to sleep well at night
- Troubleshoot and solve performance and availability problems
Who this book is for
Pro Oracle Database 11g RAC on Linux is written for Oracle Database administrators who want to step up their skills to be equal to the task of managing Real Application Clusters.
Table of Contents
- RAC Concepts
- RAC Architecture
- Linux Installation and Configuration
- Grid Infrastructure Installation
- Automatic Storage Management
- RDBMS Installation and Configuration
- Workload Management
- Oracle Performance Monitoring
- Linux Performance Monitoring
- Parallel Execution
- Upgrading to Oracle 11g Release 2
Page 2 of 89
CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED AS IS AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.