Listing 1 - 10 of 164 | << page >> |
Sort by
|
Choose an application
Linux. --- RAID (Computer science) --- Slackware Linux --- SUSE Linux
Choose an application
Learn how you can take complete control and run your small business with powerful, free open source software (FOSS). This book introduces small business owners to the power and security of Linux and other FOSS tools to manage any small business as well as the many advantages it has over expensive, proprietary software. While exploring the reasons for using Free Open Source Software, you'll investigate the assertion that, “The value of any software lies in its usefulness not in its price,” set forth by Linux Torvalds, the creator of Linux. This book examines the use of Linux and also the other Free Open Source Software you need to meet your business challenges including the usual accounting, Email, web browsing, word-processing tasks.
Linux. --- Small business --- Management. --- Industrial management --- Slackware Linux --- SUSE Linux
Choose an application
Problem-Solving in High Performance Computing: A Situational Awareness Approach with Linux focuses on understanding giant computing grids as cohesive systems. Unlike other titles on general problem-solving or system administration, this book offers a cohesive approach to complex, layered environments, highlighting the difference between standalone system troubleshooting and complex problem-solving in large, mission critical environments, and addressing the pitfalls of information overload, micro, and macro symptoms, also including methods for managing problems in large computing ecosystems.
High performance computing. --- Linux. --- HPC (Computer science) --- Electronic data processing --- Cyberinfrastructure --- Supercomputers --- Slackware Linux --- SUSE Linux
Choose an application
Electronic data processing personnel --- Certification --- Linux --- Slackware Linux --- SUSE Linux --- Examinations --- Computer architecture. Operating systems --- certificatie
Choose an application
Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2 About This Book Familiarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of them Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploits Learn how to prevent vulnerabilities in web applications before an attacker can make the most of it Who This Book Is For This book is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. You should know the basics of operating a Linux environment and have some exposure to security technologies and tools. What You Will Learn Set up a penetration testing laboratory in a secure way Find out what information is useful to gather when performing penetration tests and where to look for it Use crawlers and spiders to investigate an entire website in minutes Discover security vulnerabilities in web applications in the web browser and using command-line tools Improve your testing efficiency with the use of automated vulnerability scanners Exploit vulnerabilities that require a complex setup, run custom-made exploits, and prepare for extraordinary scenarios Set up Man in the Middle attacks and use them to identify and exploit security flaws within the communication between users and the web server Create a malicious site that will find and exploit vulnerabilities in the user's web browser Repair the most common web vulnerabilities and understand how to prevent them becoming a threat to a site's security In Detail Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform and operating system that provides a huge array of testing tools, many of which can be used specifically to execute web penetration testing. This book will teach you, in the form step-by-step recipes, how to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and ultimately buffer attackable surfaces so applications are more secure, for you and your users. Starting from the setup of a testing laboratory, this book will give you the skills you need to cover every stage of a penetration test: from gather...
Penetration testing (Computer security) --- Ethical hacking (Computer security) --- Computer security --- Linux. --- Slackware Linux --- SUSE Linux
Choose an application
Swift (Computer program language) --- Application software --- Development of application software --- Development. --- Linux. --- Slackware Linux --- SUSE Linux
Choose an application
Don’t neglect the shell – this book will empower you to use simple commands to perform complex tasks. Whether you’re a casual or advanced Linux user, the cookbook approach makes it all so brilliantly accessible and, above all, useful. Master the art of crafting one-liner command sequence to perform text processing, digging data from files, backups to sysadmin tools, and a lot more And if powerful text processing isn't enough, see how to make your scripts interact with the web-services like Twitter, Gmail Explores the possibilities with the shell in a simple and elegant way - you will see how to effectively solve problems in your day to day life In Detail The shell remains one of the most powerful tools on a computer system — yet a large number of users are unaware of how much one can accomplish with it. Using a combination of simple commands, we will see how to solve complex problems in day to day computer usage. Linux Shell Scripting Cookbook, Second Edition will take you through useful real-world recipes designed to make your daily life easy when working with the shell. The book shows the reader how to effectively use the shell to accomplish complex tasks with ease. The book discusses basics of using the shell, general commands and proceeds to show the reader how to use them to perform complex tasks with ease. Starting with the basics of the shell, we will learn simple commands with their usages allowing us to perform operations on files of different kind. The book then proceeds to explain text processing, web interaction and concludes with backups, monitoring and other sysadmin tasks. Linux Shell Scripting Cookbook, Second Edition serves as an excellent guide to solving day to day problems using the shell and few powerful commands together to create solutions.
Scripting languages (Computer science) --- Programming languages (Electronic computers) --- Linux. --- Slackware Linux --- SUSE Linux
Choose an application
Das umfassende Praxis-HandbuchAktuell für die Version Debian 7 (Wheezy)Praxis-Szenarien: Backoffice-Server, Root-Server, Linux als Gateway, Server-SecurityZahlreiche Workshops mit Schritt-für-Schritt-AnleitungenAus dem Inhalt:1. Teil: Allgemeine SystemadministrationDebian-Grundlagen, Installation, SystemstartPaketmanagement, Benutzerverwaltung, Rechteverwaltung, BashSystemadministration, System- und FestplattenmanagementZeitlich gesteuerte BackupsEinführung in die Shell-
Debian (Computer system). --- Linux. --- Operating systems (Computers). --- Slackware Linux --- SUSE Linux
Choose an application
Strategically design, troubleshoot, and automate Docker containers from development to deployment About This Book Utilize current and emergent technologies for effective Docker orchestration and management A step-by-step guide to diagnosing and fixing problems with Docker containers. Who This Book Is For This book is intended for seasoned solutions architects, developers, and programmers, system engineers, and administrators to help you troubleshoot common areas of Docker containerization. If you are looking to build production-ready Docker containers for automated deployment, you will be able to master and troubleshoot both the basic functions and the advanced features of Docker. Advanced familiarity with the Linux command line syntax, unit testing, the Docker Registry, Github, and leading container hosting platforms and Cloud Service Providers (CSP) are the prerequisites. What You Will Learn Install Docker ecosystem tools and services, Microservices and N-tier applications Create re-usable, portable containers with help of automation tools Network and inter-link containers Attach volumes securely to containers Consume and troubleshoot Docker APIs Troubleshooting issue of Docker deployment in Public cloud Ease the process of container management with Kubernetes In Detail This book will traverse some common best practices to for complex application scenarios where troubleshooting can be successfully employed to provide the repeatable processes and advantages that containers can deliver. This book will be a practical guide showing how to fix real-life issues related to installation, memory, Dockerfile syntax, connection, authorization, networking and so on in Docker. This book will also teach how to solve errors that occur during advanced setup and administration and deployment in a step-by-step fashion. By sequentially working through the real-world production scenarios in each chapter throughout the book, you will gain insight into and mastery of common areas not only for effective troubleshooting, but ways and means to avoid troubleshooting in the first place. This book will also cover tips and tricks that make the workflow easier. Style and approach An easy-to-follow guide full of interactive examples of real-world development and deployment scenarios. Ample screenshots, workflows, complementary tools, and related terminal commands are provided to address a wide range of practical and situational applications. Downloading the example code f...
Debugging in computer science --- Computer programs. --- Linux. --- Slackware Linux --- SUSE Linux
Choose an application
Make OpenVMS High Availability systems and low cost Open System computers work together in complex Intranet and Internet environments.Users of Linux, UNIX and the hundreds of thousands of OpenVMS installations world-wide will find invaluable information in Linux and OpenVMS Interoperability. This book gives you access to the best resources of both Linux and OpenVMS systems by providing practical hints, tricks, and step-by-step processes for installing and interoperating both systems. If you've heard one of John Wisniewski's many presentations on the subject, you'll find that he also br
OpenVMS device drivers. --- Device drivers (Computer programs) --- Linux. --- Slackware Linux --- SUSE Linux
Listing 1 - 10 of 164 | << page >> |
Sort by
|