Sebanyak 1165 item atau buku ditemukan

Linux Shells by Example

CD-ROM contains: all source code and datafiles from the book.

CD-ROM contains: all source code and datafiles from the book. The complete guide to bash and tsch--PLUS grep, sed, and gawk! Learn Linux shell programming hands-on! Hundreds of classroom-proven examples throughout gawk in-depth!

Live Linux CDs

Building and Customizing Bootables

Provides information on creating live Linux CDs for gaming, security, presentations, multimedia, firewalls, and clustering.

Provides information on creating live Linux CDs for gaming, security, presentations, multimedia, firewalls, and clustering.

Linux and the Unix Philosophy

Exploring the "way of thinking that is Unix" this guide explains why Linux is a superior implementation of this highly capable operating system. Every chapter in the book has been updated for the fast-growing Linux market and the text balances an simple approach with technical detail.

Exploring the "way of thinking that is Unix" this guide explains why Linux is a superior implementation of this highly capable operating system.

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization’s critical infrastructure and information. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems.

Building Embedded Linux Systems

There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux. Updated for the latest version of the Linux kernel, this new edition gives you the basics of building embedded Linux systems, along with the configuration, setup, and use of more than 40 different open source and free software packages in common use. The book also looks at the strengths and weaknesses of using Linux in an embedded system, plus a discussion of licensing issues, and an introduction to real-time, with a discussion of real-time options for Linux. This indispensable book features arcane and previously undocumented procedures for: Building your own GNU development toolchain Using an efficient embedded development framework Selecting, configuring, building, and installing a target-specific kernel Creating a complete target root filesystem Setting up, manipulating, and using solid-state storage devices Installing and configuring a bootloader for the target Cross-compiling a slew of utilities and packages Debugging your embedded system using a plethora of tools and techniques Using the uClibc, BusyBox, U-Boot, OpenSSH, thttpd, tftp, strace, and gdb packages By presenting how to build the operating system components from pristine sources and how to find more documentation or help, Building Embedded Linux Systems greatly simplifies the task of keeping complete control over your embedded operating system.

This indispensable book features arcane and previously undocumented procedures for: Building your own GNU development toolchain Using an efficient embedded development framework Selecting, configuring, building, and installing a target ...

Learn Raspberry Pi with Linux

Raspberry Pi is awesome, and it's Linux. And it's awesome because it's Linux. But if you've never used Linux or worked at the Linux command line before, it can be a bit daunting. Learn Raspberry Pi with Linux will tell you everything you need to know about the graphical interface and the command line so you can get started doing amazing things with Raspberry Pi. You'll learn how to set up your new Raspberry Pi with a monitor, keyboard and mouse, and you'll discover that what may look unfamiliar in Linux is really very familiar. You'll find out how to connect to the internet, change your desktop settings, and you'll get a tour of installed applications. Next, you'll take your first steps toward being a Raspberry Pi expert by learning how to get around at the Linux command line. You'll learn about different shells, including the bash shell, and commands that will make you a true power user. Finally, you'll learn how to create your first Raspberry Pi projects: Personal cloud storage with Samba on your Raspberry Pi Remote control your computers with Raspberry Pi A Raspberry Pi-based security cam and messenger service to let you know who's dropping by Raspberry Pi is an amazing little computer with tons of potential. And Learn Raspberry Pi with Linux can be your first step in unlocking that potential. What you’ll learn How to get online with Raspberry Pi How to customize your Pi's desktop environment Essential commands for putting your Pi to work Basic network services - the power behind what Pi can do How to turn your Pi into your own personal cloud storage device How to turn your Pi into a spy Who this book is for Raspberry Pi and hardware hacking enthusiasts who are new to Linux and the Linux command line.

What you’ll learn How to get online with Raspberry Pi How to customize your Pi's desktop environment Essential commands for putting your Pi to work Basic network services - the power behind what Pi can do How to turn your Pi into your own ...

Unix and Linux

Visual QuickStart Guide

With Unix, 4th Edition: Visual QuickStart Guide, readers can start from the beginning to get a tour of the Unix operating system, or look up specific tasks to learn just what they need to know. This task-based, visual reference guide uses step-by-step instructions and plenty of screenshots, and includes three years worth of new material based on the latest Unix developments. This reference guide details all Unix commands and options along with tips that put those commands in context. Leading Unix authorities Deborah S. Ray and Eric J. Ray leverage their expertise as technical writers and working in the industry (Sun Microsystems) as they take readers step-by-step through the most common Unix commands and options.

This reference guide details all Unix commands and options along with tips that put those commands in context.

Data Recovery Tips & Solutions: Windows, Linux, and BSD

This comprehensive manual covers three areas in which system administrators must be proficient to successfully recover data: the structure and operating principles of the most popular file systems, automatic data recovery techniques, and manual recovery techniques used in cases of total data destruction. Data recovery from hard drives and optical storage in Windows, BSD, and Linux file systems is described, as are automatic recovery utilities, manual and automatic recovery of deleted files on ext2/ext3 partitions and NTFS partitions, formatted NTFS partitions and deleted UFS/FFS files, RAID data recovery, media restoration with physical damage, and data loss prevention.

This comprehensive manual covers three areas in which system administrators must be proficient to successfully recover data: the structure and operating principles of the most popular file systems, automatic data recovery techniques, and ...