The Linux command line allows you to type specific Linux commands directly to the system so that you can easily manipulate files and query system resources, thereby permitting you to automate commonly used functions and even schedule those programs to run automatically. This new edition is packed with new and revised content, reflecting the many changes to new Linux versions, including coverage of alternative shells to the default bash shell. For this edition, the author has teamed up with another Linux expert ? with their shared expertise...
To be truly productive with Linux, you need to thoroughly master shells and the command line. Until now, you had to buy two books to gain that mastery: a tutorial on fundamental Linux concepts and techniques, plus a separate reference. Now, there’s a far better solution. Renowned Linux expert Mark Sobell has brought together comprehensive, insightful guidance on the tools system administrators, developers, and power users need most, and an outstanding day-to-day reference, both in the same book.
Linux users can now control their homes remotely! Are you a Linux user who has ever wanted to turn on the lights in your house, or open and close the curtains, while away on holiday? Want to be able to play the same music in every room, controlled from your laptop or mobile phone? Do you want to do these things without an expensive off-the-shelf kit?
In Smart Home Automation with Linux, Steven Goodwin will show you how a house can be fully controlled by its occupants, all using open source software. From appliances to kettles to curtains, control your home...
You can rely on the fully updated second edition of Linux System Administration for answers to all your questions about installing, configuring, and administering Linux. Written by two Linux experts, this book teaches you, step-by-step, all the standard and advanced techniques you need to know to set up and maintain a secure, effective Linux environment. Scores of clear, consistent examples illustrate these techniques in detail--so you stay on track and accomplish all your goals. Coverage includes:
* Installing a Linux server...
In this handy, compact guide, you’ll explore a ton of powerful Ubuntu Linux commands while you learn to use Ubuntu Linux as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.
This book was written for anyone using Linux, from new users to experts who want to explore this wonderful
operating system. The tips and tricks in this book were discovered by myself over years of experience using
Linux, and learning about it. Some are very basic tips to make your computing life easier, others are
advanced tricks that can save you days of work.
This paper describes how database benchmarks demonstrate the performance
of Red Hat Enterprise Linux AS and Oracle9i Database running on HP ProLiant
hardware. Combined with the compelling Total Cost of Ownership model
presented by this software and hardware combination, the paper shows why
solutions such as this are rapidly replacing proprietary RISC/Unix and Microsoft
In recent years, Linux has been validated as an enterprise-worthy operating
system, capable of managing the robust components of major production
environments. IT professionals acknowledging the cost savings, scalability, and
stability of Linux are deploying open source technologies at every opportunity.
Most IT professionals are familiar with the Red Hat Linux retail product line and
have been using Linux systems in business environments for some time.
This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks....
This whitepaper describes the features and benefits of the Red Hat Enterprise
Linux product family. It briefly outlines factors that need to be considered when
planning a migration from a consumer Red Hat Linux release, such as 8.0 or
7.1, to an Red Hat Enterprise Linux family product. It also discusses some of
the issues associated with migrating applications from proprietary Unix,
Microsoft Windows, and other Red Hat operating system environments.
"This welcome addition to the Linux bookshelf provides real insight into the black-art of debugging. All too often debugging books concentrate solely on the tools but this book avoids that pitfall by concentrating on examples. The authors dissect and discuss each example in detail; in so doing they give invaluable insight into the Linux environment."
—Richard J Moore, IBM Advanced Linux Response Team-Linux Technology Centre
"A plethora of Linux books exist but this guide offers a definitive overview of practical hints and tips for Linux users.
Even as recently as five years ago, many computer industry experts would never have guessed how pervasive and “business critical” electronic messaging would eventually become. The degree to which some information technology professionals are surprised by the pervasive nature of today’s electronic mails systems is merely amusing to those of us that have had an e-mail address for more than 20 years.
Developer’s Library books are designed to provide practicing programmers with unique, high-quality references and tutorials on the programming languages and technologies they use in their daily work. All books in the Developer’s Library are written by expert technology practitioners who are especially skilled at organizing and presenting information in a way that’s useful for other programmers.
"Network and system security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
Developer’s Library Series
Visit developers-library.com for a complete list of available products
The Developer’s Library Series from Addison-Wesley provides practicing programmers with unique, high-quality references and tutorials on the latest programming languages and technologies they use in their daily work. All books in the Developer’s Library are written by expert technology practitioners who are exceptionally skilled at organizing and presenting information in a way that’s useful for other programmers.
Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again
A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system
Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases)...
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms.
Designed to be browsed, Security Power Tools offers.
Get cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second Edition provides step-by-step instructions on how to use UNIX and take advantage of its powerful tools and utilities.