This book is a practical guide for system administrators, web developers, and other professionals who seek to learn how to configure Apache Tomcat on Linux.
This book is designed for both beginners ……続きを見る
著者:Paul DuBois
出版社: O'Reilly Media
発売日: 2009年09月29日
If you use UNIX, you probably use csh to type commands even if you've never heard of it. It's the standard shell (command line) on most UNIX systems. tcsh is an enhanced version that's freely availa……続きを見る
著者:Ed Burnette
出版社: O'Reilly Media
発売日: 2009年02月09日
Eclipse is the world's most popular IDE for Java development. And although there are plenty of large tomes that cover all the nooks and crannies of Eclipse, what you really need is a quick, handy gu……続きを見る
SNMP
Simple Network Management Protocol
Four lies in one acronym?
It’s baroque. It’s arcane. And it’s everywhere.
SNMP is one of those system management skills that people acquire by experience, stu……続きを見る
If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understan……続きを見る
著者:Bryson Payne
出版社: No Starch Press
発売日: 2022年01月18日
Learn firsthand just how easy a cyberattack can be.
Go Hack Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform commo……続きを見る
Do you wish the existing books on site reliability engineering started at the beginning? Do you wish someone would walk you through how to become an SRE, how to think like an SRE, or how to build an……続きを見る
Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Command
"Linux Essentials for Hackers & Pentesters" is a hands-on tutorial-style book that teaches you……続きを見る
著者:Matt Hand
出版社: No Starch Press
発売日: 2023年10月31日
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft systemsーand how to evade it.
Nearly every enterpri……続きを見る
Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threats Get With Your Book: PDF Copy, AI Assistant, and Next-Gen Reader FreeKe……続きを見る
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.
This gr……続きを見る
著者:Bruce Nikkel
出版社: No Starch Press
発売日: 2021年12月21日
A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack.
Practical Linux Forensics d……続きを見る
When an attacker breaks into your network, you have a home-field advantage. But how do you use it?
Intrusion Detection Honeypots is the foundational guide to building, deploying, and monitoring hone……続きを見る
Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers
In The Art of Attack: Attacker Mindset for Security Professionals, expe……続きを見る
A practical handbook that will help you bridge the gap between Windows and Linux to develop apps that leverage the best features across both ecosystems with seamless interoperabilityKey FeaturesConf……続きを見る
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their wor……続きを見る
著者:Richie Miller
出版社: Pastor Publishing Ltd
発売日: 2023年01月05日
If you want to become a Cybersecurity Professional, this book is for you!
If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Whether you want to become an In……続きを見る
Master the design and structure of Linux storage stack and explore its sophisticated architecture Purchase of the print or Kindle book includes a free PDF eBookKey FeaturesExplore the virtual file s……続きを見る
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world……続きを見る
Incident response tools and techniques for effective cyber threat responseKey FeaturesCreate a solid incident response framework and manage cyber incidents effectivelyLearn to apply digital forensic……続きを見る
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way
This practical guide reveals the powerful weapons and devious methods cyber-terrorist……続きを見る
Create a complete continuous delivery process using modern DevOps tools such as Docker, Jenkins, Kubernetes, Ansible, Terraform, and many moreKey FeaturesBuild reliable and secure applications using……続きを見る
For system administrators, programmers, and end users, shell command or carefully crafted shell script can save you time and effort, or facilitate consistency and repeatability for a variety of comm……続きを見る
Expect is quickly becoming a part of every UNIX user's toolbox. It allows you to automate Telnet, FTP, passwd, rlogin, and hundreds of other applications that normally require human interaction. Usi……続きを見る
Take your Linux skills to the next level! Whether you're a system administrator, software developer, site reliability engineer, or enthusiastic hobbyist, this practical, hands-on book will help you ……続きを見る
Organizations big and small have started to realize just how crucial system and application reliability is to their business. Theyâ??ve also learned just how difficult it is to maintain that reliabi……続きを見る
著者:Peter Kim
出版社: Secure Planet LLC
発売日: 2015年07月30日
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides t……続きを見る
If you use Linux in development or operations and need a structured approach to help you dive deeper, this book is for you. Author Michael Hausenblas also provides tips and tricks for improving your……続きを見る
Discover practical recipes to help you efficiently monitor enterprise IT infrastructure for Microsoft Windows, Linux, networking, and moreKey FeaturesFind out how you can leverage some of the most e……続きを見る
sed & awk describes two text processing programs that are mainstays of the UNIX programmer's toolbox.
sed is a "stream editor" for editing streams of text that might be too large to edit as a single……続きを見る