Linux Books
-
Ubuntu Unleashed 2012 Edition: Covering 11.10 and 12.04 (7th Edition) (7th Edition)
Published 9 years ago
by Matthew Helmke, Sams Publishing
Ubuntu Unleashed is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been thoroughly revised and updated by a long-time Ubuntu community leader to reflect the exciting new Ubuntu 11.10 (“Oneiric Ocelot”) and the forthcoming Ubuntu 12.04.
-
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Published 9 years ago
by Patrick Engebretson, Syngress
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more.
-
RHCE Red Hat Certified Engineer Linux Study Guide (Exam N0-201), 6th Edition (Certification Press)
Published 9 years ago
by Michael Jang, McGraw-Hill Osborne Media
Fully revised to cover the Red Hat Certified Engineer exam revision based on Red Hat Enterprise Linux 6Updated for the release of Red Hat Enterprise Linux 6 and the related Red Hat Certified Engineer certification exam revision, RHCE Red Hat Certified Engineer Linux Study Guide, Sixth Edition provides complete coverage of all official exam objectives and the revised format for the RHCE exam.
-
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Published 9 years ago
by Andrew Hoog, Syngress
The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis.
-
BackTrack 4: Assuring Security by Penetration Testing
Published 9 years ago
by Shakeel Ali, Tedi Heriyanto, Packt Publishing
Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually.
-
Digital Forensics with Open Source Tools
Published 9 years ago
by Cory Altheide, Harlan Carvey, Syngress
Based on the use of open source tools, this book lends itself to many organizations as well as students who do not have means to purchase new tools for different investigations.Well known forensic methods are demonstrated using open-source computer forensic tools (Sleuthkit, Foremost, dcdd, pyag, etc.
-
vi and Vim Editors Pocket Reference: Support for every text editing task
Published 10 years ago
by Arnold Robbins, O'Reilly Media
Many Unix, Linux, and Mac OS X geeks enjoy using the powerful, platform-agnostic text editors vi and Vim, but there are far too many commands for anyone to remember. Author Arnold Robbins has chosen the most valuable commands for vi, Vim, and vi's main clones—vile, elvis, and nvi—and packed them into this easy-to-browse pocket reference. You'll find commands for all kinds of editing tasks, including programming, modifying system files, writing and marking up articles, and more.
-
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Published 10 years ago
by Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams, McGraw-Hill Osborne Media
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods.
-
Network Your Computers & Devices Step by Step (Step By Step (Microsoft)
Published 10 years ago
by Ciprian Adrian Rusen, 7 Tutorials, Microsoft Press
Teach yourself how to use the networking features in Windows 7 to connect your home computers, even if they use different operating systems. With Step by Step, you set the pace -- building and practicing the skills you need, just when you need them! *Network your Windows 7-based PCs and set up security *Add a Mac or Linux-based computer *Share printers, devices, and files with everyone in your home *Stream media over your network or to a remote PC
-
Ubuntu Unleashed 2011 Edition: Covering 10.10 and 11.04 (6th Edition)
Published 10 years ago
by Matthew Helmke, Ryan Troy, Andrew Hudson, Paul Hudson, Sams Publishing
Ubuntu Unleashed 2011 Edition presents advanced coverage of the popular Ubuntu distribution of Linux. Windows users, Mac users, and Linux enthusiasts have been increasingly turning to Ubuntu for a user-friendly and easy-to-use Linux distribution that remains useful to power users.This book provides detailed information on installing, using, and administering Ubuntu.