UNIX and Linux System Administration Handbook

Author: Evi Nemeth

Publisher: Pearson Education

ISBN:

Category: Computers

Page: 1279

View: 184

Surveys the best practices for all aspects of system administration, covering such topics as storage management, email, Web hosting, performance analysis, virtualization, DNS, security, and configuration management.

Linux

The Textbook, Second Edition

Author: Syed Mansoor Sarwar

Publisher: CRC Press

ISBN:

Category: Computers

Page: 658

View: 734

Choosen by BookAuthority as one of BookAuthority's Best Linux Mint Books of All Time Linux: The Textbook, Second Edition provides comprehensive coverage of the contemporary use of the Linux operating system for every level of student or practitioner, from beginners to advanced users. The text clearly illustrates system-specific commands and features using Debian-family Debian, Ubuntu, and Linux Mint, and RHEL-family CentOS, and stresses universal commands and features that are critical to all Linux distributions. The second edition of the book includes extensive updates and new chapters on system administration for desktop, stand-alone PCs, and server-class computers; API for system programming, including thread programming with pthreads; virtualization methodologies; and an extensive tutorial on systemd service management. Brand new online content on the CRC Press website includes an instructor’s workbook, test bank, and In-Chapter exercise solutions, as well as full downloadable chapters on Python Version 3.5 programming, ZFS, TC shell programming, advanced system programming, and more. An author-hosted GitHub website also features updates, further references, and errata. Features New or updated coverage of file system, sorting, regular expressions, directory and file searching, file compression and encryption, shell scripting, system programming, client-server–based network programming, thread programming with pthreads, and system administration Extensive in-text pedagogy, including chapter objectives, student projects, and basic and advanced student exercises for every chapter Expansive electronic downloads offer advanced content on Python, ZFS, TC shell scripting, advanced system programming, internetworking with Linux TCP/IP, and many more topics, all featured on the CRC Press website Downloadable test bank, workbook, and solutions available for instructors on the CRC Press website Author-maintained GitHub repository provides other resources, such as live links to further references, updates, and errata

Asterisk: The Definitive Guide

Open Source Telephony for the Enterprise

Author: Jim Van Meggelen

Publisher: O'Reilly Media

ISBN:

Category: Technology & Engineering

Page: 414

View: 600

Design a complete Voice over IP (VoIP) or traditional PBX system with Asterisk, even if you have only basic telecommunications knowledge. This bestselling guide makes it easy with a detailed roadmap that shows you how to install and configure this open source software, whether you’re upgrading your existing phone system or starting from scratch. Ideal for Linux administrators, developers, and power users, this updated fifth edition shows you how to write a basic dialplan step-by-step and brings you up to speed on the features in Asterisk 16, the latest long-term support release from Digium. You’ll quickly gain working knowledge to build a simple yet inclusive system. Integrate Asterisk with analog, VoIP, and digital telephony systems Build an interactive dialplan using best practices for more advanced features Delve into voicemail options such as storing messages in a database Connect to external services including Google Hangouts, XMPP, and calendars Incorporate Asterisk features and functions into a relational database to facilitate information sharing Learn how to use Asterisk’s security, call routing, and faxing features Monitor and control your system with the Asterisk Manager Interface (AMI)

Malware Forensics Field Guide for Linux Systems

Digital Forensics Field Guides

Author: Cameron H. Malin

Publisher: Newnes

ISBN:

Category: Computers

Page: 616

View: 825

Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Linux-based systems, where new malware is developed every day. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Linux system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Linux systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Linux system; and analysis of a suspect program. This book will appeal to computer forensic investigators, analysts, and specialists. A compendium of on-the-job tasks and checklists Specific for Linux-based systems in which new malware is developed every day Authors are world-renowned leaders in investigating and analyzing malicious code

Linux Malware Incident Response

A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: an Excerpt from Malware Forensic Field Guide for Linux Systems

Author: Cameron H. Malin

Publisher: Elsevier

ISBN:

Category: Computer networks

Page: 135

View: 978

This Practitioner's Guide is designed to help digital investigators identify malware on a Linux computer system, collect volatile (and relevant nonvolatile) system data to further investigation, and determine the impact malware makes on a subject system, all in a reliable, repeatable, defensible, and thoroughly documented manner.

Information Technology

An Introduction for Today’s Digital World

Author: Richard Fox

Publisher: CRC Press

ISBN:

Category: Computers

Page: 564

View: 210

Information Technology: An Introduction for Today’s Digital World introduces undergraduate students to a wide variety of concepts they will encounter throughout their IT studies and careers. The book covers computer organization and hardware, Windows and Linux operating systems, system administration duties, scripting, computer networks, regular expressions, binary numbers, the Bash shell in Linux, DOS, managing processes and services, and computer security. It also gives students insight on IT-related careers, such as network and web administration, computer forensics, web development, and software engineering. Suitable for any introductory IT course, this classroom-tested text presents many of the topics recommended by the ACM Special Interest Group on IT Education (SIGITE). It offers a far more detailed examination of the computer than current computer literacy texts, focusing on concepts essential to all IT professionals—from operating systems and hardware to information security and computer ethics. The book highlights Windows/DOS and Linux with numerous examples of issuing commands and controlling the operating systems. It also provides details on hardware, programming, and computer networks. Ancillary Resources The book includes laboratory exercises and some of the figures from the text online. PowerPoint lecture slides, answers to exercises, and a test bank are also available for instructors.

Internet Infrastructure

Networking, Web Services, and Cloud Computing

Author: Richard Fox

Publisher: CRC Press

ISBN:

Category: Computers

Page: 612

View: 179

Internet Infrastructure: Networking, Web Services, and Cloud Computing provides a comprehensive introduction to networks and the Internet from several perspectives: the underlying media, the protocols, the hardware, the servers, and their uses. The material in the text is divided into concept chapters that are followed up with case study chapters that examine how to install, configure, and secure a server that offers the given service discussed. The book covers in detail the Bind DNS name server, the Apache web server, and the Squid proxy server. It also provides background on those servers by discussing DNS, DHCP, HTTP, HTTPS, digital certificates and encryption, web caches, and the variety of protocols that support web caching. Introductory networking content, as well as advanced Internet content, is also included in chapters on networks, LANs and WANs, TCP/IP, TCP/IP tools, cloud computing, and an examination of the Amazon Cloud Service. Online resources include supplementary content that is available via the textbook’s companion website, as well useful resources for faculty and students alike, including: a complete lab manual; power point notes, for installing, configuring, securing and experimenting with many of the servers discussed in the text; power point notes; animation tutorials to illustrate some of the concepts; two appendices; and complete input/output listings for the example Amazon cloud operations covered in the book.

Information Technology for Librarians and Information Professionals

Author: Jonathan M. Smith

Publisher: Rowman & Littlefield Publishers

ISBN:

Category: Knowledge workers

Page: 248

View: 723

This book introduces information technology topics foundational to many services offered in libraries and information centers. Written by a librarian with extensive experience as a technology specialist in libraries the book clearly explains concepts information technology principles with an eye toward their practical applications in libraries.

Artificial Intelligence to Solve Pervasive Internet of Things Issues

Author: Gurjit Kaur

Publisher: Academic Press

ISBN:

Category: Science

Page: 430

View: 118

Artificial Intelligence to Solve Pervasive Internet of Things Issues discusses standards and technologies and wide-ranging technology areas and their applications and challenges, including discussions on architectures, frameworks, applications, best practices, methods and techniques required for integrating AI to resolve IoT issues. Chapters also provide step-by-step measures, practices and solutions to tackle vital decision-making and practical issues affecting IoT technology, including autonomous devices and computerized systems. Such issues range from adopting, mitigating, maintaining, modernizing and protecting AI and IoT infrastructure components such as scalability, sustainability, latency, system decentralization and maintainability. The book enables readers to explore, discover and implement new solutions for integrating AI to solve IoT issues. Resolving these issues will help readers address many real-world applications in areas such as scientific research, healthcare, defense, aeronautics, engineering, social media, and many others. Discusses intelligent techniques for the implementation of Artificial Intelligence in Internet of Things Prepared for researchers and specialists who are interested in the use and integration of IoT and Artificial Intelligence technologies