No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.
New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…Find out more
See below for a selection of the latest books from Linux category. Presented with a red border are the Linux books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Linux books and those from many more genres to read that will keep you inspired and entertained. And it's all free!
Linux continues to evolve. Today, it's the world's dominant Internet server platform. Google runs on Linux. So does Amazon -- including its market-leading EC2 cloud-based platform. It's no wonder more and more system administrators and web developers need to be fluent in Linux. But fluency means knowing how to operate a Linux system from the command line, not from a pre-programmed GUI: that's the only way to gain full control. Through three previous editions, Mark Sobell's A Practical Guide to Linux Commands, Editors, and Shell Programming has earned a global reputation as the best way to gain this mastery. Now, Sobell and top Linux expert Matthew Helmke have thoroughly updated this best-seller to reflect Linux's latest innovations. Like all previous editions, A Practical Guide to Linux Commands, Editors, and Shell Programming, Fourth Edition is fully distribution agnostic: it will serve you just as well, whether you work with Ubuntu, Fedora, Red Hat, or any other distribution. Sobell's style is famously compact, concise, and comprehensive. He lives Linux, understands exactly what system features Linux professionals really need to master, and what examples can help them understand it quickly and in depth. This edition's extensive new coverage includes the latest distributions, as well as DNF, Python 3, the zsh shell, Maria DB, and more.
Learn to develop customized device drivers for your embedded Linux system About This Book * Learn to develop customized Linux device drivers * Learn the core concepts of device drivers such as memory management, kernel caching, advanced IRQ management, and so on. * Practical experience on the embedded side of Linux Who This Book Is For This book will help anyone who wants to get started with developing their own Linux device drivers for embedded systems. Embedded Linux users will benefit highly from this book. This book covers all about device driver development, from char drivers to network device drivers to memory management. What You Will Learn * Use kernel facilities to develop powerful drivers * Develop drivers for widely used I2C and SPI devices and use the regmap API * Write and support devicetree from within your drivers * Program advanced drivers for network and frame buffer devices * Delve into the Linux irqdomain API and write interrupt controller drivers * Enhance your skills with regulator and PWM frameworks * Develop measurement system drivers with IIO framework * Get the best from memory management and the DMA subsystem * Access and manage GPIO subsystems and develop GPIO controller drivers In Detail Linux kernel is a complex, portable, modular and widely used piece of software, running on around 80% of servers and embedded systems in more than half of devices throughout the World. Device drivers play a critical role in how well a Linux system performs. As Linux has turned out to be one of the most popular operating systems used, the interest in developing proprietary device drivers is also increasing steadily. This book will initially help you understand the basics of drivers as well as prepare for the long journey through the Linux Kernel. This book then covers drivers development based on various Linux subsystems such as memory management, PWM, RTC, IIO, IRQ management, and so on. The book also offers a practical approach on direct memory access and network device drivers. By the end of this book, you will be comfortable with the concept of device driver development and will be in a position to write any device driver from scratch using the latest kernel version (v4.13 at the time of writing this book). Style and approach A set of engaging examples to develop Linux device drivers
Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book * Practical recipes to conduct effective penetration testing using the powerful Kali Linux * Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease * Confidently perform networking and application attacks using task-oriented recipes Who This Book Is For This book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn * Installing, setting up and customizing Kali for pentesting on multiple platforms * Pentesting routers and embedded devices * Bug hunting 2017 * Pwning and escalating through corporate network * Buffer over?ows 101 * Auditing wireless networks * Fiddling around with software-defned radio * Hacking on the run with NetHunter * Writing good quality reports In Detail With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approach This is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.
The CompTIA Linux+/LPIC-1 Training and Exam Preparation Guide, First Edition is a comprehensive resource designed and written with one fundamental goal in mind: teach Linux in an easy and practical manner while preparing for the Linux+/LPIC-1 exams. This book provides an in-depth coverage of all official exam objectives.This book is organized in two parts: Part One covers LX0-103/101-400 exam objectives and Part Two covers LX0-104/102-400 exam objectives. The book includes hands-on examples, step-by-step exercises, chapter-end review of concepts, files, and commands learned, and 790 challenging practice questions.This book uses ';learn-by-doing' methodology. It begins with guidance on how to download a virtualization software and two Linux distribution versions and then provides instructions on how to create VMs and install Linux in them to set up a lab environment for hands-on learning. Throughout the book, appropriate command prompts are employed to identify the lab system and user to run a command. Each command and task presented in the book was actually performed and tested on lab systems.Followed by the lab environment setup in Part One, the book presents the essentials of Linux incl. interaction with Linux, basic commands, file management (permissions, ownership, linking, searching, special permissions, editing), filter programs, regex, shell features, and process handling. Subsequent topics focus on system administration incl. shared libraries, Debian and RPM package management, system boot and initialization, hardware management, kernel modules, storage partitioning, file system creation and repairs, quota handling, and swap space administration. This brings Part One to an end and you should be able to take the quiz in Appendix A to test your readiness for the LX0-103/101-400 exam. Part Two covers all the objectives for the LX0-104/102-400 exam. It covers shell scripts with a presentation and line-by-line analysis of several scripts. Building a simple SQL database and performing queries comes next. A detailed comprehension of local authentication files, user creation, password aging, and shell startup files follows. The book covers networking concepts, reference models, and terms that accompany exercises on interface configuration, hostname change, and route management. A discussion of network testing and debugging tools is furnished and their usage is demonstrated, followed by topics on internationalization, localization, time synchronization, name resolution, X Window, display/desktop managers, accessibility options, printer and print queue administration, task scheduling, system logging, system and service access controls, emailing and email aliasing, searching for special files, and so on. This brings Part Two to an end and you should be able to take the quiz in Appendix C to test your readiness for the LX0-104/102-400 exam.Highlights:* 100% coverage of ALL official exam objectives (version 4.0)* Enumerated and descriptive knowledge areas (under exam objectives) to assist in identifying and locating them* A summarized and convenient view showing exam objectives, chapters they are discussed in, associated weights, the number of questions to expect on the real exam, and other useful information* Separate section on each exam* 15 chapters in total (8 for LX0-103/101-400 and 7 for LX0-104/102-400)* Detailed guidance on building lab environment* 49 tested, hands-on exercises with explanation* Numerous tested, practical examples for clarity and understanding* Chapter-end one-sentence review of key topics* 790 single-response, multiple-response, and fill-in-the-blank practice questions/answers to test your knowledge of the material and exam readiness* Equally good for self-study and in-class training
Over 80 recipes to effectively test your network and boost your career in security About This Book * Learn how to scan networks to find vulnerable computers and servers * Hack into devices to control them, steal their data, and make them yours * Target wireless networks, databases, and web servers, and password cracking to make the most of Kali Linux Who This Book Is For If you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linux What You Will Learn * Acquire the key skills of ethical hacking to perform penetration testing * Learn how to perform network reconnaissance * Discover vulnerabilities in hosts * Attack vulnerabilities to take control of workstations and servers * Understand password cracking to bypass security * Learn how to hack into wireless networks * Attack web and database servers to exfiltrate data * Obfuscate your command and control connections to avoid firewall and IPS detection In Detail Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for millions of security professionals. This book focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional. Kali Linux Cookbook, Second Edition starts by helping you install Kali Linux on different options available. You will also be able to understand the lab architecture and install a Windows host for use in the lab. Next, you will understand the concept of vulnerability analysis and look at the different types of exploits. The book will introduce you to the concept and psychology of Social Engineering and password cracking. You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. By the end of this book, you will have gained the core knowledge and concepts of the penetration testing process. Style and approach This book teaches you everything you need to know about Kali Linux from the perspective of a penetration tester. It is filled with powerful recipes and practical examples that will help you gain in-depth knowledge of Kali Linux.
Use Linux containers as an alternative virtualization technique to virtualize your operating system environment. This book will cover LXC's unmatched flexibility with virtualization and LXD's smooth user experience. Practical LXC and LXD begins by introducing you to Linux containers (LXC and LXD). You will then go through use cases based on LXC and LXD. Next, you will see the internal workings of LXC and LXD by considering the repositories and templates used. You will then learn how to integrate LXC and LXD with common virtualization and orchestration tools such as libvirt and SaltStack. Finally, you will dive into containerization and security. The book will explore some of the common problems in security and provide a case study on how containerization can help mitigate some of the operating system-level security issues in an IoT environment. What You Will Learn Get an introduction to Linux containers Discover the basics of LXC and LXD See use cases that can be solved with LXC and LXD - for developers, devops, and system administrators Master LXC and LXD repositories Use LXC and LXD with common virtualization and orchestration tools Consider a containerization and security in IoT case study Who This Book Is For The audience for this book should have basic knowledge of Linux and software development in general. The intended readership is primarily software developers, operations engineers, and system administrators who are interested in devops, though managers and enthusiasts will also benefit from this book.
Build, Manage and Improve your infrastructure effortlessly. About This Book * An up-to-date and comprehensive resource on Terraform that lets you quickly and efficiently launch your infrastructure * Learn how to implement your infrastructure as code and make secure, effective changes to your infrastructure * Learn to build multi-cloud fault-tolerant systems and simplify the management and orchestration of even the largest scale and most complex cloud infrastructures Who This Book Is For This book is for developers and operators who already have some exposure to working with infrastructure but want to improve their workflow and introduce infrastructure as a code practice. Knowledge of essential Amazon Web Services components (EC2, VPC, IAM) would help contextualize the examples provided. Basic understanding of Jenkins and Shell scripts will be helpful for the chapters on the production usage of Terraform. What You Will Learn * Understand what Infrastructure as Code (IaC) means and why it matters * Install, configure, and deploy Terraform * Take full control of your infrastructure in the form of code * Manage complete infrastructure, starting with a single server and scaling beyond any limits * Discover a great set of production-ready practices to manage infrastructure * Set up CI/CD pipelines to test and deliver Terraform stacks * Construct templates to simplify more complex provisioning tasks In Detail Terraform is a tool used to efficiently build, configure, and improve the production infrastructure. It can manage the existing infrastructure as well as create custom in-house solutions. This book shows you when and how to implement infrastructure as a code practices with Terraform. It covers everything necessary to set up the complete management of infrastructure with Terraform, starting with the basics of using providers and resources. It is a comprehensive guide that begins with very small infrastructure templates and takes you all the way to managing complex systems, all using concrete examples that evolve over the course of the book. The book ends with the complete workflow of managing a production infrastructure as code-this is achieved with the help of version control and continuous integration. The readers will also learn how to combine multiple providers in a single template and manage different code bases with many complex modules. It focuses on how to set up continuous integration for the infrastructure code. The readers will be able to use Terraform to build, change, and combine infrastructure safely and efficiently. Style and approach This book will help and guide you to implement Terraform in your infrastructure. The readers will start by working on very small infrastructure templates and then slowly move on to manage complex systems, all by using concrete examples that will evolve during the course of the book.
A quick and straightforward approach to writing shell scripts to accomplish different types of tasks on a Linux system. About This Book * Understand expressions and variables and how to use them practically * Familiarize yourself with the various text filtering tools available in Linux * A fast-paced and concise guide that gets you well versed with linux shell scripting. Who This Book Is For This book is for both GNU/Linux users who want to do amazing things with the shell and for advanced users looking for ways to make their lives with the shell more productive. What You Will Learn * Get acquainted with the basics of a shell script to serve as a refresher for more advanced topics * Learn different ways to create and run a script * Discuss the passing and verification of parameters, along with the verification of other items. * Understand the different forms of conditions and loops, and go over the sleep command in detail * Learn about different ways to handle the reporting of return codes * Create an interactive script by reading the keyboard and use subroutines and interrupts * Create scripts to perform backups and go over the use of encryption tools and checksums * Use wget and curl in scripts to get data directly from the Internet In Detail Linux Shell Scripting Bootcamp is all about learning the essentials of script creation, validating parameters, and checking for the existence of files and other items needed by the script. We will use scripts to explore iterative operations using loops and learn different types of loop statements, with their differences. Along with this, we will also create a numbered backup script for backup files. Further, you will get well-versed with how variables work on a Linux system and how they relate to scripts. You'll also learn how to create and call subroutines in a script and create interactive scripts. The most important archive commands, zip and tar, are also discussed for performing backups. Later, you will dive deeper by understanding the use of wget and curl scripts and the use of checksum and file encryption in further chapters. Finally, you will learn how to debug scripts and scripting best practices that will enable you to write a great code every time! By the end of the book, you will be able to write shell scripts that can dig data from the web and process it efficiently. Style and approach This book is all about fast and intensive learning. This means we don't waste time in helping readers get started. The new content is basically about filling in with highly-effective examples to build new things, solving problems in newer and unseen ways, and solving real-world examples.