No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.
New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…Find out more
See below for a selection of the latest books from Linux category. Presented with a red border are the Linux books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Linux books and those from many more genres to read that will keep you inspired and entertained. And it's all free!
Optimize and boost your Linux-based system with Yocto Project and increase its reliability and robustness efficiently and cost-effectively. About This Book * Optimize your Yocto Project tools to develop efficient Linux-based projects * Practical approach to learning Linux development using Yocto Project * Demonstrates concepts in a practical and easy-to-understand way Who This Book Is For If you are an embedded Linux developer with a basic knowledge of Yocto Project and want to broaden your knowledge with examples of embedded development, then this book is for you. This book is also for professionals who want to find new insights into working methodologies for Linux development. What You Will Learn * Understand the basic concepts involved in Poky workflows along with configuring and preparing the Poky build environment. * Configure a build server and customize images using Toaster. * Generate images and fit packages into created images using BitBake. * Support the development process by setting up and using Package feeds. * Debug Yocto Project by configuring Poky. * Build an image for the BeagleBone Black, RaspberryPi 3, and Wandboard, and boot it from an SD card. In Detail Yocto Project is turning out to be the best integration framework for creating reliable embedded Linux projects. It has the edge over other frameworks because of its features such as less development time and improved reliability and robustness. Embedded Linux Development using Yocto Project starts with an in-depth explanation of all Yocto Project tools, to help you perform different Linux-based tasks. The book then moves on to in-depth explanations of Poky and BitBake. It also includes some practical use cases for building a Linux subsystem project using Yocto Project tools available for embedded Linux. The book also covers topics such as SDK, recipetool, and others. By the end of the book, you will have learned how to generate and run an image for real hardware boards and will have gained hands-on experience at building efficient Linux systems using Yocto Project. Style and approach A clear, concise, and straightforward book that will enable you to use and implement the latest features of Yocto Project.
Linux for Embedded and Real-Time Applications, Fourth Edition, provides a practical introduction to the basics, covering the latest developments in this rapidly evolving technology. Ideal for those new to the use of Linux in an embedded environment, the book takes a hands-on approach that covers key concepts of building applications in a cross-development environment. Hands-on exercises focus on the popular open source BeagleBone Black board. New content includes graphical programming with QT as well as expanded and updated material on projects such as Eclipse, BusyBox - configuring and building, the U-Boot bootloader - what it is, how it works, configuring and building, and new coverage of the Root file system and the latest updates on the Linux kernel..
Linux continues to evolve. Today, it's the world's dominant Internet server platform. Google runs on Linux. So does Amazon -- including its market-leading EC2 cloud-based platform. It's no wonder more and more system administrators and web developers need to be fluent in Linux. But fluency means knowing how to operate a Linux system from the command line, not from a pre-programmed GUI: that's the only way to gain full control. Through three previous editions, Mark Sobell's A Practical Guide to Linux Commands, Editors, and Shell Programming has earned a global reputation as the best way to gain this mastery. Now, Sobell and top Linux expert Matthew Helmke have thoroughly updated this best-seller to reflect Linux's latest innovations. Like all previous editions, A Practical Guide to Linux Commands, Editors, and Shell Programming, Fourth Edition is fully distribution agnostic: it will serve you just as well, whether you work with Ubuntu, Fedora, Red Hat, or any other distribution. Sobell's style is famously compact, concise, and comprehensive. He lives Linux, understands exactly what system features Linux professionals really need to master, and what examples can help them understand it quickly and in depth. This edition's extensive new coverage includes the latest distributions, as well as DNF, Python 3, the zsh shell, Maria DB, and more.
Learn to develop customized device drivers for your embedded Linux system About This Book * Learn to develop customized Linux device drivers * Learn the core concepts of device drivers such as memory management, kernel caching, advanced IRQ management, and so on. * Practical experience on the embedded side of Linux Who This Book Is For This book will help anyone who wants to get started with developing their own Linux device drivers for embedded systems. Embedded Linux users will benefit highly from this book. This book covers all about device driver development, from char drivers to network device drivers to memory management. What You Will Learn * Use kernel facilities to develop powerful drivers * Develop drivers for widely used I2C and SPI devices and use the regmap API * Write and support devicetree from within your drivers * Program advanced drivers for network and frame buffer devices * Delve into the Linux irqdomain API and write interrupt controller drivers * Enhance your skills with regulator and PWM frameworks * Develop measurement system drivers with IIO framework * Get the best from memory management and the DMA subsystem * Access and manage GPIO subsystems and develop GPIO controller drivers In Detail Linux kernel is a complex, portable, modular and widely used piece of software, running on around 80% of servers and embedded systems in more than half of devices throughout the World. Device drivers play a critical role in how well a Linux system performs. As Linux has turned out to be one of the most popular operating systems used, the interest in developing proprietary device drivers is also increasing steadily. This book will initially help you understand the basics of drivers as well as prepare for the long journey through the Linux Kernel. This book then covers drivers development based on various Linux subsystems such as memory management, PWM, RTC, IIO, IRQ management, and so on. The book also offers a practical approach on direct memory access and network device drivers. By the end of this book, you will be comfortable with the concept of device driver development and will be in a position to write any device driver from scratch using the latest kernel version (v4.13 at the time of writing this book). Style and approach A set of engaging examples to develop Linux device drivers
Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book * Practical recipes to conduct effective penetration testing using the powerful Kali Linux * Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease * Confidently perform networking and application attacks using task-oriented recipes Who This Book Is For This book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn * Installing, setting up and customizing Kali for pentesting on multiple platforms * Pentesting routers and embedded devices * Bug hunting 2017 * Pwning and escalating through corporate network * Buffer over?ows 101 * Auditing wireless networks * Fiddling around with software-defned radio * Hacking on the run with NetHunter * Writing good quality reports In Detail With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approach This is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.
The CompTIA Linux+/LPIC-1 Training and Exam Preparation Guide, First Edition is a comprehensive resource designed and written with one fundamental goal in mind: teach Linux in an easy and practical manner while preparing for the Linux+/LPIC-1 exams. This book provides an in-depth coverage of all official exam objectives.This book is organized in two parts: Part One covers LX0-103/101-400 exam objectives and Part Two covers LX0-104/102-400 exam objectives. The book includes hands-on examples, step-by-step exercises, chapter-end review of concepts, files, and commands learned, and 790 challenging practice questions.This book uses ';learn-by-doing' methodology. It begins with guidance on how to download a virtualization software and two Linux distribution versions and then provides instructions on how to create VMs and install Linux in them to set up a lab environment for hands-on learning. Throughout the book, appropriate command prompts are employed to identify the lab system and user to run a command. Each command and task presented in the book was actually performed and tested on lab systems.Followed by the lab environment setup in Part One, the book presents the essentials of Linux incl. interaction with Linux, basic commands, file management (permissions, ownership, linking, searching, special permissions, editing), filter programs, regex, shell features, and process handling. Subsequent topics focus on system administration incl. shared libraries, Debian and RPM package management, system boot and initialization, hardware management, kernel modules, storage partitioning, file system creation and repairs, quota handling, and swap space administration. This brings Part One to an end and you should be able to take the quiz in Appendix A to test your readiness for the LX0-103/101-400 exam. Part Two covers all the objectives for the LX0-104/102-400 exam. It covers shell scripts with a presentation and line-by-line analysis of several scripts. Building a simple SQL database and performing queries comes next. A detailed comprehension of local authentication files, user creation, password aging, and shell startup files follows. The book covers networking concepts, reference models, and terms that accompany exercises on interface configuration, hostname change, and route management. A discussion of network testing and debugging tools is furnished and their usage is demonstrated, followed by topics on internationalization, localization, time synchronization, name resolution, X Window, display/desktop managers, accessibility options, printer and print queue administration, task scheduling, system logging, system and service access controls, emailing and email aliasing, searching for special files, and so on. This brings Part Two to an end and you should be able to take the quiz in Appendix C to test your readiness for the LX0-104/102-400 exam.Highlights:* 100% coverage of ALL official exam objectives (version 4.0)* Enumerated and descriptive knowledge areas (under exam objectives) to assist in identifying and locating them* A summarized and convenient view showing exam objectives, chapters they are discussed in, associated weights, the number of questions to expect on the real exam, and other useful information* Separate section on each exam* 15 chapters in total (8 for LX0-103/101-400 and 7 for LX0-104/102-400)* Detailed guidance on building lab environment* 49 tested, hands-on exercises with explanation* Numerous tested, practical examples for clarity and understanding* Chapter-end one-sentence review of key topics* 790 single-response, multiple-response, and fill-in-the-blank practice questions/answers to test your knowledge of the material and exam readiness* Equally good for self-study and in-class training
Over 80 recipes to effectively test your network and boost your career in security About This Book * Learn how to scan networks to find vulnerable computers and servers * Hack into devices to control them, steal their data, and make them yours * Target wireless networks, databases, and web servers, and password cracking to make the most of Kali Linux Who This Book Is For If you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linux What You Will Learn * Acquire the key skills of ethical hacking to perform penetration testing * Learn how to perform network reconnaissance * Discover vulnerabilities in hosts * Attack vulnerabilities to take control of workstations and servers * Understand password cracking to bypass security * Learn how to hack into wireless networks * Attack web and database servers to exfiltrate data * Obfuscate your command and control connections to avoid firewall and IPS detection In Detail Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for millions of security professionals. This book focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional. Kali Linux Cookbook, Second Edition starts by helping you install Kali Linux on different options available. You will also be able to understand the lab architecture and install a Windows host for use in the lab. Next, you will understand the concept of vulnerability analysis and look at the different types of exploits. The book will introduce you to the concept and psychology of Social Engineering and password cracking. You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. By the end of this book, you will have gained the core knowledge and concepts of the penetration testing process. Style and approach This book teaches you everything you need to know about Kali Linux from the perspective of a penetration tester. It is filled with powerful recipes and practical examples that will help you gain in-depth knowledge of Kali Linux.
Use Linux containers as an alternative virtualization technique to virtualize your operating system environment. This book will cover LXC's unmatched flexibility with virtualization and LXD's smooth user experience. Practical LXC and LXD begins by introducing you to Linux containers (LXC and LXD). You will then go through use cases based on LXC and LXD. Next, you will see the internal workings of LXC and LXD by considering the repositories and templates used. You will then learn how to integrate LXC and LXD with common virtualization and orchestration tools such as libvirt and SaltStack. Finally, you will dive into containerization and security. The book will explore some of the common problems in security and provide a case study on how containerization can help mitigate some of the operating system-level security issues in an IoT environment. What You Will Learn Get an introduction to Linux containers Discover the basics of LXC and LXD See use cases that can be solved with LXC and LXD - for developers, devops, and system administrators Master LXC and LXD repositories Use LXC and LXD with common virtualization and orchestration tools Consider a containerization and security in IoT case study Who This Book Is For The audience for this book should have basic knowledge of Linux and software development in general. The intended readership is primarily software developers, operations engineers, and system administrators who are interested in devops, though managers and enthusiasts will also benefit from this book.