Something of The Book

PDF EPUB Library of e-Books

Linux Smart Homes For Dummies

Linux Smart Homes For Dummies

Author: Neil Cherry

Publisher: John Wiley & Sons

ISBN: 0470085967

Category: Computers

Page: 387

View: 749

Download BOOK »
A Linux smart home is about controlling and monitoring devices and information around your home using a standard personal computer, Linux, and its vast array of open source tools. You don’t have to be a master programmer to create one. If you like to tinker with Linux, Linux Smart Homes For Dummies will guide you through cool home automation projects that are as much fun to work on as they are to use. Home automation used to be limited to turning on lights and appliances, and maybe controlling your thermostat and lawn sprinkler, from your computer. While you still might not be able to create all the Jetsons’ toys, today you can also Build a wireless network Create and set up a weather station Automate your TV and sound system Spy on your pets when you’re not home Set up an answering system that knows what to do with calls Increase your home’s security If you know how to use Linux and a few basic development tools — Perl, the BASH shell, development libraries, and the GNU C compiler—Linux Smart Homes For Dummies will help you do all these tricks and more. For example, you can Discover the best sources for Linux-based home automation devices Set up a wireless network, create a wireless access point, build a bridge between wired and wireless networks, and route your own network traffic Build a personal video recorder with MythTV that will record to DVD, or set up a wireless streaming music system Create a smart phone system that takes messages and forwards them to your fax, modem, or answering machine Build a weather station that notifies you of severe weather alerts Control and secure your home automation network, and even check on your house when you’re away The bonus CD-ROM includes all kinds of cool open source software for your home automation projects. Linux Smart Homes For Dummies even includes lists of cool gadgets to check out and great ways to automate those boring household chores. A smart home’s a happy home!

Linux Firewalls

Linux Firewalls

Author: Michael Rash

Publisher: No Starch Press

ISBN: 9781593271411

Category: Computers

Page: 338

View: 387

Download BOOK »
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack. Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop. Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics: –Passive network authentication and OS fingerprinting –iptables log analysis and policies –Application layer attack detection with the iptables string match extension –Building an iptables ruleset that emulates a Snort ruleset –Port knocking vs. Single Packet Authorization (SPA) –Tools for visualizing iptables logs Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables—along with psad and fwsnort—to detect and even prevent compromises.

Linux Bible

Linux Bible

Author: Christopher Negus

Publisher: John Wiley & Sons

ISBN: 9781118999899

Category: Computers

Page: 914

View: 672

Download BOOK »
The industry favorite Linux guide, updated for Red Hat Enterprise Linux 7 and the cloud Linux Bible, 9th Edition is the ultimate hands-on Linux user guide, whether you're a true beginner or a more advanced user navigating recent changes. This updated ninth edition covers the latest versions of Red Hat Enterprise Linux 7 (RHEL 7), Fedora 21, and Ubuntu 14.04 LTS, and includes new information on cloud computing and development with guidance on Openstack and Cloudforms. With a focus on RHEL 7, this practical guide gets you up to speed quickly on the new enhancements for enterprise-quality file systems, the new boot process and services management, firewalld, and the GNOME 3 desktop. Written by a Red Hat expert, this book provides the clear explanations and step-by-step instructions that demystify Linux and bring the new features seamlessly into your workflow. This useful guide assumes a base of little or no Linux knowledge, and takes you step by step through what you need to know to get the job done. Get Linux up and running quickly Master basic operations and tackle more advanced tasks Get up to date on the recent changes to Linux server system management Bring Linux to the cloud using Openstack and Cloudforms Linux Bible, 9th Edition is the one resource you need, and provides the hands-on training that gets you on track in a flash.

Multitool Linux

Multitool Linux

Author: Michael Schwarz

Publisher: Addison-Wesley Professional

ISBN: 9780201734201

Category: Computers

Page: 579

View: 136

Download BOOK »
An innovative guide reveals how to perform a wide variety of tasks with Linux and other open source software by furnishing a wealth of real-world problems and then detailing the free software that comes with, or is available for Linux that will solve the problem, and demonstrates the adaptability of Linux. Original. (Intermediate).

Systems Programming in Unix/Linux

Systems Programming in Unix/Linux

Author: K.C. Wang

Publisher: Springer

ISBN: 9783319924298

Category: Computers

Page: 452

View: 368

Download BOOK »
Covering all the essential components of Unix/Linux, including process management, concurrent programming, timer and time service, file systems and network programming, this textbook emphasizes programming practice in the Unix/Linux environment. Systems Programming in Unix/Linux is intended as a textbook for systems programming courses in technically-oriented Computer Science/Engineering curricula that emphasize both theory and programming practice. The book contains many detailed working example programs with complete source code. It is also suitable for self-study by advanced programmers and computer enthusiasts. Systems programming is an indispensable part of Computer Science/Engineering education. After taking an introductory programming course, this book is meant to further knowledge by detailing how dynamic data structures are used in practice, using programming exercises and programming projects on such topics as C structures, pointers, link lists and trees. This book provides a wide range of knowledge about computer systemsoftware and advanced programming skills, allowing readers to interface with operatingsystem kernel, make efficient use of system resources and develop application software.It also prepares readers with the needed background to pursue advanced studies inComputer Science/Engineering, such as operating systems, embedded systems, databasesystems, data mining, artificial intelligence, computer networks, network security,distributed and parallel computing.

Security Strategies in Linux Platforms and Applications

Security Strategies in Linux Platforms and Applications

Author: Michael H. Jang

Publisher: Jones & Bartlett Publishers

ISBN: 9781284090659

Category: Computers

Page: 538

View: 319

Download BOOK »
"The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered sec

Practical Linux Forensics

Practical Linux Forensics

Author: Bruce Nikkel

Publisher: No Starch Press

ISBN: 9781718501966

Category: Computers

Page: 402

View: 502

Download BOOK »
A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack. Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. You’ll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used. Learn how to: Extract evidence from storage devices and analyze partition tables, volume managers, popular Linux filesystems (Ext4, Btrfs, and Xfs), and encryption Investigate evidence from Linux logs, including traditional syslog, the systemd journal, kernel and audit logs, and logs from daemons and applications Reconstruct the Linux startup process, from boot loaders (UEFI and Grub) and kernel initialization, to systemd unit files and targets leading up to a graphical login Perform analysis of power, temperature, and the physical environment of a Linux machine, and find evidence of sleep, hibernation, shutdowns, reboots, and crashes Examine installed software, including distro installers, package formats, and package management systems from Debian, Fedora, SUSE, Arch, and other distros Perform analysis of time and Locale settings, internationalization including language and keyboard settings, and geolocation on a Linux system Reconstruct user login sessions (shell, X11 and Wayland), desktops (Gnome, KDE, and others) and analyze keyrings, wallets, trash cans, clipboards, thumbnails, recent files and other desktop artifacts Analyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts (Wi-Fi, Bluetooth, WWAN), VPNs (including WireGuard), firewalls, and proxy settings Identify traces of attached peripheral devices (PCI, USB, Thunderbolt, Bluetooth) including external storage, cameras, and mobiles, and reconstruct printing and scanning activity

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

Author: EC-Council

Publisher: Cengage Learning

ISBN: 9781111787011

Category: Computers

Page: 192

View: 996

Download BOOK »
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.