Take a look at our Operating Systems books. Shulph carries a great selection of Operating Systems books, and we are always adding more.
Android Things is the new Android based Operating System for the Internet of Things. With this book you will learn the core concepts by running code examples on different peripherals. Key Features No previous knowledge of IoT or microcontrollers required. Hands-On with simple code and plenty of examples. Use Kotlin to write simpler and more readable code Book Description Android Things is the IoT platform made by Google, based on Android. It allows us to build smart devices in a simple and convenient way, leveraging on the Android ecosystem tools and libraries, while letting Google take care of security updates. This book takes you through the basics of IoT and smart devices. It will help you to interact with common IoT device components and learn the underlying protocols. For a simple setup, we will be using Rainbow HAT so that we don't need to do any wiring. In the first chapter, you will learn about the Android Things platform, the design concepts behind it, and how it relates to other IoT frameworks. We will look at the Developer Kits and learn how to install Android Things on them by creating a simple project. Later, we will explore the real power of Android Things, learning how to make a UI, designing and communicating with companion apps in different ways, showcasing a few libraries. We will demonstrate libraries and you will see how powerful the Android Things operating system is. What you will learn Understand key design concepts of Android Things and its advantages Set up an Android Things Developer Kit Interact with all the components of Rainbow HAT Understand how peripheral protocols work (GPIO, PWM, I2C, and SPI) Implement best practices of how to handle IoT peripherals with in terms Android Things Develop techniques for building companion apps for your devices Who this book is for This book is for developers who have a basic knowledge of Android and want to start using the Android Things developer kit.
Master shell basics and Unix tools and discover easy commands to perform complex tasks with speed Key Features Learn why the Bash shell is widely used on Linux and iOS Explore advanced shell concepts, such as pipes and redirection Understand how to use Unix command-line tools as building blocks for different tasks Book Description The most basic interface to a computer—the command line—remains the most flexible and powerful way of processing data and performing and automating various day-to-day tasks. Command Line Fundamentals begins by exploring the basics, and then focuses on the most common tool, the Bash shell (which is standard on all Linux and iOS systems). As you make your way through the book, you'll explore the traditional Unix command-line programs as implemented by the GNU project. You'll also learn to use redirection and pipelines to assemble these programs to solve complex problems. By the end of this book, you'll have explored the basics of shell scripting, allowing you to easily and quickly automate tasks. What you will learn Use the Bash shell to run commands Utilize basic Unix utilities such as cat, tr, sort, and uniq Explore shell wildcards to manage groups of files Apply useful keyboard shortcuts in shell Employ redirection and pipes to process data Write both basic and advanced shell scripts to automate tasks Who this book is for Command Line Fundamentals is for programmers who use GUIs but want to understand how to use the command line to complete tasks faster.
Master the concepts and techniques that will help you gain the LX0-103 and LX0-104 certifications on your first attempt Key Features Get a clear understanding of how to achieve the Linux+ certification Explore system architecture, shell scripts, data management, and Linux security Work through practice and mock tests to pass both LX0-103 and LX0-104 exams Book Description Linux+ certification demonstrates technical competency and provides a broad awareness of Linux operating systems. Professionals who have achieved the Linux+ certification exhibit all-important knowledge of installation, operation, administration, and troubleshooting services. The CompTIA Linux+ Certification Guide is an overview of the certification that gives you insights into the system architecture. You'll understand how to install and uninstall Linux distributions, followed by working with various package managers. Once you've grasped all this, you'll move on to manipulating files and processes at command-line interface (CLI) and creating, monitoring, killing, restarting, and modifying processes. As you progress, you'll be equipped to work with display managers and learn how to create, modify, and remove user accounts and groups, as well as understand how to automate tasks. The last set of chapters helps you configure dates and set up local and remote system logging. In addition to this, you'll explore different internet protocols, along with discovering network configuration, security administration, Shell scripting, and SQL management. By the end of this book, you'll not only have got to grips with all the modules using practice questions and mock exams, but you'll also be well prepared to pass the LX0-103 and LX0-104 certification exams. What you will learn Understand the Linux system architecture Install, upgrade, and manage Linux system packages Configure devices and maintain the Linux filesystem Manage the Shell environment, write scripts, and manage data Set user interfaces and desktops in the Linux operating system Automate system admin tasks and manage essential system services Manage SQL server on Linux and log locally and remotely with rsyslogd Administer network and local security Who this book is for The CompTIA Linux+ Certification Guide is for you if you want to gain the CompTIA Linux+ certificate. This guide is also for system administrators and rookie Linux professionals interested in enhancing their Linux and Shell scripting skills. No prior knowledge of Linux is needed, although some understanding of Shell scripting would be helpful.
Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency. Key Features Run .NET Framework and .NET Core apps in Docker containers for efficiency, security and portability Design distributed containerized apps, using enterprise-grade open source software from Docker Hub Build a CI/CD pipeline with Docker, going from source to a production Docker Swarm in the cloud Book Description Docker on Windows, Second Edition teaches you all you need to know about Docker on Windows, from the 101 to running highly-available workloads in production. You'll be guided through a Docker journey, starting with the key concepts and simple examples of .NET Framework and .NET Core apps in Docker containers on Windows. Then you'll learn how to use Docker to modernize the architecture and development of traditional ASP.NET and SQL Server apps. The examples show you how to break up legacy monolithic applications into distributed apps and deploy them to a clustered environment in the cloud, using the exact same artifacts you use to run them locally. You'll see how to build a CI/CD pipeline which uses Docker to compile, package, test and deploy your applications. To help you move confidently to production, you'll learn about Docker security, and the management and support options. The book finishes with guidance on getting started with Docker in your own projects. You'll walk through some real-world case studies for Docker implementations, from small-scale on-premises apps to very large-scale apps running on Azure. What you will learn Understand key Docker concepts: images, containers, registries and swarms Run Docker on Windows 10, Windows Server 2019, and in the cloud Deploy and monitor distributed solutions across multiple Docker containers Run containers with high availability and failover with Docker Swarm Master security in-depth with the Docker platform, making your apps more secure Build a Continuous Deployment pipeline, running Jenkins and Git in Docker Debug applications running in Docker containers using Visual Studio Plan the adoption of Docker in your organization Who this book is for If you want to modernize an old monolithic application without rewriting it, smooth the deployment to production, or move to DevOps or the cloud, then Docker is the enabler for you. This book gives you a solid grounding in Docker so you can confidently approach all of these scenarios.
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux. Key Features Identify the vulnerabilities in your system using Kali Linux 2018.02 Discover the art of exploiting Windows kernel drivers Get to know several bypassing techniques to gain control of your Windows environment Book Description Windows has always been the go-to platform for users around the globe to perform administration and ad hoc tasks, in settings that range from small offices to global enterprises, and this massive footprint makes securing Windows a unique challenge. This book will enable you to distinguish yourself to your clients. In this book, you'll learn advanced techniques to attack Windows environments from the indispensable toolkit that is Kali Linux. We'll work through core network hacking concepts and advanced Windows exploitation techniques, such as stack and heap overflows, precision heap spraying, and kernel exploitation, using coding principles that allow you to leverage powerful Python scripts and shellcode. We'll wrap up with post-exploitation strategies that enable you to go deeper and keep your access. Finally, we'll introduce kernel hacking fundamentals and fuzzing testing, so you can discover vulnerabilities and write custom exploits. By the end of this book, you'll be well-versed in identifying vulnerabilities within the Windows OS and developing the desired solutions for them. What you will learn Get to know advanced pen testing techniques with Kali Linux Gain an understanding of Kali Linux tools and methods from behind the scenes See how to use Kali Linux at an advanced level Understand the exploitation of Windows kernel drivers Understand advanced Windows concepts and protections, and how to bypass them using Kali Linux Discover Windows exploitation techniques, such as stack and heap overflows and kernel exploitation, through coding principles Who this book is for This book is for penetration testers, ethical hackers, and individuals breaking into the pentesting role after demonstrating an advanced skill in boot camps. Prior experience with Windows exploitation, Kali Linux, and some Windows debugging tools is necessary
Deploy functions efficiently using different cloud-based serverless offerings Key Features Understand the concept of Function-as-a-Service Implement Serverless solutions using AWS Lambda, Azure Functions and Google Cloud Functions Practical approach towards choosing the best tool for your serverless environment Book Description Serverless applications and architectures are gaining momentum and are increasingly being used by companies of all sizes. Serverless software takes care of many problems that developers face when running systems and servers, such as fault tolerance, centralized logging, horizontal scalability, and deployments. You will learn how to harness serverless technology to rapidly reduce production time and minimize your costs, while still having the freedom to customize your code, without hindering functionality. Upon finishing the book, you will have the knowledge and resources to build your own serverless application hosted in AWS, Microsoft Azure, or Google Cloud Platform, and will have experienced the benefits of event-driven technology for yourself. This hands-on guide dives into the basis of serverless architectures and how to build them using Node.js as a programming language, Visual Studio Code for code editing, and Postman for quickly and securely developing applications without the hassle of configuring and maintaining infrastructure on three public cloud platforms. What you will learn Understand the benefts of serverless computing and know when to use it Develop serverless applications on AWS, Azure, and Google Cloud Get to grips with Function as a Service (FaaS) Apply triggers to serverless functions Build event-driven apps using serverless frameworks Use the Node.js programming language to build serverless apps Use code editors, such as Visual Studio Code, as development environments Master the best development practices for creating scalable and practical solutions Who this book is for This book is targeted towards developers, system administrators or any stakeholder working in the Serverless environment and want to understand how functions work. Basic idea of serverless architecture can be an added advantage
Equip yourself with the most complete and comprehensive preparation experience for Identity with Windows Server 2016: Microsoft 70-742 exam. Key Features Helps you demonstrate real-world mastery of Windows Server 2016 identity features and functionality and prepare for 70-742 Acquire skills to reduce IT costs and deliver more business value Enhance your existing skills through practice questions and mock tests Book Description MCSA: Windows Server 2016 certification is one of the most sought-after certifications for IT professionals, which includes working with Windows Server and performing administrative tasks around it. This book is aimed at the 70-742 certification and is part of Packt's three-book series on MCSA Windows Server 2016 certification, which covers Exam 70-740, Exam 70-741, and Exam 70-742. This exam guide covers the exam objectives for the 70-742 Identity with Windows Server 2016 exam. It starts with installing and configuring Active Directory Domain Services (AD DS), managing and maintaining AD DS objects and advanced configurations, configuring Group Policy, Active Directory Certificate Services, and Active Directory Federation Services and Rights Management. At the end of each chapter, convenient test questions will help you in preparing for the certification in a practical manner. By the end of this book, you will be able to develop the knowledge and skills needed to complete MCSA Exam 70-742: Identity with Windows Server 2016 with confidence. What you will learn Install, configure, and maintain Active Directory Domain Services (AD DS) Manage Active Directory Domain Services objects Configure and manage Active Directory Certificate Services Configure and manage Group Policy Design, implement, and configure Active Directory Federation Services Implement and configure Active Directory Rights Management Services Who this book is for This book primarily targets system administrators who are looking to gain knowledge about identity and access technologies with Windows Server 2016 and aiming to pass the 70-742 certification. This will also help infrastructure administrators who are looking to gain advanced knowledge and understanding of identity and access technologies with Windows Server 2016. Familiarity with the concepts such as Active Directory, DNS is assumed.
Get ready for the Windows 10: 70-698 exam and configure Windows to manage data recovery Key Features Implement Windows 10 operational and administrative tasks Configure devices, remote management settings, advanced management tools, and device drivers Comprehensive guide to help you work efficiently in Windows 10 Book Description The Installing and Configuring Windows 10: 70-698 Exam Guide is designed to confirm what you already know, while also updating your knowledge of Windows 10. With its easy-to-follow guidance, you will quickly learn the user interface and discover steps to work efficiently in Windows 10 to rule out delays and obstacles. This book begins by covering various ways of installing Windows 10, followed by instructions on post-installation tasks. You will learn about the deployment of Windows 10 in Enterprise and also see how to configure networking in Windows 10. You'll understand how to leverage Disk Management and Windows PowerShell to configure disks, volumes, and file system options. As you progress through the chapters, you will be able to set up remote management in Windows 10 and learn more about Windows update usage, behavior, and settings. You will also gain insights that will help you monitor and manage data recovery and explore how to configure authentication, authorization, and advanced management tools in Windows 10. By the end of this book, you will be equipped with enough knowledge to take the 70-698 exam and explore different study methods to improve your chances of passing the exam with ease. What you will learn Discover various ways of installing Windows 10 Understand how to configure devices and device drivers Configure and support IPv4 and IPv6 network settings Troubleshoot storage and removable device issues Get to grips with data access and usage Explore the advanced management tools available in Windows 10 Who this book is for This book is for IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services and are preparing to clear the Windows 10: 70-698 exam
Discover end-to-end penetration testing solutions to enhance your ethical hacking skills. Key Features - Practical recipes to conduct effective penetration testing using the latest version of Kali Linux. - Leverage tools like Metasploit, Wireshark, Nmap, and more to detect vulnerabilities with ease. - Confidently perform networking and application attacks using task-oriented recipes. Book Description Many organizations have been affected by recent cyber events. At the current rate of hacking, it has become more important than ever to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4 / 2019), in addition to covering the core functionalities. The book will get you off to a strong start by introducing you to the installation and configuration of Kali Linux, which will help you to perform your tests. You will also learn how to plan attack strategies and perform web application exploitation using tools such as Burp and JexBoss. As you progress, you will get to grips with performing network exploitation using Metasploit, Sparta, and Wireshark. The book will also help you delve into the technique of carrying out wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Later chapters will draw focus to the wide range of tools that help in forensics investigations and incident response mechanisms. As you wrap up the concluding chapters, you will learn to create an optimum quality pentest report. By the end of this book, you will be equipped with the knowledge you need to conduct advanced penetration testing, thanks to the book's crisp and task-oriented recipes. What you will learn - Learn how to install, set up and customize Kali for pentesting on multiple platforms. - Pentest routers and embedded devices. - Get insights into fiddling around with software-defined radio. - Pwn and escalate through a corporate network. - Write good quality security reports. - Explore digital forensics and memory analysis with Kali Linux. Who this book is for If you are an IT security professional, pentester, or security analyst who wants to conduct advanced penetration testing techniques, then this book is for you. Basic knowledge of Kali Linux is assumed.
Become the ethical hacker you need to be to protect your network Key Features Set up, configure, and run a newly installed Kali-Linux 2018.x Footprint, monitor, and audit your network and investigate any ongoing infestations Customize Kali Linux with this professional guide so it becomes your pen testing toolkit Book Description Microsoft Windows is one of the two most common OSes, and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS. This lets you focus on using the network penetration, password cracking, and forensics tools, and not the OS. This book has the most advanced tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux penetration testing. You will start by learning about the various desktop environments that now come with Kali. The book covers network sniffers and analysis tools to uncover the Windows protocols in use on the network. You will see several tools designed to improve your average in password acquisition, from hash cracking, online attacks, offline attacks, and rainbow tables to social engineering. It also demonstrates several use cases for Kali Linux tools like Social Engineering Toolkit, and Metasploit, to exploit Windows vulnerabilities. Finally, you will learn how to gain full system-level access to your compromised system and then maintain that access. By the end of this book, you will be able to quickly pen test your system and network using easy-to-follow instructions and support images. What you will learn Learn advanced set up techniques for Kali and the Linux operating system Understand footprinting and reconnaissance of networks Discover new advances and improvements to the Kali operating system Map and enumerate your Windows network Exploit several common Windows network vulnerabilities Attack and defeat password schemes on Windows Debug and reverse engineer Windows programs Recover lost files, investigate successful hacks, and discover hidden data Who this book is for If you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge about Linux operating systems, BASH terminal, and Windows command line would be highly beneficial.