Take a look at our Operating Systems books. Shulph carries a great selection of Operating Systems books, and we are always adding more.
Become the ethical hacker you need to be to protect your network Key Features Set up, configure, and run a newly installed Kali-Linux 2018.x Footprint, monitor, and audit your network and investigate any ongoing infestations Customize Kali Linux with this professional guide so it becomes your pen testing toolkit Book Description Microsoft Windows is one of the two most common OSes, and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS. This lets you focus on using the network penetration, password cracking, and forensics tools, and not the OS. This book has the most advanced tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux penetration testing. You will start by learning about the various desktop environments that now come with Kali. The book covers network sniffers and analysis tools to uncover the Windows protocols in use on the network. You will see several tools designed to improve your average in password acquisition, from hash cracking, online attacks, offline attacks, and rainbow tables to social engineering. It also demonstrates several use cases for Kali Linux tools like Social Engineering Toolkit, and Metasploit, to exploit Windows vulnerabilities. Finally, you will learn how to gain full system-level access to your compromised system and then maintain that access. By the end of this book, you will be able to quickly pen test your system and network using easy-to-follow instructions and support images. What you will learn Learn advanced set up techniques for Kali and the Linux operating system Understand footprinting and reconnaissance of networks Discover new advances and improvements to the Kali operating system Map and enumerate your Windows network Exploit several common Windows network vulnerabilities Attack and defeat password schemes on Windows Debug and reverse engineer Windows programs Recover lost files, investigate successful hacks, and discover hidden data Who this book is for If you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge about Linux operating systems, BASH terminal, and Windows command line would be highly beneficial.
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratch Key Features Get up and running with Kali Linux 2019.2 Gain comprehensive insights into security concepts such as social engineering, wireless network exploitation, and web application attacks Learn to use Linux commands in the way ethical hackers do to gain control of your environment Book Description The current rise in hacking and security breaches makes it more important than ever to effectively pentest your environment, ensuring endpoint protection. This book will take you through the latest version of Kali Linux and help you use various tools and techniques to efficiently deal with crucial security aspects. Through real-world examples, you'll understand how to set up a lab and later explore core penetration testing concepts. Throughout the course of this book, you'll get up to speed with gathering sensitive information and even discover different vulnerability assessment tools bundled in Kali Linux 2019. In later chapters, you'll gain insights into concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections to further build on your pentesting skills. You'll also focus on techniques such as bypassing controls, attacking the end user and maintaining persistence access through social media. Finally, this pentesting book covers best practices for performing complex penetration testing techniques in a highly secured environment. By the end of this book, you'll be able to use Kali Linux to detect vulnerabilities and secure your system by applying penetration testing techniques of varying complexity. What you will learn Explore the fundamentals of ethical hacking Learn how to install and configure Kali Linux Get up to speed with performing wireless network pentesting Gain insights into passive and active information gathering Understand web application pentesting Decode WEP, WPA, and WPA2 encryptions using a variety of methods, such as the fake authentication attack, the ARP request replay attack, and the dictionary attack Who this book is for If you are an IT security professional or a security consultant who wants to get started with penetration testing using Kali Linux 2019.2, then this book is for you. The book will also help if you're simply looking to learn more about ethical hacking and various security breaches. Although prior knowledge of Kali Linux is not necessary, some understanding of cybersecurity will be useful.
Enhance your skills in expert module development, deployment, security, DevOps, and cloud Key Features A step-by-step guide to get you started with PowerShell Core 6.0 Harness the capabilities of PowerShell Core 6.0 to perform simple to complex administration tasks Learn core administrative concepts such as scripting, pipelines, and DSC Book Description Beginning with an overview of the different versions of PowerShell, Learn PowerShell Core 6.0 introduces you to VSCode and then dives into helping you understand the basic techniques in PowerShell scripting. You will cover advanced coding techniques, learn how to write reusable code as well as store and load data with PowerShell. This book will help you understand PowerShell security and Just Enough Administration, enabling you to create your own PowerShell repository. The last set of chapters will guide you in setting up, configuring, and working with Release Pipelines in VSCode and VSTS, and help you understand PowerShell DSC. In addition to this, you will learn how to use PowerShell with Windows, Azure, Microsoft Online Services, SCCM, and SQL Server. The final chapter will provide you with some use cases and pro tips. By the end of this book, you will be able to create professional reusable code using security insight and knowledge of working with PowerShell Core 6.0 and its most important capabilities. What you will learn Get to grips with Powershell Core 6.0 Explore basic and advanced PowerShell scripting techniques Get to grips with Windows PowerShell Security Work with centralization and DevOps with PowerShell Implement PowerShell in your organization through real-life examples Learn to create GUIs and use DSC in production Who this book is for If you are a Windows administrator or a DevOps user who wants to leverage PowerShell to automate simple to complex tasks, then this book is for you. Whether you know nothing about PowerShell or just enough to get by, this guide will give you what you need to go to take your scripting to the next level. You'll also find this book useful if you're a PowerShell expert looking to expand your knowledge in areas such as PowerShell Security and DevOps.
Get up to speed with the most important concepts in driver development and focus on common embedded system requirements such as memory management, interrupt management, and locking mechanismsKey FeaturesWrite feature-rich and customized Linux device drivers for any character, SPI, and I2C deviceDevelop a deep understanding of locking primitives, IRQ management, memory management, DMA, and so onGain practical experience in the embedded side of Linux using GPIO, IIO, and input subsystemsBook DescriptionLinux is by far the most-used kernel on embedded systems. Thanks to its subsystems, the Linux kernel supports almost all of the application fields in the industrial world. This updated second edition of Linux Device Driver Development is a comprehensive introduction to the Linux kernel world and the different subsystems that it is made of, and will be useful for embedded developers from any discipline.You'll learn how to configure, tailor, and build the Linux kernel. Filled with real-world examples, the book covers each of the most-used subsystems in the embedded domains such as GPIO, direct memory access, interrupt management, and I2C/SPI device drivers. This book will show you how Linux abstracts each device from a hardware point of view and how a device is bound to its driver(s). You'll also see how interrupts are propagated in the system as the book covers the interrupt processing mechanisms in-depth and describes every kernel structure and API involved. This new edition also addresses how not to write device drivers using user space libraries for GPIO clients, I2C, and SPI drivers.By the end of this Linux book, you'll be able to write device drivers for most of the embedded devices out there. What you will learnDownload, configure, build, and tailor the Linux kernelDescribe the hardware using a device treeWrite feature-rich platform drivers and leverage I2C and SPI busesGet the most out of the new concurrency managed workqueue infrastructureUnderstand the Linux kernel timekeeping mechanism and use time-related APIsUse the regmap framework to factor the code and make it genericOffload CPU for memory copies using DMAInteract with the real world using GPIO, IIO, and input subsystemsWho this book is forThis Linux OS book is for embedded system and embedded Linux enthusiasts/developers who want to get started with Linux kernel development and leverage its subsystems. Electronic hackers and hobbyists interested in Linux kernel development as well as anyone looking to interact with the platform using GPIO, IIO, and input subsystems will also find this book useful.
Over 30 recipes to develop custom drivers for your embedded Linux applications. Key Features Use Kernel facilities to develop powerful drivers Via a practical approach, learn core concepts of developing device drivers Program a custom character device to get access to kernel internals Book Description Linux is a unified kernel that is widely used to develop embedded systems. As Linux has turned out to be one of the most popular operating systems used, the interest in developing proprietary device drivers has also increased. Device drivers play a critical role in how the system performs and ensures that the device works in the manner intended. By offering several examples on the development of character devices and how to use other kernel internals, such as interrupts, kernel timers, and wait queue, as well as how to manage a device tree, you will be able to add proper management for custom peripherals to your embedded system. You will begin by installing the Linux kernel and then configuring it. Once you have installed the system, you will learn to use the different kernel features and the character drivers. You will also cover interrupts in-depth and how you can manage them. Later, you will get into the kernel internals required for developing applications. Next, you will implement advanced character drivers and also become an expert in writing important Linux device drivers. By the end of the book, you will be able to easily write a custom character driver and kernel code as per your requirements. What you will learn Become familiar with the latest kernel releases (4.19+/5.x) running on the ESPRESSObin devkit, an ARM 64-bit machine Download, configure, modify, and build kernel sources Add and remove a device driver or a module from the kernel Master kernel programming Understand how to implement character drivers to manage different kinds of computer peripherals Become well versed with kernel helper functions and objects that can be used to build kernel applications Acquire a knowledge of in-depth concepts to manage custom hardware with Linux from both the kernel and user space Who this book is for This book will help anyone who wants to develop their own Linux device drivers for embedded systems. Having basic hand-on with Linux operating system and embedded concepts is necessary.
Find solutions to all your problems related to Linux system programming using practical recipes for developing your own system programsKey FeaturesDevelop a deeper understanding of how Linux system programming worksGain hands-on experience of working with different Linux projects with the help of practical examplesLearn how to develop your own programs for LinuxBook DescriptionLinux is the world's most popular open source operating system (OS). Linux System Programming Techniques will enable you to extend the Linux OS with your own system programs and communicate with other programs on the system. The book begins by exploring the Linux filesystem, its basic commands, built-in manual pages, the GNU compiler collection (GCC), and Linux system calls. You'll then discover how to handle errors in your programs and will learn to catch errors and print relevant information about them. The book takes you through multiple recipes on how to read and write files on the system, using both streams and file descriptors. As you advance, you'll delve into forking, creating zombie processes, and daemons, along with recipes on how to handle daemons using systemd. After this, you'll find out how to create shared libraries and start exploring different types of interprocess communication (IPC). In the later chapters, recipes on how to write programs using POSIX threads and how to debug your programs using the GNU debugger (GDB) and Valgrind will also be covered. By the end of this Linux book, you will be able to develop your own system programs for Linux, including daemons, tools, clients, and filters.What you will learnDiscover how to write programs for the Linux system using a wide variety of system callsDelve into the working of POSIX functionsUnderstand and use key concepts such as signals, pipes, IPC, and process managementFind out how to integrate programs with a Linux systemExplore advanced topics such as filesystem operations, creating shared libraries, and debugging your programsGain an overall understanding of how to debug your programs using ValgrindWho this book is forThis book is for anyone who wants to develop system programs for Linux and gain a deeper understanding of the Linux system. The book is beneficial for anyone who is facing issues related to a particular part of Linux system programming and is looking for specific recipes or solutions.
Become an expert at managing enterprise identity infrastructure by leveraging Active Directory Key Features Explore the new features in Active Directory Domain Service Manage your Active Directory services for Windows Server 2016 effectively Automate administrative tasks in Active Directory using PowerShell Core 6.x Book Description Active Directory (AD) is a centralized and standardized system that automates networked management of user data, security, and distributed resources and enables inter-operation with other directories. This book will first help you brush up on the AD architecture and fundamentals, before guiding you through core components, such as sites, trust relationships, objects, and attributes. You will then explore AD schemas, LDAP, RMS, and security best practices to understand objects and components and how they can be used effectively. Next, the book will provide extensive coverage of AD Domain Services and Federation Services for Windows Server 2016, and help you explore their new features. Furthermore, you will learn to manage your identity infrastructure for a hybrid cloud setup. All this will help you design, plan, deploy, manage operations, and troubleshoot your enterprise identity infrastructure in a secure and effective manner. You'll later discover Azure AD Module, and learn to automate administrative tasks using PowerShell cmdlets. All along, this updated second edition will cover content based on the latest version of Active Directory, PowerShell 5.1 and LDAP. By the end of this book, you'll be well versed with best practices and troubleshooting techniques for improving security and performance in identity infrastructures. What you will learn Design your Hybrid AD environment by evaluating business and technology requirements Protect sensitive data in a hybrid environment using Azure Information Protection Explore advanced functionalities of the schema Learn about Flexible Single Master Operation (FSMO) roles and their placement Install and migrate Active Directory from older versions to Active Directory 2016 Control users, groups, and devices effectively Design your OU structure in the most effective way Integrate Azure AD with Active Directory Domain Services for a hybrid setup Who this book is for If you are an Active Directory administrator, system administrator, or network professional who has basic knowledge of Active Directory and is looking to become an expert in this topic, this book is for you.
Master the art of developing customized device drivers for your embedded Linux systemsKey FeaturesStay up to date with the Linux PCI, ASoC, and V4L2 subsystems and write device drivers for themGet to grips with the Linux kernel power management infrastructureAdopt a practical approach to customizing your Linux environment using best practicesBook DescriptionLinux is one of the fastest-growing operating systems around the world, and in the last few years, the Linux kernel has evolved significantly to support a wide variety of embedded devices with its improved subsystems and a range of new features. With this book, you'll find out how you can enhance your skills to write custom device drivers for your Linux operating system.Mastering Linux Device Driver Development provides complete coverage of kernel topics, including video and audio frameworks, that usually go unaddressed. You'll work with some of the most complex and impactful Linux kernel frameworks, such as PCI, ALSA for SoC, and Video4Linux2, and discover expert tips and best practices along the way. In addition to this, you'll understand how to make the most of frameworks such as NVMEM and Watchdog. Once you've got to grips with Linux kernel helpers, you'll advance to working with special device types such as Multi-Function Devices (MFD) followed by video and audio device drivers.By the end of this book, you'll be able to write feature-rich device drivers and integrate them with some of the most complex Linux kernel frameworks, including V4L2 and ALSA for SoC.What you will learnExplore and adopt Linux kernel helpers for locking, work deferral, and interrupt managementUnderstand the Regmap subsystem to manage memory accesses and work with the IRQ subsystemGet to grips with the PCI subsystem and write reliable drivers for PCI devicesWrite full multimedia device drivers using ALSA SoC and the V4L2 frameworkBuild power-aware device drivers using the kernel power management frameworkFind out how to get the most out of miscellaneous kernel subsystems such as NVMEM and WatchdogWho this book is forThis book is for embedded developers, Linux system engineers, and system programmers who want to explore Linux kernel frameworks and subsystems. C programming skills and a basic understanding of driver development are necessary to get started with this book.
Protect your cloud, virtual, and on-premises environments by implementing Veeam's powerful backup and replication technologyKey FeaturesGain in-depth knowledge of CDP and hardened repositories that you can use in your virtual environmentExplore Veeam's monitoring and reporting utility - Veeam ONE - along with Linux proxy enhancementsWork with the new Veeam Disaster Recovery Orchestrator (Orchestrator) for testing failovers and backupsBook DescriptionVeeam is one of the leading modern data protection solutions, making it a necessary skill for anyone responsible for securing virtual environments. This revised second edition of Mastering Veeam Backup & Replication is updated to cover Veeam version 11. The book guides you through implementing modern data protection solutions for your cloud and virtual infrastructure with Veeam, all while helping you master advanced concepts such as Continuous Data Protection (CDP), extended object storage support, Veeam ONE enhancements, and Orchestrator.Starting with Veeam essentials, including installation, best practices, and optimizations for Veeam Backup & Replication, you'll get to grips with the 3-2-1-1-0 rule to safeguard data. You'll understand how to set up a backup server, proxies, repositories, and more and then advance to cover a powerful feature of Veeam 11 – CDP. As you progress, you'll learn about immutability (also known as hardened repositories) and discover the best practices for creating them. Finally, you'll explore the new proxy option available in Linux and become well-versed with advanced topics such as extended object storage support, Veeam ONE enhancements, and Orchestrator.By the end of this Veeam book, you'll be able to implement Veeam Backup & Replication for securing your environment and enabling disaster recovery.What you will learnDiscover the advanced concepts of Veeam Backup & Replication 11Master application optimization based on Veeam best practicesGet to grips with configuring CDP and working with repositories and proxiesExplore ways to protect your backups with immutable hardened repositoriesUnderstand the enhancements to backups, instant recovery, and Linux proxiesExplore Veeam ONE enhancementsBecome well-versed in using Veeam Disaster Recovery OrchestratorWho this book is forThis Veeam backup book is for IT professionals who have intermediate to advanced-level knowledge of virtualization as well as backups and backup applications. Anyone who needs a reference guide for learning the advanced features of Veeam Backup & Replication and how they are used, including best practices and optimizations, will also find this book useful.
Discover advanced virtualization techniques and strategies to deliver centralized desktop and application services Key Features Leverage advanced desktop virtualization techniques and strategies to transform your organization Build better virtualized services for your users with VMware Horizon 7.8 Develop and deploy end-to-end virtualized solutions Book Description Desktop virtualization can be tough, but VMware Horizon 7.8 changes all that. With a rich and adaptive UX, improved security,and a range of useful features for storage and networking optimization, there's plenty to love. But to properly fall in love with it, you need to know how to use it, and that means venturing deeper into the software and taking advantage of its extensive range of features, many of which are underused and underpromoted. This guide will take you through everything you need to know to not only successfully virtualize your desktop infrastructure, but also to maintain and optimize it to keep all your users happy. We'll show you how to assess and analyze your infrastructure, and how to use that analysis to design a solution that meets your organizational and user needs. Once you've done that, you'll find out how to build your virtualized environment, before deploying your virtualized solution. But more than that,we'll also make sure you know everything you need to know about the full range of features on offer, including the mobile cloud, so that you can use them to take full control of your virtualized infrastructure. What you will learn Successfully configure Horizon 7.8 for the needs of your users Deliver virtual desktops, session-based desktops, and hosted applications Become familiar with how to develop, and deploy, a complete, end-to-end solution Discover how to optimize desktop OS images for virtual desktops Build, optimize, and tune desktop operating systems to deliver a superior end user experience Explore the Horizon 7.8 infrastructure so that you can take full advantage of it Who this book is for This book is ideal for system admins, and solution architects interested in gaining hands-on experience with virtualization. It will take you to an advanced level, but at a pace that ensures you are always solving real-world problems. Some experience in desktop management using Windows and Microsoft Office (and familiarity with Active Directory, SQL, Windows Remote Desktop Session Hosting, and VMware vSphere technology) is necessary.