Red Hat Fedora Linux Secrets


Book Description

Featuring the latest changes in Fedora Core, this book offers valuable new secrets for Fedora users, including yum, mail filtering with SpamAssassin, mandatory access control with Security Enhanced Linux (SELinux), and improved device handling with udev Demonstrates how to use Linux for real-world tasks, from learning UNIX commands to setting up a secure Java-capable Web server for a business Because Fedora Core updates occur frequently, the book contains a helpful appendix with instructions on how to download and install the latest release of Fedora Core The DVD contains the Fedora distribution as well as all binary code packages and source code




Windows 7 Secrets


Book Description

Tips, tricks, treats, and secrets revealed on the latest operating system from Microsoft: Windows 7 You already know the ups and downs of Windows Vista-now it's time to learn the ins and outs of Windows 7! Internationally recognized Windows experts, Microsoft insiders, and authors Paul Thurrott and Rafael Rivera cut through the hype to pull away the curtain and reveal useful information not found anywhere else. Regardless of your level of knowledge, you'll discover little-known facts on how things work, what's new and different, and how you can modify Windows 7 to meet your own specific needs. A witty, conversational tone tells you what you need to know to go from Windows user to Windows expert and doesn't waste time with basic computer topics while point-by-point comparisons demonstrate the difference between Windows 7 features and functionality to those in Windows XP and Vista. Windows 7 is the exciting update to Microsoft's operating system Authors are internationally known Windows experts and Microsoft insiders Exposes tips, tricks, and secrets on the new features and functionality of Windows 7 Reveals best practices for customizing the system to work for you Investigates the differences between Windows 7 and previous versions of Windows No need to whisper! Window 7 Secrets is the ultimate insider's guide to Microsoft's most exciting Windows version in years.




Windows Vista Secrets


Book Description

Follows the highly successful first edition with over 25% more content, including extensive coverage of the latest update, Service Pack 1 Addresses a huge market of consumers eager to learn about hidden gems and secrets in Vista and SP1 Covers features that are not disclosed in Microsoft's books or help files A highly connected and qualified author has gathered information from an extensive network of Windows beta testers and thousands of readers, as well as conducted his own experiments on the new OS New chapters cover personalizing and configuring Vista, networking, Zune, Vista and ultra-mobile PCs, Windows Home Server, and many more new topics




Red Hat Linux Secrets


Book Description

Barkakati successfully unlocks hidden techniques for power users and administrators seeking more power and performance from Red Hat. Readers learn skills of the experts, with sections on configuration, running Linux, exploiting hardware in Linux, and using Linux for fun and profit. CD-ROM includes the latest version of Red Hat 6.x.




Linux Secrets


Book Description

In addition to providing expert advice for installation and setup of Linux, this book uncovers little-known or undocumented information on the best ways to use Linux for specific business purposes. Naba Barkakati takes readers on a real world tour of Linux focusing on the ways Linux is used daily.




Python for Secret Agents


Book Description

If you are a Python beginner who is looking to learn the language through interesting projects, this book is for you. A basic knowledge of programming and statistics is beneficial to get the most out of the book.




Fedora 9 and Red Hat Enterprise Linux Bible


Book Description

Master the latest version of Fedora and Red Hat Enterprise Linux with the step-by-step instructions and hands-on advice in Fedora 9 and Red Hat Enterprise Linux Bible. Learn key system administration skills like setting users and automating system tasks, understand the latest security issues and threats, and gain confidence with using and customizing the desktop menus, icons, and window manager. Updated every six months to correspond with the latest Fedora release, this book includes an official Fedora 9 LiveCD so that you can practice your knowledge and improve your skills. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.




Red Hat Linux Fedora All-in-One Desk Reference For Dummies


Book Description

Completely updated for the newest release of Red Hat Linux, with nine stand-alone, task-oriented minibooks that enable readers to understand all aspects of the Red Hat Linux operating system Includes a new minibook on the OpenOffice.org Desktop Productivity Suite; a new chapter on wireless Ethernet local area networks (LANs); new material on USB devices; and enhanced information on accessing databases, working with graphics and images, and using Linux multimedia tools Written in the friendly, easy-to-understand For Dummies style, the book offers nearly 900 pages of coverage on basic to advanced Red Hat Linux topics, making it the perfect desktop reference to help readers find quick answers or learn how to perform a particular task Includes a DVD that contains all of the CD-ROMs that make up the full Fedora Core distribution, including the source code.




Docker on Windows


Book Description

Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency. Key FeaturesRun .NET Framework and .NET Core apps in Docker containers for efficiency, security and portabilityDesign distributed containerized apps, using enterprise-grade open source software from Docker HubBuild a CI/CD pipeline with Docker, going from source to a production Docker Swarm in the cloudBook Description Docker on Windows, Second Edition teaches you all you need to know about Docker on Windows, from the 101 to running highly-available workloads in production. You’ll be guided through a Docker journey, starting with the key concepts and simple examples of .NET Framework and .NET Core apps in Docker containers on Windows. Then you’ll learn how to use Docker to modernize the architecture and development of traditional ASP.NET and SQL Server apps. The examples show you how to break up legacy monolithic applications into distributed apps and deploy them to a clustered environment in the cloud, using the exact same artifacts you use to run them locally. You’ll see how to build a CI/CD pipeline which uses Docker to compile, package, test and deploy your applications. To help you move confidently to production, you’ll learn about Docker security, and the management and support options. The book finishes with guidance on getting started with Docker in your own projects. You’ll walk through some real-world case studies for Docker implementations, from small-scale on-premises apps to very large-scale apps running on Azure. What you will learnUnderstand key Docker concepts: images, containers, registries and swarmsRun Docker on Windows 10, Windows Server 2019, and in the cloudDeploy and monitor distributed solutions across multiple Docker containersRun containers with high availability and failover with Docker SwarmMaster security in-depth with the Docker platform, making your apps more secureBuild a Continuous Deployment pipeline, running Jenkins and Git in DockerDebug applications running in Docker containers using Visual StudioPlan the adoption of Docker in your organizationWho this book is for If you want to modernize an old monolithic application without rewriting it, smooth the deployment to production, or move to DevOps or the cloud, then Docker is the enabler for you. This book gives you a solid grounding in Docker so you can confidently approach all of these scenarios.




Mastering Linux Security and Hardening


Book Description

Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threats Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features Discover security techniques to prevent malware from infecting a Linux system, and detect it Prevent unauthorized people from breaking into a Linux system Protect important and sensitive data from being revealed to unauthorized persons Book DescriptionThe third edition of Mastering Linux Security and Hardening is an updated, comprehensive introduction to implementing the latest Linux security measures, using the latest versions of Ubuntu and AlmaLinux. In this new edition, you will learn how to set up a practice lab, create user accounts with appropriate privilege levels, protect sensitive data with permissions settings and encryption, and configure a firewall with the newest firewall technologies. You’ll also explore how to use sudo to set up administrative accounts with only the privileges required to do a specific job, and you’ll get a peek at the new sudo features that have been added over the past couple of years. You’ll also see updated information on how to set up a local certificate authority for both Ubuntu and AlmaLinux, as well as how to automate system auditing. Other important skills that you’ll learn include how to automatically harden systems with OpenSCAP, audit systems with auditd, harden the Linux kernel configuration, protect your systems from malware, and perform vulnerability scans of your systems. As a bonus, you’ll see how to use Security Onion to set up an Intrusion Detection System. By the end of this new edition, you will confidently be able to set up a Linux server that will be secure and harder for malicious actors to compromise.What you will learn Prevent malicious actors from compromising a production Linux system Leverage additional features and capabilities of Linux in this new version Use locked-down home directories and strong passwords to create user accounts Prevent unauthorized people from breaking into a Linux system Configure file and directory permissions to protect sensitive data Harden the Secure Shell service in order to prevent break-ins and data loss Apply security templates and set up auditing Who this book is for This book is for Linux administrators, system administrators, and network engineers interested in securing moderate to complex Linux environments. Security consultants looking to enhance their Linux security skills will also find this book useful. Working experience with the Linux command line and package management is necessary to understand the concepts covered in this book.