bash Pocket Reference (Pocket Reference (O’Reilly))

Rating: 
Amazon Price: N/A (as of March 6, 2016 11:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

It's simple: you need to know how to work with the bash shell if you want to get to the heart of Mac OS X, Linux, and other Unix systems. Updated for the most recent version of bash, this concise little book puts all of the essential information about bash at your fingertips. You'll quickly find answers to annoying questions that always come up when you're writing shell scripts — What characters do you need to quote? How do you get variable substitution to do exactly what you want? How do you use arrays? — and much more.

If you're a user or programmer of any Unix variant, or if you're using bash on Windows, you'll find this pocket reference indispensable. This book covers:Invoking the ShellSyntaxFunctionsVariablesArithmetic ExpressionsCommand HistoryProgrammable CompletionJob ControlShell OptionsCommand ExecutionCoprocessesRestricted ShellsBuilt-in Commands

Hacking : A Beginner’s Guide to Learn and Master Ethical Hacking with Practical Examples to Computer, Hacking, Wireless Network, Cybersecurity and Penetration Test (Kali Linux)

Rating: 
Amazon Price: $22.99 (as of August 12, 2020 03:53 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This Book Includes :

Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing
Continue reading “Hacking : A Beginner's Guide to Learn and Master Ethical Hacking with Practical Examples to Computer, Hacking, Wireless Network, Cybersecurity and Penetration Test (Kali Linux)”

grep Pocket Reference (Pocket Reference (O’Reilly))

Rating: 
Amazon Price: $8.54 (as of August 12, 2020 03:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

grep Pocket Reference is the first guide devoted to grep, the powerful Unix content-location utility. This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it — for everything from mail filtering and system log management to malware analysis. With grep Pocket Reference, you will:Learn methods for filtering large files for specific contentAcquire information not included in the current grep documentationGet several tricks for using variants such as egrepKeep key information about grep right at your fingertips

Find the answers you need about grep quickly and easily. If you're familiar with this utility, grep Pocket Reference will help you refresh your basic knowledge, understand rare situations, and work more efficiently. If you're new to grep, this book is the best way to get started.

SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery Book 1)

Rating: 
Amazon Price: N/A (as of February 7, 2018 11:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"Michael W. Lucas is one of my favorite technical authors, and every book he writes is a must-read for IT professionals." – Richard Bejtlich, CSO, MANDIANT, and TaoSecurity blogger

Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job and improves security.
Continue reading “SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery Book 1)”

Sudo Mastery: User Access Control for Real People (IT Mastery Book 3)

Rating: 
Amazon Price: N/A (as of August 20, 2019 04:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Unix-like operating systems have a primitive access control system. The root account can do anything. Other users are peasants with only minimal system access. This worked fine in UNIX’s youth, but today, system administration responsibilities are spread among many people and applications. Each person needs a tiny slice of root’s power.

Sudo lets you divide root’s monolithic power between the people who need it, with accountability and auditability.
Continue reading “Sudo Mastery: User Access Control for Real People (IT Mastery Book 3)”