Linux is Badass

Linux is Badass

Author: Bryan Lunduke

Publisher: Lulu.com

Published: 2016-04-16

Total Pages: 63

ISBN-13: 1365052095

DOWNLOAD EBOOK

We all know that Linux is badass. Now there's a book to prove it. Sure to convert even the most die-hard Windows or Mac OS users, "Linux is Badass" takes you on a magical journey filled with adventure, Linux, bad poetry and swear words.


Half a Decade of Linux-y Shenanigans

Half a Decade of Linux-y Shenanigans

Author: Bryan Lunduke

Publisher: Lulu.com

Published: 2018-02-05

Total Pages: 576

ISBN-13: 1387571249

DOWNLOAD EBOOK

Every article written, between 2012 and 2017, by Bryan Lunduke. Originally published by Network World, these articles represent a snapshot -- a sort of time capsule -- of the state of Linux, Open Source, and alternative Operating Systems during that half decade. It was a crazy time... covered by an equally crazy guy.


Red Hat Linux 9 Unleashed

Red Hat Linux 9 Unleashed

Author: Bill Ball

Publisher: Sams Publishing

Published: 2003

Total Pages: 1058

ISBN-13: 9780672325885

DOWNLOAD EBOOK

The best, most comprehensive coverage of the leading Linux distribution on the market.


The Book of GNS3

The Book of GNS3

Author: Jason C. Neumann

Publisher: No Starch Press

Published: 2015-07-15

Total Pages: 272

ISBN-13: 1593276958

DOWNLOAD EBOOK

GNS3 is open source software that emulates Cisco router and switch hardware to simulate complex networks. You can use GNS3 on any computer to experiment with various router configurations, study for that next big Cisco certification, or build the ubernetwork of your wildest dreams—all without plugging in a single physical network cable. The Book of GNS3 will teach you how to harness the powerful GNS3 software to create your own virtual networks with Cisco and Juniper devices. Hands-on tutorials throughout show you how to: –Configure Cisco IOS and ASA devices in GNS3 –Add Juniper routers to your projects with VirtualBox and QEMU –Connect GNS3’s hub, switch, and cloud devices to physical hardware –Integrate Cisco IOU virtual machines for advanced switching features –Simulate a Cisco access server to practice managing devices –Build bigger labs by distributing project resources across multiple computers Why set up all of that expensive physical hardware before you know whether it will all work together? Learn how to build virtual networks with The Book of GNS3, and stop reconfiguring your lab every time you want to test something new.


Kubernetes in Action

Kubernetes in Action

Author: Marko Luksa

Publisher: Simon and Schuster

Published: 2017-12-14

Total Pages: 1062

ISBN-13: 1638355347

DOWNLOAD EBOOK

Summary Kubernetes in Action is a comprehensive guide to effectively developing and running applications in a Kubernetes environment. Before diving into Kubernetes, the book gives an overview of container technologies like Docker, including how to build containers, so that even readers who haven't used these technologies before can get up and running. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology Kubernetes is Greek for "helmsman," your guide through unknown waters. The Kubernetes container orchestration system safely manages the structure and flow of a distributed application, organizing containers and services for maximum efficiency. Kubernetes serves as an operating system for your clusters, eliminating the need to factor the underlying network and server infrastructure into your designs. About the Book Kubernetes in Action teaches you to use Kubernetes to deploy container-based distributed applications. You'll start with an overview of Docker and Kubernetes before building your first Kubernetes cluster. You'll gradually expand your initial application, adding features and deepening your knowledge of Kubernetes architecture and operation. As you navigate this comprehensive guide, you'll explore high-value topics like monitoring, tuning, and scaling. What's Inside Kubernetes' internals Deploying containers across a cluster Securing clusters Updating applications with zero downtime About the Reader Written for intermediate software developers with little or no familiarity with Docker or container orchestration systems. About the Author Marko Luksa is an engineer at Red Hat working on Kubernetes and OpenShift. Table of Contents PART 1 - OVERVIEW Introducing Kubernetes First steps with Docker and Kubernetes PART 2 - CORE CONCEPTS Pods: running containers in Kubernetes Replication and other controllers: deploying managed pods Services: enabling clients to discover and talk to pods Volumes: attaching disk storage to containers ConfigMaps and Secrets: configuring applications Accessing pod metadata and other resources from applications Deployments: updating applications declaratively StatefulSets: deploying replicated stateful applications PART 3 - BEYOND THE BASICS Understanding Kubernetes internals Securing the Kubernetes API server Securing cluster nodes and the network Managing pods' computational resources Automatic scaling of pods and cluster nodes Advanced scheduling Best practices for developing apps Extending Kubernetes


Kali Linux CTF Blueprints

Kali Linux CTF Blueprints

Author: Cameron Buchanan

Publisher: Packt Publishing Ltd

Published: 2014-07-24

Total Pages: 258

ISBN-13: 1783985992

DOWNLOAD EBOOK

Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customising your own challenges. If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system.


Border Hacker

Border Hacker

Author: Levi Vonk

Publisher: Bold Type Books

Published: 2022-04-26

Total Pages: 320

ISBN-13: 1645037045

DOWNLOAD EBOOK

An unlikely friendship, a four-thousand-mile voyage, and an impenetrable frontier—this dramatic odyssey reveals the chaos and cruelty US immigration policies have unleashed beyond our borders. Axel Kirschner was a lifelong New Yorker, all Queens hustle and bravado. But he was also undocumented. After a minor traffic violation while driving his son to kindergarten, Axel was deported to Guatemala, a country he swore he had not lived in since he was a baby. While fighting his way back through Mexico on a migrant caravan, Axel met Levi Vonk, a young anthropologist and journalist from the US. That chance encounter would change both of their lives forever. Levi soon discovered that Axel was no ordinary migrant. He was harboring a secret: Axel was a hacker. This secret would launch the two friends on a dangerous adventure far beyond what either of them could have imagined. While Axel’s abilities gave him an edge in a system that denied his existence, they would also ensnare him in a tangled underground network of human traffickers, corrupt priests, and anti-government guerillas eager to exploit his talents for their own ends. And along the way, Axel’s secret only raised more questions for Levi about his past. How had Axel learned to hack? What did he want? And was Axel really who he said he was? Border Hacker is at once an adventure saga—the story of a man who would do anything to return to his family, and the friend who would do anything to help him—and a profound parable about the violence of American immigration policy told through a single, extraordinary life.


Transformative Teachers

Transformative Teachers

Author: Kira J. Baker-Doyle

Publisher: Harvard Education Press

Published: 2021-03-04

Total Pages: 294

ISBN-13: 1682530345

DOWNLOAD EBOOK

cTransformative Teachers offers an insightful look at the growing movement of civic-minded educators who are using twenty-first-century participatory practices and connected technologies to organize change from the ground up. Kira J. Baker-Doyle highlights the collaborative, grassroots tactics that activist teachers are implementing to transform their profession and pursue greater social justice and equity in education. The author provides a framework and practical suggestions for charting the path to transformative teacher leadership as well as suggestions for how others, including administrators and outside organizations, can support them. In addition, the book profiles fifteen transformative teachers who are changing the face of education, features three case studies of organizational allies (Edcamps, the Philadelphia Education Fund, and the Connected Learning Alliance), and includes insights from a wide range of educational leaders. A guide to the norms and practices of innovative educators, Transformative Teachers offers a clear and compelling vision of the potential for grassroots change in education.


Hacker Culture A to Z

Hacker Culture A to Z

Author: Kim Crawley

Publisher: "O'Reilly Media, Inc."

Published: 2023-11-06

Total Pages: 291

ISBN-13: 1098145631

DOWNLOAD EBOOK

Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and surprising facts about familiar cultural touchstones. Understand the relationship between hacker culture and cybersecurity Get to know the ideas behind the hacker ethos, like "knowledge should be free" Explore topics and publications central to hacker culture, including 2600 Magazine Appreciate the history of cybersecurity Learn about key figures in the history of hacker culture Understand the difference between hackers and cybercriminals