Categories
books

Modern Linux

Modern Linux Administration : How to Become A Cutting-Edge Linux Administrator
By Alapati, Sam R.
Book – 2017

Categories
books

Linux Administration

Linux Administration
A Beginner’s Guide
By Soyinka, Wale

Book – 2016

Categories
books

Pro Vim

Pro Vim
By McDonnell, Mark
Book – 2014

Categories
books

Linux Binary

Learning Linux Binary Analysis, Packt, 2016

Software security people will want to read this book on
binary analysis in areas of security, forensics, and antivirus.

Topics

  • the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • UNIX and Linux memory infections
  • ELF viruses
  • binary protection schemes
Categories
books

Networking All-in-one

Networking All-in-one for Dummies
By Lowe, Doug, 1959-
Book – 2016

How to set up a computer network, including installing network hardware, understanding protocols, using cloud services, configuring Windows Server 2016 reference, solving network problems, and managing Linux systems.

Categories
books

Security Strategies Linux

Security Strategies in Linux Platforms and Applications
By Jang, Michael
Book – 2015

Linux systems administrators will like this very readable book.

Contents:

  • Security threats to Linux
  • Basic components of Linux security
  • Starting Off: Getting Up and Running
  • User privileges and permissions
  • Filesystems, volumes, and encryption
  • Securing services
  • Networks, firewalls, and more
  • Networked filesystems and remote access
  • Networked application security
  • Kernel security risk mitigation
  • Managing security alerts and updates
  • Building and maintaining a security baseline
  • Testing and reporting
  • Detecting and responding to security breaches
  • Best practices and emerging technologies
Categories
books

Red Team Field Manual (RTFM)

RTFM Red Team Field Manual By Clark, Ben Book – 2013

What a strange little self published book. It will be useful to pen-testers and newbie crackers. Just 100 pages, listing command line tools that can be used to break in to remote servers.

For each tool, the basic syntax is presented, with almost no discussion. If you want more depth of understanding, Google will help you. Read and understand the (typically) 5-line scripts, and you will become expert at Bash, Powershell, and a few other system interpreters.

There is a section for Linux tools, and another for Windows tools. Then there are sections for Web, Databases, Programming, and Wireless.

Remember the pen-tester first rule: get permission before ‘exploring’ a remote server! The second rule: do not cause damage.

This book has no mention of some important pen-testing skills: how to negotiate a contract, and how to report the test results. The analysis phase could also fill a book.

Categories
books

Linux Administration

Linux Administration A Beginner’s Guide By Soyinka, Wale Book – 2015

Categories
books

Git in

Git in Practice
McQuaid, Mike
Book – 2015

Programmers will find Git to be powerful but complicated, like Linus’ other brainchild. This excellent book starts by explaining the concepts, and will quickly get you productive with Git.

Categories
books

Linux Bible

Linux Bible, Eighth edition, By Negus, Chris – 2015

Here is an updated version of the user and admin manual for Linux. You can enjoy many hours of poking through and trying out all the tools and packages discussed in this book. 800 pages.