Author: ATTILA KOVACS
Narrator: Ryan Simpson
Unabridged: 1 hr 22 min
Format: Digital Audiobook
Publisher: Findaway Voices
Published: 02/13/2020
If you're looking to become more effective at working with the infrastructure that powers DevOps, web applications, Enterprise servers, or you just want to tighten your control over a few Linux machines, then this book is for you!
This book will introduce you to some of the basics of Linux system monitoring, optimization, network security, and encryption. You will also get your hands dirty managing users and groups, object permissions, port scanning, and understanding Docker containers.
Frequently Asked Questions
-Question: I don't have any Linux knowledge. Will this book help me?
-Answer: No. For this book you should already be comfortable with the basics of installing Linux, therefore you should start with Volume 1: How to Install the Linux OS, followed by Volume 2: 37 Linux Commands you Must Know.
-Question: I want to learn about User and Group Admin, will this book help me?
-Answer: Yes, Chapter 5 and 6 is all about Working with Users and Groups in Linux!
-Question: Are there any hands on practice scenarios in this book or just basic description of what Linux is?
-Answer: In each chapter there is a brief description of each scenario followed by step-by-step implementation using Linux CLI (Command Line Interface).
BUY THIS BOOK NOW, AND GET STARTED TODAY!
IN THIS AUDIOBOOK YOU WILL LEARN:
•Optimizing Linux
•Monitoring System Resources
•Introduction to System Process Management
•Process Priority Management
•Working with Users and Groups in Linux
•User and Group Administration
•Securing Your Linux Server
•Object Usability Extension
•Linux Server Hardening
•Data Encryption
•Docker and Linux Containers
•Accepting the Docker Ecosystem
•Docker Installation on Linux
BUY THIS AUDIOBOOK NOW, AND GET STARTED TODAY!
Do you want to know what Critical Responsibilities a Cybersecurity Specialist have?Do you want to know what tools and techniques are used in Cybersecurity?Do you want to know what daily tasks you must do to protect your Infrastructure?If the answer ...
If you are looking to get started with the Linux command line interface you've definitely come to the right place!Familiarizing yourself to the environment that powers the backbone of the production server universe is a great move. This book will co...
Women are turning up dead in the rural outskirts of Virginia, killed in grotesque ways, and when the FBI is called in, they are stumped. A serial killer is out there, his frequency increasing, and they know there is only one agent good enough to cra...
The Linux Command Line Beginner's Guide gives users new to Linux an introduction to the command line environment.In the Guide, you'll learn how to:-Copy, move, and delete files and directories.-Create, delete, and manage users.-Create, delete, and m...
This book will focus on social engineering techniques that are favourite of both, White Hat and Black Hat hackers.If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or da...
- Do you want learn how to build a PenTest Lab but you don't know where to start?- Do you want a practical audiobook that explains step-by-step how to get going?If the answer is yes to the above questions, this audiobook is for you!Frequently Asked ...
If you are looking to get started with the Linux command line interface you've definitely come to the right place!Familiarizing yourself to the environment that powers the backbone of the production server universe is a great move. This book will co...
“A MASTERPIECE OF THRILLER AND MYSTERY. Blake Pierce did a magnificent job developing characters with a psychological side so well described that we feel inside their minds, follow their fears and cheer for their success. Full of twists, this ...
Kali Linux is the most well known and high level infiltration testing Linux conveyance inside the online protection industry. Utilizing Kali Linux, a network protection expert will actually want to find and take advantage of different weaknesses and...