A Desktop Quick Reference

Book Description:

Written by a leading developer and maintainer of the Linux kernel,Linux Kernel in a Nutshell is a comprehensiveoverview of kernel configuration and building, a critical task forLinux users and administrators.

No distribution can provide a Linux kernel that meets all users’needs. Computers big and small have special requirements that requirereconfiguring and rebuilding the kernel. Whether you are trying toget sound, wireless support, and power management working on a laptopor incorporating enterprise features such as logical volume managementon a large server, you can benefit from the insights in this book.

Linux Kernel in a Nutshell covers the entirerange of kernel tasks, starting with downloading the source and makingsure that the kernel is in sync with the versions of the tools youneed. In addition to configuration and installation steps, the bookoffers reference material and discussions of related topics such ascontrol of kernel options at runtime.

A key benefit of the book is a chapter on determining exactly what drivers are needed for your hardware. Also included are recipes thatlist what you need to do to accomplish a wide range of popular tasks.

A Desktop Quick Reference

Book Description:

The Tcl language and Tk graphical toolkit are simple and powerful building blocks for custom applications. The Tcl/Tk combination is increasingly popular because it lets you produce sophisticated graphical interfaces with a few easy commands, develop and change scripts quickly, and conveniently tie together existing utilities or programming libraries.One of the attractive features of Tcl/Tk is the wide variety of commands, many offering a wealth of options. Most of the things you’d like to do have been anticipated by the language’s creator, John Ousterhout, or one of the developers of Tcl/Tk’s many powerful extensions. Thus, you’ll find that a command or option probably exists to provide just what you need.And that’s why it’s valuable to have a quick reference that briefly describes every command and option in the core Tcl/Tk distribution as well as the most popular extensions. Keep this book on your desk as you write scripts, and you’ll be able to find almost instantly the particular option you need.Most chapters consist of alphabetical listings. Since Tk and mega-widget packages break down commands by widget, the chapters on these topics are organized by widget along with a section of core commands where appropriate. Contents include:

  • Core Tcl and Tk commands and Tk widgets
  • C interface (prototypes)
  • Expect
  • [incr Tcl] and [incr Tk]
  • Tix
  • TclX
  • BLT
  • Oratcl, SybTcl, and Tclodbc

Get to grips with managing your Apple devices and content, easily and automatically with iCloud

Book Description:

iCloud is a cloud storage and cloud computing service from Apple Inc. iCloud is a hub in a multi-devices environment, that allows your iPads, iPhones, iPod Touches, and Macs sync with each other and always have the same content. The service allows users to store data, such as music files, on remote computer servers that can be downloaded to multiple devices such as iOS-based devices, and personal computers running OS X or Microsoft Windows.

This practical guide provides easy, step-by-step guidance to using the numerous features offered by iCloud, for first time users You will be guided through everything that you need to know about using iCloud on multiple platforms, as well as how to use it on a Windows PC.

Learn about what iCloud can offer you with this practical guide, and what makes it better than other cloud services. It will take you through all of the iCloud services available, and help you to manage your contents easily across devices.

You will also learn how to use Mail, Contacts, Calendar, and other iCloud services on Mac, PC, iOS devices or in the web browser. This book will also let you explore more on using iPhone and iTunes with iCloud, sync all contents without any hassle, and even back them up with iCloud. If you want to take full advantage of iCloud, then this is the right book for you.

What you will learn from this book

  • Sign up for iCloud using Apple ID
  • Setup iCloud on Mac, PC, and iOS devices
  • Migrate contents from MobileMe to iCloud
  • Use Mail, Contacts, and Calendar and manage their contents
  • Configure iMessage, using Notes and Reminders
  • Create a shared Photo Stream on supported devices
  • Manage purchased contents on iTunes, including iTunes Match
  • Sync contents with iCloud, including documents and bookmarks
  • Explore more iCloud apps and iCloud.com
  • Back up devices easily to iCloud
  • Operate iCloud with OS X and Windows PC

Approach

An easy-to-use guide, filled with tutorials that will teach you how to set up and use iCloud, and profit from all of its marvellous features.

Who this book is written for

This book is for anyone with basic knowledge of computers and mobile operations. Prior knowledge of cloud computing or iCloud is not expected.

Writing Automated UI Tests

Book Description:

Write Android user interface (UI) tests using Google Espresso for Android. You’ll cover all the major topics of writing functional UI automated tests using the Espresso testing framework, including different ways of running automated tests, architecting test projects in an easy and maintainable way, and using tools which help to implement automated tests with less effort.

Android Espresso Revealed explains the basics of using Espresso to write automated UI tests, and how to customize the framework for advanced functionality. The author provides examples in both Java and Kotlin, and includes dealing with network operations in UI tests, testing application accessibility, implementing supervised monkey tests, and more.

What You Will Learn

  • Write Espresso tests with both Kotlin and Java including test project migration from Java to Kotlin
  • Test web views inside the application under test
  • Use Espresso to set up test devices or emulators to minimize test flakiness and run tests in Firebase Test Lab
  • Verify and stub intents with Espresso-Intents
  • Move test projects to AndroidX
  • Test notifications or operate on third-party apps during Espresso test execution
  • Apply different test architecture approaches to the test project to reduce maintenance effort
  • Implement supervised monkey tests using Espresso and UIAutomator
Who This Book Is For

Engineers with experience of Android test automation will benefit from this book

A detailed and practical guide to DNS implementation, configuration, and administration

Book Description:

What This Book Covers

Chapter 1 begins to explain basic DNS principles. It introduces essential names, for example,domain and zone, explaining the difference between them. It describes the iteration principle by which the DNS translates names to IP addresses. It presents a configuration of a resolver both for UNIX and for Windows. The end of the chapter explains name server principles and describes various name server types.
Chapter 2 is fully focused on the most basic DNS procedure, the DNS query. Through this procedure, the DNS translates names to IP addresses. In the very beginning, however, this chapter describes in detail the Resource Record structure. At the end of this chapter, many practical examples of DNS exchanges are listed.
Chapter 3 deals with other DNS procedures (DNS Extensions), i.e., DNS Update, DNS Notify, incremental zone transfer, negative caching, IPv6 Extensions, IPsec, and TSIG.
Chapter 4 talks about the DNS implementation. It is derived from its historical evolution. From the historical point of view, the oldest DNS implementation that is still sometimes used is BIND version 4. This implementation is very simple so it is suitable to describe basic principles with it. Next, the new generations of BIND are discussed followed by the Windows 2000 implementation.
Chapter 5 discusses the tools for debugging DNS such as nslookup, dnswalk, and dig, how to control a name server using the rndc program, and the common errors that might occur while configuring DNS.
Chapter 6 deals with the creation of DNS domains (domain delegation) and with the procedure of domain registration.

Book Description:

In Starting Out with App Inventor for Android, Tony Gaddis and Rebecca Halsey teach the fundamentals of programming while simultaneously showing students how to create fun, useful, and imaginative apps. Because App Inventor allows students to create apps and see them running on a phone, programming becomes a personally meaningful skill.

The Missing Manual: The book that should have been in the box

Book Description:

With Sierra, Apple brings never-before-seen features to macOS—like Siri voice control, file sharing across all your iOS devices, picture-in-picture mode for iTunes and Safari, and AI photo search. Once again, David Pogue brings his humor and expertise to the #1 bestselling Mac book.

Whether you’re a developer or a home-user, this guide offers a wealth of detail on Apple’s OS X 10.12 operating system, this new edition covers everything Sierra has to offer.

  • Perfect for newcomers. Get crystal-clear, jargon-free introduction to the Dock, the macOS folder structure, Safari, Mail, and iCloud.
  • Go in-depth. Learn how to use key new features such as Optimized Storage, the Universal Clipboard, Siri for Mac, and iCloud Drive Sync.
  • Get the full story. David Pogue doesn’t stop at telling you how to use macOS features. He wants you to know why to use them—and how to avoid common pitfalls.

A Project-based Introduction to Linux

Book Description:

Ubuntu brings Linux to the masses, but it can still be intimidating for newbies, neophytes, and geeks-in-training. With Ubuntu Made Easy by your side you’ll be ready to face any challenge, and you’ll discover just how fun Linux can be.Packed with tips, tricks, and helpful pointers, Ubuntu Made Easy will get you up and running with the world’s most popular free operating system. Authors Rickford Grant and Phil Bull walk you through common tasks like installing and playing games, accessing your favorite social networks, troubleshooting hardware and software problems, interacting with your Windows installation, and more.With the help of the book’s straightforward explanations and step-by-step projects, you’ll also learn how to: Set up printers, scanners, USB flash drives, and other hardware Install and play free games like Frets on Fire and Frozen Bubble as well as commercial hits like Braid and World of Goo Watch DVDs, lis

Leverage the power of digital forensics for Windows systems

Book Description:

Over the last few years, the wave of the cybercrime has risen rapidly. We have witnessed many major attacks on the governmental, military, financial, and media sectors. Tracking all these attacks and crimes requires a deep understanding of operating system operations, how to extract evident data from digital evidence, and the best usage of the digital forensic tools and techniques. Regardless of your level of experience in the field of information security in general, this book will fully introduce you to digital forensics. It will provide you with the knowledge needed to assemble different types of evidence effectively, and walk you through the various stages of the analysis process.

We start by discussing the principles of the digital forensics process and move on to show you the approaches that are used to conduct analysis. We will then study various tools to perform live analysis, and go through different techniques to analyze volatile and non-volatile data.

Who This Book Is For

This book targets forensic analysts and professionals who would like to develop skills in digital forensic analysis for the Windows platform. You will acquire proficiency, knowledge, and core skills to undertake forensic analysis of digital data.

Prior experience of information security and forensic analysis would be helpful. You will gain knowledge and an understanding of performing forensic analysis with tools especially built for the Windows platform.

What You Will Learn

  • Perform live analysis on victim or suspect Windows systems locally or remotely
  • Understand the different natures and acquisition techniques of volatile and non-volatile data.
  • Create a timeline of all the system actions to restore the history of an incident.
  • Recover and analyze data from FAT and NTFS file systems.
  • Make use of various tools to perform registry analysis.
  • Track a system user’s browser and e-mail activities to prove or refute some hypotheses.
  • Get to know how to dump and analyze computer memory.

Book Description:

*Imparts good security doctrine, methodology, and strategies

*Each application-focused chapter will be able to be used as a stand-alone HOW-TO for that particular application.

*Offers users a selection of resources (websites, mailing lists, and books) to further their knowledge.

Book Description:

Discover the power of Java™ for developing applications today when you trust the engaging, hands-on approach in Farrell’s JAVA PROGRAMMING, 9E. Even if you’re a first-time programmer, JAVA PROGRAMMING can show you how to quickly start developing useful programs, all while still mastering the basic principles of structured and object-oriented programming. Unique, reader-friendly explanations and meaningful programming exercises emphasize business applications and game creation while useful debugging exercises and contemporary case problems further expand your understanding. Additional digital learning resources within MindTap provide interactive learning tools as well as coding IDE (Integrated Development Environment) labs for practicing and expanding your skills.

Book Description:

Linux can be configured as a networked workstation, a DNS server, a mail server, a firewall, a gateway router, and many other things. These are all part of administration tasks, hence network administration is one of the main tasks of Linux system administration. By knowing how to configure system network interfaces in a reliable and optimal manner, Linux administrators can deploy and configure several network services including file, web, mail, and servers while working in large enterprise environments.

Starting with a simple Linux router that passes traffic between two private networks, you will see how to enable NAT on the router in order to allow Internet access from the network, and will also enable DHCP on the network to ease configuration of client systems. You will then move on to configuring your own DNS server on your local network using bind9 and tying it into your DHCP server to allow automatic configuration of local hostnames. You will then future enable your network by setting up IPv6 via tunnel providers.

Moving on, we’ll configure Samba to centralize authentication for your network services; we will also configure Linux client to leverage it for authentication, and set up a RADIUS server that uses the directory server for authentication.

Toward the end, you will have a network with a number of services running on it, and will implement monitoring in order to detect problems as they occur.

What you will learn

  • Route an IPv6 netblock to your local network
  • Modify your named instance to support setting hostnames for your IPv6 addresses
  • Use SSH for remote console access
  • Configure NGINX with TLS
  • Secure XMPP with TLS
  • Leverage iptables6 to firewall your IPv6 traffic
  • Configure Samba as an Active Directory compatible directory service

Configuring, Securing and Integrating Directory Services

Book Description:

This book is the ideal introduction to using OpenLDAP for Application Developers and will also benefit System Administrators running OpenLDAP. It prepares the reader to build a directory using OpenLDAP, and then employ this directory in the context of the network, taking a practical approach that emphasizes how to get things done. On occasion, it delves into theoretical aspects of LDAP, but only where understanding the theory helps to answer practical questions. The reader requires no knowledge of OpenLDAP, but even readers already familiar with the technology will find new things and techniques. The target audience will require basic Linux system administration knowledge, but no prior knowledge of LDAP or OpenLDAP is assumed. If you are web savvy and are interested in using OpenLDAP for web applications and services like client interaction then this is the book for you.

Book Description:

Pro tips for macOS from “Dr. Mac”

Your shiny new iMac or trusty old MacBook both rely on macOS to help you get things done. It helps to have an equally reliable guidebook to steer you through the tasks and steps that make macOS run efficiently.

This fun and friendly guide provides the direction you need to easily navigate macOS. Longtime expert Bob “Dr. Mac” LeVitus shares his years of experience to help you better understand macOS and make it a timesaving tool in your life.

  • Take a tour of the macOS interface
  • Get organized and save time with macOS applications
  • Get pro tips on speeding up your Mac
  • Back up your data with ease

Covering the fundamentals of the OS and offering insight into the most common functions of macOS, this is indispensable reading for new or inexperienced macOS users.

Getting Started with Networking, Scripting, and Security in Kali

Book Description:

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.

If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you’ll learn the basics of using the Linux operating system and acquire the tools and techniques you’ll need to take control of a Linux environment.

First, you’ll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you’ll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You’ll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to:

– Cover your tracks by changing your network information and manipulating the rsyslog logging utility
– Write a tool to scan for network connections, and connect and listen to wireless networks
– Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email
– Write a bash script to scan open ports for potential targets
– Use and abuse services like MySQL, Apache web server, and OpenSSH
– Build your own hacking tools, such as a remote video spy camera and a password cracker

Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Book Description:

Linux in Action is a task-based tutorial that will give you the skills and deep understanding you need to administer a Linux-based system. This hands-on book guides you through 12 real-world projects so you can practice as you learn. Each chapter ends with a review of best practices, new terms, and exercises.

Including Container-Based Deployment with Docker and Kubernetes

Book Description:

Get SQL Server up and running on the Linux operating system and containers. No database professional managing or developing SQL Server on Linux will want to be without this deep and authoritative guide by one of the most respected experts on SQL Server in the industry. Get an inside look at how SQL Server for Linux works through the eyes of an engineer on the team that made it possible.

Microsoft SQL Server is one of the leading database platforms in the industry, and SQL Server 2017 offers developers and administrators the ability to run a database management system on Linux, offering proven support for enterprise-level features and without onerous licensing terms. Organizations invested in Microsoft and open source technologies are now able to run a unified database platform across all their operating system investments. Organizations are further able to take full advantage of containerization through popular platforms such as Docker and Kubernetes.

Pro SQL Server on Linux walks you through installing and configuring SQL Server on the Linux platform. The author is one of the principal architects of SQL Server for Linux, and brings a corresponding depth of knowledge that no database professional or developer on Linux will want to be without. Throughout this book are internals of how SQL Server on Linux works including an in depth look at the innovative architecture.

The book covers day-to-day management and troubleshooting, including diagnostics and monitoring, the use of containers to manage deployments, and the use of self-tuning and the in-memory capabilities. Also covered are performance capabilities, high availability, and disaster recovery along with security and encryption. The book covers the product-specific knowledge to bring SQL Server and its powerful features to life on the Linux platform, including coverage of containerization through Docker and Kubernetes.

What You’ll Learn

  • Learn about the history and internal of the unique SQL Server on Linux architecture.
  • Install and configure Microsoft’s flagship database product on the Linux platform
  • Manage your deployments using container technology through Docker and Kubernetes
  • Know the basics of building databases, the T-SQL language, and developing applications against SQL Server on Linux
  • Use tools and features to diagnose, manage, and monitor SQL Server on Linux
  • Scale your application by learning the performance capabilities of SQL Server
  • Deliver high availability and disaster recovery to ensure business continuity
  • Secure your database from attack, and protect sensitive data through encryption
  • Take advantage of powerful features such as Failover Clusters, Availability Groups, In-Memory Support, and SQL Server’s Self-Tuning Engine
  • Learn how to migrate your database from older releases of SQL Server and other database platforms such as Oracle and PostgreSQL
  • Build and maintain schemas, and perform management tasks from both GUI and command line
Who This Book Is For

Developers and IT professionals who are new to SQL Server and wish to configure it on the Linux operating system. This book is also useful to those familiar with SQL Server on Windows who want to learn the unique aspects of managing SQL Server on the Linux platform and Docker containers. Readers should have a grasp of relational database concepts and be comfortable with the SQL language.

Book Description:

Outsmart your new Android

Getting a smartphone or tablet can be intimidating for anyone, but this user-friendly guide is here to help you to get the most out of all your new gadget has to offer! Whether you’re upgrading from an older model or totally new to the awesome world of Androids, this book makes it easier than ever to get up and running with the latest technology.

From setup and configuration to taking advantage of all those intricate bells and whistles, Android Phones & Tablets For Dummies helps you unleash everything your Android can do for you. If you’re looking to use your phone or tablet for texting, emailing, accessing the Internet, or anything in between, you’ll want to keep this go-to reference close by every step of the way.

•    Make sense of the phone features

•    Find your way around with navigation

•    Capture moments on the camera

•    Seamlessly sync with a PC or Mac

Who needs a headache when dealing with a new device? This book makes it totally pain free!

Up and Running: Upgrading, Installing, and Optimizing Windows Server 2012

Book Description:

If your organization plans to move to a cloud infrastructure from a LAN or WAN, this book shows you how to do it efficiently with Windows Server 2012. Experienced Windows administrators will learn how to deploy, configure, and manage the server’s expanded capabilities and features step-by-step, using clear examples and numerous screen shots. You’ll also discover how to integrate employees’ private mobile devices into your corporate network.

Whether you intend to take your infrastructure to a public, private, or hybrid cloud environment, Windows Server 2012 provides the virtualization technology to get you there. This book helps you put it to work.

  • Control your entire Windows infrastructure from the Server Manager console
  • Learn how Active Directory Domain Services provide more centralized network administration
  • Use Dynamic Access Control to manage data and user permissions
  • Provide data integrity and fault tolerance with Storage Spaces and ReFS
  • Gain robust management of virtual environments with Hyper V R3
  • Master networking tools such as IPAM to help you move to the cloud
  • Connect clients to network resources through Unified Remote Access

Book Description:

Stop hackers before they hack you!

In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks.

Whether you’re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently—with confidence and ease.

  • Get up to speed on Windows 10 hacks
  • Learn about the latest mobile computing hacks
  • Get free testing tools
  • Find out about new system updates and improvements

There’s no such thing as being too safe—and this resourceful guide helps ensure you’re protected.