Kill Process
Title | Kill Process PDF eBook |
Author | William Hertling |
Publisher | William Hertling |
Pages | 486 |
Release | 2016-07-15 |
Genre | Fiction |
ISBN |
By day, Angie, a twenty-year veteran of the tech industry, is a data analyst at Tomo, the world's largest social networking company; by night, she exploits her database access to profile domestic abusers and kill the worst of them. She can't change her own traumatic past, but she can save other women. When Tomo introduces a deceptive new product that preys on users’ fears to drive up its own revenue, Angie sees Tomo for what it really is—another evil abuser. Using her coding and hacking expertise, she decides to destroy Tomo by building a new social network that is completely distributed, compartmentalized, and unstoppable. If she succeeds, it will be the end of all centralized power in the Internet. But how can an anti-social, one-armed programmer with too many dark secrets succeed when the world’s largest tech company is out to crush her and a no-name government black ops agency sets a psychopath to look into her growing digital footprint? “Awesome, thrilling, and creepy: a fast-paced portrayal of the startup world, and the perils of our personal data and technical infrastructure in the wrong hands.” —Brad Feld, managing director of Foundry Group “His most ambitious work yet. A murder thriller about high tech surveillance and espionage in the startup world. Like the best of Tom Clancy and Barry Eisner.” —Gene Kim, author of The Phoenix Project “Explores the creation and effects of the templated self, the rise of structured identity and one-size-fits-all media culture, and feasible alternatives.” —Amber Case, author of Calm Technology
Process activity control command (kill)
Title | Process activity control command (kill) PDF eBook |
Author | Noite.pl |
Publisher | NOITE S.C. |
Pages | 12 |
Release | |
Genre | |
ISBN |
If pascifist knew who many processes I've killed ... With the knowledge learnt in the micro-course, Linux system administrator will be able to use more advanced commands to control the running in the system processes. By sending signals to processes one can order them to do selected tasks. A rebellious processes, well, you can always just kill them.
Kill Process
Title | Kill Process PDF eBook |
Author | William Hertling |
Publisher | |
Pages | 306 |
Release | 2016-06 |
Genre | |
ISBN | 9781533574169 |
By day, Angie, a twenty-year veteran of the tech industry, is a data analyst at Tomo, the world's largest social networking company; by night, she exploits her database access to profile domestic abusers and kill the worst of them. She can't change her own traumatic past, but she can save other women. When Tomo introduces a deceptive new product that preys on users' fears to drive up its own revenue, Angie sees Tomo for what it really is--another evil abuser. Using her coding and hacking expertise, she decides to destroy Tomo by building a new social network that is completely distributed, compartmentalized, and unstoppable. If she succeeds, it will be the end of all centralized power in the Internet. But how can an anti-social, one-armed programmer with too many dark secrets succeed when the world's largest tech company is out to crush her and a no-name government black ops agency sets a psychopath to look into her growing digital footprint?This Library Edition offers an alternative cover.
Unix Power Tools
Title | Unix Power Tools PDF eBook |
Author | Jerry Peek |
Publisher | "O'Reilly Media, Inc." |
Pages | 1156 |
Release | 2002-10-28 |
Genre | Computers |
ISBN | 0596550553 |
With the growing popularity of Linux and the advent of Darwin, Unix has metamorphosed into something new and exciting. No longer perceived as a difficult operating system, more and more users are discovering the advantages of Unix for the first time. But whether you are a newcomer or a Unix power user, you'll find yourself thumbing through the goldmine of information in the new edition of Unix Power Tools to add to your store of knowledge. Want to try something new? Check this book first, and you're sure to find a tip or trick that will prevent you from learning things the hard way.The latest edition of this best-selling favorite is loaded with advice about almost every aspect of Unix, covering all the new technologies that users need to know. In addition to vital information on Linux, Darwin, and BSD, Unix Power Tools 3rd Edition now offers more coverage of bash, zsh, and other new shells, along with discussions about modern utilities and applications. Several sections focus on security and Internet access. And there is a new chapter on access to Unix from Windows, addressing the heterogeneous nature of systems today. You'll also find expanded coverage of software installation and packaging, as well as basic information on Perl and Python.Unix Power Tools 3rd Edition is a browser's book...like a magazine that you don't read from start to finish, but leaf through repeatedly until you realize that you've read it all. Bursting with cross-references, interesting sidebars explore syntax or point out other directions for exploration, including relevant technical details that might not be immediately apparent. The book includes articles abstracted from other O'Reilly books, new information that highlights program tricks and gotchas, tips posted to the Net over the years, and other accumulated wisdom.Affectionately referred to by readers as "the" Unix book, UNIX Power Tools provides access to information every Unix user is going to need to know. It will help you think creatively about UNIX, and will help you get to the point where you can analyze your own problems. Your own solutions won't be far behind.
Title | PDF eBook |
Author | |
Publisher | IOS Press |
Pages | 4947 |
Release | |
Genre | |
ISBN |
Red Hat RHCSA 9 Cert Guide
Title | Red Hat RHCSA 9 Cert Guide PDF eBook |
Author | Sander van Vugt |
Publisher | Pearson IT Certification |
Pages | 1123 |
Release | 2023-04-27 |
Genre | Computers |
ISBN | 013809618X |
This is the eBook version of the print title. Learn, prepare, and practice for Red Hat RHCSA 9 (EX200) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning. Master Red Hat RHCSA 9 EX200 exam topics Assess your knowledge with chapter-ending quizzes and labs Review key concepts with exam-preparation tasks Practice with four unique practice tests Learn from two full hours of video training from the author's Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video Course Red Hat RHCSA 9 Cert Guide: EX200 is a comprehensive exam study guide. Leading Linux consultant, author, and instructor Sander van Vugt shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. The material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy, and chapter-ending Exam Preparation Tasks help you drill deep on key concepts you must know thoroughly to pass the exam. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. The companion website also contains two additional practice tests plus two full hours of personal video training from the author's Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video Course. Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time, including Basic system management: Installation, tools, file management, text files, RHEL9 connections, user/group management, permissions, and network configuration Operating running systems: Managing software, processes, storage, and advanced storage; working with Systemd; scheduling tasks; and configuring logging Advanced system administration: Managing the kernel and boot procedures, essential troubleshooting, bash shell scripting Managing network services: Configuring SSH, firewalls, and time services; managing Apache HTTP services and SE Linux; accessing network storage; and managing containers
Linux Security Cookbook
Title | Linux Security Cookbook PDF eBook |
Author | Daniel J. Barrett |
Publisher | "O'Reilly Media, Inc." |
Pages | 335 |
Release | 2003-06-02 |
Genre | Computers |
ISBN | 1449366767 |
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are: Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more Monitoring your network with tcpdump, dsniff, netstat, and other tools Protecting network connections with Secure Shell (SSH) and stunnel Safeguarding email sessions with Secure Sockets Layer (SSL) Encrypting files and email messages with GnuPG Probing your own security with password crackers, nmap, and handy scripts This cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.