Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




Download 6,34 Mb.
Pdf ko'rish
bet203/203
Sana10.01.2024
Hajmi6,34 Mb.
#134102
1   ...   195   196   197   198   199   200   201   202   203
Bog'liq
Linux This Book Includes 4 Manuscripts The Underground Bible

Document Outline

  • Linux for Beginners
  • Introduction
  • Linux File System Structure
  • Links
  • The Path
  • Chapter 1: Basic Operating System Concepts
  • Chapter 1: Basic Operating System Concepts
  • The Concept Of The Operating System, Its Purpose, And Function
  • Classification Of Modern Operating Systems
  • Functional Components Of Operating Systems
  • I / O Management
  • File Management And File Systems
  • Network Support
  • Data security
  • User Interface
  • Conclusions
  • Chapter 2: Operating System Architecture
  • Chapter 2: Operating System Architecture
  • Basic Concepts Of Operating System Architecture
  • System Kernel - Privileged Mode And User Mode
  • Implementation Of Operating System Architecture
  • Monolithic Systems
  • Multilevel Systems
  • Micronucleus Systems
  • The Concept Of Virtual Machines
  • Architecture Features: UNIX and Linux
  • The Purpose Of The Linux Kernel And Its Features
  • Kernel Modules
  • Features Of System Libraries
  • User Application
  • Installation
  • System Configuration
  • Conclusions
  • Chapter 3: Process and Flow Management
  • Basic concepts of processes and flows
  • Process and Flow Models
  • Process and Flow Components
  • Process And Flow States
  • Description Of Processes And Flows
  • Managing Process And Flow Blocks
  • Process And Flow Images
  • Creating and Completing Processes and Threads
  • Managing Address Space When Creating Processes
  • Run The Application With One System Call
  • Features Of Process Completion
  • Synchronous And Asynchronous Execution Of Processes
  • Creating and Completing Streams
  • Features Completion Streams
  • Managing Processes In UNIX and Linux
  • Identification Information And Process Security Attributes
  • Process Control Unit
  • Creation Process
  • Completing The Process
  • Waiting For Process To Complete
  • 5/3 7 Alerts
  • Types Of Signals
  • Layout Of Signals
  • Signal Blocking
  • Setting The Signal Layout
  • Signal Generation
  • Organization Of Asynchronous Execution Of Processes
  • Managing Threads in Linux
  • The Disadvantages Of Traditional Multitasking Support For Linux
  • Linux Kernel Threads
  • The Flow Management Software Interface
  • Completion of POSIX Streams
  • Waiting For Completion Of Threads
  • Conclusions
  • Chapter 4: Process and Flow Planning
  • Chapter 4: Process and Flow Planning
  • General Principles Of Planning
  • Planning Mechanisms and Policy
  • Planning Principles
  • Types Of Planning
  • Long-Term Planning
  • Medium-Term Planning
  • Short-Term Planning
  • Planning Strategies - Displacement And Non-Displacement Multitasking
  • Planning Algorithms
  • FIFO Planning
  • Circular Planning
  • Priority Planning
  • Planning Based On Performance Characteristics
  • Multilevel Feedback Queues
  • Lottery Planning
  • Implementation Of Planning In Linux
  • Real-Time Scheduling Of Kernel Processes
  • Traditional Scheduling Algorithm
  • Planning Procedure Call Conditions
  • Planning Procedure
  • The Beginning Of A New Era
  • Dynamic Priority Calculation
  • Recounting A Quantum When Creating A New Process
  • Modern Approaches To Planning Implementation
  • The Programming Interface Of Planning
  • Conclusions
  • Chapter 5: Flow Interaction
  • Chapter 5: Flow Interaction
  • Basic Principles Of Flow Interaction
  • The Main Problems Of Flow Interaction
  • Critical Sections And Locks
  • Locking
  • Problems With Implementation Of Blocking
  • Basic Mechanisms Of Flow Synchronization
  • Semaphores
  • Features Of Use Of Semaphores
  • Realization Of The Problem Of Producers-Consumers With The Help Of Semaphores
  • Mutexes
  • Interprocess
  • Types Of Interprocess Interaction
  • Conclusions
  • Chapter 6: Managing Memory
  • Chapter 6: Managing Memory
  • Fundamentals of Virtual Memory Technology
  • The Concept Of Virtual Memory
  • Problems of virtual memory implementation: Memory fragmentation
  • Logical And Physical Memory Addressing
  • Approach Of Base And Boundary Registers
  • Memory Segmentation
  • Segmentation Implementation In IA-32 Architecture
  • Page Memory Organization
  • Basic Principles Of Page Organization Of Memory
  • Comparative Analysis Of Page Organization Of Memory And Segmentation
  • Multi-Level Page Tables
  • Implementation Of Page Tables In IA-32 Architecture
  • Associative Memory
  • Conclusion
  • Linux for Hackers
  • Introduction
  • Chapter 1: Preview of the Linux Operating SystemPreview of How Linux Works
  • Chapter 1: Preview of the Linux Operating SystemPreview of How Linux Works
  • Relationship Between the Applications, Hardware, and Kernels
  • Benefits of Using Linux
  • Chapter 2: Hacking and the Skills Hackers Need
  • Chapter 2: Hacking and the Skills Hackers Need
  • What is Hacking?
  • Types of Hacking Techniques and Precautions to Take
  • Hacking Skills with the Linux System
  • How to Protect Yourself When Hacking
  • Chapter 3: Linux Distributions and Backup File System
  • Chapter 3: Linux Distributions and Backup File System
  • How to Use the Linux Operating System
  • What is Linux Distribution?
  • Types of Linux Distributions
  • Directories in Linux
  • Backup Linux File Systems
  • Chapter 4: Text Manipulation
  • Chapter 4: Text Manipulation
  • How Linux is Useful in Text Manipulation
  • Why Use Text Manipulation
  • Top Seven Linux command Line tools for text manipulation
  • Managing networks
  • Dynamic host configuration protocol ( DHCP)
  • Process of hacking with kali Linux
  • Installation of Kali Linux
  • Storage management
  • Block storage
  • Chapter 5:Detailed Overview of Linux and How to Hack with Linux
  • Chapter 5:Detailed Overview of Linux and How to Hack with Linux
  • Chapter 5:Detailed Overview of Linux and How to Hack with Linux
  • How does Linux work?
  • How to hack and what you need
  • Python scripting for the hacker
  • Why is Kali Linux the best for starters
  • Bash scripting
  • Automatic tasks
  • Chapter 6:
  • Process of Web Hacking
  • Web hacking
  • Penetration testing
  • Conclusion
  • Hacking with Linux
  • Introduction
  • Chapter 1: Basic and Advanced Linux Concepts
  • Chapter 1: Basic and Advanced Linux Concepts
  • Advanced Linux Concepts
  • Chapter 2: Linux Installation
  • Chapter 2: Linux Installation
  • Kali Linux Installation Requirements
  • The Installation Process
  • Chapter 3: Bash and Python Scripting
  • Chapter 3: Bash and Python Scripting
  • Different Types of Hacking
  • How to be Secure and Anonymous while Hacking
  • Chapter 4: Ethical and Unethical Hacking
  • Chapter 4: Ethical and Unethical Hacking
  • Hackers Hierarchy (Using and Abusing Services)
  • Chapter 5: Servers and Networks
  • Chapter 5: Servers and Networks
  • Chapter 6: Cyber-attacks and Malware
  • Chapter 6: Cyber-attacks and Malware
  • Chapter 7: Cryptography
  • Chapter 7: Cryptography
  • Advantages of Cryptography
  • Types of Cryptography
  • Chapter 8: Wireless and Network Exploitation
  • Chapter 8: Wireless and Network Exploitation
  • The Dark Web Explained
  • Accessing the Dark Web
  • Conclusion
  • Hacking with Kali Linux
  • Chapter 1: Introduction to Linux and Hacking
  • Chapter 1: Introduction to Linux and Hacking
  • What is Linux?
  • Why is Linux the Best Operating System?
  • What is Hacking?
  • Who are Hackers?
  • Installation of Linux Distros
  • Chapter 2: Basic Linux Commands
  • Chapter 2: Basic Linux Commands
  • How to Find Help while Using Linux?
  • User Management in Linux
  • File Management in Linux
  • Process Management System
  • Chapter 3: Basic Shell Programming
  • Chapter 3: Basic Shell Programming
  • What is a Shell?
  • Built-in Shell Commands
  • Fundamentals of Shell Programming
  • Chapter 4: Hacking Procedure
  • Chapter 4: Hacking Procedure
  • Chapter 5: Web Hacking Tools
  • Chapter 5: Web Hacking Tools
  • Scanning of Webservers
  • Hacking a WordPress Website
  • Chapter 6:Network Hacking Tools
  • Chapter 6:Network Hacking Tools
  • What is a Network?
  • What is Routing?
  • Chapter 7: Web Hierarchies and Cybersecurity Ethics
  • Chapter 7: Web Hierarchies and Cybersecurity Ethics
  • Why Do Hackers Fit Into Hierarchies?
  • Cybersecurity Ethics
  • What is Penetration Testing?
  • Chapter 8: TOR & VPN in Linux
  • Chapter 8: TOR & VPN in Linux
  • How to Use the TOR Network in Kali Linux?
  • What is TOR?
  • Chapter 9: Advanced Kali Linux Hacking Tools
  • Chapter 9: Advanced Kali Linux Hacking Tools
  • Burp Suite
  • Metasploit
  • Conclusion

Download 6,34 Mb.
1   ...   195   196   197   198   199   200   201   202   203




Download 6,34 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

Download 6,34 Mb.
Pdf ko'rish