Search Results - "Linux kernel"

Refine Results
  1. 1

    Advanced Infrastructure Penetration Testing : Defend your systems from methodized and proficient attackers. by Chebbi, Chiheb

    Published 2018
    Table of Contents: “…Jobs, cron, and crontabSecurity models; Security controls; Access control models; Linux attack vectors; Linux enumeration with LinEnum; OS detection with Nmap; Privilege escalation; Linux privilege checker; Linux kernel exploitation; UserLand versus kernel land; System calls; Linux kernel subsystems ; Process ; Threads; Security-Enhanced Linux ; Memory models and the address spaces ; Linux kernel vulnerabilities; NULL pointer dereference; Arbitrary kernel read/write ; Case study CVE-2016-2443 Qualcomm MSM debug fs kernel arbitrary write; Memory corruption vulnerabilities.…”
    Full text (MFA users only)
    Electronic eBook
  2. 2

    How Linux works : what every superuser should know by Ward, Brian, 1972-

    Published 2015
    Table of Contents: “…The big picture -- Basic commands and directory hierarchy -- Devices -- Disks and filesystems -- How the Linux kernel boots -- How user space starts -- System configuration: logging, system time, batch jobs, and users -- A closer look at processes and resource utilization -- Understanding your network and its configuration -- Network applications and services -- Introduction to shell scripts -- Moving files across the network -- User environments -- A brief survey of the Linux desktop -- Development tools -- Introduction to compiling software from C source code -- Building on the basics.…”
    Full text (MFA users only)
    Electronic eBook
  3. 3

    Linux All-In-One for Dummies. by Blum, Richard

    Published 2022
    Table of Contents: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- 1 Getting Started with Linux -- Chapter 1 Introducing Linux -- What Is Linux? -- The Linux kernel -- System memory management -- Software program management -- Hardware management -- GNU utilities -- Linux user interfaces -- The X Window system -- The KDE Plasma desktop -- The GNOME desktop -- The command-line interface -- Linux Distributions: Why So Many? …”
    Full text (MFA users only)
    Electronic eBook
  4. 4
  5. 5

    See MIPS Run. by Sweetman, Dominic

    Published 2006
    Table of Contents: “…MIPS Specific Issues in the Linux Kernel; Chapter 16. Linux Application Code, PIC, and Libraries; Appendix A. …”
    Full text (MFA users only)
    Electronic eBook
  6. 6
  7. 7
  8. 8
  9. 9

    CompTIA Linux+ and LPIC Practice Tests. by Ryan, Kevin E.

    Published 2017
    Table of Contents: “…Chapter 8 Essential System Services (Domain 108)Chapter 9 Networking Fundamentals (Domain 109); Chapter 10 Security (Domain 110); Part II LPIC-2; Chapter 11 Capacity Planning (Topic 200); Chapter 12 Linux Kernel (Topic 201); Chapter 13 System Startup (Topic 202); Chapter 14 Filesystems and Devices (Topic 203); Chapter 15 Advanced Storage Device Administration (Topic 204); Chapter 16 Networking Configuration (Topic 205); Chapter 17 System Maintenance (Topic 206); Chapter 18 Domain Name Server (Topic 207); Chapter 19 HTTP Services (Topic 208); Chapter 20 File Sharing (Topic 209).…”
    Full text (MFA users only)
    Electronic eBook
  10. 10

    Mastering Proxmox - Third Edition. by Ahmed, Wasim

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  11. 11

    Oracle SOA Suite 11g Performance Cookbook. by Brasier, Matthew

    Published 2013
    Table of Contents: “…Increasing the HTTP accept backlogReducing the server logging level; Finding out which JVM you are using; Using large pages in Linux; Increasing the number of file descriptors in Linux; Tuning the SOA Suite EJB timeouts; Upgrading to a newer JVM; Setting the Linux kernel swappiness to low; Using the Oracle JRockit JVM; Running your domain in the production mode; Creating a boot.properties file; Chapter 7: Data Sources and JMS; Introduction; Setting the data source pool sizes; Configuring data source testing; Configuring data source growing and shrinking.…”
    Full text (MFA users only)
    Electronic eBook
  12. 12
  13. 13

    Linux Command Line and Shell Scripting Bible. by Blum, Richard

    Published 2014
    Table of Contents: “…; Looking into the Linux kernel; System memory management; Software program management; Hardware management; Filesystem management; The GNU utilities; The core GNU utilities; The shell; The Linux desktop environment; The X Window system; The KDE desktop; The GNOME desktop; The Unity desktop; Other desktops; Linux Distributions; Core Linux distributions; Specialized Linux distributions; The Linux LiveCD; Summary; Chapter 2: Getting to the Shell; Reaching the Command Line.…”
    Full text (MFA users only)
    Electronic eBook
  14. 14
  15. 15

    Linux network servers by Hunt, Craig

    Published 2002
    Table of Contents: “…In SumChapter 13: Troubleshooting; Configuring the Linux Kernel; Troubleshooting a Network Server; Checking the Network Interface; Testing the Connection; Testing Routing; Analyzing Network Protocols; Testing Services; In Sum; Appendices; Appendix A: Installing Linux; Installation Planning; Booting the Installation Program; Partitioning the Disk; Installing the Software; In Sum; Appendix B: BIND Reference; named.conf Commands; Appendix C: The m4 Macros for sendmail; Local Code; DAEMON_OPTIONS; LDAP Mail Routing; Index…”
    Full text (MFA users only)
    Electronic eBook
  16. 16

    Mastering Proxmox - Second Edition by Ahmed, Wasim

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  17. 17

    Professional assembly language by Blum, Richard, 1962-

    Published 2005
    Table of Contents: “…Optimizing Floating-Point CalculationsSummary; Chapter 10: Working with Strings; Moving Strings; Storing and Loading Strings; Comparing Strings; Scanning Strings; Summary; Chapter 11: Using Functions; Defining Functions; Assembly Functions; Passing Data Values in C Style; Using Separate Function Files; Using Command-Line Parameters; Summary; Chapter 12: Using Linux System Calls; The Linux Kernel; System Calls; Using System Calls; Advanced System Call Return Values; Tracing System Calls; System Calls versus C Libraries; Summary; Chapter 13: Using Inline Assembly; What Is Inline Assembly?…”
    Full text (MFA users only)
    Electronic eBook
  18. 18

    Virtual networks : pluralistic approach for the next generation of Internet

    Published 2013
    Table of Contents: “…Overall performance -- linux kernel compilation; 1.4.6. Single virtual machine tests; 1.4.7. …”
    Full text (MFA users only)
    Electronic eBook
  19. 19

    Learning CoreOS. by S, Kingston Smiler, Agrawal, Shantanu

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  20. 20

    Software engineering for embedded systems : methods, practical techniques, and applications

    Published 2013
    Table of Contents: “…Note continued: Available techniques -- Static and dynamic analysis -- Requirements traceability -- Static analysis-adherence to a coding standard -- Essential knots & essential cyclomatic complexity -- case study -- Understanding dynamic analysis -- The legacy from high-integrity systems -- Defining unit, module and integration tests -- Defining structural coverage analysis -- Achieving code coverage with unit test and system test in tandem -- Retaining the functionality through regression test -- Unit test and test-driven development -- Automatically generating test cases -- Setting the standard -- The terminology of standards -- The evolution of a recognized process standard -- Freedom to choose adequate standards -- Dealing with the unusual -- Working with auto-generated code -- Working with legacy code -- Tracing requirements through to object code verification (OCV) -- Implementing a test solution environment -- Pragmatic considerations -- Considering the alternatives -- Summary and conclusions -- Introduction to debugging tools -- GDB debugging -- Configure the GDB debugger -- Starting GDB -- Compiling the application -- Debugging the application -- Examining data -- Using breakpoints -- Stepping -- Changing the program -- Analyzing core dumps -- Debug agent design -- Use cases -- Debug agent overview -- Starting the application -- Context switch -- Position-independent executables -- Debug event from the application -- Multicore -- Starting the debug agent -- Debugging using JTAG -- Benefits of using JTAG -- Board bring-up using JTAG -- Comparison with the debug agent -- GDB and JTAG -- Debugging tools using Eclipse and GDB -- Linux application debug with GDB -- Linux kernel debug with KGDB -- Instrumented code -- Practical example -- Analysis tools -- Strace -- Mtrace -- Vaigrind -- Hardware capabilities -- Hardware breakpoints -- Hardware watchpoints -- Debugging tips and tricks -- Part 1: Analysis and high-level design -- Analysis -- Improving serial performance -- Understand the application -- High-level design -- Parallel decomposition -- Data dependencies -- Communication and synchronization -- Load balancing -- Choice of algorithm -- Decomposition approaches -- Summary of Part 1 -- Part 2: Implementation and low-level design -- Thread-based implementations -- Kernel scheduling -- Pthreads -- Using PPthreads -- Dealing with thread safety -- Implementing synchronizations and mutual exclusion -- Mutexes, locks, nested locks -- Mutex -- Condition variables -- Granularity -- Fine-grained -- Coarse-grained -- Approach -- Implementing task parallelism -- Creation and join -- Parallel-pipeline computation -- Divide-and-conquer scheme -- Task scheduling considerations -- Thread pooling -- Affinity scheduling -- Event-based parallel programs -- Implementing loop parallelism -- Aligning computation and locality -- Message-passing implementations -- MCAPI -- MRAPI -- MCAPI and MRAPI in multicore systems -- Playing-card recognition and sorting example -- Using a hybrid approach -- References -- Introduction -- Which safety requirements? …”
    Full text (MFA users only)
    Electronic eBook