EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Certified Kubernetes Security Specialist  CKS  Study Guide

Download or read book Certified Kubernetes Security Specialist CKS Study Guide written by Benjamin Muschko and published by "O'Reilly Media, Inc.". This book was released on 2023-06-08 with total page 214 pages. Available in PDF, EPUB and Kindle. Book excerpt: Vulnerabilities in software and IT infrastructure pose a major threat to organizations. In response, the Cloud Native Computing Foundation (CNCF) developed the Certified Kubernetes Security Specialist (CKS) certification to verify an administrator's proficiency to protect Kubernetes clusters and the cloud native software they contain. This practical book helps you fully prepare for the certification exam by walking you through all of the topics covered. Different from typical multiple-choice formats used by other certifications, this performance-based exam requires deep knowledge of the tasks it covers under intense time pressure. If you want to pass the CKS exam on the first go, author Benjamin Muschko shares his personal experience to help you learn the objectives, abilities, and tips and tricks you need to pass on the first attempt. Identify, mitigate, and/or minimize threats to cloud native applications and Kubernetes clusters Learn the ins and outs of Kubernetes's security features, and external tools for security detection and mitigation purposes Demonstrate competency to perform the responsibilities of a Kubernetes administrator or application developer with a security viewpoint Solve real-world Kubernetes problems in a hands-on, command-line environment Effectively navigate and solve questions during the CKS exam

Book Certified Kubernetes Security Specialist  Cks  Study Guide

Download or read book Certified Kubernetes Security Specialist Cks Study Guide written by Benjamin Muschko and published by . This book was released on 2023-07-25 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: Vulnerabilities in software and IT infrastructure pose a major threat to organizations. In response, the Cloud Native Computing Foundation (CNCF) developed the Certified Kubernetes Security Specialist (CKS) certification to verify an administrator's proficiency to protect Kubernetes clusters and the cloud native software they contain. This practical book helps you fully prepare for the certification exam by walking you through all of the topics covered. Different from typical multiple-choice formats used by other certifications, this performance-based exam requires deep knowledge of the tasks it covers under intense time pressure. If you want to pass the CKS exam on the first go, author Benjamin Muschko shares his personal experience to help you learn the objectives, abilities, and tips and tricks you need to pass on the first attempt. Identify, mitigate, and/or minimize threats to cloud native applications and Kubernetes clusters Learn the ins and outs of Kubernetes's security features, and external tools for security detection and mitigation purposes Demonstrate competency to perform the responsibilities of a Kubernetes administrator or application developer with a security viewpoint Solve real-world Kubernetes problems in a hands-on, command-line environment Effectively navigate and solve questions during the CKS exam

Book Certified Kubernetes Application Developer  CKAD  Study Guide

Download or read book Certified Kubernetes Application Developer CKAD Study Guide written by Benjamin Muschko and published by "O'Reilly Media, Inc.". This book was released on 2021-02-02 with total page 199 pages. Available in PDF, EPUB and Kindle. Book excerpt: Developers with the ability to operate, troubleshoot, and monitor applications in Kubernetes are in high demand today. To meet this need, the Cloud Native Computing Foundation created a certification exam to establish a developer's credibility and value in the job market to work in a Kubernetes environment. The Certified Kubernetes Application Developer (CKAD) exam is different from the typical multiple-choice format of other certifications. Instead, the CKAD is a performance-based exam that requires deep knowledge of the tasks under immense time pressure. This study guide walks you through all the topics you need to fully prepare for the exam. Author Benjamin Muschko also shares his personal experience with preparing for all aspects of the exam. Learn when and how to apply Kubernetes concepts to manage an application Understand the objectives, abilities, tips, and tricks needed to pass the CKAD exam Explore the ins and outs of the kubectl command-line tool Demonstrate competency for performing the responsibilities of a Kubernetes application developer Solve real-world Kubernetes problems in a hands-on command-line environment Navigate and solve questions during the CKAD exam

Book Container Security

    Book Details:
  • Author : Liz Rice
  • Publisher : O'Reilly Media
  • Release : 2020-04-06
  • ISBN : 1492056677
  • Pages : 201 pages

Download or read book Container Security written by Liz Rice and published by O'Reilly Media. This book was released on 2020-04-06 with total page 201 pages. Available in PDF, EPUB and Kindle. Book excerpt: To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions. Author Liz Rice, Chief Open Source Officer at Isovalent, looks at how the building blocks commonly used in container-based systems are constructed in Linux. You'll understand what's happening when you deploy containers and learn how to assess potential security risks that could affect your deployments. If you run container applications with kubectl or docker and use Linux command-line tools such as ps and grep, you're ready to get started. Explore attack vectors that affect container deployments Dive into the Linux constructs that underpin containers Examine measures for hardening containers Understand how misconfigurations can compromise container isolation Learn best practices for building container images Identify container images that have known software vulnerabilities Leverage secure connections between containers Use security tooling to prevent attacks on your deployment

Book Learn Kubernetes Security

Download or read book Learn Kubernetes Security written by Kaizhe Huang and published by Packt Publishing Ltd. This book was released on 2020-07-09 with total page 330 pages. Available in PDF, EPUB and Kindle. Book excerpt: Secure your container environment against cyberattacks and deliver robust deployments with this practical guide Key FeaturesExplore a variety of Kubernetes components that help you to prevent cyberattacksPerform effective resource management and monitoring with Prometheus and built-in Kubernetes toolsLearn techniques to prevent attackers from compromising applications and accessing resources for crypto-coin miningBook Description Kubernetes is an open source orchestration platform for managing containerized applications. Despite widespread adoption of the technology, DevOps engineers might be unaware of the pitfalls of containerized environments. With this comprehensive book, you'll learn how to use the different security integrations available on the Kubernetes platform to safeguard your deployments in a variety of scenarios. Learn Kubernetes Security starts by taking you through the Kubernetes architecture and the networking model. You'll then learn about the Kubernetes threat model and get to grips with securing clusters. Throughout the book, you'll cover various security aspects such as authentication, authorization, image scanning, and resource monitoring. As you advance, you'll learn about securing cluster components (the kube-apiserver, CoreDNS, and kubelet) and pods (hardening image, security context, and PodSecurityPolicy). With the help of hands-on examples, you'll also learn how to use open source tools such as Anchore, Prometheus, OPA, and Falco to protect your deployments. By the end of this Kubernetes book, you'll have gained a solid understanding of container security and be able to protect your clusters from cyberattacks and mitigate cybersecurity threats. What you will learnUnderstand the basics of Kubernetes architecture and networkingGain insights into different security integrations provided by the Kubernetes platformDelve into Kubernetes' threat modeling and security domainsExplore different security configurations from a variety of practical examplesGet to grips with using and deploying open source tools to protect your deploymentsDiscover techniques to mitigate or prevent known Kubernetes hacksWho this book is for This book is for security consultants, cloud administrators, system administrators, and DevOps engineers interested in securing their container deployments. If you're looking to secure your Kubernetes clusters and cloud-based deployments, you'll find this book useful. A basic understanding of cloud computing and containerization is necessary to make the most of this book.

Book Gradle in Action

    Book Details:
  • Author : Benjamin Muschko
  • Publisher : Simon and Schuster
  • Release : 2014-02-19
  • ISBN : 1638351724
  • Pages : 756 pages

Download or read book Gradle in Action written by Benjamin Muschko and published by Simon and Schuster. This book was released on 2014-02-19 with total page 756 pages. Available in PDF, EPUB and Kindle. Book excerpt: Summary Gradle in Action is a comprehensive guide to end-to-end project automation with Gradle. Starting with the basics, this practical, easy-to-read book discusses how to build a full-fledged, real-world project. Along the way, it touches on advanced topics like testing, continuous integration, and monitoring code quality. You'll also explore tasks like setting up your target environment and deploying your software. About the Technology Gradle is a general-purpose build automation tool. It extends the usage patterns established by its forerunners, Ant and Maven, and allows builds that are expressive, maintainable, and easy to understand. Using a flexible Groovy-based DSL, Gradle provides declarative and extendable language elements that let you model your project's needs the way you want. About the Book Gradle in Action is a comprehensive guide to end-to-end project automation with Gradle. Starting with the basics, this practical, easy-to-read book discusses how to establish an effective build process for a full-fledged, real-world project. Along the way, it covers advanced topics like testing, continuous integration, and monitoring code quality. You'll also explore tasks like setting up your target environment and deploying your software. The book assumes a basic background in Java, but no knowledge of Groovy. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. Whats Inside A comprehensive guide to Gradle Practical, real-world examples Transitioning from Ant and Maven In-depth plugin development Continuous delivery with Gradle About the Author Benjamin Muschko is a member of the Gradleware engineering team and the author of several popular Gradle plugins. Table of Contents PART 1 INTRODUCING GRADLE Introduction to project automation Next-generation builds with Gradle Building a Gradle project by example PART 2 MASTERING THE FUNDAMENTALS Build script essentials Dependency management Multiproject builds Testing with Gradle Extending Gradle Integration and migration PART 3 FROM BUILD TO DEPLOYMENT IDE support and tooling Building polyglot projects Code quality management and monitoring Continuous integration Artifact assembly and publishing Infrastructure provisioning and deployment

Book Kubernetes Security and Observability

Download or read book Kubernetes Security and Observability written by Brendan Creane and published by "O'Reilly Media, Inc.". This book was released on 2021-10-26 with total page 201 pages. Available in PDF, EPUB and Kindle. Book excerpt: Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to adopt a holistic security and observability strategy for building and securing cloud native applications running on Kubernetes. Whether you're already working on cloud native applications or are in the process of migrating to its architecture, this guide introduces key security and observability concepts and best practices to help you unleash the power of cloud native applications. Authors Brendan Creane and Amit Gupta from Tigera take you through the full breadth of new cloud native approaches for establishing security and observability for applications running on Kubernetes. Learn why you need a security and observability strategy for cloud native applications and determine your scope of coverage Understand key concepts behind the book's security and observability approach Explore the technology choices available to support this strategy Discover how to share security responsibilities across multiple teams or roles Learn how to architect Kubernetes security and observability for multicloud and hybrid environments

Book Certified Kubernetes Administrator  CKA  Study Guide

Download or read book Certified Kubernetes Administrator CKA Study Guide written by Benjamin Muschko and published by "O'Reilly Media, Inc.". This book was released on 2022-06-09 with total page 210 pages. Available in PDF, EPUB and Kindle. Book excerpt: The ability to administer and monitor a Kubernetes cluster is in high demand today. To meet this need, the Cloud Native Computing Foundation developed a certification exam to establish an administrator's credibility and value in the job market to confidently work in a Kubernetes environment. The Certified Kubernetes Administrator (CKA) certification exam is different from the typical multiple-choice format of other professional certifications. Instead, the CKA is a performance-based exam that requires deep knowledge of the tasks under immense time pressure. This study guide walks you through all the topics covered to fully prepare you for the exam. Author Benjamin Muschko also shares his personal experience with preparing for all aspects of the exam. Learn when and how to apply Kubernetes concepts to administer and troubleshoot a production-grade cluster Understand the objectives, abilities, and tips and tricks needed to pass the CKA exam Explore the ins and outs of the kubectl command-line tool Demonstrate competency to perform the responsibilities of a Kubernetes administrator Solve real-world Kubernetes problems in a hands-on command-line environment Effectively navigate and solve questions during the CKA exam

Book Docker Certified Associate  DCA   Exam Guide

Download or read book Docker Certified Associate DCA Exam Guide written by Francisco Javier Ramirez Urea and published by Packt Publishing Ltd. This book was released on 2020-09-28 with total page 598 pages. Available in PDF, EPUB and Kindle. Book excerpt: Pass the DCA exam and enhance your DevOps skills by achieving faster deployments, reduced downtime, and continuous integration and continuous delivery Key FeaturesStrengthen your knowledge of container fundamentals and exploit Docker networking, storage, and image managementLeverage Docker Swarm to deploy and scale applications in a clusterBuild your Docker skills with the help of sample questions and mock testsBook Description Developers have changed their deployment artifacts from application binaries to container images, and they now need to build container-based applications as containers are part of their new development workflow. This Docker book is designed to help you learn about the management and administrative tasks of the Containers as a Service (CaaS) platform. The book starts by getting you up and running with the key concepts of containers and microservices. You'll then cover different orchestration strategies and environments, along with exploring the Docker Enterprise platform. As you advance, the book will show you how to deploy secure, production-ready, container-based applications in Docker Enterprise environments. Later, you'll delve into each Docker Enterprise component and learn all about CaaS management. Throughout the book, you'll encounter important exam-specific topics, along with sample questions and detailed answers that will help you prepare effectively for the exam. By the end of this Docker containers book, you'll have learned how to efficiently deploy and manage container-based environments in production, and you will have the skills and knowledge you need to pass the DCA exam. What you will learnUnderstand the key concepts of containerization and its advantagesDiscover how to build secure images and run customized Docker containersExplore orchestration with Docker Swarm and KubernetesBecome well versed with networking and application publishing methodsUnderstand the Docker container runtime environment and customizationsDeploy services on Docker Enterprise with Universal Control PlaneGet to grips with effectively managing images using Docker Trusted RegistryWho this book is for If you are a system administrator, a developer, a DevOps engineer, or any professional interested in enhancing your career portfolio by gaining Docker certification, this book is for you. In order to understand container networking and the use of load balancers and proxies to provide a full-featured Containers-as-a-Service environment, Linux and Windows user knowledge with some networking skills will be necessary.

Book Certified Kubernetes Application Developer  CKAD  Study Guide

Download or read book Certified Kubernetes Application Developer CKAD Study Guide written by Benjamin Muschko and published by "O'Reilly Media, Inc.". This book was released on 2024-05-22 with total page 367 pages. Available in PDF, EPUB and Kindle. Book excerpt: Developers with the ability to operate, troubleshoot, and monitor applications in Kubernetes are in high demand today. To meet this need, the Cloud Native Computing Foundation created a certification exam to establish a developer's credibility and value in the job market for work in a Kubernetes environment. The Certified Kubernetes Application Developer (CKAD) exam format is different from the typical multiple-choice format of other certifications. Instead, the CKAD is performance-based and requires deep knowledge under immense time pressure. Updated to reflect revisions to the official curriculum made in September 2022, this revised study guide takes you through all the topics you need to fully prepare for the exam. Author Benjamin Muschko also shares his personal experience and tips. Learn when and how to apply Kubernetes's concepts to manage an application Understand the objectives, abilities, tips, and tricks needed to pass the CKAD exam Explore the ins and outs of the kubectl command-line tool Solve real-world Kubernetes problems in a hands-on command-line environment Navigate and solve questions during the CKAD exam New topics include: Deployment strategies, the Helm package manager, resources that extend Kubernetes (CRD), building container images, and more

Book Hackers   Painters

    Book Details:
  • Author : Paul Graham
  • Publisher : "O'Reilly Media, Inc."
  • Release : 2004-05-18
  • ISBN : 0596006624
  • Pages : 272 pages

Download or read book Hackers Painters written by Paul Graham and published by "O'Reilly Media, Inc.". This book was released on 2004-05-18 with total page 272 pages. Available in PDF, EPUB and Kindle. Book excerpt: The author examines issues such as the rightness of web-based applications, the programming language renaissance, spam filtering, the Open Source Movement, Internet startups and more. He also tells important stories about the kinds of people behind technical innovations, revealing their character and their craft.

Book  ISC 2 CCSP Certified Cloud Security Professional Official Practice Tests

Download or read book ISC 2 CCSP Certified Cloud Security Professional Official Practice Tests written by Ben Malisow and published by John Wiley & Sons. This book was released on 2020-01-27 with total page 400 pages. Available in PDF, EPUB and Kindle. Book excerpt: The only official CCSP practice test product endorsed by (ISC)2 With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the big day. These questions cover 100% of the CCSP exam domains, and include answers with full explanations to help you understand the reasoning and approach for each. Logical organization by domain allows you to practice only the areas you need to bring you up to par, without wasting precious time on topics you’ve already mastered. As the only official practice test product for the CCSP exam endorsed by (ISC)2, this essential resource is your best bet for gaining a thorough understanding of the topic. It also illustrates the relative importance of each domain, helping you plan your remaining study time so you can go into the exam fully confident in your knowledge. When you’re ready, two practice exams allow you to simulate the exam day experience and apply your own test-taking strategies with domains given in proportion to the real thing. The online learning environment and practice exams are the perfect way to prepare, and make your progress easy to track.

Book Kubernetes and Docker   An Enterprise Guide

Download or read book Kubernetes and Docker An Enterprise Guide written by Scott Surovich and published by Packt Publishing Ltd. This book was released on 2020-11-06 with total page 526 pages. Available in PDF, EPUB and Kindle. Book excerpt: Apply Kubernetes beyond the basics of Kubernetes clusters by implementing IAM using OIDC and Active Directory, Layer 4 load balancing using MetalLB, advanced service integration, security, auditing, and CI/CD Key Features Find out how to add enterprise features to a Kubernetes cluster with theory and exercises to guide you Understand advanced topics including load balancing, externalDNS, IDP integration, security, auditing, backup, and CI/CD Create development clusters for unique testing requirements, including running multiple clusters on a single server to simulate an enterprise environment Book DescriptionContainerization has changed the DevOps game completely, with Docker and Kubernetes playing important roles in altering the flow of app creation and deployment. This book will help you acquire the knowledge and tools required to integrate Kubernetes clusters in an enterprise environment. The book begins by introducing you to Docker and Kubernetes fundamentals, including a review of basic Kubernetes objects. You’ll then get to grips with containerization and understand its core functionalities, including how to create ephemeral multinode clusters using kind. As you make progress, you’ll learn about cluster architecture, Kubernetes cluster deployment, and cluster management, and get started with application deployment. Moving on, you’ll find out how to integrate your container to a cloud platform and integrate tools including MetalLB, externalDNS, OpenID connect (OIDC), pod security policies (PSPs), Open Policy Agent (OPA), Falco, and Velero. Finally, you will discover how to deploy an entire platform to the cloud using continuous integration and continuous delivery (CI/CD). By the end of this Kubernetes book, you will have learned how to create development clusters for testing applications and Kubernetes components, and be able to secure and audit a cluster by implementing various open-source solutions including OpenUnison, OPA, Falco, Kibana, and Velero.What you will learn Create a multinode Kubernetes cluster using kind Implement Ingress, MetalLB, and ExternalDNS Configure a cluster OIDC using impersonation Map enterprise authorization to Kubernetes Secure clusters using PSPs and OPA Enhance auditing using Falco and EFK Back up your workload for disaster recovery and cluster migration Deploy to a platform using Tekton, GitLab, and ArgoCD Who this book is for This book is for anyone interested in DevOps, containerization, and going beyond basic Kubernetes cluster deployments. DevOps engineers, developers, and system administrators looking to enhance their IT career paths will also find this book helpful. Although some prior experience with Docker and Kubernetes is recommended, this book includes a Kubernetes bootcamp that provides a description of Kubernetes objects to help you if you are new to the topic or need a refresher.

Book Certified Kubernetes Application Developer  CKAD  Study Guide  In Depth Guidance and Practice

Download or read book Certified Kubernetes Application Developer CKAD Study Guide In Depth Guidance and Practice written by Benjamin Muschko and published by . This book was released on 2021 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: Developers with the ability to operate, troubleshoot, and monitor applications in Kubernetes are in high demand today. To meet this need, the Cloud Native Computing Foundation created a certification exam to establish a developer's credibility and value in the job market to work in a Kubernetes environment. The Certified Kubernetes Application Developer (CKAD) exam is different from the typical multiple-choice format of other certifications. Instead, the CKAD is a performance-based exam that requires deep knowledge of the tasks under immense time pressure. This study guide walks you through all the topics you need to fully prepare for the exam. Author Benjamin Muschko also shares his personal experience with preparing for all aspects of the exam.

Book Kubernetes Secrets Handbook

Download or read book Kubernetes Secrets Handbook written by Emmanouil Gkatziouras and published by Packt Publishing Ltd. This book was released on 2024-01-31 with total page 294 pages. Available in PDF, EPUB and Kindle. Book excerpt: Gain hands-on skills in Kubernetes Secrets management, ensuring a comprehensive overview of the Secrets lifecycle and prioritizing adherence to regulatory standards and business sustainability Key Features Master Secrets encryption, encompassing complex life cycles, key rotation, access control, backup, and recovery Build your skills to audit Secrets consumption, troubleshoot, and optimize for efficiency and compliance Learn how to manage Secrets through real-world cases, strengthening your applications’ security posture Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionSecuring Secrets in containerized apps poses a significant challenge for Kubernetes IT professionals. This book tackles the critical task of safeguarding sensitive data, addressing the limitations of Kubernetes encryption, and establishing a robust Secrets management system for heightened security for Kubernetes. Starting with the fundamental Kubernetes architecture principles and how they apply to the design of Secrets management, this book delves into advanced Kubernetes concepts such as hands-on security, compliance, risk mitigation, disaster recovery, and backup strategies. With the help of practical, real-world guidance, you’ll learn how to mitigate risks and establish robust Secrets management as you explore different types of external secret stores, configure them in Kubernetes, and integrate them with existing Secrets management solutions. Further, you'll design, implement, and operate a secure method of managing sensitive payload by leveraging real use cases in an iterative process to enhance skills, practices, and analytical thinking, progressively strengthening the security posture with each solution. By the end of this book, you'll have a rock-solid Secrets management solution to run your business-critical applications in a hybrid multi-cloud scenario, addressing operational risks, compliance, and controls.What you will learn Explore Kubernetes Secrets, related API objects, and CRUD operations Understand the Kubernetes Secrets limitations, attack vectors, and mitigation strategies Explore encryption at rest and external secret stores Build and operate a production-grade solution with a focus on business continuity Integrate a Secrets Management solution in your CI/CD pipelines Conduct continuous assessments of the risks and vulnerabilities for each solution Draw insights from use cases implemented by large organizations Gain an overview of the latest and upcoming Secrets management trends Who this book is for This handbook is a comprehensive reference for IT professionals to design, implement, operate, and audit Secrets in applications and platforms running on Kubernetes. For developer, platform, and security teams experienced with containers, this Secrets management guide offers a progressive path—from foundations to implementation—with a security-first mindset. You’ll also find this book useful if you work with hybrid multi-cloud Kubernetes platforms for organizations concerned with governance and compliance requirements.

Book The Cybersecurity Manager s Guide

Download or read book The Cybersecurity Manager s Guide written by Todd Barnum and published by "O'Reilly Media, Inc.". This book was released on 2021-03-18 with total page 179 pages. Available in PDF, EPUB and Kindle. Book excerpt: If you're a leader in Cybersecurity, then you know it often seems like no one cares about--or understands--information security. Infosec professionals struggle to integrate security into their companies. Most are under resourced. Most are at odds with their organizations. There must be a better way. This essential manager's guide offers a new approach to building and maintaining an information security program that's both effective and easy to follow. Author and longtime infosec leader Todd Barnum upends the assumptions security professionals take for granted. CISOs, CSOs, CIOs, and IT security professionals will learn a simple seven-step process that will help you build a new program or improve your current program. Build better relationships with IT and other teams within your organization Align your role with your company's values, culture, and tolerance for information loss Lay the groundwork for your security program Create a communications program to share your team's contributions and educate your coworkers Transition security functions and responsibilities to other teams Organize and build an effective infosec team Measure your progress with two key metrics: your staff's ability to recognize and report security policy violations and phishing emails.

Book Cybersecurity Ops with bash

Download or read book Cybersecurity Ops with bash written by Paul Troncone and published by O'Reilly Media. This book was released on 2019-04-02 with total page 306 pages. Available in PDF, EPUB and Kindle. Book excerpt: If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash Cookbook (O’Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations. In four parts, security practitioners, administrators, and students will examine: Foundations: Principles of defense and offense, command-line and bash basics, and regular expressions Defensive security operations: Data collection and analysis, real-time log monitoring, and malware analysis Penetration testing: Script obfuscation and tools for command-line fuzzing and remote access Security administration: Users, groups, and permissions; device and software inventory