Best Linux Applications Books
Linux has a variety of operating systems with different features and functionalities. You can use Linux Distros on various hardware manufactured by IBM, Intel, HP, SPARC, etc.
1. 7th Grade Common Core Math: Daily Practice Workbook – Part I: Multiple Choice | 1000+ Practice Questions and Video Explanations | Argo Brothers (Common Core Math by ArgoPrep)
Author: by Argo Brothers
Published at: Argo Brothers Inc (January 5, 2019)
ISBN: 978-1946755568
This book is your comprehensive workbook for 7th Grade Common Core Math. By practicing and mastering this entire workbook, your child will become very familiar and comfortable with the state math exam and common core standards. This 7th Grade Common Core Math Workbook (Multiple Choice) includes:20 Weeks of Daily Multiple ChoiceWeekly AssessmentsState Aligned Common Core CurriculumEnd of Year Assessment This book has following topics covered:Week 1 – Rational numbersWeek 2 – Multiply/divide rational numbers, fractions and solve real-world word problemsWeek 3 – Add, subtract, factor and expand algebraic expressionsWeek 4 – Rewriting expressionsWeek 5 – Real-world word problemsWeek 6 – Writing your own equations and inequalitiesWeek 7 – Unit rates, ratios, proportionsWeek 8 – Percents (simple interest, tax, discount, markups)Week 9 – StatisticsWeek 10 – Comparing and understanding data setsWeek 11 – Measures of center and measures of variabilityWeek 12 – ProbabilityWeek 13 – Probability (continued)Week 14 – Probability: Compound eventsWeek 15 – Scale models and diagramsWeek 16 – Triangles and anglesWeek 17 – Geometry: Slicing three-dimensional figuresWeek 18 – Area and circumference of a circleWeek 19 – Supplementary, complementary, adjacent anglesWeek 20 – Volume and surface areaEnd of Year AssessmentFor practice with Free Response questions, be sure to check out Part II of our workbook titled:7th Grade Common Core Math: Daily Practice Workbook – Part II: Free Response | 1000+ Practice Questions and Video Explanations | Argo BrothersEach question is labeled with the specific common core standard so both parents and teachers can use this workbook for their student(s).
2. Upper Level ISEE: 1500+ Practice Questions
Author: by The Tutorverse
Published at: CreateSpace Independent Publishing Platform (September 5, 2015)
ISBN: 978-1515297352
Add Digital Practice & Mock Tests for 3,300+ Questions! Get access to an EXTRA 1,900+ practice questions made exclusively for online practice. Get 5 simulated practice tests AND question sets organized by topic.Visit www.Thetutorverse. Com/digital to start practicing. Live Online Tutoring & ClassesAce your upcoming ISEE with help from expert tutors.Visit www.Thetutorverse.
Com to learn more or enroll. 100% Multiple Choice QuestionsAsk your tutor – we still have the most realistic ISEE prep questions! The ISEE is a multiple-choice test – choose books like this that are modeled like the real test! 2022 Update – We have made revisions to correct for minor errata and to improve the organization of the book.
Not sure if you need the new edition? We can help you decide!Visit www.Thetutorverse. Com/books to open a ticket. The Upper Level ISEE can be a very challenging test. Extra practice can make all the difference between a good score and a great score.
That’s why this book has more questions than even 10 full-length exams – well over 1,500 practice questions dedicated only to the Upper Level ISEE. You won’t find any material in this book related to another test there’s no filler here! In this book you will find: Two full-length tests; a diagnostic test to help you pinpoint the areas in most need of improvement, and a practice test to help familiarize students with the real thing.
3. Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3rd Edition
Author: by Vijay Kumar Velu
Published at: Packt Publishing (January 30, 2019)
ISBN: 978-1789340563
School bulk orders can get up to 50% discount along with access to the industry’s leading UNIK LMS system, absolutely FREE! Contact us at 925-361-0573 or Practice online for free at Grade Common Core Math: Practice Workbook | Practice Questions, Answers & Explanations | Recommended by Teachers | Ace Academic Publishing Based on Common Core State Standards: Similar to a standardized exam, you can find questions of all types, including multiple-choice, fill-in-the-blank, true or false, match the correct answer and free-response questions.
High Standards of Questions: Each of these questions are divided into Chapters and Sub-Topics. The contents of this Math workbook include multiple chapters and units covering all the required Common Core Standards for this grade level. Recommended by Teachers: These carefully written questions aim to help students reason abstractly and quantitatively using various models, strategies, and problem-solving techniques.
Identifying trouble spots and fixing it: This workbook will help students overcome any deficiencies in their understanding of critical concepts and also will help you identify the specific topic that students may require additional practice. Practice all types of questions including free response: The book is comprised of multiple tests for each topic so that your child can have an abundant amount of test on the same topic.
5. Embedded Linux Systems with the Yocto Project (Pearson Open Source Software Development Series)
Author: by Rudolf Streif
Published at: Pearson; 1st edition (May 2, 2016)
ISBN: 978-0133443240
Build Complete Embedded Linux Systems Quickly and Reliably Developers are increasingly integrating Linux into their embedded systems: It supports virtually all hardware architectures and many peripherals, scales well, offers full source code, and requires no royalties. The Yocto Project makes it much easier to customize Linux for embedded systems.
If you’re a developer with working knowledge of Linux, Embedded Linux Systems with the Yocto Project will help you make the most of it. An indispensable companion to the official documentation, this guide starts by offering a solid grounding in the embedded Linux landscape and the challenges of creating custom distributions for embedded systems.
You’ll master the Yocto Project’s toolbox hands-on, by working through the entire development lifecycle with a variety of real-life examples that you can incorporate into your own projects. Author Rudolf Streif offers deep insight into Yocto Project’s build system and engine, and addresses advanced topics ranging from board support to compliance management.
6. Hacking for Beginners: A Step by Step Guide to Learn How to Hack Websites, Smartphones, Wireless Networks, Work with Social Engineering, Complete a Penetration Test, and Keep Your Computer Safe
Author: by Julian James McKinnon
Published at: Independently published (November 27, 2019)
ISBN: 978-1712448069
This Book has been revised and more Info has been added (January 2021)Hacking is a term most of us shudder away from, we assume that it is only for those who have lots of programming skills and lose morals and that it is too hard for us to learn how to use it.
But what if you could work with hacking like a good thing, as a way to protect your personal information and even the information of many customers for a large business? This guidebook is going to spend some time taking a look at the world of hacking, and some of the great techniques that come with this type of process as well.
Whether you are an unethical or ethical hacker, you will use a lot of the same techniques, and this guidebook is going to explore them in more detail along the way, turning you from a novice to a professional in no time.
Some of the different topics we will look at concerning hacking in this guidebook includes: The basics of hacking and some of the benefits of learning how to use this programming technique. The different types of hackers and why each one is important and how they are different from one another.
7. Professional Linux Kernel Architecture
Author: by Wolfgang Mauerer
Published at: Wrox; 1st edition (October 13, 2008)
ISBN: 978-0470343432
Find an introduction to the architecture, concepts and algorithms of the Linux kernel in Professional Linux Kernel Architecture, a guide to the kernel sources and large number of connections among subsystems. Find an introduction to the relevant structures and functions exported by the kernel to userland, understand the theoretical and conceptual aspects of the Linux kernel and Unix derivatives, and gain a deeper understanding of the kernel.
Learn how to reduce the vast amount of information contained in the kernel sources and obtain the skills necessary to understand the kernel sources.
8. Hands-On System Programming with Go: Build modern and concurrent applications for Unix and Linux systems using Golang
Author: by Alex Guerrieri
Published at: Packt Publishing (July 5, 2019)
ISBN: 978-1789804072
Explore the fundamentals of systems programming starting from kernel API and filesystem to network programming and process communications Key Features Learn how to write Unix and Linux system code in Golang v1. 12 Perform inter-process communication using pipes, message queues, shared memory, and semaphores Explore modern Go features such as goroutines and channels that facilitate systems programming Book Description System software and applications were largely created using low-level languages such as C or C++.
Go is a modern language that combines simplicity, concurrency, and performance, making it a good alternative for building system applications for Linux and macOS. This Go book introduces Unix and systems programming to help you understand the components the OS has to offer, ranging from the kernel API to the filesystem, and familiarize yourself with Go and its specifications.
You’ll also learn how to optimize input and output operations with files and streams of data, which are useful tools in building pseudo terminal applications. You’ll gain insights into how processes communicate with each other, and learn about processes and daemon control using signals, pipes, and exit codes.
9. Internetworking With Tcp/Ip: Client-Server Programming and Applications
Author: by Douglas E. Comer
Published at: Prentice Hall; 1st edition (August 1, 2000)
ISBN: 978-0130320711
Internetworking with TCP/IP, Volume III describes the fundamental concepts of client-server computing used to build all distributed computing systems, and presents an in-depth guide to the Posix sockets standard utilized by Linux and other operating systems.Dr. Douglas E.
Comer compares leading server designs, and describes the key tools and techniques used to build clients and servers, including Remote Procedure Call (RPC). The book contains examples of running programs that illustrate each approach. KEY TOPICS:Comer introduces the client-server model and its software design implications; the role of concurrent processing and threads; the Socket API, and differences that impact Linux programmers.
Understand the key algorithms and issues associated with client and server software design; then review three leading approaches: iterative, connectionless servers (UPD); and both iterative and concurrent connection-oriented servers (TCP). The book contains extensive coverage of threading, including a new chapter on using threads for concurrency; as well as coverage of single-threaded and multi-threaded concurrent servers.
10. Linux in Action
Author: by David Clinton
Published at: Manning Publications; 1st edition (September 16, 2018)
ISBN: 978-1617294938
SummaryLinux in Action is a task-based tutorial that will give you the skills and deep understanding you need to administer a Linux-based system. This hands-on book guides you through 12 real-world projects so you can practice as you learn. Each chapter ends with a review of best practices, new terms, and exercises.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the TechnologyYou can’t learn anything without getting your hands dirtyincluding Linux. Skills like securing files, folders, and servers, safely installing patches and applications, and managing a network are required for any serious user, including developers, administrators, and DevOps professionals.
With this hands-on tutorial, you’ll roll up your sleeves and learn Linux project by project. About the BookLinux in Action guides you through 12 real-world projects, including automating a backup-and-restore system, setting up a private Dropbox-style file cloud, and building your own MediaWiki server.
11. Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux – the ultimate white hat hackers' toolkit, 2nd Edition
Author: by Vijay Kumar Velu
Published at: Packt Publishing; 2nd Revised edition (June 30, 2017)
ISBN: 978-1787120235
A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration testers and hackers. About This BookEmploy advanced pentesting techniques with Kali Linux to build highly-secured systemsGet to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approachesSelect and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costsWho This Book Is ForPenetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.
Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title. What You Will LearnSelect and configure the most effective tools from Kali Linux to test network securityEmploy stealth to avoid detection in the network being testedRecognize when stealth attacks are being used against your networkExploit networks and data systems using wired and wireless networks as well as web servicesIdentify and download valuable data from target systemsMaintain access to compromised systemsUse social engineering to compromise the weakest part of the networkthe end usersIn DetailThis book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers.
12. Linux Device Driver Development Cookbook: Develop custom drivers for your embedded Linux applications
Author: by Rodolfo Giometti
Published at: Packt Publishing (May 31, 2019)
ISBN: 978-1838558802
Over 30 recipes to develop custom drivers for your embedded Linux applicationsKey FeaturesUse kernel facilities to develop powerful driversLearn core concepts for developing device drivers using a practical approachProgram a custom character device to get access to kernel internalsBook DescriptionLinux is a unified kernel that is widely used to develop embedded systems.
As Linux has turned out to be one of the most popular operating systems worldwide, the interest in developing proprietary device drivers has also increased. Device drivers play a critical role in how the system performs and ensure that the device works in the manner intended.
By exploring several examples on the development of character devices, the technique of managing a device tree, and how to use other kernel internals, such as interrupts, kernel timers, and wait queue, you’ll be able to add proper management for custom peripherals to your embedded system.
You’ll begin by installing the Linux kernel and then configuring it. Once you have installed the system, you will learn to use different kernel features and character drivers. You will also cover interrupts in-depth and understand how you can manage them.
13. SELinux System Administration: Implement mandatory access control to secure applications, users, and information flows on Linux, 3rd Edition
Author: by Sven Vermeulen
Published at: Packt Publishing; 3rd ed. edition (December 4, 2020)
ISBN: 978-1800201477
Enhance Linux security, application platforms, and virtualization solutions with SELinux 3 to work within your boundaries, your rules, and your policiesKey FeaturesLearn what SELinux is, and how it acts as a mandatory access control system on LinuxApply and tune SELinux enforcement to users, applications, platforms, and virtualization solutionsUse real-life examples and custom policies to strengthen the security posture of your systemsBook DescriptionLinux is a dominant player in many organizations and in the cloud.
Securing the Linux environment is extremely important for any organization, and Security-Enhanced Linux (SELinux) acts as an additional layer to Linux system security. SELinux System Administration covers basic SELinux concepts and shows you how to enhance Linux system protection measures.
You will get to grips with SELinux and understand how it is integrated. As you progress, you’ll get hands-on experience of tuning and configuring SELinux and integrating it into day-to-day administration tasks such as user management, network management, and application maintenance.
14. Linux for Embedded and Real-time Applications
Author: by Doug Abbott
Published at: Newnes; 4th edition (November 29, 2017)
ISBN: 978-0128112779
Linux for Embedded and Real-Time Applications, Fourth Edition, provides a practical introduction to the basics, covering the latest developments in this rapidly evolving technology. Ideal for those new to the use of Linux in an embedded environment, the book takes a hands-on approach that covers key concepts of building applications in a cross-development environment.
Hands-on exercises focus on the popular open source BeagleBone Black board. New content includes graphical programming with QT as well as expanded and updated material on projects such as Eclipse, BusyBox configuring and building, the U-Boot bootloader what it is, how it works, configuring and building, and new coverage of the Root file system and the latest updates on the Linux kernel..