Table of Contents for
Linux Basics for Hackers

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Linux Basics for Hackers by OccupyTheWeb . Published by No Starch Press, 2018
  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. About the Author
  6. About the Technical Reviewer
  7. BRIEF CONTENTS
  8. CONTENTS IN DETAIL
  9. ACKNOWLEDGMENTS
  10. INTRODUCTION
  11. 1 GETTING STARTED WITH THE BASICS
  12. 2 TEXT MANIPULATION
  13. 3 ANALYZING AND MANAGING NETWORKS
  14. 4 ADDING AND REMOVING SOFTWARE
  15. 5 CONTROLLING FILE AND DIRECTORY PERMISSIONS
  16. 6 PROCESS MANAGEMENT
  17. 7 MANAGING USER ENVIRONMENT VARIABLES
  18. 8 BASH SCRIPTING
  19. 9 COMPRESSING AND ARCHIVING
  20. 10 FILESYSTEM AND STORAGE DEVICE MANAGEMENT
  21. 11 THE LOGGING SYSTEM
  22. 12 USING AND ABUSING SERVICES
  23. 13 BECOMING SECURE AND ANONYMOUS
  24. 14 UNDERSTANDING AND INSPECTING WIRELESS NETWORKS
  25. 15 MANAGING THE LINUX KERNEL AND LOADABLE KERNEL MODULES
  26. 16 AUTOMATING TASKS WITH JOB SCHEDULING
  27. 17 PYTHON SCRIPTING BASICS FOR HACKERS
  28. INDEX
  29. Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
Prev Previous Chapter
About the Technical Reviewer
Next Next Chapter
CONTENTS IN DETAIL

BRIEF CONTENTS

Acknowledgments

Introduction

Chapter 1: Getting Started with the Basics

Chapter 2: Text Manipulation

Chapter 3: Analyzing and Managing Networks

Chapter 4: Adding and Removing Software

Chapter 5: Controlling File and Directory Permissions

Chapter 6: Process Management

Chapter 7: Managing User Environment Variables

Chapter 8: Bash Scripting

Chapter 9: Compressing and Archiving

Chapter 10: Filesystem and Storage Device Management

Chapter 11: The Logging System

Chapter 12: Using and Abusing Services

Chapter 13: Becoming Secure and Anonymous

Chapter 14: Understanding and Inspecting Wireless Networks

Chapter 15: Managing the Linux Kernel and Loadable Kernel Modules

Chapter 16: Automating Tasks with Job Scheduling

Chapter 17: Python Scripting Basics for Hackers

Index

Prev Previous Chapter
About the Technical Reviewer
Next Next Chapter
CONTENTS IN DETAIL
Back to top