وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

Linux Under the Hood, 2nd Edition

سرفصل های دوره

Introduction
  • 001. Linux Under the Hood Introduction
  • 002. Linux Under the Hood Introduction

  • Lesson 1 Core Linux Elements
  • 001. Learning objecties
  • 002. 1.1 System Space and User Space, and How They are Related
  • 003. 1.2 The Role of the Kernel
  • 004. 1.3 Why the Root User is Unrestricted
  • 005. 1.4 Driers, Kernel Modules, and Deice Files
  • 006. 1.5 Glibc
  • 007. 1.6 The Shell
  • 008. 1.7 File Descriptors
  • 009. Real-world Scenario Understanding the Root User

  • Lesson 2 The Linux Boot Procedure
  • 001. Learning objecties
  • 002. 2.1 The Boot Procedure from Firmware to Shell
  • 003. 2.2 System Firmware UEFI and BIOS
  • 004. 2.3 Managing UEFI Booting
  • 005. 2.4 Bootloaders
  • 006. 2.5 Where GRUB is Stored
  • 007. 2.6 Configuring GRUB2
  • 008. 2.7 Understanding and Modifying Initramfs
  • 009. 2.8 Serice Managers
  • 010. 2.9 Booting Cloud Linux Instances
  • 011. 2.10 Accessing an Early Boot Shell
  • 012. Real-world Scenario Recoering From a Lost MBR

  • Lesson 3 Looking Closer at the Kernel
  • 001. Learning objecties
  • 002. 3.1 Why Compiling Kernels isnt Necessary Anymore
  • 003. 3.2 Kernel Generic Interfaces
  • 004. 3.3 Managing and Tuning Kernel Modules
  • 005. 3.4 The proc Pseudo Filesystem
  • 006. 3.5 Using proc to get Detailed System Information
  • 007. 3.6 Reading Process Information in proc
  • 008. 3.7 Tuning the Kernel through procsys
  • 009. 3.8 Testing Critical Features with sysrq
  • 010. 3.9 Using Watchdogs
  • 011. 3.10 eBPF
  • 012. Real-world Scenario Automatically Recoering from System Hangs

  • Lesson 4 Systemd Taking Oer
  • 001. Learning objecties
  • 002. 4.1 Manually Starting Systemd
  • 003. 4.2 Systemd Unit Files
  • 004. 4.3 Tweaking Unit Files
  • 005. 4.4 Mounting Filesystems with Systemd
  • 006. 4.5 Using Sockets
  • 007. 4.6 Scheduling Processes with Timers
  • 008. 4.7 Analyzing Systemd Performance
  • 009. 4.8 Adanced Dependency Handling
  • 010. 4.9 Managing Resource Allocation Part 1
  • 011. 4.10 Managing Resource Allocation Part 2
  • 012. 4.11 Managing Resource Allocation Part 3
  • 013. 4.12 Creating Custom Units
  • 014. 4.13 Creating Custom Targets
  • 015. 4.14 Running User Processes in Systemd
  • 016. Real-world Scenario Booting without etcfstab

  • Lesson 5 Hardware Handling
  • 001. Learning objecties
  • 002. 5.1 Understanding Deice Nodes
  • 003. 5.2 Initializing Deices Automatically or Manually
  • 004. 5.3 Analyzing sysfs
  • 005. 5.4 Systemd-uded
  • 006. 5.5 Creating Ude Rules
  • 007. Real-world Scenario Denying Unauthorized Deices

  • Lesson 6 Storage Deices
  • 001. Learning objecties
  • 002. 6.1 Linux Storage Deices
  • 003. 6.2 Partitions MBR and GPT
  • 004. 6.3 Managing Partitions
  • 005. 6.4 Images and ISO Files
  • 006. 6.5 Understanding Flexible Storage Solutions
  • 007. 6.6 Managing LVM Logical Volumes
  • 008. 6.7 Using LVM Features
  • 009. 6.8 Deice Mapper
  • 010. 6.9 Manually Creating Deice Mapper Storage
  • 011. 6.10 LVM and VDO
  • 012. 6.11 Stratis
  • 013. 6.12 Creating Encrypted Deices
  • 014. 6.13 Booting from Encrypted Deices
  • 015. Real-world Scenario Creating a Hidden Storage Deice

  • Lesson 7 Filesystems
  • 001. Learning objecties
  • 002. 7.1 Filesystems and the VFS
  • 003. 7.2 About POSIX and non-POSIX Filesystems
  • 004. 7.3 Linux Filesystem Components
  • 005. 7.4 Inodes and Block Allocation
  • 006. 7.5 Sparse Files
  • 007. 7.6 FUSE Filesystems
  • 008. 7.7 Next-generation Filesystems
  • 009. 7.8 Running ZFS on Linux
  • 010. 7.9 Running Btrfs
  • 011. 7.10 Using the Ext Filesystem Debugger
  • 012. 7.11 Managing XFS IDs
  • 013. Real-world Scenario Exploring Cool Filsystem Tools

  • Lesson 8 Cloud and Datacenter Storage
  • 001. Learning objecties
  • 002. 8.1 Storage Challenges in Cloud and Datacenter
  • 003. 8.2 Working with SSD Media
  • 004. 8.3 Understanding iSCSI
  • 005. 8.4 Configuring iSCSI Storage
  • 006. 8.5 Connecting the Initiator
  • 007. 8.6 Object Storage
  • 008. 8.7 Configuring a Ceph Cluster
  • 009. 8.8 Configuring a Ceph Client
  • 010. Real-world Scenario Ceph in Kubernetes

  • Lesson 9 Memory Management
  • 001. Learning objecties
  • 002. 9.1 Linux Memory Allocation Virtual s. Physical Memory
  • 003. 9.2 Cache
  • 004. 9.3 Actie and Inactie Memory
  • 005. 9.4 The Need to Swap
  • 006. 9.5 Configuring and Monitoring Swap Space
  • 007. 9.6 Managing Huge Pages
  • 008. 9.7 Managing Dirty Cache
  • 009. 9.8 Out of Memory (OOM) and Dealing with it
  • 010. 9.9 Analyzing Kernel Memory
  • 011. Real-world Scenario Optimizing Memory Usage

  • Lesson 10 Processes
  • 001. Learning objecties
  • 002. 10.1 How a Process is Created
  • 003. 10.2 Processes and Threads
  • 004. 10.3 Killing a Zombie
  • 005. 10.4 Priorities, Schedulers, and Nice Values
  • 006. 10.5 Inter-process Communication, Sockets, Pipes, and More
  • 007. 10.6 Communicating on the D-Bus Message Interface
  • 008. 10.7 Monitoring IPC Usage
  • 009. Real-world Scenario Cgroups and Priorities

  • Lesson 11 Linux Commands and How They Work
  • 001. Learning objecties
  • 002. 11.1 Exploring What Happens When Commands are Executed
  • 003. 11.2 System Space and User Space
  • 004. 11.3 Understanding System Calls
  • 005. 11.4 How Processes get Access to System Calls
  • 006. 11.5 How Process Memory is Organized
  • 007. 11.6 Creating Processes
  • 008. 11.7 Allocating Memory
  • 009. 11.8 Accessing Libraries
  • 010. 11.9 Analyzing Library Usage
  • 011. Real-world Scenario Using exec for Troubleshooting

  • Lesson 12 Networking
  • 001. Learning objecties
  • 002. 12.1 Linux Network Deice Names
  • 003. 12.2 The OSI Model
  • 004. 12.3 Transforming Data into Packets
  • 005. 12.4 Analyzing Packet Headers
  • 006. 12.5 IP4 and IP6
  • 007. 12.6 How Linux Chooses a Network Interface
  • 008. 12.7 Analyzing and Optimizing Networking
  • 009. 12.8 Bonding and Teaming
  • 010. 12.9 Network Bridge Deices
  • 011. Real-world Scenario Scanning Packets for Security

  • Lesson 13 Containers are Linux, Linux is Containers
  • 001. Learning objecties
  • 002. 13.1 Running an Application on Linux
  • 003. 13.2 Running Applications in a Chroot Jail
  • 004. 13.3 Managing Linux Process Resource Allocation
  • 005. 13.4 Using unshare to run Namespaced Processes
  • 006. 13.5 Running Linux Applications with Namespaces and Cgroups
  • 007. 13.6 From Restricted Linux Applications to Containers
  • 008. 13.7 Container Runtimes
  • 009. 13.8 Systemd Containers
  • 010. 13.9 Containers and the Future of Linux
  • 011. Real-world Scenario Running Pure Linux Containers

  • Lesson 14 The Code Behind Linux
  • 001. Learning objecties
  • 002. 14.1 The C Programming Language
  • 003. 14.2 Working Together in Git
  • 004. 14.3 From Git Project to Linux Distributions
  • 005. 14.4 C Programs From Source Code to Binary
  • 006. 14.5 C and Libraries
  • 007. 14.6 Compiling a C Program from a Makefile
  • 008. Real-world Scenario Writing Your own Zombie

  • Module 1 Linux Architecture
  • 001. Module introduction

  • Module 2 Storage and Filesystems
  • 001. Module introduction

  • Module 3 Core Linux Components
  • 001. Module introduction

  • Module 4 Key Linux Components
  • 001. Module introduction

  • Summary
  • 001. Linux Under the Hood Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 38808
    حجم: 2470 مگابایت
    مدت زمان: 710 دقیقه
    تاریخ انتشار: ۱۰ مرداد ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید