وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Linux Under the Hood, 2nd Edition

سرفصل های دوره

Introduction
  • 001. Linux Under the Hood Introduction
  • 002. Linux Under the Hood Introduction

  • Lesson 1 Core Linux Elements
  • 001. Learning objecties
  • 002. 1.1 System Space and User Space, and How They are Related
  • 003. 1.2 The Role of the Kernel
  • 004. 1.3 Why the Root User is Unrestricted
  • 005. 1.4 Driers, Kernel Modules, and Deice Files
  • 006. 1.5 Glibc
  • 007. 1.6 The Shell
  • 008. 1.7 File Descriptors
  • 009. Real-world Scenario Understanding the Root User

  • Lesson 2 The Linux Boot Procedure
  • 001. Learning objecties
  • 002. 2.1 The Boot Procedure from Firmware to Shell
  • 003. 2.2 System Firmware UEFI and BIOS
  • 004. 2.3 Managing UEFI Booting
  • 005. 2.4 Bootloaders
  • 006. 2.5 Where GRUB is Stored
  • 007. 2.6 Configuring GRUB2
  • 008. 2.7 Understanding and Modifying Initramfs
  • 009. 2.8 Serice Managers
  • 010. 2.9 Booting Cloud Linux Instances
  • 011. 2.10 Accessing an Early Boot Shell
  • 012. Real-world Scenario Recoering From a Lost MBR

  • Lesson 3 Looking Closer at the Kernel
  • 001. Learning objecties
  • 002. 3.1 Why Compiling Kernels isnt Necessary Anymore
  • 003. 3.2 Kernel Generic Interfaces
  • 004. 3.3 Managing and Tuning Kernel Modules
  • 005. 3.4 The proc Pseudo Filesystem
  • 006. 3.5 Using proc to get Detailed System Information
  • 007. 3.6 Reading Process Information in proc
  • 008. 3.7 Tuning the Kernel through procsys
  • 009. 3.8 Testing Critical Features with sysrq
  • 010. 3.9 Using Watchdogs
  • 011. 3.10 eBPF
  • 012. Real-world Scenario Automatically Recoering from System Hangs

  • Lesson 4 Systemd Taking Oer
  • 001. Learning objecties
  • 002. 4.1 Manually Starting Systemd
  • 003. 4.2 Systemd Unit Files
  • 004. 4.3 Tweaking Unit Files
  • 005. 4.4 Mounting Filesystems with Systemd
  • 006. 4.5 Using Sockets
  • 007. 4.6 Scheduling Processes with Timers
  • 008. 4.7 Analyzing Systemd Performance
  • 009. 4.8 Adanced Dependency Handling
  • 010. 4.9 Managing Resource Allocation Part 1
  • 011. 4.10 Managing Resource Allocation Part 2
  • 012. 4.11 Managing Resource Allocation Part 3
  • 013. 4.12 Creating Custom Units
  • 014. 4.13 Creating Custom Targets
  • 015. 4.14 Running User Processes in Systemd
  • 016. Real-world Scenario Booting without etcfstab

  • Lesson 5 Hardware Handling
  • 001. Learning objecties
  • 002. 5.1 Understanding Deice Nodes
  • 003. 5.2 Initializing Deices Automatically or Manually
  • 004. 5.3 Analyzing sysfs
  • 005. 5.4 Systemd-uded
  • 006. 5.5 Creating Ude Rules
  • 007. Real-world Scenario Denying Unauthorized Deices

  • Lesson 6 Storage Deices
  • 001. Learning objecties
  • 002. 6.1 Linux Storage Deices
  • 003. 6.2 Partitions MBR and GPT
  • 004. 6.3 Managing Partitions
  • 005. 6.4 Images and ISO Files
  • 006. 6.5 Understanding Flexible Storage Solutions
  • 007. 6.6 Managing LVM Logical Volumes
  • 008. 6.7 Using LVM Features
  • 009. 6.8 Deice Mapper
  • 010. 6.9 Manually Creating Deice Mapper Storage
  • 011. 6.10 LVM and VDO
  • 012. 6.11 Stratis
  • 013. 6.12 Creating Encrypted Deices
  • 014. 6.13 Booting from Encrypted Deices
  • 015. Real-world Scenario Creating a Hidden Storage Deice

  • Lesson 7 Filesystems
  • 001. Learning objecties
  • 002. 7.1 Filesystems and the VFS
  • 003. 7.2 About POSIX and non-POSIX Filesystems
  • 004. 7.3 Linux Filesystem Components
  • 005. 7.4 Inodes and Block Allocation
  • 006. 7.5 Sparse Files
  • 007. 7.6 FUSE Filesystems
  • 008. 7.7 Next-generation Filesystems
  • 009. 7.8 Running ZFS on Linux
  • 010. 7.9 Running Btrfs
  • 011. 7.10 Using the Ext Filesystem Debugger
  • 012. 7.11 Managing XFS IDs
  • 013. Real-world Scenario Exploring Cool Filsystem Tools

  • Lesson 8 Cloud and Datacenter Storage
  • 001. Learning objecties
  • 002. 8.1 Storage Challenges in Cloud and Datacenter
  • 003. 8.2 Working with SSD Media
  • 004. 8.3 Understanding iSCSI
  • 005. 8.4 Configuring iSCSI Storage
  • 006. 8.5 Connecting the Initiator
  • 007. 8.6 Object Storage
  • 008. 8.7 Configuring a Ceph Cluster
  • 009. 8.8 Configuring a Ceph Client
  • 010. Real-world Scenario Ceph in Kubernetes

  • Lesson 9 Memory Management
  • 001. Learning objecties
  • 002. 9.1 Linux Memory Allocation Virtual s. Physical Memory
  • 003. 9.2 Cache
  • 004. 9.3 Actie and Inactie Memory
  • 005. 9.4 The Need to Swap
  • 006. 9.5 Configuring and Monitoring Swap Space
  • 007. 9.6 Managing Huge Pages
  • 008. 9.7 Managing Dirty Cache
  • 009. 9.8 Out of Memory (OOM) and Dealing with it
  • 010. 9.9 Analyzing Kernel Memory
  • 011. Real-world Scenario Optimizing Memory Usage

  • Lesson 10 Processes
  • 001. Learning objecties
  • 002. 10.1 How a Process is Created
  • 003. 10.2 Processes and Threads
  • 004. 10.3 Killing a Zombie
  • 005. 10.4 Priorities, Schedulers, and Nice Values
  • 006. 10.5 Inter-process Communication, Sockets, Pipes, and More
  • 007. 10.6 Communicating on the D-Bus Message Interface
  • 008. 10.7 Monitoring IPC Usage
  • 009. Real-world Scenario Cgroups and Priorities

  • Lesson 11 Linux Commands and How They Work
  • 001. Learning objecties
  • 002. 11.1 Exploring What Happens When Commands are Executed
  • 003. 11.2 System Space and User Space
  • 004. 11.3 Understanding System Calls
  • 005. 11.4 How Processes get Access to System Calls
  • 006. 11.5 How Process Memory is Organized
  • 007. 11.6 Creating Processes
  • 008. 11.7 Allocating Memory
  • 009. 11.8 Accessing Libraries
  • 010. 11.9 Analyzing Library Usage
  • 011. Real-world Scenario Using exec for Troubleshooting

  • Lesson 12 Networking
  • 001. Learning objecties
  • 002. 12.1 Linux Network Deice Names
  • 003. 12.2 The OSI Model
  • 004. 12.3 Transforming Data into Packets
  • 005. 12.4 Analyzing Packet Headers
  • 006. 12.5 IP4 and IP6
  • 007. 12.6 How Linux Chooses a Network Interface
  • 008. 12.7 Analyzing and Optimizing Networking
  • 009. 12.8 Bonding and Teaming
  • 010. 12.9 Network Bridge Deices
  • 011. Real-world Scenario Scanning Packets for Security

  • Lesson 13 Containers are Linux, Linux is Containers
  • 001. Learning objecties
  • 002. 13.1 Running an Application on Linux
  • 003. 13.2 Running Applications in a Chroot Jail
  • 004. 13.3 Managing Linux Process Resource Allocation
  • 005. 13.4 Using unshare to run Namespaced Processes
  • 006. 13.5 Running Linux Applications with Namespaces and Cgroups
  • 007. 13.6 From Restricted Linux Applications to Containers
  • 008. 13.7 Container Runtimes
  • 009. 13.8 Systemd Containers
  • 010. 13.9 Containers and the Future of Linux
  • 011. Real-world Scenario Running Pure Linux Containers

  • Lesson 14 The Code Behind Linux
  • 001. Learning objecties
  • 002. 14.1 The C Programming Language
  • 003. 14.2 Working Together in Git
  • 004. 14.3 From Git Project to Linux Distributions
  • 005. 14.4 C Programs From Source Code to Binary
  • 006. 14.5 C and Libraries
  • 007. 14.6 Compiling a C Program from a Makefile
  • 008. Real-world Scenario Writing Your own Zombie

  • Module 1 Linux Architecture
  • 001. Module introduction

  • Module 2 Storage and Filesystems
  • 001. Module introduction

  • Module 3 Core Linux Components
  • 001. Module introduction

  • Module 4 Key Linux Components
  • 001. Module introduction

  • Summary
  • 001. Linux Under the Hood Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 38808
    حجم: 2470 مگابایت
    مدت زمان: 710 دقیقه
    تاریخ انتشار: 10 مرداد 1403
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید