Skip to main content

More titles to consider

Shopping Cart

You're getting the VIP treatment!

Item(s) unavailable for purchase
Please review your cart. You can remove the unavailable item(s) now or we'll automatically remove it at Checkout.
itemsitem
itemsitem

Linux

If you like Linux eBooks, then you'll love these top picks.
Skip side bar filters
  • Crafting the InfoSec Playbook

    Security Monitoring and Incident Response Master Plan

    by Jeff Bollinger and 2 more

    Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, rather than ... Read more

    $43.11 AUD

  • The Passage

    The original post-apocalyptic virus thriller: chosen as Time Magazine’s one of the best books to read during self-isolation in the Coronavirus outbreak

    by Justin Cronin

    series The Passage Trilogy ##1
    NOW A MAJOR TV SERIES!'THE STAND meets THE ROAD' Entertainment Weekly'Enthralling ... richly imagined. Above all, Amy is a superb creation, believably human yet beguilingly enigmatic' Sunday TimesAmy Harper Bellafonte is six years old and her mother thinks she's the most important person in the whole world.She is.Anthony Carter doesn't think he could ever be in a worse place than De... ... Read more

    $11.99 AUD

  • iPhone 12 User Guide

    The Complete User Manual For Dummies, Beginners, and Seniors With Tips And Tricks On How To Master Your Device with iOS 14 Update

    by Katrine Isaksen

    iPhone 12 is made with A14 Bionic chip, next-generation neural engine. The world’s best Nano-powered processor, according to Apple, is 15% faster and 50% more energy efficiency than the most recent chip. That means you are in for high speed and efficient user experience.iPhone 12 runs on the new iOS 14 with updates to existing apps and new feature also. iPhone 12 also comes with 5G technology, ... Read more

    $7.68 AUD

  • The Linux Command Line Beginner's Guide

    by Jonathan Moeller

    The Linux Command Line Beginner's Guide gives users new to Linux an introduction to the command line environment.In the Guide, you'll learn how to:-Copy, move, and delete files and directories.-Create, delete, and manage users.-Create, delete, and manage groups.-Use virtual terminals.-Use the bash shell.-Safely use the root account with su and sudo.-Change permissions and ownership of files and ... Read more

    $1.34 AUD

  • Countdown to Zero Day

    Stuxnet and the Launch of the World's First Digital Weapon

    by Kim Zetter

    Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant ... Read more

    $22.21 AUD

  • The Linux Mint Beginner's Guide - Second Edition

    by Jonathan Moeller

    series Computer Beginner's Guides
    The Linux Mint Beginner's Guide (Second Edition) will show you how to get the most out of Linux Mint, from using the Cinnamon desktop environment to advanced command-line tasks. In the Guide, you will learn how to: -Install Linux Mint. -Use the desktop environment. -Manage files and folders. -Manage users, groups, and file permissions. -Install software on a Linux Mint system, both from the ... Read more

    $1.52 AUD

  • Healthy Passwords

    by Ken Klein

    Learn To Make Strong Passwords You Can Remember - Learn how to make strong memorable passwords using the password sandwich. - Learn to create an ingredient list then use it to assemble different passwords for different sites. - Learn a way to have unique passwords that regularly change for all your sites. It doesn't matter if you have a dozen or a hundred site passwords to remember. - Learn how to ... Read more

    $1.01 AUD

  • Sandworm

    A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

    by Andy Greenberg

    **From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it."Much more than a true-life techno-thriller ... a tour through a realm that is both invisible and critical to the daily lives of every person alive in the 21st century."—Los Angeles Times**In 2014, the world ... Read more

    $10.44 AUD

  • Pocket Reference: Raspberry Pi

    by Agus Kurniawan

    This is a pocket reference for getting started Raspberry Pi. **TOC** 1. Introduction to Raspberry Pi 1.1 Raspberry Pi 1.2 Getting Hardware 2. Raspberry Pi Software 2.1 Raspberry Pi Operating System 2.2 Installing Raspberry Pi OS 2.2.1 Setup SD Card 2.2.2 Booting 3. Basic Configuration 3.1 Configure Timezone 3.2 Configure Keyboard 3.3 Rebooting 3.4 Shutdown 3.5 Update Package Repository<br /... ... Read more

    $4.50 AUD

  • Linux iptables Pocket Reference

    Firewalls, NAT & Accounting

    by Gregor N. Purdy

    series Pocket Reference (O'Reilly)
    Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered on Linux and makes Linux an extremely flexible system for any kind of network filtering you might do. Large sets of filtering rules can be ... Read more

    $9.56 AUD

  • Dark Territory

    The Secret History of Cyber War

    by Fred Kaplan

    “An important, disturbing, and gripping history” (Kirkus Reviews, starred review), the never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invent and employ cyber wars—where every country can be a major power player and every hacker a mass destroyer.In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly ... Read more

    $14.99 AUD

  • The Ubuntu Desktop Beginner's Guide - Second Edition

    by Jonathan Moeller

    series Computer Beginner's Guides
    Want to use Ubuntu without having to learn the command line? Then this is the book for you! THE UBUNTU DESKTOP BEGINNER'S GUIDE will show you how to use the Ubuntu desktop interface and perform common tasks with the operating system. In the guide, you'll earn how to: -Install Ubuntu. -Install the latest updates for Ubuntu. -Configure and use Ubuntu's Unity environment. -Master the Launcher, the ... Read more

    $4.59 AUD

  • The 101 Most Important UNIX and Linux Commands

    by Ronald J. Leach

    This book delivers what the title states: It describes the 101 most important UNIX and Linux commands and system calls.  The book bridges the gap between on-line tutorials and manual pages on one hand, and books of 1,000 pages or more that explore the nuances of many shell commands in exhaustive detail.  While most of these sources provide excellent information, they do not really solve the ... Read more

    $5.99 AUD

  • A Practical Guide to Linux Commands, Editors, and Shell Programming

    by Mark G. Sobell

    The Most Useful Tutorial and Reference, with Hundreds of High-Quality Examples for Every Popular Linux Distribution** **Linux is today’s dominant Internet server platform. System administrators and Web developers need deep Linux fluency, including expert knowledge of shells and the command line. This is the only guide with everything you need to achieve that level of Linux mastery. Renowned Linux ... Read more

    $49.16 AUD

  • Survivors

    The gripping, bestselling novel of life after a global pandemic

    by Terry Nation

    Survivors of a global plague battle for life on an empty planet. A gripping vision of a post-apocalyptic world...'A fine piece of British post-apocalyptic fiction''Nation's novel is based on his original cult series...and is all the better for it, being far, far more gritty and realistic' SUNDAY SUNA virus has wiped out 95 per cent of the world's population in just a few weeks, leaving the ... Read more

    $12.99 AUD

  • Worm

    The First Digital World War

    by Mark Bowden

    Worm is the gripping story of the 'Conficker' virus- which, since its introduction in November 2008, has infected millions of computers around the world - and the cyber security elites who have joined forces in a high-tech game of cops and robbers to find its creators and defeat them.This dramatic cybercrime story travels from the Ukraine to the United States (and all parts in between) to explore ... Read more

    $12.64 AUD

  • Hackers & Painters

    Big Ideas from the Computer Age

    by Paul Graham

    "The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul GrahamWe are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. ... Read more

    $19.35 AUD

  • Work with the Command-line: To Manage Files and Directories in Ubuntu

    by Sudiman Suhaili

    This book is aimed at anybody who are looking to deepen their understanding of the command-line in Linux, the essential skills to use and manage the operating system. This book also an ideal reference for beginners to learn the common and basic Linux commands but it is also great for intermediate users.In this book, we use the Ubuntu to understand how Linux can be used, explore the Linux directory ... Read more

    Free

  • Bash Command Line Pro Tips

    by Jason Cannon

    As someone that has used the Bash shell almost daily for over 15 years, I've accumulated several command line "tricks" that have saved me time and frustration. Bash Command Line Pro Tips is a collection of techniques that you can put to use right away to increase your efficiency at the command line.Here is what you will learn by reading Bash Command Line Pro Tips:* How to use tab completion* How ... Read more

    Free

  • Raspberry Pi Insider Guide

    by Bruce Smith

    Raspberry Pi Insider Guide: Everything you need for the Model B/B+ and moreTaking You from beginner to Expert!The most up-to-date Raspberry Pi guide available.Everything you need to make you an expert using the Raspberry Pi Model B and B+.Taking you from beginner to expert. Even as an absolute beginner you will start on a journey that will ultimately leave you knowledgeable and with the confidence ... Read more

    Free

  • Site Reliability Engineering

    How Google Runs Production Systems

    by Betsy Beyer and 3 more

    The overwhelming majority of a software system’s lifespan is spent in use, not in design or implementation. So, why does conventional wisdom insist that software engineers focus primarily on the design and development of large-scale computing systems?In this collection of essays and articles, key members of Google’s Site Reliability Team explain how and why their commitment to the entire lifecycle ... Read more

    $39.59 AUD

  • The Cobra Event

    by Richard Preston

    A deadly virus - and a desperate race against time.'One of the most horrifying things I've ever read in my entire life' Stephen KingOne spring morning in New York City a seventeen-year-old student wakes up feeling vaguely ill. Hours later she is having violent seizures, blood is pouring out of her nose, and she begins to attack her own body in the most hideous way imaginable.Soon, other gruesome ... Read more

    $11.99 AUD

  • Virus Free Computer

    Learn About Encryption Software, Anti-Virus Programs, Spam Security, Spyware Malware Removal, Cyber Security And More PC Security Tips To Keep You Safe From Dangerous Computer Threats

    by Ben K. Woodward

    Today, more and more people are using their computers for everything from communication to online banking and investing to shopping. As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers. While some may be looking to phish your personal information and identity for resale, others simply just want to use your computer as a platform from ... Read more

    $6.13 AUD