El Libro del Administrador Debian

Cover
Author: Raphäel Hertzog & Roland Mas
Year: 2015
Publisher: Autoedición
Pages: 540
Size: 28.74 Mbs (zip)
Language: spanish

Cada vez más profesionales están adoptando Debian GNU/Linux, cuya finalidad de crear una distribución rica y flexible que no precise demasiado mantenimiento satisface sus expectativas. Por lo general, aprecian su robustez y su confiabilidad, su automatización de tareas secundarias, así como también la coherencia que proporciona la estricta aplicación de especificaciones y por lo tanto la durabilidad de sus logros y habilidades.

Al mismo tiempo, muchas personalidades influyentes de la industria de la informática acaban de comprender el interés estratégico que supone la utilización de una distribución elaborada que no es gestionada por entidades comerciales. Algunos de sus clientes además comprenden — siguiendo la misma lógica — que una plataforma de software que no depende de acuerdos entre proveedores reduce las obligaciones que tendrán tras la compra.

El Libro del administrador de Debian lo acompañará a lo largo de su propio camino a la autonomía. Solo podría haber sido escrito por autores que combinan tanto los aspectos técnicos como el funcionamiento interno del proyecto Debian y que conocen las necesidades de los profesionales como también de los entusiastas. Raphaël Hertzog y Roland Mas poseían las cualidades necesarias y lograron crear y actualizar este libro. Yo les agradezco mucho su trabajo y no tengo ninguna duda que leer este libro será tan útil como agradable.


Energy Efficient Servers Blueprints for Data Center Optimization

Cover
Author: Varios
Year: 2015
Publisher: Apress Open
Pages: 347
Size: 6.92 Mbs (pdf)
Language: english

Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outlines the power and performance impact of these features and the role firmware and software play in initialization and control. Using examples from cloud, HPC, and enterprise environments, the book demonstrates how various power management technologies are utilized across a range of server utilization.

It teaches the reader how to monitor, analyze, and optimize their environment to best suit their needs. It shares optimization techniques used by data center administrators and system optimization experts at the world’s most advanced data centers.


Security of Networks and Services in an All-Connected World

Cover
Author: Varios
Year: 2017
Publisher: Springer Open
Pages: 204
Size: 10.66 Mbs (pdf)
Language: spanish

This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017.

The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.


Building the Infrastructure for Cloud Security

Cover
Author: Yeluri Raghuram & Enrique Castro-Leon
Year: 2014
Publisher: Apress Open
Pages: 240
Size: 8.55 Mbs (pdf)
Language: english

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:

  • Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
  • Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
  • OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
  • A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.


The InfoSec Handbook

Cover
Author: Umesh Hodeghatta Rao & Umesha Nayak
Year: 2014
Publisher: Apress Open
Pages: 376
Size: 10.84 Mbs (pdf)
Language: english

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.

It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base.

Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users.

This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face.


Cyber-Physical Systems of Systems

Cover
Author: Varios
Year: 2016
Publisher: Springer Open
Pages: 270
Size: 34.30 Mbs (pdf)
Language: english

Technical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating to achieve a well-defined objective – form the backbone of most of today’s infrastructure. The energy grid, most transportation systems, the global banking industry, the water-supply system, the military equipment, many embedded systems, and a great number more, strongly depend on systems-of-systems. The correct operation and continuous availability of these underlying systems-of-systems are fundamental for the functioning of our modern society.

The 8 papers presented in this book document the main insights on Cyber-Physical System of Systems (CPSoSs) that were gained during the work in the FP7-610535 European Research Project AMADEOS (acronym for Architecture for Multi-criticality Agile Dependable Evolutionary Open System-of-Systems). It is the objective of this book to present, in a single consistent body, the foundational concepts and their relationships. These form a conceptual basis for the description and understanding of SoSs and go deeper in what we consider the characterizing and distinguishing elements of SoSs: time, emergence, evolution and dynamicity.


An Introduction to Computer Networks

Cover
Author: Peter L Dorlan
Year: 2016
Publisher: Autoedición
Pages: 726
Size: 5.73 Mbs (zip)
Language: english

This book is meant as a serious and more-or-less thorough text for an introductory college or graduate course in computer networks, carefully researched, with consistent notation and style, and complete with diagrams and exercises. My intent is to create a text that covers to a reasonable extent why the Internet is the way it is, to avoid the endless dreary focus on TLA’s (Three-Letter Acronyms), and to remain not too mathematical. For the last, I have avoided calculus, linear algebra, and, for that matter, quadratic terms (though some inequalities do sneak in at times). That said, the book includes a large number of back-of-the-envelope calculations – in settings as concrete as I could make them – illustrating various networking concepts.

Overall, I tried to find a happy medium between practical matters and underlying principles. My goal has been to create a book that is useful to a broad audience, including those interested in network management, in high-performance networking, in software development, or just in how the Internet is put together.

The book can also be used as a networks supplement or companion to other resources for a variety of other courses that overlap to some greater or lesser degree with networking. At Loyola, earlier versions of this material have been used – coupled with a second textbook – in courses in computer security, network management, telecommunications, and even introduction-to-computing courses for non-majors. Another possibility is an alternative or nontraditional presentation of networking itself. It is when used in concert with other works, in particular, that this book’s being free is of marked advantage.


Building the infraestructure for cloud security

Cover
Author: Raghu Yeluri & Enrique Castro-Leon
Year: 2014
Publisher: Apress Open
Pages: 240
Size: 7.45 Mbs (zip)
Language: english

Security is an ever-present consideration for applications and data in the cloud. It is a concern for executives trying to come up with criteria for migrating an application, for marketing organizations in trying to position the company in a good light as enlightened technology adopters, for application architects attempting to build a safe foundation and operations staff making sure bad guys don’t have a field day. It does not matter whether an application is a candidate for migration to the cloud or it already runs using cloud-based components. It does not even matter that an application has managed to run for years in the cloud without a major breach: an unblemished record does not entitle an organization to claim to be home free in matters of security; its executives are acutely aware that resting on their laurels regardless of an unblemished record is an invitation to disaster; and certainly past performance is no predictor for future gains.


Beej’s Guide to Network Programming, Ed. 2015

Cover
Author: Brian Beej Hall
Year: 2015
Publisher: Autoedición
Pages: 105
Size: 554 Kbs (zip)
Language: english

Hey! Socket programming got you down? Is this stuff just a little too difficult to figure out from the man pages? You want to do cool Internet programming, but you don’t have time to wade through a gobof structs trying to figure out if you have to call bind() before you connect(), etc., etc.

Well, guess what! I’ve already done this nasty business, and I’m dying to share the information with everyone! You’ve come to the right place. This document should give the average competent C programmer the edge s/he needs to get a grip on this networking noise.

And check it out: I’ve finally caught up with the future (just in the nick of time, too!) and have updated the Guide for IPv6! Enjoy!


Applied Crypto Hardening

Cover
Author: Varios
Year: 2015
Publisher: University of Vienna
Pages: 94
Size: 1.30 Mbs (zip)
Language: english

This guide arose out of the need for system administrators to have an updated, solid, well researched and thought-through guide for configuring SSL, PGP, SSH and other cryptographic tools in the post-Snowden age. Triggered by the NSA leaks in the summer of 2013, many system administrators and IT security officers saw the need to strengthen their encryption settings. This guide is specifically written for these system administrators.

As Schneier noted in [Sch13a], it seems that intelligence agencies and adversaries on the Internet are not breaking so much the mathematics of encryption per se, but rather use software and hardware weaknesses, subvert standardization processes, plant backdoors, rig random number generators and most of all exploit careless settings in server configurations and encryption systems to listen in on private communications. Worst of all, most communication on the internet is not encrypted at all by default (for SMTP, opportunistic TLS would be a solution).

This guide can only address one aspect of securing our information systems: getting the crypto settings right to the best of the authors’ current knowledge. Other attacks, as the above mentioned, require di ffrent protection schemes which are not covered in this guide. This guide is not an introduction to cryptography. For background information on cryptography and cryptoanalysis we would like to refer the reader to the references in appendix B and C at the end of this document.

The focus of this guide is merely to give current best practices for configuring complex cipher suites and related parameters in a copy & paste-able manner. The guide tries to stay as concise as is possible for such a complex topic as cryptography. Naturally, it can not be complete. There are many excellent guides [ IS12, fSid IB13, EN I13] and best practice documents available when it comes to cryptography. However none of them focuses specifically on what an average system administrator needs for hardening his or her systems’ crypto settings.

This guide tries to fill this gap.


An Introduction to Ontology Engineering

Cover
Author: C. Maria Keet
Year: 2018
Publisher: Autoedición
Pages: 270
Size: 7.10 Mbs (pdf)
Language: english

This book is my attempt at providing the first textbook for an introduction in ontology engineering. Indeed, there are books about ontology engineering, but they either promote one specific ontology or methodology only, are handbooks, or are conference proceedings. There have been collaborative initiatives that aimed for a generic introduction, yet they have not made it to the writing stage.

Problems to overcome with such an endeavour—aside from the difficult task of finding time to write it—are, mainly, to answer the questions of 1) which topics should an introductory textbook on ontology engineering cover? and 2) how comprehensive should an introduction be? The answer to the first question is different for the different audiences, in particular with respect to emphases of one topic or another and the order of things. The intended audience for this textbook are people at the level of advanced undergraduate and early postgraduate studies in computer science. This entails, for instance, that I assume the reader will know what UML class diagrams and databases are. As computing degrees seem to have a tendency to have become less theoretical, a solid background in logic, reasoning, and computational complexity is not expected, so a gentle introduction (or recap, as it may be) of the core concepts is provided.

There are no lengthy philosophical debates in any of the chapters, but philosophical aspects are presented and discussed mainly only insofar as they are known to affect the engineering side. There still will be sections of interest for philosophers and domain experts, but they may prefer to work through the chapters in a different order.


Recent Advances in Cellular D2D Communications

Cover
Author: Varios
Year: 2018
Publisher: MDPI
Pages: 184
Size: 15.72 Mbs (pdf)
Language: english

Device-to-device (D2D) communications have attracted a great deal of attention from researchers in recent years. It is a promising technique for offloading local traffic from cellular base stations by allowing local devices, in physical proximity, to communicate directly with each other. Furthermore, the resulting short-range communications can enable local devices to realize higher data rates, lower communication latency, and reduced power consumption. Through relaying, D2D is also a promising approach to enhancing service coverage, particularly at cell edges or in black spots within the cell. In addition to improving network performance and service quality, D2D can open up opportunities for new proximity-based services and applications for cellular users.

However, there are many challenges to realizing the full benefits of D2D. For one, minimizing the interference between legacy cellular and D2D users, operating in underlay mode, is still an active research issue. With 5G expected to be the main carrier for IoT traffic, the potential role of D2D and its scalability to support massive IoT devices and their machine-centric (as opposed to human-centric) communications need to be investigated. New challenges have also arisen from new enabling technologies for D2D communications, such as millimeter-wave and massive MIMO (multiple-input and multiple-output) systems, which call for new solutions to be proposed. The aforementioned matters are just a few examples of the many challenges that remain to be addressed.