Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Dean J., Pessanha B.G., Langfeldt N. — LPI Linux Certification in a Nutshell
Dean J., Pessanha B.G., Langfeldt N. — LPI Linux Certification in a Nutshell



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: LPI Linux Certification in a Nutshell

Авторы: Dean J., Pessanha B.G., Langfeldt N.

Аннотация:

LPI Linux Certification in a Nutshell,
Second Edition is an invaluable resource for determining what you need
to practice to pass the Linux Professional Institute exams. This book
will help
you determine when you're ready to take the exams, which are
technically challenging and designed to reflect the skills that
administrators need
in real working environments.

As more corporations adopt Linux as the networking backbone for their
IT systems, the demand for certified technicians will become
even greater. Passing the LPI exams will broaden your career options
because the LPIC
is the most widely known and respected Linux certification program in
the
world. Linux Journal recognized the LPI as the best
Training and
Certification Program. The exams were developed by the Linux
Professional Institute,
an international, volunteer-driven organization with affiliates in a
dozen countries.

The core LPI exams cover two levels. Level 1 tests a basic knowledge of
Linux installation, configuration, and command-line
skills. Level 2 goes into much more depth regarding system
troubleshooting and
network services such as email and the Web. The second edition of LPI
Linux
Certification in a Nutshell is a thoroughly researched
reference to these exams. The book is divided into four parts, one for
each of the
LPI exams. Each part features not only a summary of the core skills you
need, but sample exercises and test questions, along with helpful hints
to let
you focus your energies.

Major topics include:

GNU and Unix commands

Linux installation and package management

Devices, filesystems, and kernel configuration

Text editing, processing, and printing

The X Window System

Networking fundamentals and troubleshooting

Security, including intrusion detection, SSH, Kerberos, and
more

DNS, DHCP, file sharing, and other networking infrastructure

Email, FTP, and Web services


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: 2nd

Год издания: 2006

Количество страниц: 978

Добавлена в каталог: 01.11.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
review exercise      
review exercises      
review for Exam 101      
review questions      
review questions and exercises      
reviewing for changes      
reviewing screen output      
reviewing settings in network troubleshooting      
rewinding tapes      
rhosts      
rhosts authentication      
rm -r, -R
rm command      2nd
rmdir command      2nd
rmmod command      2nd 3rd
role in security      
root account      
root and user prompts      
root directive      
root filesystem      
root logins, permitting      
root name servers, hints for finding      
root shell prompt      
root user      
rotating log files      
Rotation      
rotation of      
round robin buffer      
route command vs.      
route command, using      
route commands      2nd 3rd 4th
routed      
router configuration      
routers      
Routing      
routing on Internet      
RPC calls      
RPC daemons, NSF-related      
RPC portmapper      
rpc.lockd file      
rpc.statd file      
rpcinfo command      
rpcinfo utility      
RPM (Red Hat Package Manager)      2nd
rpm --checksig      
rpm command      
RPM package build      
RPM packages      
rpmbuild command      
rsync utility      2nd
rsync, using with      
RTS (ready-to-send) signals      
rule sets      
Rule Specifications      
rule targets      
Rules      
rules file (Debian packages)      2nd
rules file for Debian packages      
rules, configuring      
rules, understanding      
runlevel 1      
runlevel command      2nd
runlevels      
runlevels, customizing      
Running      
running automatically      
running BIND in chroot jail/reduced privileges      
running configure script      
running in chroot jail/reduced privileges      
running manually      
running on Apache      
running Perl scripts on Apache as CGI scripts      
running pipeline of commands      
running rpm      
runtime configuration      
runtime kernel configuration      
Samba      
Samba (smb.conf file)      
Samba packages and source code      
Samba server, configuring      
sample results      
saving and reloading rule sets      
scanning in general      
scanning tools      
scanning, network      
scheduled execution      
scheduling on routine basis      
scheduling program execution      
scp command      2nd
Screen      
script files      
scripting      
Scripting languages      
scripting with      
Scripts      
scripts called by cron      
SCSI      2nd
SCSI (Small Computer System Interface)      2nd
SCSI controller      
SCSI controllers      
SCSI device files      
SCSI devices      
SCSI versus      
Searching      
searching and browing for modules      
searching with regular expressions      2nd 3rd
secondary (mail) servers      
secondary and tertiary DNS      
secondary and tertiary DNS server      
secondary DNS server      
secondary IDE interface      
Sections      2nd
Secure Set Identifier (SSID)      
Secure Shell (OpenSSH)      
securing DNS server      
securing servers      
Security      2nd
security alerts      
security and      
security auditing      
security concerns      
security information      
security risks      
security risks, minimizing      
security, setting up      
security, syslog and      
security-related tuning of /proc/sys/net/ipv4 directory      
sed (stream editor)      
sed utility      
selecting and configuring      
self-monitoring, analysis, and reporting technology system (SMART)      
self-signed certificate, creating      
SELinux      
sending email from scripts      
sending from script      
sending from shell scripts      2nd
sending mail from      
sendmail      
sendmail.cf file      
sendmail.cf file, generating      
sendmail.mc file      
serial interfaces      
Serial Port      
serial ports      
server daemon, launching      
server installation and configuration      
server reliance on reverse DNS lookups      
Server, setting up      
server-to-client communications, port numbers      
servers, querying commands      
Services      2nd
services and foreign hosts lists      
services controlled by, TCP wrappers for      
Services file      2nd 3rd
services list, tcpd      
services provided      
services, starting and stopping      
session handling, cron jobs      
session showing ARP request/reply      
Sessions      
setting      2nd
setting default      
setting for new accounts      
setting for users in /etc/profile      
setting home directory      
setting limits on use of      
setting quotas      
setting up as slave server      
setting up clients      
setting up display manager      
setting up server      
setting with ifconfig      
SGID (Set Group ID)      
SGID (Set Group ID) property, access modes      
SGID property      
SGID workgroups      
sh (Bourne shell)      2nd
Shadow      2nd 3rd
shadow passwords      
shadowed passwords      
sharable data      
shared directory (Samba)      
shared libraries      
shared libraries, managing      
shared object dynamic linker      
shared, managing      2nd
Sharing      
sharing using Samba      
sharing, using NFS      
she-bang line      
she-bang line (scripts)      2nd 3rd
Shell      
shell environment      
shell job control      
shell programs      
shell prompt (#)      
Shell script      
shell script results      
shell scripting and      
shell scripts      
shell user interface      
shell variables      2nd 3rd 4th
shells      
shells (sh and bash)      
shift command      
shortcut for home directory      2nd
showing ARP requests with no answers      
showmount command      2nd
shrinking a logical volume      
shutdown      
shutdown command, using      
SIGHUP signal      
SIGINT (interrupt signal)      
signaling active processes      
Signals      2nd
signing Debian packages      
signing packages      
Single-user      2nd
single-user mode      
single-user runlevel      
size of      
slapd      
slapd.conf file      
slaptest command      
slave disk drive      
slave server (NIS)      
sldap.conf file      
slurpd      
SMART      
SMART (self-monitoring, analysis, and reporting technology)      
smart host      
smart host parameter      
smart host-based mail delivery vs.      
smartctl utility      
smartd      
smartmontools      
SMART_HOST directives      
smb.conf file      
smbclient command      
smbd      
smbd daemon      
smbmount command      2nd
smbpasswd program      
smbprint      
smbprint utility      
smbstatus program      
smbtestparm command      
SMP (symmetric multiprocessing) kernel      
SMS alerts, sending from scripts      
SMTP (Simple Mail Transfer Protocol)      2nd
SMTP delivery based on      
SMTP delivery using DNS lookups      
SMTP delivery via smart host      
SNAPSHOTS      
snapshots (LVM)      
sndconfig command      
Snort      
SOA (start of authority) records      
soft limit (disk quotas)      
software and kernel configuration      
software package components      
software updates, potential problems      
Sort command      
sorting mail      
sound cards      2nd
source code      
source command      2nd
source or binary distributions      
source packages, Debian      
source RPM (SRPM) packages, building RPM packages from      
sourcing of configuration files      
spam, configuring Sendmail to prevent      
spec file      
spec files      
special permissions      
specification in /etc/printcap      
Specifying      
specifying services      
SPECS directory      
Speed      
split command      2nd
spoofing source addresses of packets      
spoofing, attacks involving      
spool directories      
SQL injection      
Squid      
Squid acl option      
Squid passwd ACL      
src.rpm files      
SRPM (source RPM) package, building RPM packages from      
SSH      2nd
SSH (Secure Shell)      2nd
SSH and Kerberos, problems caused by DNS      
ssh port forwarding      
SSH session      
ssh-agent command      
ssh-keygen command      
sshd      
SSID (Secure Set Identifier)      
SSL      
1 2 3 4 5 6 7 8 9 10
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте