Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Dean J., Pessanha B.G., Langfeldt N. — LPI Linux Certification in a Nutshell
Dean J., Pessanha B.G., Langfeldt N. — LPI Linux Certification in a Nutshell



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: LPI Linux Certification in a Nutshell

Авторы: Dean J., Pessanha B.G., Langfeldt N.

Аннотация:

LPI Linux Certification in a Nutshell,
Second Edition is an invaluable resource for determining what you need
to practice to pass the Linux Professional Institute exams. This book
will help
you determine when you're ready to take the exams, which are
technically challenging and designed to reflect the skills that
administrators need
in real working environments.

As more corporations adopt Linux as the networking backbone for their
IT systems, the demand for certified technicians will become
even greater. Passing the LPI exams will broaden your career options
because the LPIC
is the most widely known and respected Linux certification program in
the
world. Linux Journal recognized the LPI as the best
Training and
Certification Program. The exams were developed by the Linux
Professional Institute,
an international, volunteer-driven organization with affiliates in a
dozen countries.

The core LPI exams cover two levels. Level 1 tests a basic knowledge of
Linux installation, configuration, and command-line
skills. Level 2 goes into much more depth regarding system
troubleshooting and
network services such as email and the Web. The second edition of LPI
Linux
Certification in a Nutshell is a thoroughly researched
reference to these exams. The book is divided into four parts, one for
each of the
LPI exams. Each part features not only a summary of the core skills you
need, but sample exercises and test questions, along with helpful hints
to let
you focus your energies.

Major topics include:

GNU and Unix commands

Linux installation and package management

Devices, filesystems, and kernel configuration

Text editing, processing, and printing

The X Window System

Networking fundamentals and troubleshooting

Security, including intrusion detection, SSH, Kerberos, and
more

DNS, DHCP, file sharing, and other networking infrastructure

Email, FTP, and Web services


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: 2nd

Год издания: 2006

Количество страниц: 978

Добавлена в каталог: 01.11.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
SSL (Secure Sockets Layer), Apache mod_ssl module      
SSL connections      
SSL connections, handling      
stable kernels      
stack of protocols      
Standard      
standard error (stderr)      2nd
Standard I/O      
standard input (stdin)      2nd 3rd
standard output (STDOUT)      2nd
starting      
starting and stopping      2nd
starting and stopping httpd      
starting and stopping services      
starting/stopping processes      
startup      2nd
startup instructions      
startup script (example)      
startup, system      2nd
static data      
static IP address assignment, DHCP      
statically linked programs      2nd
stderr (standard error)      
STDOUT (standard output)      2nd
steps in process      
Sticky bit      
stopping/restarting after changes      
storage site, selecting      
strace command      
stratum 1 servers      
streaming devices      
streams      2nd
String      
study guide      
subdirectories      
subnet masks      2nd
subnet masks and      
Subnets      2nd
subnets and relays      
Substitution      
substitution, command history      
substitution, commands      
SUID (Set User ID)      2nd
SUID files      
SUID files, searching for      
SUID property      
suite of protocols      
sum command      
summary of      
Superblock      
Superuser      
supported under Linux      
swap partitions      
swap partitions, creating      
swap space      
swap, managing      
swapoff command      
swapon command      
SWAT (Samba Web Administration Tool)      
SWAT, using with      
switches, failure of      
Symbolic      
symbolic access modes      
symbolic links      2nd 3rd
symmetric multiprocessing (SMP) kernel      
sync command      
synchronizing across machines      
synchronizing files across machines      
synchronizing time on all systems      
synchronous connections      
Syntax      
syntax and options      
syntax, commands      2nd
sysctl command      2nd 3rd
sysctl.conf file      2nd
sysinit script      
Syslog      
syslog system      2nd
syslog, using over network      
syslogd      
syslogd security      
syslogd, configuring      
syslogd.conf file      
system      
system administration      2nd
system administration tasks, scheduling      
system applications, debugging      
system command      
system considerations      
system crontab files      
system hanging during DNS lookups      
system initialization scripts      
system initialization techniques      
system log files      2nd
system logging, security and      
system logs, reviewing      
system maintenance      
system resources      
system runlevel directories      
system runlevel directories on Red Hat      
system security      
system startup scripts      
System V (SysV) Unix, printing      
system-config-network-tui tool      2nd
systemwide      
tac command      2nd
tail command      2nd
tainted data, tracking with Perl      
talk and finger servers, eliminating      
tape drives      
tar and cp utilities      
tar utility      2nd 3rd
tar utility, using      
tarballs      
tarfiles      
targets (Makefile)      
TCP (Transmission Control Protocol)      2nd
TCP wrappers      
TCP wrappers for services      
TCP wrappers, using      
TCP/IP      
TCP/IP (Transmission Control Protocol/Internet Protocol)      
tcpd      
tcpd logging      
tcpd, controlling access to inetd services      
tcpdump command, syntax and options      
tcpdump utility      
tcpdump, using      
tcsh      
tee command      
telinit command      
telinit command, using      
Telnet      
telnet client program      
telnet command      2nd
Telnet, using      
temporary files, security risks      
temporary files, unsafe creation      
Term      
terminal emulators      2nd
terminals (X)      2nd 3rd
terminating      
terminating processes      
Termination      
terminators (SCSI bus)      
test      
test command      2nd
test run, performing      
Testing      
Testing configuration      
testing implementation and monitoring problems      
testparm program      
tethereal utility      
texinfo      
texinfo, viewing      
text editors      
Text files      
text files and paging      
text matching operators      
text streams      
third-party modules      
Thomson Prometric      
threads      
threats (classifications), for disaster and recovery planning      
through ports      
tilde (~) shortcut      2nd
time, maintaining      
timeout directive      
times for crontab command execution      
to scripts in init.d      
Tools      
tools and software for compilation      
top command      2nd
top-level categories      
topics      
topology      
touch command      2nd
tr command      2nd
traceroute command      2nd 3rd 4th
transaction signatures (TSIGs)      
translating domain name into      
translation of Windows machine names to      
translation, print data      
Tripwire      
tripwire commands      
Tripwire files, encryption      
troubleshooting      
troubleshooting boot process      
troubleshooting configurations      
troubleshooting hardware      
troubleshooting kernel parameters      
troubleshooting modules      
troubleshooting problems      
troubleshooting problems with      
troubleshooting system resources      
troubleshooting sytem resources      
troubleshooting, Exam 201 review      
trusted network, defining      
TSIGs (Transaction Signatures)      
tune2fs      
tune2fs command      2nd
tune2fswas command      
tutorials      
twadmin command      
twm window manager      
Types      
types of      
typical, summary of      
Ubuntu Linux, network configuration tool      
UDP (User Datagram Protocol)      2nd
UHCI (Universal Host Controller Interface)      
UID (user ID)      2nd
ulimit      
ulimit command      2nd
umask command      
umount command      
uncompress program      
unexpand command      
uninstall mode, rpm      
uniq command      
Universal Host Controller Interface (UHCI)      
UNIX      
Unix streams, pipes, and redirects      2nd 3rd
Unix98, ps command options      
unprivileged ports      
until command      
until loops      
UPD (User Datagram Protocol)      
update-modules command      
update-rc.d command      
updatedb command      2nd
Updating      
updating Linux      
upgrade mode, rpm      
upgrading, PCMCIA cards and      
upstream clients (INN)      
USB      2nd
USB devices      
USB drivers      
USB support      
usbview command      
Usenet newsgroups      
User      
user access mode      
user accounts      2nd
user accounts and password file      
user and group management      
user crontab files      
user environment and system environment variables      2nd
user environment, tuning      2nd
User ID (UID)      2nd
user prompt      
user prompt ($)      
user variables in shell scripts      
user-level      2nd
user-level, setting up      
useradd command      2nd
userdel command      2nd
usermod command      2nd
UserName      
USERNAME environment variable      
users      
using as local caching-only name server      
using central logs      
using CPAN      
using for DNS servers      
using grep to isolate port used by network socket      
using in network troubleshooting      
using sed      
using with lsof      
utilities      
Variable data      
Variables      2nd
verification codes      
verification of Red Hat packages      
verify and compare options      
verify mode, rpm      
verifying      
verifying archives      
verifying backups      
verifying existence of      
verifying function for backups      
verifying hardware and network software      
verifying httpd process      
verifying installation      
verifying listening on network port      
verifying packages      2nd
verifying system configuration      
verifying tar archives      
verifying web server is running      
versions, kernel      
vertical refresh frequency (monitors)      
Very Secure FTP Daemon (vsftpd)      
vfat filesystem      2nd
vg* commands      
vgchange command      
vgdisplay command      2nd
vgscan command      
vi      2nd 3rd
vi editor      2nd
1 2 3 4 5 6 7 8 9 10
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте