Eleventh Hour Linux+: Exam XK0-003 Study Guide offers a practical guide for those preparing for the Linux+ certification exam. The book begins with a review of important concepts that are needed for successful operating system installation. These include computer hardware, environment settings, partitions, and network settings. The book presents the strategies for creating filesystems; different types of filesystems; the tools used to create filesystems; and the tools used to administer filesystems. It explains the Linux boot process; how to configure system and user profiles as well as the common environment variables; and how to use BASH command line interpreter. The remaining chapters discuss how to install, configure, support, and remove applications; the configuration of Linux as a workstation and as a server; securing the Linux system; and common tools for managing a system. Each chapter includes information on exam objectives, exam warnings, and the top five toughest questions along with their answers.
- Fast Facts quickly review fundamentals
- Exam Warnings highlight particularly tough sections of the exam
- Crunch Time sidebars point out key concepts to remember
- Did You Know? sidebars cover sometimes forgotten details
Top Five Toughest Questions and answers help you to prepare
Beginner to Intermediate Computer Support Professionals, Network/Security Administrators, IT Technicians, Network/Systems Engineers
Author Bios Chapter 1 Installing Linux Introduction A Note about Hardware Installing from Local Media Linux Installation Process Preparation Installation Settings Installing Across the Network Laying out the Filesystem Disk Types LVM RAID RAID Levels Summary of Exam Objectives Top Five Toughest Questions Answers Chapter 2 Managing Filesystems Introduction Filesystem Types Local Filesystems Network Mounting and U(n)mounting Filesystems The mount and umount Commands /etc/fstab Partitions Directories Filesystem Management Quotas Loopback Device NFS Swap Summary of Exam Objectives Top Five Toughest Questions Answers Chapter 3 Booting Linux Introduction GRUB Installing GRUB and Booting Linux GRUB Configuration Files and Commands Runlevels The init Command Runlevels Troubleshooting Boot Issues Summary of Exam Objectives Top Five Toughest Questions Answers Chapter 4 Configuring the Base System Introduction User Profiles System and User Profile and Environment Variables Device Management lsusb lspci lsmod /sys /proc modprobe and modprobe.conf file /etc/modules.conf configuration file Networking Configuring the Interface TCP/IP Ports Managing Connectivity Summary of Exam Objectives Top Five Toughest Questions Answers Chapter 5 Using BASH Introduction BASH Commands Using File Commands Editing Files Using vi Managing Processes Leveraging I/O Redirection Special Devices Using System Documentatio
- No. of pages:
- © Syngress 2010
- 16th November 2009
- eBook ISBN:
- Paperback ISBN:
Graham Speake (CISSP #56073, M.Inst. ISP) is a risk management consultant with BP, one of the world's largest energy companies. He currently provides risk assessment and remediation consultancy to BP operating units throughout the world. His specialties include industrial automation and process control security, penetration testing, network security, and network design. Graham is a frequent speaker at security conferences and often presents security training to BP staff around the world. Grahams's background includes positions as a consultant at ATOS/Origin and an engineer at the Ford Motor Company. Graham holds a Bachelor's Degree from the Swansea University in Wales and is a member of the ISA.
Risk Management Consultant, BP and CISSP
Brian Barber (Linux+, MCSE, MCSA, MCP+I, CNE, CNA-GW) works for the Canada Deposit Insurance Corporation (CDIC) as a project manager and architect for CDIC's IT service management program. He first started using Linux at home with Red Hat 5.1 and since then he has been a staunch advocate of open source software, belonging to the Ottawa Canada Linux User Group (OCLUG) since 2001 and the Ottawa Python Authors Group. His primary areas of interest are operating systems, infrastructure design, multiplatform integration, directory services, and enterprise messaging. In the past he has held the positions of Principal Consultant with Sierra Systems Group Inc., Senior Technical Coordinator at the LGS Group Inc. (now a part of IBM Global Services) and Senior Technical Analyst at MetLife Canada.
(Linux+, MCSE, MCSA, MCP+I, MCNE, CNE, CNA-GW)
Chris Happel has over 20 years' experience with voice and data networking and security. He is currently a managing consultant for Liberty Trio, LLC, and is an avid supporter of GNU/Linux and open source software.
Terrence V. Lillard (Linux+, CISSP) is an IT Security architect and cybercrime and cyberforensics expert. He is actively involved in computer, intrusion, network, and steganography cybercrime and cyberforensics cases, including investigations, security audits, and assessments both nationally and internationally. Terrence has testified in U.S. District Court as a Computer Forensics/Security Expert Witness. He has designed and implemented security architectures for various government, military, and multi-national corporations. Terrence's background includes positions as principal consultant at Microsoft, the IT Security Operations manager for the District of Columbia's government IT Security Team, and instructor at the Defense Cyber Crime Center's (DC3) Computer Investigation Training Academy Program. He has taught IT security and cybercrime/cyberforensics at the undergraduate and graduate level. He holds a B.S. in Electrical Engineering, Master of Business Administration (MBA), and is currently pursuing a Ph.D. in Information Security.
"This unique text offers an attractive, reader-friendly layout, demonstrating concepts creatively with thought provoking color and b&w photos, illustrations, and images, many from art history. The volume is designed so that readers can jump from image to image and find the core ideas of the chapter. Sidebars of key ideas also increase the book's browsability. Employing a multidisciplinary approach to information architecture and the design of the new pervasive information spaces, the book draws on insights in diverse disciplines from cognitive psychology to cinema. Each chapter begins with a short story and concludes with case studies and a list of articles, books, movies, and videos. Part 1 surveys information architecture as both a field of practice and a research discipline. Part 2 illustrates five design principles, and Part 3 shows how to apply these principles with a real-life case study. Parts 2 and 3 include boxed contributions from international authors, researchers, and practitioners. Readers can access a companion web site and a blog."--Reference and Research Book News