Muutke küpsiste eelistusi

E-raamat: CompTIA Linux+ Certification All-in-One Exam Guide: Exam XK0-004

  • Formaat: 800 pages
  • Ilmumisaeg: 07-Feb-2020
  • Kirjastus: McGraw-Hill Education
  • Keel: eng
  • ISBN-13: 9781260457353
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 51,48 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 800 pages
  • Ilmumisaeg: 07-Feb-2020
  • Kirjastus: McGraw-Hill Education
  • Keel: eng
  • ISBN-13: 9781260457353
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This comprehensive study guide delivers 100% coverage of every topic on the challenging CompTIA Linux+ exam 

Take the CompTIA Linux+ exam XK0-004 with complete confidence using the detailed information contained in this highly effective self-study guide. Written by a pair of Linux authorities and training experts, the book serves both a powerful exam preparation tool and an ideal on-the-job reference.

CompTIA Linux+ Certification All-in-One Exam Guide: Exam XK0-004 offers complete coverage of every topic on the test and features more than 200 accurate practice questions. You will get special elements that reinforce and teach practical skills, including step-by-step exercises, “Exam Tips” and “Notes.” Sidebars throughout contain real-world insights and practical applications, and end-of-chapter summaries and review questions aid in retention.

A downloadable virtual machine is pre-configured for use with step-by-step exercises and labs included in each chapter
Contains a coupon for 10% off any CompTIA exam voucher
Online content includes simulated practice exams in the Total Tester exam engine and training videos
Acknowledgments xxi
Introduction xxiii
Objective Map: Exam XK0-004 xxxii
Chapter 1 An Introduction to Linux and a Pre-Assessment Exam 1(46)
A Brief History of Linux
1(3)
Batch Processing
1(1)
ARPA/DARPA
1(1)
Compatible Time-Sharing System
2(1)
MULTICS
2(1)
UNIX
3(1)
MINIX
3(1)
GNU
4(1)
Linus Torvalds
4(1)
Linux Operating System Structure
4(2)
Kernel
5(1)
Operating System Software
5(1)
Application Software
5(1)
Distributions
6(2)
Distribution Differences
6(1)
Linux Derivatives
7(1)
Common Linux Implementations
8(3)
Linux on the Desktop
8(1)
Linux on the Server
9(1)
Mobile Linux
9(1)
Linux and Virtualization
10(1)
Linux and Cloud Computing
10(1)
Embedded Linux
11(1)
Review
11(1)
Pre-Assessment Test
12(1)
Questions
12(18)
Quick Answer Key
30(1)
In-Depth Answer Explanations
31(14)
Analyzing Your Results
45(2)
Chapter 2 Using the vi Text Editor 47(18)
The Role and Function of the vi Text Editor
47(1)
Editing Text Files in vi
48(9)
Opening Files in vi
48(2)
The vi Modes
50(1)
Working in Command Mode
51(2)
Working in Command-Line Mode
53(3)
Exercise 2-1: Using the vi Editor
56(1)
Editing Text Files in nano
57(1)
Configuration files
57(1)
Command Keys
57(1)
Review
58(2)
Questions
60(3)
Answers
63(2)
Chapter 3 Working with the Linux Shell 65(32)
What Is a Shell?
65(1)
Configuring the Shell
66(3)
Processes
66(1)
Variables
66(2)
Aliases
68(1)
Setting Up the Local Environment (Locale)
69(3)
Character Encoding
70(1)
ASCII
70(1)
Unicode
70(1)
locale Settings
70(2)
Setting Time
72(5)
date
73(1)
/etc/timezone and /usr/share/zoneinfo
73(2)
hwclock
75(1)
timedatectl
76(1)
Bash Configuration Files
77(5)
/etc/profile
77(1)
/etc/bashrc
78(1)
-/.bash_profile
78(1)
-/.bashrc
79(1)
/etc/profile.d
79(1)
The source Command
79(1)
Exercise 3-1: Working with Variables, Parameters, and Aliases
80(2)
Redirection
82(7)
File Descriptors
83(1)
Terminal devices
83(1)
/dev/null
84(1)
stdin
84(1)
stdout
85(1)
stderr
86(1)
Combining stdout and stderr
86(1)
Pipe
87(1)
Exercise 3-2: Redirection
87(2)
Review
89(1)
Questions
89(4)
Answers
93(4)
Chapter 4 Managing Linux Users and Groups 97(28)
Understanding Linux Users and Groups
97(8)
Linux User Accounts
97(6)
Real and Effective User and Group IDs
103(2)
Creating and Managing User Accounts from the Command Line
105(12)
useradd
105(7)
Exercise 4-1: Managing User Accounts from the Command Line
112(2)
Linux Groups
114(2)
Exercise 4-2: Managing Groups from the Command Line
116(1)
Review
117(1)
Questions
118(4)
Answers
122(3)
Chapter 5 Managing Linux Files and Directories 125(42)
Understanding Filesystem Hierarchy Standard (FHS)
125(6)
Navigating the Filesystem
128(1)
Viewing Directory Contents
129(1)
Exercise 5-1: Navigating the Filesystem
130(1)
Managing Linux Files
131(12)
Filenames
131(1)
Types of Files Used by Linux
132(1)
Creating New Files
133(1)
Symbolic and Hard Links
133(4)
Creating New Directories
137(1)
Determining the File Content
138(1)
Viewing File Contents
139(1)
Deleting Files
140(1)
Copying and Moving Files
140(1)
Exercise 5-2: Managing Files and Directories
141(2)
Finding Files in the Linux Filesystem
143(5)
Using find
143(2)
Using xargs
145(1)
Using locate
146(1)
Using whereis
147(1)
Understanding Commands and Precedence
148(5)
Alias
148(1)
Function
149(1)
Builtin
149(1)
External
150(2)
Exercise 5-3: Finding Files
152(1)
Finding Content within Files
153(4)
grep
153(2)
egrep
155(1)
fgrep
155(2)
Exercise 5-4: Using grep
157(1)
Review
157(3)
Questions
160(3)
Answers
163(4)
Chapter 6 Managing Ownership and Permissions 167(20)
Managing File Ownership
167(3)
Managing Ownership from the Command Line
168(1)
Exercise 6-1: Managing Ownership
169(1)
Managing File and Directory Permissions
170(10)
How Permissions Work
170(3)
Managing Permissions from the Command Line
173(2)
Exercise 6-2: Managing Permissions
175(1)
Working with Default Permissions
176(2)
Working with Special Permissions
178(1)
Exercise 6-3: Managing Default and Special Permissions
179(1)
File Attributes and Access Control Lists
180(1)
File Access Control Lists
181(1)
Review
181(2)
Questions
183(1)
Answers
184(3)
Chapter 7 Managing Linux Filesystems 187(46)
Partitions Overview
187(12)
Master Boot Record
187(1)
GPT
188(3)
Device Naming Conventions
191(1)
Locating a Device
192(4)
Viewing Disk Partitions
196(3)
Creating Partitions
199(10)
Partition Considerations
199(2)
fdisk
201(4)
parted
205(1)
gdisk
206(2)
Block Device Encryption
208(1)
Managing Filesystems
209(18)
Available Filesystems
209(1)
Building a Filesystem
210(4)
Mounting a Filesystem
214(2)
Automatic Mounts
216(2)
Unmounting a Partition
218(1)
Maintaining Linux Filesystems
218(4)
Managing Quotas
222(1)
Editing /etc/fstab
222(1)
Creating database files
222(1)
Assigning a Quota
223(1)
Exercise 7-1: Managing Linux Partitions
224(3)
Review
227(1)
Questions
228(3)
Answers
231(2)
Chapter 8 Configuring Volume Management 233(24)
Implementing Logical Volume Management
233(5)
LVM Components
234(1)
LVM Configuration
235(2)
LVM Snapshots
237(1)
Creating Archives and Performing Compression
238(7)
Selecting a Backup Medium
239(1)
Selecting a Backup Strategy
239(1)
Linux Backup and Compression Utilities
240(4)
Exercise 8-1: Backing Up Data
244(1)
Enabling RAID with LVM
245(8)
Software RAID Configuration
247(1)
Verifying RAID Status
248(1)
Exercise 8-2: RAID and Logical Volumes
248(5)
Review
253(1)
Questions
254(2)
Answers
256(1)
Chapter 9 Managing Linux Processes 257(38)
Understanding Linux Processes
257(6)
User Versus System Processes
258(2)
How Linux Processes Are Loaded
260(3)
Managing Processes
263(17)
Starting System Processes
263(2)
Viewing Running Processes
265(6)
Prioritizing Processes
271(2)
Managing Foreground and Background Processes
273(2)
Ending a Running Process
275(2)
Keeping a Process Running After Logout
277(1)
Exercise 9-1: Working with Linux Processes
277(3)
Scheduling Processes
280(8)
Using the at Daemon
280(2)
Using the cron Daemon
282(3)
Exercise 9-2: Scheduling Linux Processes
285(2)
Using the anacron Service
287(1)
Review
288(2)
Questions
290(3)
Answers
293(2)
Chapter 10 Managing Linux Software 295(38)
What Is a Package Manager?
295(1)
Red Hat Package Manager (RPM)
296(7)
Package Names
296(1)
RPM modes
297(1)
Installing an RPM Package
298(1)
Upgrading an RPM Package
298(1)
Removing (Erasing) an RPM Package
299(1)
Verify Mode
299(2)
Querying the RPM Database
301(1)
rpm2cpio
301(1)
Exercise 10-1: RPM
302(1)
yum
303(6)
/etc/yum.conf
304(1)
/etc/yum/repos.d
305(1)
Plug-Ins
306(1)
Yum Commands
307(2)
Exercise 10-2: Yum
309(1)
dnf
309(1)
zypper
310(2)
Installing, Updating, and Removing Packages
310(1)
Working with Repositories
311(1)
Debian Package Management
312(5)
Debian Package Naming
312(1)
Installing Packages with dpkg
312(1)
Viewing Package Information with apt-cache
312(2)
Installing Packages with apt-get
314(1)
Using aptitude
314(3)
Installing Packages from a Source
317(4)
Preparing the Installation Files
317(2)
Compiling the Executable
319(1)
Installing the Executable
319(1)
Exercise 10-3: Building Software from Source Code
320(1)
Uninstalling Software Compiled from Source Code
320(1)
Managing Shared Libraries
321(3)
How Shared Libraries Work
321(2)
lib/modules
323(1)
Review
324(2)
Questions
326(4)
Answers
330(3)
Chapter 11 Managing the Linux Boot Process 333(30)
The Bootstrap Phase
333(4)
BIOS
334(2)
UEFI ESP
336(1)
PXE
337(1)
ISO
337(1)
The Bootloader Phase
337(9)
GRUB (Legacy)
337(6)
GRUB2
343(2)
Exercise 11-1: Working with GRUB2
345(1)
The Kernel Phase
346(1)
System V Initialization
346(5)
Runlevel
346(1)
/etc/inittab
347(1)
/etc/rc.local
348(1)
Changing Runlevels
349(1)
Managing Daemons
349(1)
Shutting Down the System
350(1)
Working with systemd
351(4)
Units
351(3)
Controlling Services
354(1)
Targets
354(1)
Kernel Panic
355(1)
Review
356(2)
Questions
358(4)
Answers
362(1)
Chapter 12 Managing Hardware Under Linux 363(50)
Discovering Devices
363(13)
Kernel and User Space
363(1)
/sys and sysfs
364(2)
PCI
366(3)
Host Bus Adapter (HBA)
369(1)
udev
370(6)
Configuring Hardware Devices
376(8)
lsdev
376(5)
lshw
381(2)
Exercise 12-1: Discovering Devices
383(1)
Configuring Bluetooth
384(1)
Classes
384(1)
Bluetooth Commands
384(1)
Configuring Wi-Fi
385(2)
Scanning for Network Devices
385(1)
Configuring a Wi-Fi Network
386(1)
Configuring Storage Devices
387(7)
IDE
387(1)
SCSI
387(1)
SATA
388(1)
Optical Drives
389(1)
Solid State Drives
389(1)
USB
389(3)
sginfo
392(1)
hdparm
393(1)
lsscsi
393(1)
Understanding Printing
394(1)
Adding Printers
394(1)
lpadmin
394(7)
Printing to a Printer
397(1)
Managing Printers and Print Queues
397(1)
Cancelling Print Jobs
398(1)
lpmove
399(1)
Removing a Printer or Printer Class
399(1)
Exercise 12-2: Printing
400(1)
Using Facility Priority with dmesg
401(1)
Using the abrt Command
402(2)
Exercise 12-3: abrt
403(1)
Review
404(3)
Questions
407(3)
Answers
410(3)
Chapter 13 Writing Shell Scripts 413(38)
Understanding Shell Script Components
413(5)
Shebang (#!)
413(1)
Comments (#)
413(1)
Executing a Script
413(1)
Variables
414(1)
Reading User Input
415(1)
Positional Parameters
416(1)
Functions
417(1)
Command Substitution
418(1)
Using Control Operators
418(8)
Expressions
418(3)
Control Structure
421(2)
Using Looping Structures
423(2)
Exercise 13-1: Creating a Basic Shell Script
425(1)
Processing Text Streams
426(17)
tr
426(1)
cut
427(1)
expand and unexpand
428(1)
fmt
429(1)
join and paste
429(1)
nl
430(2)
od
432(1)
pr
433(1)
sed
433(4)
awk
437(3)
sort
440(1)
split
441(1)
head
441(1)
tail
441(1)
uniq
441(1)
we
442(1)
Exercise 13-2: Processing Text Streams
442(1)
Review
443(2)
Questions
445(3)
Answers
448(3)
Chapter 14 Managing Linux Network Settings 451(38)
Understanding IP Networks
452(9)
What Is a Protocol?
452(4)
How IPv4 Addresses Work
456(2)
How IPv4 Subnet Masks Work
458(3)
Configuring Network Addressing Parameters
461(11)
Assigning NIC Nomenclature
461(1)
Configuring IPv4 Parameters
461(5)
Exercise 14-1: Working with Network Interfaces
466(1)
Configuring Routing Parameters
467(2)
Configuring Name Resolver Settings
469(2)
Configuring IPv6
471(1)
Troubleshooting Network Problems
472(8)
Using a Standardized Troubleshooting Model
472(2)
Using ping
474(1)
Using netstat
475(1)
Using traceroute
476(2)
Using nc
478(1)
Using Name Resolution Tools
478(2)
Exercise 14-2: Working with Network Commands
480(1)
Understanding Network-based Filesystems
480(2)
Network File System (NFS)
481(1)
Samba
481(1)
Review
482(2)
Questions
484(2)
Answers
486(3)
Chapter 15 Understanding Network Security 489(44)
Understanding How Encryption Works
489(3)
Symmetric Encryption
490(1)
Asymmetric Encryption
491(1)
Integrity Checking via Hashing
491(1)
Implementing Secured Tunnel Networks
492(11)
How SSH Works
493(1)
Configuring SSH
494(2)
Exercise 15-1: Working with SSH
496(2)
Logging In to SSH Without a Password
498(2)
Exercise 15-2: Configuring Public Key Authentication
500(1)
Virtual Private Networks
501(2)
Configuring High-Availability Networking
503(2)
Network Bridge Control
504(1)
Network Bonding
505(1)
Understanding Single Sign-On
505(3)
RADIUS
506(1)
LDAP
507(1)
Kerberos
507(1)
TACACS+
508(1)
Defending Against Network Attacks
508(12)
Mitigating Network Vulnerabilities
508(3)
Implementing a Firewall with firewalld
511(4)
Exercise 15-3: Implementing Network
Security Measures with firewalld
515(1)
Implementing a Firewall with iptables
516(2)
Exercise 15-4: Implementing Network
Security Measures with iptables
518(2)
Encrypting Files with GPG
520(8)
How GPG Works
520(1)
Using GPG to Encrypt Files
521(5)
Exercise 15-5: Using GPG to Encrypt Files
526(2)
Review
528(2)
Questions
530(1)
Answers
531(2)
Chapter 16 Securing Linux 533(44)
Securing the System
533(3)
Securing the Physical Environment
533(1)
Securing Access to the Operating System
534(2)
Controlling User Access
536(14)
To Root or Not to Root?
536(3)
Implementing a Strong Password Policy
539(3)
Locking Accounts After Failed Authentications
542(1)
Configuring User Limits
543(2)
Disabling User Login
545(2)
Security Auditing Using find
547(2)
Exercise 16-1: Managing User Access
549(1)
Managing System Logs
550(12)
Configuring Log Files
550(7)
Using Log Files to Troubleshoot Problems
557(3)
Using Log Files to Detect Intruders
560(2)
Enhancing Group and File Security
562(7)
Implementing SELinux
562(5)
Implementing AppArmor
567(1)
Exercise 16-2: Managing SELinux Contexts
568(1)
Review
569(3)
Questions
572(3)
Answers
575(2)
Chapter 17 Applying DevOps: Automation and Orchestration 577(14)
Orchestration Concepts
577(2)
Orchestration Processes
579(1)
The Git Revision Control System
580(7)
Using Git
580(3)
Collaborating with Git
583(3)
Exercise 17-1: Working with a Git Repository
586(1)
Review
587(1)
Questions
588(1)
Answers
589(2)
Chapter 18 Understanding Cloud and Virtualization 591(12)
Understanding Virtualization
591(3)
Hypervisors
591(2)
Thin vs. Thick Provisioning
593(1)
Virtualization File Formats
593(1)
libvirt
593(1)
Containers
594(2)
Persistent Volumes
594(1)
BLOB Storage
594(1)
Container Markup Languages
595(1)
Cloud-init
595(1)
Networking
596(1)
NAT
596(1)
Bridge
596(1)
Overlay
596(1)
Dual-Homed
596(1)
Bonding Interfaces
596(1)
Virtual Switch
597(1)
Anaconda and Kickstart
597(1)
Review
598(1)
Questions
599(2)
Answers
601(2)
Chapter 19 Troubleshooting and Diagnostics 603(26)
A Standardized Troubleshooting Model
603(1)
Troubleshooting Computer Problems
604(13)
Verify Hardware Configuration
604(2)
Verify CPU Performance
606(1)
Verify Memory Performance
607(3)
Exercise 19-1: Working with Swap Space
610(1)
Validate Storage Performance
610(3)
Validate Other Devices
613(4)
Troubleshooting Network Problems
617(8)
Verify Network Performance
618(4)
Validate User Connections
622(1)
Validate the Firewall
623(1)
Exercise 19-2: Troubleshooting Networking Issues
624(1)
Review
625(1)
Questions
626(2)
Answers
628(1)
Chapter 20 Installing and Configuring Linux 629(36)
Designing a Linux Installation
630(10)
Linux Installers and the Lima+ Exam
630(1)
Conducting a Needs Assessment
630(1)
Selecting a Distribution
631(1)
Checking Hardware Compatibility
632(1)
Verifying System Requirements
633(1)
Planning the Filesystem
633(2)
Selecting Software Packages
635(1)
Identifying User Accounts
636(1)
Gathering Network Information
636(1)
Selecting an Installation Source
636(4)
Installing Linux
640(3)
Exercise 20-1: Installing a Linux System
640(3)
Configuring the X Environment
643(6)
Configuring the X Server
643(3)
Configuring the Display Manager
646(1)
Configuring Accessibility
647(2)
Configuring Locale Settings
649(1)
Configuring Time Zone Settings
650(1)
Configuring Printing with CUPS
651(3)
Configuring CUPS
651(3)
Configuring E-mail
654(2)
Configuring SQL Databases
656(1)
Questions
657(5)
Answers
662(3)
Appendix About the Online Content 665(4)
System Requirements
665(1)
Your Total Seminars Training Hub Account
665(1)
Privacy Notice
665(1)
Single User License Terms and Conditions
665(2)
TotalTester Online
667(1)
Other Book Resources
667(1)
Virtual Machines
667(1)
Videos
668(1)
Book Figures
668(1)
Technical Support
668(1)
Index 669
Ted Jordan has more than 25 years of UNIX, IRIX, Solaris, and Linux experience. He is founder and president of two successful tech companies, including Funutation Tekademy Inc., which teaches kids programming on Linux-based Raspberry Pi systems their franchise operators. Sandor Strohmayer has been an instructor for over 20 years. He has authored multiple Linux training guides and created learning programs for several corporate entities. Mr. Strohmayer specializes in developing book, e-learning, and blended learning course materials.