Muutke küpsiste eelistusi

CompTIA Linuxplus Study Guide: Exam XK0-005 5th edition [Pehme köide]

  • Formaat: Paperback / softback, 992 pages, kõrgus x laius x paksus: 234x188x51 mm, kaal: 1293 g
  • Sari: Sybex Study Guide
  • Ilmumisaeg: 20-Oct-2022
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 1119878942
  • ISBN-13: 9781119878940
Teised raamatud teemal:
  • Pehme köide
  • Hind: 56,89 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 66,92 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 992 pages, kõrgus x laius x paksus: 234x188x51 mm, kaal: 1293 g
  • Sari: Sybex Study Guide
  • Ilmumisaeg: 20-Oct-2022
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 1119878942
  • ISBN-13: 9781119878940
Teised raamatud teemal:
The best-selling, hands-on roadmap to acing the new Linux+ exam

In the newly updated Fifth Edition of CompTIA Linux+ Study Guide: Exam XK0-005, IT industry veterans and tech education gurus Richard Blum and Christine Bresnahan deliver a concise and practical blueprint to success on the CompTIA Linux+ exam and in your first role as a Linux network or system administrator.

In the book, youll find concrete strategies and proven techniques to master Linux system management, security, scripting, containers, automation, and troubleshooting. Every competency tested on the Linux+ exam is discussed here. Youll also get:





Hands-on Linux advice that ensures youre job-ready on the first day of your new network or sysadmin role Test-taking tips and tactics that decrease exam anxiety and get you ready for the challenging Linux+ exam Complimentary access to the Sybex learning environment, complete with online test bank, bonus practice exams, electronic flashcards, and a searchable glossary

Perfect for practicing network and system admins seeking an in-demand and valuable credential for working with Linux servers and computers, CompTIA Linux+ Study Guide: Exam XK0-005, Fifth Edition, will also earn a place in the libraries of people looking to change careers and start down an exciting new path in tech.

And save 10% when you purchase your CompTIA exam voucher with our exclusive WILEY10 coupon code.
Introduction xxi
Assessment Test
xliv
Answers to Assessment Test
lv
Part I Gathering Your Tools 1(130)
Chapter 1 Preparing Your Environment
3(14)
Setting Up a Learning Space
4(4)
Using That Old Laptop
4(1)
Creating a Virtualized Environment
5(2)
Jumping to the Cloud
7(1)
Exploring Linux Distributions
8(6)
Looking at Red Hat Enterprise Linux
9(1)
Looking at Ubuntu
10(1)
Looking at openSUSE
11(1)
Looking at Fedora
12(2)
Locating a Terminal
14(1)
Summary
15(2)
Chapter 2 Introduction to Services
17(26)
What Is a Linux Server?
18(4)
Launching Services
19(1)
Listening for Clients
20(2)
Serving the Basics
22(5)
Web Servers
22(1)
Database Servers
23(2)
Mail Servers
25(2)
Serving Local Networks
27(4)
File Servers
27(1)
Print Servers
28(1)
Network Resource Servers
29(2)
Implementing Security
31(4)
Authentication Server
31(2)
Certificate Authority
33(1)
Access Server (SSH)
33(1)
Virtual Private Networks
34(1)
Proxy Server
34(1)
Monitoring
34(1)
Improving Performance
35(1)
Clustering
35(1)
Load Balancing
35(1)
Containers
35(1)
Summary
36(1)
Exam Essentials
37(1)
Review Questions
38(5)
Chapter 3 Managing Files, Directories, and Text
43(46)
Handling Files and Directories
44(16)
Viewing and Creating Files
44(6)
Copying and Moving Files
50(6)
Removing Files
56(4)
Linking Files and Directories
60(3)
Establishing a Hard Link
60(2)
Constructing a Soft Link
62(1)
Reading Files
63(8)
Reading Entire Text Files
64(2)
Reading Text File Portions
66(4)
Reading Text File Pages
70(1)
Finding Information
71(11)
Viewing File Information
72(1)
Exploring File Differences
72(3)
Using Simple Pinpoint Commands
75(4)
Using Intricate Pinpoint Commands
79(3)
Summary
82(1)
Exam Essentials
83(1)
Review Questions
84(5)
Chapter 4 Searching and Analyzing Text
89(42)
Processing Text Files
90(11)
Filtering Text
90(5)
Formatting Text
95(4)
Determining Word Count
99(2)
Redirecting Input and Output
101(10)
Handling Standard Output
101(1)
Redirecting Standard Error
102(2)
Regulating Standard Input
104(2)
Piping Commands
106(2)
Creating Here Documents
108(1)
Creating Command Lines
109(2)
Editing Text Files
111(12)
Appreciating Text Editors
111(5)
Learning about Stream Editors
116(7)
Summary
123(1)
Exam Essentials
124(1)
Review Questions
125(6)
Part II Starting Up and Configuring Your System 131(158)
Chapter 5 Explaining the Boot Process
133(24)
The Linux Boot Process
134(2)
Following the Boot Process
134(1)
Viewing the Boot Process
135(1)
The Firmware Startup
136(2)
The BIOS Startup
136(1)
The UEFI Startup
137(1)
Linux Bootloaders
138(8)
GRUB Legacy
139(4)
GRUB2
143(2)
Alternative Bootloaders
145(1)
System Recovery
146(4)
Kernel Failures
146(2)
Root Drive Failure
148(2)
Summary
150(1)
Exam Essentials
150(2)
Review Questions
152(5)
Chapter 6 Maintaining System Startup and Services
157(42)
Looking at init
158(1)
Managing systemd Systems
159(19)
Exploring Unit Files
160(2)
Focusing on Service Unit Files
162(5)
Focusing on Target Unit Files
167(1)
Looking at systemctl
168(4)
Examining Special systemd Commands
172(6)
Managing SysV init Systems
178(9)
Understanding Runlevels
178(4)
Investigating SysV init Commands
182(5)
Digging Deeper into systemd
187(4)
Looking at systemd Mount Units
187(2)
Exploring Automount Units
189(1)
Focusing on Timer Unit Files
190(1)
Summary
191(1)
Exam Essentials
191(3)
Review Questions
194(5)
Chapter 7 Configuring Network Connections
199(36)
Configuring Network Features
200(14)
Network Configuration Files
201(2)
Graphical Tools
203(2)
Command-Line Tools
205(9)
Command-Line Networking Tool
214(3)
Basic Network Troubleshooting
217(5)
Sending Test Packets
217(2)
Finding Host Information
219(3)
Advanced Network Troubleshooting
222(6)
The netstat Command
222(4)
Examining Sockets
226(1)
Monitoring the Network
226(2)
Summary
228(1)
Exam Essentials
229(2)
Review Questions
231(4)
Chapter 8 Comparing GUIs
235(34)
Focusing on the GUI
236(11)
Getting to Know GNOME
237(2)
Probing KDE Plasma
239(2)
Considering Cinnamon
241(2)
Making Acquaintance with MATE
243(2)
Setting Up Accessibility
245(2)
Serving Up the GUI
247(5)
Figuring Out Wayland
248(2)
Examining X11
250(2)
Using Remote Desktops
252(5)
Viewing VNC
252(2)
Grasping Xrdp
254(2)
Exploring NX
256(1)
Studying SPICE
257(1)
Forwarding
257(5)
Local
259(1)
Remote
260(1)
Tunneling Your X11 Connection
261(1)
Summary
262(1)
Exam Essentials
262(2)
Review Questions
264(5)
Chapter 9 Adjusting Localization Options
269(20)
Understanding Localization
270(2)
Character Sets
270(1)
Environment Variables
271(1)
Setting Your Locale
272(3)
Installation Locale Decisions
272(1)
Changing Your Locale
272(3)
Looking at Time
275(6)
Working with Time Zones
275(1)
Setting the Time and Date
276(4)
Watching System Time
280(1)
Summary
281(1)
Exam Essentials
282(2)
Review Questions
284(5)
Part III Managing Your System 289(148)
Chapter 10 Administering Users and Groups
291(38)
Managing User Accounts
292(17)
Adding Accounts
292(12)
Maintaining Passwords
304(2)
Modifying Accounts
306(2)
Deleting Accounts
308(1)
Managing Groups
309(4)
Setting Up the Environment
313(3)
Perusing Bash Parameters
313(1)
Understanding User Entries
314(2)
Grasping Global Entries
316(1)
Querying Users
316(4)
Exploring the whoami Utility
316(1)
Understanding the who Utility
317(1)
Identifying with the id Program
318(1)
Displaying Access History with the last Utility
319(1)
Managing Disk Space Usage
320(3)
Summary
323(1)
Exam Essentials
324(1)
Review Questions
325(4)
Chapter 11 Handling Storage
329(34)
Storage Basics
330(2)
Drive Connections
330(1)
Partitioning Drives
331(1)
Automatic Drive Detection
331(1)
Partitioning Tools
332(5)
Working with fdisk
332(2)
Working with gdisk
334(2)
The GNU parted Command
336(1)
Graphical Tools
337(1)
Understanding Filesystems
337(4)
The Virtual Directory
338(3)
Maneuvering around the Filesystem
341(1)
Formatting Filesystems
341(3)
Common Filesystem Types
341(2)
Creating Filesystems
343(1)
Mounting Filesystems
344(2)
Manually Mounting Devices
344(1)
Automatically Mounting Devices
345(1)
Managing Filesystems
346(3)
Retrieving Filesystem Stats
346(2)
Filesystem Tools
348(1)
Storage Alternatives
349(9)
Multipath
350(1)
Logical Volume Manager
350(4)
Using RAID Technology
354(1)
Encrypting Partitions
355(3)
Summary
358(1)
Exam Essentials
358(2)
Review Questions
360(3)
Chapter 12 Protecting Files
363(30)
Understanding Backup Types
364(2)
Looking at Compression Methods
366(2)
Comparing Archive and Restore Utilities
368(14)
Copying with cpio
369(3)
Archiving with tar
372(5)
Duplicating with dd
377(3)
Replicating with rsync
380(2)
Securing Offsite/Off-System Backups
382(5)
Copying Securely via scp
382(2)
Transferring Securely via sftp
384(3)
Checking Backup Integrity
387(2)
Digesting an MD5 Algorithm
387(1)
Securing Hash Algorithms
388(1)
Summary
389(1)
Exam Essentials
389(1)
Review Questions
390(3)
Chapter 13 Governing Software
393(30)
Working with Source Code
394(6)
Downloading Source Code
394(1)
Bundling Source Code Packages
395(4)
Compiling Source Code
399(1)
Packaging Applications
400(13)
Installing and Managing Packages
401(4)
Understanding Repositories
405(8)
Using Application Containers
413(5)
Using Snap Containers
414(2)
Using Flatpak Containers
416(2)
Summary
418(1)
Exam Essentials
419(2)
Review Questions
421(2)
Chapter 14 Tending Kernel Modules
423(14)
Exploring Kernel Modules
424(4)
Installing Kernel Modules
428(3)
Removing Kernel Modules
431(1)
Summary
432(1)
Exam Essentials
432(2)
Review Questions
434(3)
Part IV Securing Your System 437(134)
Chapter 15 Applying Ownership and Permissions
439(30)
Looking at File and Directory Permissions
440(8)
Understanding Ownership
440(2)
Controlling Access Permissions
442(3)
Exploring Special Permissions
445(1)
Managing Default Permissions
446(2)
Access Control Lists
448(2)
Context-Based Permissions
450(7)
Using SELinux
451(4)
Using AppArmor
455(2)
Understanding Linux User Types
457(2)
Types of User Accounts
458(1)
Escalating Privileges
458(1)
Restricting Users and Files
459(5)
Summary
464(1)
Exam Essentials
465(1)
Review Questions
466(3)
Chapter 16 Looking at Access and Authentication Methods
469(34)
Getting to Know PAM
470(13)
Exploring PAM Configuration Files
471(3)
Enforcing Strong Passwords
474(3)
Locking Out Accounts
477(4)
Limiting Root Access
481(2)
Exploring PKI Concepts
483(3)
Getting Certificates
483(1)
Discovering Key Concepts
483(1)
Securing Data
484(1)
Signing Transmissions
485(1)
Using SSH
486(10)
Exploring Basic SSH Concepts
486(2)
Configuring SSH
488(2)
Generating SSH Keys
490(2)
Authenticating with SSH Keys
492(2)
Authenticating with the Authentication Agent
494(2)
Using SSH Securely
496(2)
Using VPN as a Client
498(1)
Summary
499(1)
Exam Essentials
499(2)
Review Questions
501(2)
Chapter 17 Implementing Logging Services
503(14)
Understanding the Importance of Logging
504(3)
The syslog Protocol
504(2)
The History of Linux Logging
506(1)
Basic Logging Using rsyslog
507(3)
Configuration
507(2)
Making Log Entries
509(1)
Finding Event Messages
509(1)
Journaling with systemd-journald
510(3)
Configuration
510(1)
Viewing Logs
511(2)
Summary
513(1)
Exam Essentials
514(1)
Review Questions
515(2)
Chapter 18 Overseeing Linux Firewalls
517(30)
Providing Access Control
518(2)
Looking at Firewall Technologies
520(19)
Familiarizing Yourself with firewalld
521(4)
Investigating iptables
525(5)
Exploring nftables
530(3)
Understanding UFW
533(6)
Forwarding IP Packets
539(1)
Dynamically Setting Rules
539(3)
DenyHosts
539(1)
Fail2Ban
540(1)
IPset
540(2)
Summary
542(1)
Exam Essentials
542(2)
Review Questions
544(3)
Chapter 19 Embracing Best Security Practices
547(24)
User Security
548(13)
Authentication Methods
548(2)
Multifactor Authentication
550(1)
Unique User Accounts
551(1)
Enforce Strong Passwords
551(2)
Restricting the Root Account
553(2)
Separation of Data
555(1)
Disk Encryption
556(1)
Restricting Applications
556(1)
Preventing Unauthorized Rebooting
557(2)
Restricting Unapproved Jobs
559(1)
Banners and Messages
559(1)
Restricting USB Devices
559(1)
Looking for Trouble
560(1)
Auditing
561(1)
Network Security
561(3)
Denying Hosts
561(1)
Disabling Unused Services
562(1)
Changing Default Ports
562(1)
Using Encryption on the Network
563(1)
Summary
564(1)
Exam Essentials
565(2)
Review Questions
567(4)
Part V Troubleshooting Your System 571(126)
Chapter 20 Analyzing System Properties and Remediation
573(34)
Troubleshooting the Network
574(13)
Exploring Network Issues
574(4)
Viewing Network Performance
578(6)
Reviewing the Network's Configuration
584(3)
Troubleshooting Storage Issues
587(7)
Running Out of Filesystem Space
587(1)
Waiting on Disk I/O
588(3)
Measuring Disk Performance
591(2)
Failing Disks
593(1)
Troubleshooting the CPU
594(1)
Troubleshooting Memory
595(5)
Swapping
596(3)
Running Out of Memory
599(1)
Surviving a Lost Root Password
600(1)
Summary
601(1)
Exam Essentials
601(2)
Review Questions
603(4)
Chapter 21 Optimizing Performance
607(16)
Looking at Processes
608(2)
Monitoring Processes in Real Time
610(4)
Managing Processes
614(4)
Setting Priorities
614(1)
Stopping Processes
615(3)
Summary
618(1)
Exam Essentials
619(1)
Review Questions
620(3)
Chapter 22 Investigating User Issues
623(20)
Troubleshooting Access
624(7)
Local
624(5)
Remote
629(1)
Authentication
630(1)
Examining File Obstacles
631(5)
File Permissions
631(1)
Directory Permissions
632(1)
Working with Advanced Permissions
633(2)
File Creation
635(1)
Exploring Environment and Shell Issues
636(2)
Summary
638(1)
Exam Essentials
638(1)
Review Questions
639(4)
Chapter 23 Dealing with Linux Devices
643(24)
Communicating with Linux Devices
644(7)
Device Interfaces
644(3)
The /dev Directory
647(1)
The /proc Directory
648(2)
The /sys Directory
650(1)
Working with Devices
651(8)
Finding Devices
651(3)
Working with PCI Devices
654(1)
Working with USB Devices
655(1)
Supporting Monitors
656(2)
Using Printers
658(1)
Using Hot-Pluggable Devices
659(3)
Detecting Dynamic Devices
660(1)
Working with Dynamic Devices
660(2)
Summary
662(1)
Exam Essentials
662(2)
Review Questions
664(3)
Chapter 24 Troubleshooting Application and Hardware Issues
667(30)
Dealing with Storage Problems
668(6)
Exploring Common Issues
668(2)
Dealing with Specialized Issues
670(4)
Uncovering Application Permission Issues
674(3)
Analyzing Application Dependencies
677(4)
Versioning
677(1)
Updating Issues
677(1)
Patching
678(1)
Dealing with Libraries
679(1)
Exploring Environment Variable Issues
679(1)
Gaining GCC Compatibility
680(1)
Perusing Repository Problems
680(1)
Looking at SELinux Context Violations
681(1)
Exploring Firewall Blockages
682(2)
Unrestricting ACLs
682(1)
Unblocking Ports
683(1)
Unblocking Protocols
683(1)
Troubleshooting Additional Hardware Issues
684(8)
Looking at Helpful Hardware Commands
684(4)
Investigating Other Hardware Problems
688(4)
Summary
692(1)
Exam Essentials
692(2)
Review Questions
694(3)
Part VI Automating Your System 697(74)
Chapter 25 Deploying Bash Scripts
699(28)
The Basics of Shell Scripting
700(5)
Running Multiple Commands
700(1)
Redirecting Output
701(1)
Piping Data
702(1)
The Shell Script Format
703(1)
Running the Shell Script
704(1)
Advanced Shell Scripting
705(6)
Displaying Messages
706(1)
Using Variables
706(3)
Command-Line Arguments
709(1)
The Exit Status
710(1)
Writing Script Programs
711(10)
Command Substitution
711(1)
Performing Math
712(2)
Logic Statements
714(3)
Loops
717(3)
Text Manipulation
720(1)
Summary
721(1)
Exam Essentials
722(2)
Review Questions
724(3)
Chapter 26 Automating Jobs
727(22)
Running Scripts in Background Mode
728(2)
Running in the Background
728(1)
Running Multiple Background Jobs
729(1)
Running Scripts without a Console
730(2)
Sending Signals
732(2)
Interrupting a Process
732(1)
Pausing a Process
732(2)
Job Control
734(3)
Viewing Jobs
734(2)
Restarting Stopped Jobs
736(1)
Running Like Clockwork
737(7)
Scheduling a Job Using the at Command
737(3)
Scheduling Regular Scripts
740(4)
Summary
744(1)
Exam Essentials
744(2)
Review Questions
746(3)
Chapter 27 Controlling Versions with Git
749(22)
Understanding Version Control
750(2)
Setting Up Your Git Environment
752(3)
Committing with Git
755(7)
Tags
762(1)
Merging Versions
763(3)
Summary
766(1)
Exam Essentials
766(2)
Review Questions
768(3)
Part VII Realizing Virtual and Cloud Environments 771(58)
Chapter 28 Understanding Cloud and Virtualization Concepts
773(18)
Considering Cloud Services
774(3)
What Is Cloud Computing?
774(1)
What Are the Cloud Services?
775(2)
Understanding Virtualization
777(4)
Hypervisors
778(1)
Types of Hypervisors
779(2)
Hypervisor Templates
781(1)
Exploring Containers
781(5)
What Are Containers?
781(1)
Container Software
782(1)
Container Templates
783(1)
Working with Docker
783(3)
Summary
786(1)
Exam Essentials
787(1)
Review Questions
788(3)
Chapter 29 Inspecting Cloud and Virtualization Services
791(22)
Focusing on VM Tools
792(4)
Looking at libvirt
792(1)
Viewing virsh
793(1)
Managing with Virtual Machine Manager
794(2)
Understanding Bootstrapping
796(6)
Booting with Shell Scripts
796(1)
Kickstarting with Anaconda
797(4)
Initializing with Cloud-init
801(1)
Exploring Storage Issues
802(2)
Considering Network Configurations
804(4)
Virtualizing the Network
804(1)
Configuring Virtualized NICs
805(3)
Summary
808(1)
Exam Essentials
808(2)
Review Questions
810(3)
Chapter 30 Orchestrating the Environment
813(16)
Understanding Orchestration Concepts
814(5)
Probing Procedures
815(1)
Analyzing Attributes
816(3)
Provisioning the Data Center
819(3)
Coding the Infrastructure
819(1)
Automating the Infrastructure
820(1)
Comparing Agent and Agentless
821(1)
Investigating the Inventory
821(1)
Looking at Container Orchestration Engines
822(1)
Embracing Kubernetes
822(1)
Inspecting Docker Swarm
823(1)
Surveying Mesos
823(1)
Summary
823(1)
Exam Essentials
824(1)
Review Questions
825(4)
Appendix Answers to the Review Questions 829(68)
Chapter 2: Introduction to Services
830(3)
Chapter 3: Managing Files, Directories, and Text
833(4)
Chapter 4: Searching and Analyzing Text
837(4)
Chapter 5: Explaining the Boot Process
841(3)
Chapter 6: Maintaining System Startup and Services
844(4)
Chapter 7: Configuring Network Connections
848(3)
Chapter 8: Comparing GUIs
851(4)
Chapter 9: Adjusting Localization Options
855(3)
Chapter 10: Administering Users and Groups
858(3)
Chapter 11: Handling Storage
861(2)
Chapter 12: Protecting Files
863(1)
Chapter 13: Governing Software
864(2)
Chapter 14: Tending Kernel Modules
866(2)
Chapter 15: Applying Ownership and Permissions
868(1)
Chapter 16: Looking at Access and Authentication Methods
869(2)
Chapter 17: Implementing Logging Services
871(1)
Chapter 18: Overseeing Linux Firewalls
872(2)
Chapter 19: Embracing Best Security Practices
874(2)
Chapter 20: Analyzing System Properties and Remediation
876(2)
Chapter 21: Optimizing Performance
878(2)
Chapter 22: Investigating User Issues
880(1)
Chapter 23: Dealing with Linux Devices
881(2)
Chapter 24: Troubleshooting Application and Hardware Issues
883(2)
Chapter 25: Deploying Bash Scripts
885(2)
Chapter 26: Automating Jobs
887(2)
Chapter 27: Controlling Versions with Git
889(1)
Chapter 28: Understanding Cloud and Virtualization Concepts
890(2)
Chapter 29: Inspecting Cloud and Virtualization Services
892(2)
Chapter 30: Orchestrating the Environment
894(3)
Index 897
RICHARD BLUM has over 35 years of experience working as a system and network administrator. He teaches online courses in Linux and Web programming and is co-author with Christine Bresnahan of several Linux titles, including CompTIA Linux+ Study Guide, Linux Essentials, Mastering Linux System Administration, and the Linux Command Line and Shell Scripting Bible.

CHRISTINE BRESNAHAN has over 35 years of experience working in the IT industry. She is an Adjunct Professor at Ivy Tech Community College where she teaches Linux certification and Python programming classes. She is co-author with Richard Blum of CompTIA Linux+ Study Guide, Linux Essentials, Mastering Linux System Administration, and the Linux Command Line and Shell Scripting Bible.