Muutke küpsiste eelistusi

Hands-on Guide to the Red Hat Exams: RHCSA and RHCE Cert Guide and Lab Manual [Pehme köide]

  • Formaat: Paperback / softback, 600 pages, kõrgus x laius x paksus: 196x235x32 mm, kaal: 1028 g
  • Ilmumisaeg: 05-May-2011
  • Kirjastus: Addison-Wesley Educational Publishers Inc
  • ISBN-10: 0321767950
  • ISBN-13: 9780321767950
Teised raamatud teemal:
  • Pehme köide
  • Hind: 53,19 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 600 pages, kõrgus x laius x paksus: 196x235x32 mm, kaal: 1028 g
  • Ilmumisaeg: 05-May-2011
  • Kirjastus: Addison-Wesley Educational Publishers Inc
  • ISBN-10: 0321767950
  • ISBN-13: 9780321767950
Teised raamatud teemal:

Master every topic on Red Hat’s new RHCSA™ and RHCE® exams.

  • Assess your knowledge and focus your learning.
  • Get the practical workplace knowledge you need!

Start-to-finish RHCSA™ and RHCE® preparation from leading Linux system administrator, IT trainer, and certification expert Damian Tommasino!

Master every RHCSA™ and RHCE® topic!

  • Red Hat Enterprise Linux 6 local and network installation
  • System services, runlevels, and bootup
  • Disks, partitions, and file systems, including LUKS encryption
  • Networking
  • Package management
  • User administration
  • Logging, monitoring, and automation
  • Kernel updates and tuning
  • Security, including SELinux, firewalls, and policies
  • Remote access, including SSH
  • Apache, Squid, DNS, DHCP, NTP, and email
  • NFS and Samba
  • Client and network troubleshooting
  • KVM virtualization

Test your knowledge, build your confidence, and succeed!

  • 22 hands-on RHCSA™ and RHCE® Labs, each with multiple real-world tasks
  • Downloadable troubleshooting scripts
  • Practical tutorials and real-world tips
  • Exam tips
  • Red Hat Enterprise Linux 6 Command Quick Reference
  • Exclusive Red Hat exam prep advice and task lists
  • Two full length lab-based practice exams

Damian Tommasino (RHCE, RHCSA, MCSA, CCNA, CCENT, MCP, Security+, Network+, A+) is a Linux system administrator at TradeCard and CEO of Modular Learning Inc., an online IT training company. He blogs on Red Hat, Linux, and security at Security Nut (http://secnut.blogspot.com), and actively contributes to the popular IT exam certification forums at techexams.net.

Preface vi
Introduction 3(26)
Chapter 1 Installation
29(18)
Starting the Installation
29(11)
An Older Install with RHEL5
33(4)
The Firstboot Process
37(3)
Verifying the Installation
40(1)
Summary
41(1)
Review Questions
42(1)
Answers to Review Questions
42(5)
Chapter 2 System Initialization
47(24)
The Boot Process
47(4)
Working with GRUB
51(4)
The Config File
52(2)
The GRUB Command Line
54(1)
Runlevels
55(4)
Runlevel Utilities
56(3)
Rescue and Recovery Runlevels
59(1)
Service Management
59(7)
The Upstart Conversion
64(2)
Summary
66(1)
Review Questions
66(1)
Answers to Review Questions
67(4)
Chapter 3 Disks and Partitioning
71(42)
Basic Partitions
71(14)
Creating a Partition
75(6)
Making a Swap Partition
81(2)
Deleting a Partition
83(2)
Logical Volume Manager
85(16)
Creating an LVM Partition
89(4)
Adjusting the Size of LVM Partitions
93(3)
Migrating Data
96(3)
Deleting an LVM Partition
99(2)
Setting Up RAID
101(8)
Creating a RAID Array
102(3)
What to Do When a Disk Fails
105(3)
Deleting a RAID Array
108(1)
Summary
109(1)
Review Questions
109(1)
Answers to Review Questions
109(4)
Chapter 4 File Systems and Such
113(36)
File System Setup
113(15)
Creating a File System
114(2)
Creating a Swap
116(3)
Mounting a File System
119(6)
Extra File System Commands
125(3)
Encryption with LUKS
128(4)
Creating Encrypted Partitions
129(3)
Mounting LUKS at Boot
132(1)
Managing File System Quotas
132(5)
Setting Up Quotas
132(2)
Enabling Quotas
134(3)
Quota Usage Reports
137(1)
File System Security
137(4)
Setting Up ACLs
138(3)
GnuPG
141(1)
Using AutoFS
141(3)
Summary
144(1)
Review Questions
144(1)
Answers to Review Questions
145(4)
Chapter 5 Networking
149(20)
Setting Up Networking
149(7)
Static IP Addresses
151(4)
Routing
155(1)
Creating Static Routes
156(1)
Troubleshooting Network Connections
156(4)
Networking Utilities
157(2)
Network Monitoring and Analysis
159(1)
Advanced Networking
160(1)
Ethernet Bonding
160(1)
Client DNS Troubleshooting
161(3)
Summary
164(1)
Review Questions
165(1)
Answers to Review Questions
165(4)
Chapter 6 Package Management
169(26)
Working with RPM
169(8)
Installing and Removing Packages
170(2)
Querying and Verifying Packages
172(5)
Doing It Again with Yum
177(7)
Installing and Removing Packages
178(4)
Searching for Packages
182(1)
Configuring Additional Repositories
183(1)
Making Your Own RPM
184(4)
Creating an RPM
185(3)
Creating Your Own Repository
188(2)
Adding Your Custom Packages
190(1)
The Red Hat Network
190(1)
Registering Your System
191(1)
Summary
191(1)
Review Questions
192(1)
Answers to Review Questions
192(3)
Chapter 7 User Administration
195(26)
Users and Groups
195(12)
Users
196(3)
Passwords
199(1)
The Password File
200(1)
The Shadow File
201(3)
Groups
204(1)
The Group File
204(2)
Switching Accounts
206(1)
User Account Initialization
207(2)
User-Specific Files
207(1)
Global User Configuration
208(1)
Group Collaboration
209(2)
Network User Authentication
211(4)
Summary
215(1)
Review Questions
215(1)
Answers to Review Questions
216(5)
Chapter 8 Network Installs
221(18)
Kickstart Server Setup
221(4)
Firewall and SELinux Configuration
224(1)
Mastering Kickstart Config Files
225(3)
Post Install
227(1)
Advanced Partitioning
227(1)
Automating Kickstart
228(6)
TFTP Server
229(3)
PXE Boot
232(1)
Firewall and SELinux Configuration
233(1)
Other Network Installs
234(1)
Summary
235(1)
Review Questions
235(1)
Answers to Review Questions
236(3)
Chapter 9 System Logging, Monitoring, and Automation
239(26)
Working with Syslog
239(9)
The Config File
241(2)
Log Rotation
243(1)
Centralized Logging
244(2)
Centralized Logging (The RHEL5 Way)
246(1)
User Login Events
247(1)
Monitoring System Performance
248(4)
Automation with cron and at
252(9)
Creating cron Jobs
254(4)
Single Jobs with at
258(3)
Summary
261(1)
Review Questions
261(1)
Answers to Review Questions
262(3)
Chapter 10 The Kernel
265(12)
Kernel Basics
265(3)
Updating the Kernel
268(4)
Tuning the Kernel with /proc/sys
272(2)
Summary
274(1)
Review Questions
275(1)
Answers to Review Questions
275(2)
Chapter 11 SELinux
277(14)
Understanding SELinux
277(9)
Configuring SELinux
279(1)
File Contexts
279(4)
Service and Boolean Options
283(3)
SELinux Troubleshooting
286(1)
Policy Violations
286(1)
Summary
287(1)
Review Questions
287(1)
Answers to Review Questions
288(3)
Chapter 12 System Security
291(18)
Security Through TCP Wrappers
291(2)
Firewall Rules Using iptables
293(7)
Configuring iptables
294(5)
Troubleshooting Firewall Rules
299(1)
Working with NAT
300(1)
Pluggable Authentication Module
301(4)
Securing Access
301(2)
PAM Troubleshooting
303(1)
Managing Password Policies
304(1)
Summary
305(1)
Review Questions
305(1)
Answers to the Review Questions
306(3)
Chapter 13 Remote Access
309(16)
Secure SHell (SSH)
309(6)
Configuring SSH
310(3)
Firewall and SELinux Configuration
313(1)
SSH Security
314(1)
Troubleshooting SSH
315(1)
SSH Security Revisited
315(3)
Public/Private Keys
316(1)
Port Forwarding
317(1)
VNC Servers
318(3)
Connecting Clients
320(1)
Summary
321(1)
Review Questions
321(1)
Answers to Review Questions
321(4)
Chapter 14 Web Services
325(26)
The Apache Web Server
325(9)
Installing Apache
325(1)
Configuring the Web Server
326(3)
Firewall and SELinux Configuration
329(3)
Troubleshooting Apache
332(2)
Apache Security
334(7)
Host-Based Security
334(2)
User-Based Security
336(3)
Setting Up HTTPS
339(2)
CGI Applications
341(1)
Virtual Hosts
342(1)
Squid Web Proxy
343(4)
Installing Squid
344(1)
Configuring the Proxy
344(1)
Firewall and SELinux Configuration
345(1)
Web Proxy Security
346(1)
Summary
347(1)
Review Questions
347(1)
Answers to Review Questions
348(3)
Chapter 15 NFS
351(18)
Network File Systems
351(9)
Installing an NFS Server
352(1)
Configuring NFS
353(5)
Firewall and SELinux Configuration
358(2)
NFS Security
360(1)
Troubleshooting NFS
361(3)
Connecting Clients
364(2)
Summary
366(1)
Review Questions
366(1)
Answers to Review Questions
366(3)
Chapter 16 Samba
369(14)
Samba
369(8)
Configuring Samba
370(7)
Samba Security
377(1)
Samba Clients
377(2)
Summary
379(1)
Review Questions
380(1)
Answers to Review Questions
380(3)
Chapter 17 FTP
383(10)
File Transfer Protocol
383(5)
Installing an FTP Server
384(1)
Configuring vsftp
384(2)
Firewall and SELinux Configuration
386(2)
FTP Security
388(1)
Troubleshooting FTP
389(1)
Summary
390(1)
Review Questions
390(1)
Answers to Review Questions
391(2)
Chapter 18 DNS
393(28)
Setting Up BIND
393(3)
Firewall and SELinux Configuration
394(2)
Configuring a DNS Server
396(10)
Master Server
397(4)
Slave Server
401(3)
Caching-Only Server
404(2)
Forwarding-Only Server
406(1)
DNS Utilities and Troubleshooting
406(6)
BIND Security
412(5)
Summary
417(1)
Review Questions
417(1)
Answers to Review Questions
418(3)
Chapter 19 Network Services
421(22)
Xinetd: The Master Service
421(5)
Dynamic Host Configuration Protocol
426(7)
Installing a DHCP Server
426(1)
Configuring the DHCP Server
427(4)
Security Configuration
431(1)
Troubleshooting DHCP
432(1)
Network Time Protocol
433(6)
Installing a Time Server
434(1)
Configuring NTP
434(2)
Firewall and SELinux Configuration
436(1)
NTP Security
437(1)
Troubleshooting NTP
438(1)
Summary
439(1)
Review Questions
439(1)
Answers to Review Questions
439(4)
Chapter 20 Email Services
443(20)
Email Service Overview
443(1)
SMTP with Postfix
443(9)
Configuring Postfix
445(4)
Firewall and SELinux Configuration
449(1)
Postfix Security
450(1)
Alias Mapping
451(1)
Receiving Mail with Dovecot
452(4)
Configuring Dovecot
452(1)
Firewall and SELinux Configuration
453(1)
Dovecot Security
454(2)
Testing the Mail Server
456(2)
Summary
458(1)
Review Questions
459(1)
Answers to Review Questions
459(4)
Chapter 21 Troubleshooting
463(10)
Boot Issues
463(3)
I Lost My Root User Password
463(1)
Password Change Not Available in Single-User Mode
464(1)
The MBR Is Corrupt
464(1)
The Partition or Root File System Can't Be Found
465(1)
Troubleshooting File Systems
466(2)
The System Complains About a File System Label
466(1)
The Superblock Has Become Corrupt
466(1)
Users Can't Create Files in Their Home Directories
467(1)
Miscellaneous
468(2)
I Can't Remote into My System
468(1)
I Can't Access Service X
468(1)
When I Start a Service, It Tells Me "Cannot Bind to Address"
469(1)
I Get the Error Message "No Route to Host"
469(1)
My Ping to Another Host Has Failed
470(1)
Summary
470(3)
Chapter 22 Visualization with KVM
473(10)
Working with Virtual Machines
473(6)
Setting Up the Physical Host
473(1)
Installing a Virtual Client
474(3)
Managing a Virtual Client
477(2)
Monitoring Virtual Resources
479(1)
Summary
480(1)
Review Questions
480(1)
Answers to Review Questions
481(2)
Lab Exam 1 483(2)
Lab Exam 2 485(1)
Index 486
Damian Tommasino is currently a Linux system administrator at TradeCard and CEO of Modular Learning, Inc., an online IT training company. His current certifications include RHCE, RHCSA, MCSA, CCNA, CCENT, MCP, Security+, Network+, and A+. He has a popular blog called Security Nut (http://secnut.blogspot.com) that covers Red Hat, Linux, security, and more. Damian also spends time over at techexams.net helping out in the forums and conversing with friends.