Preface |
|
xiii | |
Acknowledgments |
|
xv | |
About the Author |
|
xvii | |
|
|
1 | (22) |
|
|
2 | (1) |
|
|
3 | (7) |
|
|
3 | (3) |
|
Software Program Management |
|
|
6 | (2) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (7) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (2) |
|
|
15 | (2) |
|
The Command Line Interface |
|
|
17 | (1) |
|
Linux Distributions: Why So Many? |
|
|
18 | (2) |
|
|
18 | (1) |
|
Derivative Linux Distributions |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (2) |
|
Chapter 2 Linux and Software |
|
|
23 | (28) |
|
Popular Linux Applications |
|
|
24 | (5) |
|
|
24 | (4) |
|
|
28 | (1) |
|
Exploring Package Management |
|
|
29 | (12) |
|
Exploring the Debian-Based Systems |
|
|
30 | (8) |
|
The Red Hat--Based Systems |
|
|
38 | (3) |
|
Managing Software Using Containers |
|
|
41 | (4) |
|
|
42 | (2) |
|
|
44 | (1) |
|
Installing from Source Code |
|
|
45 | (4) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
Chapter 3 Linux and Hardware |
|
|
51 | (22) |
|
|
52 | (6) |
|
Listing Installed Modules |
|
|
53 | (2) |
|
|
55 | (3) |
|
|
58 | (1) |
|
Communicating with Linux Devices |
|
|
58 | (6) |
|
|
58 | (2) |
|
|
60 | (1) |
|
|
61 | (2) |
|
|
63 | (1) |
|
|
64 | (5) |
|
|
64 | (3) |
|
|
67 | (1) |
|
|
68 | (1) |
|
Using Hot Pluggable Devices |
|
|
69 | (1) |
|
Detecting Dynamic Devices |
|
|
69 | (1) |
|
Working with Dynamic Devices |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
73 | (22) |
|
|
74 | (2) |
|
Following the Boot Process |
|
|
74 | (1) |
|
|
74 | (2) |
|
|
76 | (2) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (5) |
|
|
78 | (3) |
|
|
81 | (2) |
|
|
83 | (1) |
|
|
83 | (9) |
|
|
84 | (3) |
|
|
87 | (5) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (2) |
|
Chapter 5 Disk Management |
|
|
95 | (24) |
|
|
97 | (2) |
|
|
97 | (1) |
|
|
98 | (1) |
|
Automatic Drive Detection |
|
|
98 | (1) |
|
|
99 | (4) |
|
|
99 | (2) |
|
|
101 | (1) |
|
|
101 | (2) |
|
|
103 | (1) |
|
Understanding File Systems |
|
|
103 | (3) |
|
|
104 | (2) |
|
Maneuvering Around the File System |
|
|
106 | (1) |
|
|
106 | (2) |
|
|
106 | (2) |
|
|
108 | (1) |
|
|
108 | (2) |
|
Manually Mounting Devices |
|
|
109 | (1) |
|
Automatically Mounting Devices |
|
|
109 | (1) |
|
|
110 | (2) |
|
Retrieving File System Stats |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
112 | (2) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (3) |
|
Chapter 6 Command Line Basics |
|
|
119 | (34) |
|
|
120 | (3) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
Accessing the Command Line |
|
|
123 | (4) |
|
|
124 | (2) |
|
|
126 | (1) |
|
|
127 | (4) |
|
|
127 | (1) |
|
|
128 | (3) |
|
Running Multiple Commands |
|
|
131 | (1) |
|
Redirecting Input and Output |
|
|
131 | (5) |
|
|
132 | (1) |
|
|
132 | (2) |
|
|
134 | (2) |
|
Linux Environment Variables |
|
|
136 | (5) |
|
Global Environment Variables |
|
|
136 | (2) |
|
Local Environment Variables |
|
|
138 | (1) |
|
Setting Environment Variables |
|
|
139 | (1) |
|
Removing Environment Variables |
|
|
140 | (1) |
|
|
141 | (9) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (2) |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
Chapter 7 File Management |
|
|
153 | (32) |
|
|
154 | (4) |
|
|
154 | (3) |
|
|
157 | (1) |
|
|
158 | (4) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (2) |
|
|
161 | (1) |
|
File and Directory Listing |
|
|
162 | (4) |
|
|
162 | (1) |
|
Modifying Listing Information |
|
|
163 | (1) |
|
The Complete Parameter List |
|
|
164 | (2) |
|
|
166 | (2) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (6) |
|
|
168 | (1) |
|
|
168 | (3) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
174 | (3) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (2) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (3) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
Chapter 8 Networking Concepts |
|
|
185 | (24) |
|
Configuring Network Features |
|
|
186 | (11) |
|
Network Configuration Files |
|
|
186 | (2) |
|
|
188 | (2) |
|
|
190 | (7) |
|
Basic Network Troubleshooting |
|
|
197 | (5) |
|
|
197 | (2) |
|
|
199 | (3) |
|
Advanced Network Troubleshooting |
|
|
202 | (4) |
|
|
202 | (3) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
Chapter 9 Managing Processes |
|
|
209 | (22) |
|
|
210 | (2) |
|
Monitoring Processes in Real Time |
|
|
212 | (1) |
|
|
213 | (4) |
|
|
213 | (2) |
|
|
215 | (2) |
|
Running Programs in Background Mode |
|
|
217 | (2) |
|
Running in the Background |
|
|
217 | (1) |
|
Running Multiple Background Jobs |
|
|
218 | (1) |
|
Running Programs Without a Console |
|
|
219 | (1) |
|
|
220 | (3) |
|
|
220 | (2) |
|
|
222 | (1) |
|
|
223 | (5) |
|
Scheduling a Job Using the at Command |
|
|
223 | (3) |
|
Scheduling Recurring Programs |
|
|
226 | (2) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
Chapter 10 Advanced Administration |
|
|
231 | (34) |
|
|
232 | (5) |
|
|
233 | (1) |
|
Accessing Administrator Privileges |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
Linux File and Directory Permissions |
|
|
237 | (7) |
|
|
237 | (1) |
|
Changing File or Directory Ownership |
|
|
238 | (1) |
|
Changing the File or Directory Group |
|
|
239 | (1) |
|
Controlling Access Permissions |
|
|
239 | (2) |
|
Exploring Special Permissions |
|
|
241 | (2) |
|
Managing Default Permissions |
|
|
243 | (1) |
|
Advanced Access Control Lists |
|
|
244 | (3) |
|
Managing the Date and Time |
|
|
247 | (2) |
|
Setting the Date and Time Manually |
|
|
247 | (1) |
|
Synching the Time Automatically |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
249 | (2) |
|
|
249 | (1) |
|
|
250 | (1) |
|
Using Linux Printer Drivers |
|
|
251 | (1) |
|
|
251 | (4) |
|
Describing Linux Email Architecture |
|
|
252 | (1) |
|
Identifying Linux Email Servers |
|
|
253 | (1) |
|
Using Linux Email Clients |
|
|
253 | (2) |
|
|
255 | (1) |
|
|
255 | (4) |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
259 | (3) |
|
|
259 | (2) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
264 | (1) |
|
Chapter 11 Linux Security |
|
|
265 | (26) |
|
|
266 | (6) |
|
Gaining Super User Privileges |
|
|
267 | (2) |
|
Determining Your Privilege Elevation Status |
|
|
269 | (1) |
|
Keeping Track of Root Logins |
|
|
270 | (1) |
|
Disabling Root Access from SSH |
|
|
270 | (1) |
|
Enabling Automatic Logout |
|
|
271 | (1) |
|
|
271 | (1) |
|
Context-Based Permissions |
|
|
272 | (7) |
|
|
273 | (6) |
|
|
279 | (2) |
|
Network Security Using Firewalls |
|
|
281 | (7) |
|
Red Hat Firewall Concepts |
|
|
281 | (2) |
|
Checking the Firewall Status |
|
|
283 | (1) |
|
|
284 | (1) |
|
Working with Firewall Rules |
|
|
285 | (3) |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
289 | (1) |
|
|
290 | (1) |
|
Chapter 12 Linux in the Cloud |
|
|
291 | (20) |
|
Taking a Look at the Cloud |
|
|
292 | (3) |
|
|
292 | (1) |
|
What Are the Cloud Services? |
|
|
293 | (2) |
|
Understanding Virtualization |
|
|
295 | (3) |
|
|
295 | (2) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (2) |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
300 | (3) |
|
|
300 | (2) |
|
|
302 | (1) |
|
Agent and Agentless Containers |
|
|
302 | (1) |
|
|
303 | (1) |
|
Container Orchestration Engines |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
Understanding DevOps Concepts |
|
|
304 | (3) |
|
|
304 | (2) |
|
DevOps Container Attributes |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
309 | (2) |
Appendix A Answer Key |
|
311 | (2) |
Glossary |
|
313 | (10) |
Index |
|
323 | |