Muutke küpsiste eelistusi

LPIC-1 Linux Professional Institute Certification Study Guide: Exam 101-500 and Exam 102-500 5th edition [Pehme köide]

  • Formaat: Paperback / softback, 688 pages, kõrgus x laius x paksus: 231x188x41 mm, kaal: 930 g
  • Ilmumisaeg: 02-Dec-2019
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 1119582121
  • ISBN-13: 9781119582120
Teised raamatud teemal:
  • Pehme köide
  • Hind: 59,75 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 70,30 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Raamatukogudele
  • Formaat: Paperback / softback, 688 pages, kõrgus x laius x paksus: 231x188x41 mm, kaal: 930 g
  • Ilmumisaeg: 02-Dec-2019
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 1119582121
  • ISBN-13: 9781119582120
Teised raamatud teemal:

The bestselling study guide for the popular Linux Professional Institute Certification Level 1 (LPIC-1).

The updated fifth edition of LPIC-1: Linux Professional Institute Certification Study Guide is a comprehensive, one-volume resource that covers 100% of all exam objectives. Building on the proven Sybex Study Guide approach, this essential resource offers a comprehensive suite of study and learning tools such as assessment tests, hands-on exercises, chapter review questions, and practical, real-world examples. This book, completely updated to reflect the latest 101-500 and 102-500 exams, contains clear, concise, and user-friendly information on all of the Linux administration topics you will encounter on test day. Key exam topics include system architecture, Linux installation and package management, GNU and UNIX commands, user interfaces and desktops, essential system services, network and server security, and many more. 

Linux Servers currently have a 20% market share which continues to grow. The Linux OS market saw a 75% increase from last year and is the third leading OS, behind Windows and MacOS. There has never been a better time to expand your skills, broaden your knowledge, and earn certification from the Linux Professional Institute. A must-have guide for anyone preparing for the 101-500 and 102-500 exams, this study guide enables you to:

  • Assess your performance on practice exams to determine what areas need extra study
  • Understand and retain vital exam topics such as administrative tasks, network configuration, booting Linux, working with filesystems, writing scripts, and using databases
  • Gain insights and tips from two of the industry’s most highly respected instructors, consultants, and authors
  • Access Sybex interactive tools that include electronic flashcards, an online test bank, customizable practice exams, bonus chapter review questions, and a searchable PDF glossary of key terms

LPIC-1: Linux Professional Institute Certification Study Guide is ideal for network and system administrators studying for the LPIC-1 exams, either for the first time or for the purpose of renewing their certifications.

Introduction xxi
Assessment Test xxxix
Part I Exam 101-500 1(302)
Chapter 1 Exploring Linux Command-Line Tools
3(64)
Understanding Command-Line Basics
4(16)
Discussing Distributions
4(1)
Reaching a Shell
5(1)
Exploring Your Linux Shell Options
5(2)
Using a Shell
7(4)
Using Environment Variables
11(6)
Getting Help
17(3)
Editing Text Files
20(8)
Looking at Text Editors
20(4)
Understanding vim Modes
24(1)
Exploring Basic Text-Editing Procedures
24(3)
Saving Changes
27(1)
Processing Text Using Filters
28(17)
File-Combining Commands
28(3)
File-Transforming Commands
31(2)
File-Formatting Commands
33(3)
File-Viewing Commands
36(4)
File-Summarizing Commands
40(5)
Using Regular Expressions
45(5)
Using grep
45(2)
Understanding Basic Regular Expressions
47(3)
Understanding Extended Regular Expressions
50(1)
Using Streams, Redirection, and Pipes
50(11)
Redirecting Input and Output
51(4)
Piping Data between Programs
55(1)
Using sed
56(4)
Generating Command Lines
60(1)
Summary
61(1)
Exam Essentials
61(1)
Review Questions
62(5)
Chapter 2 Managing Software and Processes
67(66)
Looking at Package Concepts
68(1)
Using RPM
69(17)
RPM Distributions and Conventions
69(2)
The rpm Command Set
71(6)
Extracting Data from RPMs
77(1)
Using YUM
78(5)
Using ZYpp
83(3)
Using Debian Packages
86(12)
Debian Package File Conventions
87(1)
The dpkg Command Set
87(5)
Looking at the APT Suite
92(1)
Using apt-cache
93(1)
Using apt-get
94(3)
Reconfiguring Packages
97(1)
Managing Shared Libraries
98(4)
Library Principles
98(1)
Locating Library Files
99(1)
Loading Dynamically
100(1)
Library Management Commands
100(2)
Managing Processes
102(24)
Examining Process Lists
102(7)
Employing Multiple Screens
109(7)
Understanding Foreground and Background Processes
116(4)
Managing Process Priorities
120(1)
Sending Signals to Processes
121(5)
Summary
126(1)
Exam Essentials
127(2)
Review Questions
129(4)
Chapter 3 Configuring Hardware
133(48)
Configuring the Firmware and Core Hardware
134(20)
Understanding the Role of Firmware
134(2)
Device Interfaces
136(2)
The /dev Directory
138(1)
The /proc Directory
139(4)
The /sys Directory
143(1)
Working with Devices
144(4)
Hardware Modules
148(6)
Storage Basics
154(2)
Types of Drives
154(1)
Drive Partitions
155(1)
Automatic Drive Detection
155(1)
Storage Alternatives
156(2)
Multipath
156(1)
Logical Volume Manager
157(1)
Using RAID Technology
158(1)
Partitioning Tools
158(6)
Working with fdisk
158(3)
Working with gdisk
161(1)
The GNU parted Command
162(1)
Graphical Tools
163(1)
Understanding Filesystems
164(3)
The Virtual Directory
164(2)
Maneuvering Around the Filesystem
166(1)
Formatting Filesystems
167(3)
Common Filesystem Types
167(2)
Creating Filesystems
169(1)
Mounting Filesystems
170(3)
Manually Mounting Devices
170(2)
Automatically Mounting Devices
172(1)
Managing Filesystems
173(1)
Retrieving Filesystem Stats
173(1)
Filesystem Tools
173(1)
Summary
174(1)
Exam Essentials
175(2)
Review Questions
177(4)
Chapter 4 Managing Files
181(64)
Using File Management Commands
182(36)
Naming and Listing Files
182(4)
Exploring Wildcard Expansion Rules
186(3)
Understanding the File Commands
189(10)
Compressing File Commands
199(3)
Archiving File Commands
202(11)
Managing Links
213(5)
Managing File Ownership
218(3)
Assessing File Ownership
219(1)
Changing a File's Owner
219(1)
Changing a File's Group
220(1)
Controlling Access to Files
221(8)
Understanding Permissions
221(2)
Changing a File's Mode
223(3)
Setting the Default Mode
226(2)
Changing Special Access Modes
228(1)
Locating Files
229(10)
Getting to Know the FHS
229(2)
Employing Tools to Locate Files
231(8)
Summary
239(1)
Exam Essentials
239(2)
Review Questions
241(4)
Chapter 5 Booting, Initializing, and Virtualizing Linux
245(58)
Understanding the Boot Process
246(3)
The Boot Process
246(1)
Extracting Information about the Boot Process
247(2)
Looking at Firmware
249(2)
The BIOS Startup
249(1)
The UEFI Startup
250(1)
Looking at Boot Loaders
251(10)
Boot Loader Principles
251(1)
Using GRUB Legacy as the Boot Loader
251(4)
Using GRUB 2 as the Boot Loader
255(4)
Adding Kernel Boot Parameters
259(1)
Using Alternative Boot Loaders
260(1)
The Initialization Process
261(1)
Using the systemd Initialization Process
262(14)
Exploring Unit Files
263(2)
Focusing on Service Unit Files
265(3)
Focusing on Target Unit Files
268(2)
Looking at systemctl
270(3)
Examining Special systemd Commands
273(3)
Using the SysV Initialization Process
276(7)
Understanding Runlevels
277(3)
Investigating SysVinit Commands
280(3)
Stopping the System
283(1)
Notifying the Users
284(2)
Virtualizing Linux
286(9)
Looking at Virtual Machines
287(4)
Understanding Containers
291(2)
Looking at Infrastructure as a Service
293(2)
Summary
295(1)
Exam Essentials
295(3)
Review Questions
298(5)
Part II Exam 102-500 303(280)
Chapter 6 Configuring the GUI, Localization, and Printing
305(48)
Understanding the GUI
306(1)
Understanding the X11 Architecture
307(4)
Examining X.Org
308(1)
Figuring Out Wayland
309(2)
Managing the GUI
311(12)
Standard GUI Features
311(2)
The X GUI Login System
313(1)
Common Linux Desktop Environments
314(9)
Providing Accessibility
323(2)
Using X11 for Remote Access
325(3)
Remote X11 Connections
326(1)
Tunneling your X11 Connection
326(2)
Using Remote Desktop Software
328(5)
Viewing VNC
328(2)
Grasping Xrdp
330(2)
Exploring NX
332(1)
Studying SPICE
332(1)
Understanding Localization
333(2)
Character Sets
333(1)
Environment Variables
334(1)
Setting Your Locale
335(3)
Installation Locale Decisions
335(1)
Changing Your Locale
336(2)
Looking at Time
338(5)
Working with Time Zones
338(1)
Setting the Time and Date
339(4)
Configuring Printing
343(2)
Summary
345(1)
Exam Essentials
346(2)
Review Questions
348(5)
Chapter 7 Administering the System
353(70)
Managing Users and Groups
354(21)
Understanding Users and Groups
354(1)
Configuring User Accounts
355(16)
Configuring Groups
371(4)
Managing Email
375(9)
Understanding Email
375(1)
Choosing Email Software
376(1)
Working with Email
377(7)
Using Log and Journal Files
384(19)
Examining the syslog Protocol
385(2)
Viewing the History of Linux Logging
387(1)
Logging Basics Using rsyslogd
387(7)
Journaling with systemd-journald
394(9)
Maintaining the System Time
403(13)
Understanding Linux Time Concepts
403(1)
Viewing and Setting Time
404(4)
Understanding the Network Time Protocol
408(3)
Using the NTP Daemon
411(2)
Using the chrony Daemon
413(3)
Summary
416(1)
Exam Essentials
416(3)
Review Questions
419(4)
Chapter 8 Configuring Basic Networking
423(42)
Networking Basics
424(9)
The Physical Layer
424(2)
The Network Layer
426(4)
The Transport Layer
430(1)
The Application Layer
431(2)
Configuring Network Features
433(14)
Network Configuration Files
433(3)
Graphical Tools
436(2)
Command-Line Tools
438(7)
Getting Network Settings Automatically
445(1)
Bonding Network Cards
445(2)
Basic Network Troubleshooting
447(5)
Sending Test Packets
447(1)
Tracing Routes
448(1)
Finding Host Information
449(3)
Advanced Network Troubleshooting
452(5)
The netstat Command
452(3)
Examining Sockets
455(1)
The netcat Utility
456(1)
Summary
457(1)
Exam Essentials
458(2)
Review Questions
460(5)
Chapter 9 Writing Scripts
465(58)
Shell Variables
466(9)
Global Environment Variables
466(2)
Local Environment Variables
468(2)
Setting Local Environment Variables
470(2)
Setting Global Environment Variables
472(1)
Locating System Environment Variables
472(2)
Using Command Aliases
474(1)
The Basics of Shell Scripting
475(6)
Running Multiple Commands
475(1)
Redirecting Output
476(1)
Piping Data
477(1)
The Shell Script Format
478(1)
Running the Shell Script
479(2)
Advanced Shell Scripting
481(8)
Displaying Messages
481(1)
Using Variables in Scripts
482(2)
Command-Line Arguments
484(1)
Getting User Input
484(4)
The Exit Status
488(1)
Writing Script Programs
489(11)
Command Substitution
489(1)
Performing Math
490(2)
Logic Statements
492(4)
Loops
496(2)
Functions
498(2)
Running Scripts in Background Mode
500(3)
Running in the Background
501(1)
Running Multiple Background Jobs
502(1)
Running Scripts Without a Console
503(1)
Sending Signals
504(2)
Interrupting a Process
504(1)
Pausing a Process
504(2)
Job Control
506(3)
Viewing Jobs
506(2)
Restarting Stopped Jobs
508(1)
Running Like Clockwork
509(6)
Scheduling a Job Using the at Command
509(4)
Scheduling Regular Scripts
513(2)
Summary
515(1)
Exam Essentials
516(2)
Review Questions
518(5)
Chapter 10 Securing Your System
523(60)
Administering Network Security
524(15)
Disabling Unused Services
524(10)
Using Super Server Restrictions
534(4)
Restricting via TCP Wrappers
538(1)
Administering Local Security
539(14)
Securing Passwords
539(4)
Limiting root Access
543(4)
Auditing User Access
547(2)
Setting Login, Process, and Memory Limits
549(2)
Locating SUID/SGID Files
551(2)
Exploring Cryptography Concepts
553(2)
Discovering Key Concepts
553(1)
Securing Data
554(1)
Signing Transmissions
555(1)
Looking at SSH
555(12)
Exploring Basic SSH Concepts
555(3)
Configuring SSH
558(2)
Generating SSH Keys
560(1)
Authenticating with SSH Keys
561(3)
Authenticating with the Authentication Agent
564(1)
Tunneling
565(2)
Using SSH Securely
567(1)
Using GPG
567(7)
Generating Keys
568(1)
Importing Keys
569(1)
Encrypting and Decrypting Data
570(1)
Signing Messages and Verifying Signatures
571(2)
Revoking a Key
573(1)
Summary
574(1)
Exam Essentials
575(2)
Review Questions
577(6)
Appendix Answers to Review Questions 583(36)
Chapter 1: Exploring Linux Command-Line Tools
584(3)
Chapter 2: Managing Software and Processes
587(3)
Chapter 3: Configuring Hardware
590(3)
Chapter 4: Managing Files
593(4)
Chapter 5: Booting, Initializing, and Virtualizing Linux
597(4)
Chapter 6: Configuring the GUI, Localization, and Printing
601(4)
Chapter 7: Administering the System
605(3)
Chapter 8: Configuring Basic Networking
608(3)
Chapter 9: Writing Scripts
611(4)
Chapter 10: Securing Your System
615(4)
Index 619
Christine Bresnahan is an Adjunct Professor at Ivy Tech Community College. She teaches Linux certification, and Python programming classes.

Richard Blum has served as both systems and network administrator roles for UNIX, Linux, Novell, and Microsoft servers. Rich is widely published on Linux, and is a popular online Linux instructor.