Muutke küpsiste eelistusi

E-raamat: RHCSA/RHCE Red Hat Linux Certification Study Guide, Seventh Edition (Exams EX200 & EX300)

  • Formaat: 1072 pages
  • Ilmumisaeg: 15-Apr-2016
  • Kirjastus: McGraw-Hill Inc.,US
  • Keel: eng
  • ISBN-13: 9780071841948
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 56,16 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 1072 pages
  • Ilmumisaeg: 15-Apr-2016
  • Kirjastus: McGraw-Hill Inc.,US
  • Keel: eng
  • ISBN-13: 9780071841948
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Based on Red Hat Enterprise Linux 7, the new edition of this bestselling study guide covers the updated Red Hat Certified System Administrator (RHCSA) and Red Hat Certified Engineer (RHCE) exams. RHCSA/RHCE Red Hat Linux Certification Study Guide, 7th Edition is fully revised to cover the recently released Red Hat Enterprise Linux 7 and the corresponding RHCSA and RHCE certification exams. This new edition provides complete coverage of all official exam objectives for the new exams.

An integrated study system based on proven pedagogy, this revised bestseller features special elements that reinforce and teach practical skills while preparing candidates for the exam. Each chapter includes step-by-step exercises, Exam Watch and On-the-Job sidebars, Two-Minute Drills, end-of-chapter self tests, and hands-on lab questions. Electronic content includes four complete lab-based practice exams to ensure youre ready to sit for the live exams.





Complete coverage of all exam objectives and performance-based requirements related to the exams, including difficult lab-based scenariosElectronic content includes four complete lab-based practice exams, two for RHCSA and two for RHCEA proven study system for RHCSA and RHCE candidatesThis book includes copies of the Linux Kernel provided under the terms of the GNU General Public License version 2
Acknowledgments xxv
Preface xxvii
Introduction xxxviii
1 Prepare for Red Hat Hands-on Certifications 1(54)
The RHCSA and RHCE Exams
4(3)
The Exam Experience
5(1)
The RHCSA Exam
5(1)
The RHCE Exam
6(1)
If You're Studying "Just" for the RHCSA Exam
6(1)
Evolving Requirements
6(1)
Basic Hardware Requirements
7(4)
Hardware Compatibility
7(1)
Architectures
8(1)
RAM Requirements
8(1)
Hard Drive Options
9(1)
Networking
9(1)
Virtual Machine Options
10(1)
Get Red Hat Enterprise Linux
11(2)
Purchase a Subscription
11(1)
Get an Evaluation Copy
12(1)
Third-party Rebuilds
12(1)
Check the Download
13(1)
Installation Requirements
13(5)
You Won't Start from Scratch
14(1)
The Advantages of Network Installation
14(1)
Red Hat and Virtual Machines
15(1)
Virtual and Physical Systems
15(1)
A Pre-installed Environment for Practice Labs
15(1)
System Roles
16(2)
Installation Options
18(18)
Boot Media
18(1)
CD/DVD or Boot USB Starts Installation
19(1)
Basic Installation Steps
20(5)
The Installation Perspective on Partitions
25(3)
Partition Creation Exercise
28(4)
Exercise 1-1: Partitioning During Installation
30(2)
Wow, Look at All That Software!
32(2)
Baseline Packages
34(1)
Package Groups
34(1)
During the Installation
35(1)
System Setup Options
36(3)
Initial Setup and Firstboot
37(1)
Default Security Settings
37(1)
Special Setup Options for Virtual Machines
38(1)
Configure Default File Sharing Services
39(9)
Mount and Copy the Installation DVD
40(1)
Set Up a Default Configuration Apache Server
40(3)
Exercise 1-2: Configure Apache as an Installation Server
42(1)
Share Copied Files via FTP Server
43(2)
Certification Summary
45(1)
Two-Minute Drill
46(2)
Q &A Self Test
48(7)
Lab Questions
49(3)
Self Test Answers
52(1)
Lab Answers
53(2)
2 Virtual Machines and Automated Installations 55(60)
Configure KVM for Red Hat
56(12)
Why Virtual Machines
57(1)
If You Have to Install KVM
58(1)
The Right KVM Modules
59(1)
Configure the Virtual Machine Manager
60(1)
Configuration by Hypervisor
61(1)
Virtual Networks on a Hypervisor
62(6)
Exercise 2-1: Create a Second Virtual Network
63(5)
Configure a Virtual Machine on KVM
68(12)
Configure a Virtual Machine on KVM
68(7)
Exercise 2-2: Add Virtual Hard Drives
73(2)
KVM Configuration Files
75(1)
Control Virtual Machines from the Command Line
76(4)
Automated Installation Options
80(15)
Kickstart Concepts
81(1)
Set Up Local Access to Kickstart
81(2)
Set Up Network Access to Kickstart
83(1)
Sample Kickstart File
83(7)
Exercise 2-3: Create and Use a Sample Kickstart File
89(1)
The Kickstart Configurator
90(5)
Administration with the Secure Shell and Secure Copy
95(3)
Configure an SSH Client
95(1)
Command-Line Access
96(1)
More SSH Command-Line Tools
97(1)
Graphical Secure Shell Access
97(1)
Consider Adding These Command-Line Tools
98(9)
Checking Ports with telnet
99(1)
Checking Ports with nmap
100(1)
Configure an E-mail Client
100(2)
The Use of Text and Graphical Browsers
102(1)
Using lftp to Access URLs
103(2)
Certification Summary
105(1)
Two-Minute Drill
105(2)
Q&A Self Test
107(8)
Lab Questions
108(2)
Self Test Answers
110(1)
Lab Answers
111(4)
3 Fundamental Command-Line Skills 115(60)
Shells
118(4)
Other Shells
119(1)
Virtual Terminals
119(1)
GUI Shell Interfaces
120(1)
Differences Between Regular and Administrative Users
121(1)
Text Streams and Command Redirection
121(1)
Standard Command-Line Tools
122(9)
File and Directory Concepts
123(3)
File Lists and is
126(1)
File-Creation Commands
127(3)
Wildcards
130(1)
File Searches
130(1)
The Management of Text Files
131(11)
Commands to Read Text Streams
132(2)
Commands to Process Text Streams
134(3)
Edit Text Files at the Console
137(4)
Exercise 3-1: Using vi to Create a New User
139(2)
If You Don't Like vi
141(1)
Edit Text Files in the GUI
141(1)
Local Online Documentation
142(4)
When You Need Help
142(1)
A Variety of man Pages
143(2)
The info Manuals
145(1)
Detailed Documentation in /usr/share/doc
146(1)
A Networking Primer
146(8)
IPv4 Networks
146(1)
Networks and Routing
147(1)
Tools and Commands
148(6)
Network Configuration and Troubleshooting
154(16)
Network Configuration Files
155(3)
Network Configuration Tools
158(6)
Exercise 3-2: Configure a Network Card
161(3)
Configure Name Resolution
164(1)
Hostname Configuration Files
165(1)
Hostname Configuration Options
166(1)
Certification Summary
167(1)
Two-Minute Drill
168(2)
Q&A Self Test
170(5)
Lab Questions
171(1)
Self Test Answers
172(1)
Lab Answers
173(2)
4 RHCSA-Level Security Options 175(66)
Basic File Permissions
178(8)
File Permissions and Ownership
178(3)
Commands to Change Permissions and Ownership
181(3)
Basic User and Group Concepts
184(2)
Access Control Lists and More
186(9)
The getfacl Command
186(1)
Make a Filesystem ACL Friendly
187(1)
Manage ACLs on a File
188(2)
Configure a Directory for ACLs
190(1)
Configure Default ACLs
191(1)
ACLs and Masks
192(1)
Exercise 4-1: Use ACLs to Deny a User
192(1)
NFS Shares and ACLs
193(2)
Basic Firewall Control
195(12)
Standard Ports
196(1)
A Focus on iptables
196(2)
Keep That Firewall in Operation
198(1)
The iptables Service
199(2)
The firewalld Service
201(6)
Exercise 4-2: Adjust Firewall Settings
206(1)
Securing SSH with Key-Based Authentication
207(6)
SSH Configuration Commands
208(1)
SSH Client Configuration Files
208(1)
Basic Encrypted Communication
209(1)
Set Up a Private/Public Pair for Key-Based Authentication
210(3)
A Security-Enhanced Linux Primer
213(21)
Basic Features of SELinux
213(1)
SELinux Status
213(2)
SELinux Configuration at the Command Line
215(1)
Configure Basic SELinux Settings
215(1)
Configure Regular Users for SELinux
216(2)
Manage SELinux Boolean Settings
218(1)
List and Identify SELinux File Contexts
219(1)
Restore SELinux File Contexts
220(2)
Identify SELinux Process Contexts
222(1)
Diagnose and Address SELinux Policy Violations
223(2)
The GUI SELinux Administration Tool
225(4)
The SELinux Troubleshoot Browser
229(3)
Exercise 4-3: Test a SELinux User Type
230(2)
Certification Summary
232(1)
Two-Minute Drill
232(2)
Q&A Self Test
234(7)
Lab Questions
236(1)
Self Test Answers
236(2)
Lab Answers
238(3)
5 The Boot Process 241(44)
The BIOS and the UEFI
243(2)
Basic System Configuration
243(1)
Startup Menus
244(1)
Access to Linux Bootloaders
244(1)
Bootloaders and GRUB 2
245(14)
GRUB, the GRand Unified Bootloader
246(4)
Exercise 5-1: Boot into a Different Target
248(1)
Exercise 5-2: Recover the Root Password
249(1)
Modify the System Bootloader
250(3)
How to Update GRUB
253(1)
The GRUB 2 Command Line
253(3)
Exercise 5-3: Using the GRUB 2 Command Line
255(1)
Reinstall GRUB 2
256(1)
An Option for Booting from GRUB 2: Rescue Mode
256(3)
Between GRUB 2 and Login
259(11)
Kernels and the Initial RAM Disk
260(1)
The First Process, Targets, and Units
261(2)
Switch Between Targets
263(1)
Reboot and Shut Down a System Normally
264(1)
systemd Replaces Upstart and SysVinit
264(3)
systemd Units
267(3)
Virtual Terminals and Login Screens
270(1)
Control by Target
270(4)
Functionality by Target
271(1)
The Innards of systemd Units
271(2)
Service Configuration
273(1)
Time Synchronization
274(5)
Time Zone Configuration
275(1)
Sync the Time with chronyd
276(1)
Sync the Time with ntpd
276(1)
Certification Summary
277(1)
Two-Minute Drill
278(1)
Q&A Self Test
279(6)
Lab Questions
281(1)
Self Test Answers
281(1)
Lab Answers
282(3)
6 Linux Filesystem Administration 285(58)
Storage Management and Partitions
287(18)
Current System State
287(1)
The fdisk Utility
288(8)
The gdisk Utility
296(1)
The parted Utility
297(1)
Using parted: Starting, Getting Help, and Quitting
298(4)
Graphical Options
302(3)
Exercise 6-1: Work with fdisk and parted
304(1)
Filesystem Formats
305(5)
Standard Formatting Filesystems
306(1)
Journaling Filesystems
307(1)
Filesystem Format Commands
307(1)
Swap Volumes
308(1)
Filesystem Check Commands
309(1)
Exercise 6-2: Format, Check, and Mount Different Filesystems
309(1)
Basic Linux Filesystems and Directories
310(3)
Separate Linux Filesystems
310(2)
Directories That Can Be Mounted Separately
312(1)
Logical Volume Management (LVM)
313(7)
Definitions in LVM
313(1)
Create a Physical Volume
314(1)
Create a Volume Group
314(1)
Create a Logical Volume
315(1)
Make Use of a Logical Volume
315(1)
More LVM Commands
315(3)
Remove a Logical Volume
318(1)
Resize Logical Volumes
319(1)
Filesystem Management
320(8)
The /etc/fstab File
320(2)
Universally Unique Identifiers in /etc/fstab
322(1)
The mount Command
323(1)
More Filesystem Mount Options
324(1)
Virtual Filesystems
325(1)
Add Your Own Filesystems to /etc/fstab
325(1)
Removable Media and /etc/fstab
326(1)
Networked Filesystems
327(1)
The Automounter
328(8)
Mounting via the Automounter
328(6)
Exercise 6-3: Configure the Automounter
332(2)
Certification Summary
334(1)
Two-Minute Drill
334(2)
Q& A Self Test
336(7)
Lab Questions
337(1)
Self Test Answers
338(1)
Lab Answers
339(4)
7 Package Management 343(52)
The Red Hat Package Manager
344(9)
What Is a Package?
345(1)
What Is the RPM Database?
345(1)
What Is a Repository?
346(1)
Install an RPM Package
347(1)
Uninstall an RPM Package
348(1)
Install RPMs from Remote Systems
349(1)
RPM Installation Security
350(1)
Special RPM Procedures with the Kernel
350(3)
More RPM Commands
353(4)
Package Queries
353(1)
Package Signatures
354(1)
File Verification
355(2)
Dependencies and the yum Command
357(22)
An Example of Dependency Hell
357(2)
Relief from Dependency Hell
359(1)
Basic yum Configuration
360(1)
The Basic yum Configuration File: yum.conf
361(1)
Configuration Files in the /etc/yum/pluginconf.d Directory
362(1)
Configuration Files in the /etc/yum.repos.d Directory
363(2)
Create Your Own /etc/yum.repos.d Configuration File
365(4)
Exercise 7-1: Create a yum Repository from the RHEL 7 DVD
368(1)
Third-party Repositories
369(1)
Basic yum Commands
370(1)
Installation Mode
371(1)
Security and yum
372(1)
Updates and Security Fixes
373(1)
Package Groups and yum
373(3)
More yum Commands
376(3)
More Package Management Tools
379(8)
The GNOME Software Update Tool
380(1)
Automated Updates
381(1)
GNOME Software Tool
381(2)
Exercise 7-2: Installing More with yum and the GNOME Software Tool
382(1)
Red Hat Subscription Manager
383(2)
Certification Summary
385(1)
Two-Minute Drill
386(1)
Q&A Self Test
387(8)
Lab Questions
389(1)
Self Test Answers
389(2)
Lab Answers
391(4)
8 User Administration 395(48)
User Account Management
397(14)
Different Kinds of Users
397(1)
The Shadow Password Suite
398(5)
Command-Line Tools
403(4)
Exercise 8-1: Add a User with the Red Hat User Manager
406(1)
Exercise 8-2: Real and Fake Shells
407(1)
Modify an Account
407(2)
More User and Group Management Commands
409(2)
Administrative Control
411(5)
The Ability to Log In as root
411(2)
Exercise 8-3: Limit root Logins
412(1)
The Ability to Log In
413(1)
The Proper Use of the su Command
413(1)
Limit Access to su
414(1)
The Proper Use of the sg Command
414(1)
Custom Administrators with the sudo Command
415(1)
Other Administrative Users
416(1)
User and Shell Configuration
416(5)
Home Directories and /etc/skel
417(3)
Exercise 8-4: Another Way to Secure a System
419(1)
Shell Configuration Files in User Home Directories
420(1)
Login, Logout, and User Switching
420(1)
Users and Network Authentication
421(11)
LDAP Client Configuration
423(2)
The Name Service Switch File
425(1)
The System Security Service Daemon
425(1)
Red Hat Network Authentication Tools
426(6)
Special Groups
432(5)
Standard and Red Hat Groups
432(1)
Shared Directories
432(3)
Exercise 8-5: Control Group Ownership with the SGID Bit
433(2)
Certification Summary
435(1)
Two-Minute Drill
436(1)
Q&A Self Test
437(6)
Lab Questions
439(1)
Self Test Answers
439(1)
Lab Answers
440(3)
9 RHCSA-Level System Administration Tasks 443(36)
Elementary System Administration Commands
444(10)
System Resource Management Commands
445(9)
Archives and Compression
454(10)
Automate System Administration: cron and at
456(1)
The System crontab and Components
456(2)
Hourly cron Jobs
458(1)
Regular Anacron Jobs
459(1)
Setting Up cron for Users
460(1)
Exercise 9-1: Create a cron Job
461(1)
Running a Job with the at System
461(1)
Secure cron and at
462(2)
Local Log File Analysis
464(8)
System Log Configuration File
464(1)
Log File Management
465(1)
A Variety of Log Files
466(2)
Service-Specific Logs
468(1)
Exercise 9-2: Learn the Log Files
468(1)
View systemd Journal Log Entries
468(3)
Certification Summary
471(1)
Two-Minute Drill
471(1)
Q&A Self Test
472(7)
Lab Questions
474(1)
Self Test Answers
474(1)
Lab Answers
475(4)
10 A Security Primer 479(58)
The Layers of Linux Security
480(7)
Bastion Systems
481(1)
Best Defenses with Security Updates
481(1)
Service-Specific Security
482(2)
Host-Based Security
484(1)
User-Based Security
484(1)
Console Security
485(1)
Recommendations from the U.S. National Security Agency
485(1)
The PolicyKit
486(1)
Firewalls and Network Address Translation
487(21)
Definitions
488(1)
The Structure of firewalld
489(9)
Exercise 10-1: Configure Rich Rules
496(2)
Further Recommendations from the NSA
498(1)
Make Sure That firewalld Is Running
499(1)
IP Masquerading
500(1)
IP Forwarding
501(1)
The Red Hat Firewall Configuration Tool
502(6)
TCP Wrappers
508(4)
Is a Service Protected by TCP Wrappers?
508(1)
TCP Wrappers Configuration Files
509(3)
Exercise 10-2: Configure TCP Wrappers
511(1)
Pluggable Authentication Modules
512(10)
Configuration Files
512(1)
Control Flags
513(2)
The Format of a PAM File
515(4)
Exercise 10-3: Configure PAM to Limit root Access
519(1)
PAM and User-Based Security
519(3)
Exercise 10-4: Use PAM to Limit User Access
521(1)
Secure Files and More with GPG2
522(7)
GPG2 Commands
522(1)
Current GPG2 Configuration
523(1)
GPG2 Encryption Options
523(1)
Generate a GPG2 Key
523(2)
Use a GPG2 Key to Encrypt a File
525(2)
Certification Summary
527(1)
Two-Minute Drill
527(2)
Q&A Self Test
529(8)
Lab Questions
531(1)
Self Test Answers
531(1)
Lab Answers
532(5)
11 System Services and SELinux 537(42)
Red Hat System Configuration
539(2)
Service Management
539(1)
System Services
539(1)
Bigger Picture Configuration Process
540(1)
Available Configuration Tools
540(1)
Security-Enhanced Linux
541(11)
Options in the SELinux Booleans Directory
542(1)
Service Categories of SELinux Booleans
543(1)
Boolean Configuration with the SELinux Management Tool
543(1)
Boolean Settings
544(4)
SELinux File Contexts
548(2)
SELinux Port Labeling
550(2)
Exercise 11-1: Configure a New Directory with Appropriate SELinux Contexts
550(2)
The Secure Shell Server
552(10)
SSH Server Configuration Files
552(1)
Configure an SSH Server
553(7)
Exercise 11-2: Run an SSH Server on a Nonstandard Port
560(1)
User-Based Security for SSH
560(1)
Host-Based Security for SSH
561(1)
A Security and Configuration Checklist
562(11)
Installation of Server Services
562(4)
Basic Configuration
566(1)
Make Sure the Service Survives a Reboot
566(1)
Review Access Through Layers of Security
566(5)
Exercise 11-3: Practice Troubleshooting Network Connectivity Issues
568(1)
Exercise 11-4: Review the Different Effects of firewalld and TCP Wrappers
569(2)
Certification Summary
571(1)
Two-Minute Drill
572(1)
Q&A Self Test
573(6)
Lab Questions
574(1)
Self Test Answers
575(1)
Lab Answers
576(3)
12 RHCE Administrative Tasks 579(52)
Automate System Maintenance
581(9)
Standard Administrative Scripts
581(2)
Bash Variables
583(1)
Bash Commands
584(6)
Exercise 12-1: Create a Script
588(2)
Set Up System Utilization Reports
590(5)
System Utilization Commands
591(1)
The System Activity Report Tool
591(1)
Collect System Status into Logs
592(1)
Prepare a System Status Report
593(2)
Kernel Run-time Parameters
595(3)
How sysctl Works with /etc/sysctl.conf
595(1)
Settings in the /etc/sysctl.conf File
596(2)
Exercise 12-2: Disable Responses to the ping Command
597(1)
IP Routes
598(4)
Configure a Default Route
598(1)
Configure a Static Route
599(3)
Exercise 12-3: Practice with Static Routes
600(2)
An Introduction to IPv6
602(4)
Basic IPv6 Addressing
602(2)
Troubleshooting Tools
604(1)
Configure IPv6 Addresses
604(2)
Network Interface Bonding and Teaming
606(7)
Configure Interface Bonding
608(4)
Exercise 12-4: Test Bonding Failover
611(1)
Configure Interface Teaming
612(1)
Authentication with Kerberos
613(10)
A Kerberos Primer
613(1)
Prerequisites for Kerberos Servers and Clients
614(3)
Exercise 12-5: Install a Kerberos KDC
615(2)
Set Up a Kerberos Client
617(4)
Exercise 12-6: Configure Kerberos Authentication
620(1)
Certification Summary
621(1)
Two-Minute Drill
622(1)
Q&A Self Test
623(8)
Lab Questions
625(1)
Self Test Answers
625(1)
Lab Answers
626(5)
13 Network Services: DNS, SMTP, iSCSI, and NTP 631(48)
An Introduction to Domain Name Services
633(1)
The BIND Name Server
633(1)
Different Types of DNS Servers
634(1)
Minimal DNS Server Configurations
634(11)
BIND Configuration Files
634(2)
A BIND Caching-Only Name Server
636(5)
Unbound as a Caching-Only Name Server
641(1)
DNS Client Troubleshooting
642(3)
Exercise 13-1: Set Up Your Own BIND DNS Server
644(1)
Exercise 13-2: Set Up Your Own Unbound DNS Server
645(1)
A Variety of E-Mail Agents
645(5)
Definitions and Protocols
646(1)
Relevant Mail Server Packages
646(1)
Use the alternatives Command to Select an E-Mail System
647(1)
General User Security
648(1)
Mail Logging
649(1)
Common Security Issues
649(1)
Testing an E-Mail Server
649(1)
Exercise 13-3: Create Users Just for E-Mail
649(1)
The Configuration of Postfix
650(10)
Configuration Files
650(3)
The main.cf Configuration File
653(3)
The /etc/aliases Configuration File
656(1)
Test the Current Postfix Configuration
657(1)
Configure Postfix Authentication
658(1)
Configure Postfix as an SMTP Server for a Domain
659(1)
Configure Postfix as a Null Client
659(1)
iSCSI Targets and Initiators
660(6)
Set Up an iSCSI Target
661(4)
Connect to Remote iSCSI Storage
665(1)
The Network Time Service
666(6)
The NTP Server Configuration File
666(3)
Certification Summary
669(1)
Two-Minute Drill
670(2)
Q&A Self Test
672(7)
Lab Questions
673(1)
Self Test Answers
674(1)
Lab Answers
675(4)
14 The Apache Web Server 679(54)
The Apache Web Server
681(8)
Apache 2.4
681(1)
The LAMP Stack
681(1)
Installation
681(3)
Exercise 14-1: Install the Apache Server
683(1)
The Apache Configuration Files
684(1)
Analyze the Default Apache Configuration
685(1)
The Main Apache Configuration File
686(1)
Basic Apache Configuration for a Simple Web Server
686(2)
Apache Log Files
688(1)
Standard Apache Security Configuration
689(11)
Ports and Firewalls
689(1)
Apache and SELinux
690(2)
Module Management
692(1)
Security Within Apache
692(6)
Exercise 14-2: The Apache Welcome and the noindex.html Story
697(1)
Exercise 14-3: Create a List of Files
698(1)
Host-Based Security
698(1)
User-Based Security
699(1)
Specialized Apache Directories
700(6)
Control Through the .htaccess File
701(1)
Password-Protected Access
701(1)
Home Directory Access
702(2)
Group-Managed Directories
704(2)
Exercise 14-4: Password Protection for a Web Directory
705(1)
Regular and Secure Virtual Hosts
706(13)
The Standard Virtual Host
707(3)
Secure Virtual Hosts
710(3)
Create a New TLS Certificate
713(4)
Test Pages
717(1)
Syntax Checkers
717(1)
Apache Troubleshooting
718(1)
Exercise 14-5: Set Up a Virtual Web Server
718(1)
Deploy a Basic CGI Application
719(6)
Apache Configuration Changes for CGI Files
720(1)
Set Up a Simple CGI Script in Perl
721(1)
Connections to a Website
721(1)
Certification Summary
722(1)
Two-Minute Drill
723(2)
Q&A Self Test
725(8)
Lab Questions
726(1)
Self Test Answers
727(1)
Lab Answers
728(5)
15 The Samba File Server 733(40)
Samba Services
734(23)
Install Samba Services
735(1)
Some Samba Background
735(2)
Ports, Firewalls, and Samba
737(1)
Configure SELinux Booleans for Samba
738(1)
Configure SELinux File Contexts for Samba
738(2)
Samba Daemons
740(1)
Samba Server Global Configuration
740(8)
Shared Samba Directories
748(4)
Let Samba Join a Domain
752(1)
The Samba User Database
753(1)
Create a Public Share
754(1)
Test Changes to /etc/samba/smb.conf
755(2)
Exercise 15-1: Configure a Samba Home Directory Share
756(1)
Samba as a Client
757(4)
Command-Line Tools
757(1)
Mount Options
758(1)
Automated Samba Mounts
759(2)
Exercise 15-2: Configuring a Samba Share for Group Collaboration
759(2)
Multiuser Samba Mounts
761(1)
Samba Troubleshooting
761(4)
Samba Problem Identification
761(1)
Local Log File Checks
762(2)
Certification Summary
764(1)
Two-Minute Drill
764(1)
Q&A Self Test
765(8)
Lab Questions
767(1)
Self Test Answers
767(1)
Lab Answers
768(5)
16 NFS Secured with Kerberos 773(34)
The Network File System (NFS) Server
774(16)
NFS Options for RHEL 7
775(1)
Basic NFS Installation
775(1)
Basic NFS Server Configuration
776(2)
Configure NFS for Basic Operation
778(3)
Fixed Ports in /etc/sysconfig/nfs
781(1)
Make NFS Work with SELinux
782(3)
Quirks and Limitations of NFS
785(2)
Performance Tips
787(1)
NFS Security Directives
787(1)
Options for Host-Based Security
788(1)
Options for User-Based Security
788(2)
Exercise 16-1: NFS
788(2)
Test an NFS Client
790(2)
NFS Mount Options
790(1)
Configure NFS in /etc/fstab
791(1)
Diskless Clients
791(1)
Current NFS Status
792(1)
NFS with Kerberos
792(8)
Kerberos-Enabled NFS Services
793(1)
Configure NFS Exports with Kerberos
794(1)
Configure NFS Clients with Kerberos
795(3)
Exercise 16-2: Prepare a System for NFS Secured with Kerberos
795(1)
Exercise 16-3: Configure a Kerberos-Enabled NFS Share
796(2)
Certification Summary
798(1)
Two-Minute Drill
799(1)
Q&A Self Test
800(7)
Lab Questions
801(1)
Self Test Answers
802(1)
Lab Answers
803(4)
17 The MariaDB Server 807(36)
Introduction to MariaDB
808(7)
MariaDB Installation
809(2)
Initial Configuration
811(2)
Exercise 17-1: Install and Secure MariaDB
812(1)
Run MariaDB on a Nonstandard TCP Port
813(2)
Exercise 17-2: Run MariaDB on a Nonstandard TCP Port
813(2)
Database Management
815(4)
Database Concepts
815(1)
Working with Databases
816(1)
Working with Tables
817(2)
Exercise 17-3: Create a Table
818(1)
Simple SQL Queries
819(7)
The INSERT SQL Command
820(1)
The SELECT SQL Command
821(1)
The DELETE SQL Command
822(1)
The UPDATE SQL Command
822(4)
Exercise 17-4: Practice with Simple SQL Queries
823(3)
Secure MariaDB
826(5)
Host-Based Security
827(1)
User-Based Security
827(4)
Exercise 17-5: Practice MariaDB User's Permissions
830(1)
Database Backup and Recovery
831(5)
Back Up and Restore with mysqldump
831(2)
Back Up with a Dump of the Data to a Text File
833(1)
Certification Summary
834(1)
Two-Minute Drill
834(2)
Q&A Self Test
836(7)
Lab Questions
837(1)
Self Test Answers
838(1)
Lab Answers
839(4)
A Prepare a System for the Sample Exams 843(4)
Basic Sample Exam System Requirements
843(3)
Additional Sample Exam System Requirements for the RHCE
846(1)
B Sample Exam 1: RHCSA 847(4)
RHCSA Sample Exam 1 Discussion
849(2)
C Sample Exam 2: RHCSA 851(4)
RHCSA Sample Exam 2 Discussion
853(2)
D Sample Exam 3: RHCE Sample Exam 1 855(6)
RHCE Sample Exam 1 Discussion
857(4)
E Sample Exam 4: RHCE Sample Exam 2 861(4)
RHCE Sample Exam 2 Discussion
863(2)
F About the DVD 865(2)
System Requirements
865(1)
Electronic Book
866(1)
Technical Support
866(1)
Glossary 867(16)
Index 883
Michael Jang, (RHCE, LPIC-2, UCP, Linux+, MCP), author of the popular RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302) and about 20 other professional technology titles, is currently a full-time writer, specializing in operating systems and networks. His experience with computers goes back to the days of jumbled punch cards. He has written other books on Linux certification, including LPIC-1 in Depth, Mike Meyers Linux+ Certification Passport, and Sair GNU/Linux Installation and Configuration Exam Cram. His other Linux books include Linux Annoyances for Geeks, Linux Patch Management, and Mastering Fedora Core Linux 5. He has also written or contributed to books on Microsoft operating systems, including MCSE Guide to Microsoft Windows 98 and Mastering Windows XP Professional, Second Edition.





Alessandro Orsaria (London, England) is an IT Infrastructure Architect with more than 15 years of experience with Linux systems. He is currently employed by a global equity hedge fund and has authored articles for Linux Magazine and Linux Journal. Alessandro is Red Hat RHCE and RHCA certified and has a double Cisco CCIE certification in Routing & Switching and Datacenter. He holds an MBA from Imperial College of London and a degree in Physics.