did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780471405382

Sair Linux and Gnu Certification Level II: Core Concepts and Practices

by
  • ISBN13:

    9780471405382

  • ISBN10:

    0471405388

  • Format: Paperback
  • Copyright: 2001-11-01
  • Publisher: John Wiley & Sons Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $39.99
We're Sorry.
No Options Available at This Time.

Summary

Learn more, earn more with Linux certification! Sair Linux and GNU Certification(r) Level II: Core Concepts and Practices The Sair Linux and GNU Certification program, designed and developed by the industry-leading members of Sair Linux and GNU, Inc. and its advisory board, provides you with a clear path for improving your Linux and GNU skills and knowledge base. This new series of books will help you gain the necessary tools to become Linux and GNU certified, which can lead to more job opportunities and a higher salary! Level II: Core Concepts and Practices, the second volume in the series, is a study guide that arms you with valuable insight and additional know-how for mastering the required courses that all candidates must take in order to receive the Sair Linux and GNU Certified Engineer (LCE) certificate. In this manual, the Sair Linux and GNU Certification team draws upon its years of experience to provide essential guidance on how to pass Exam 3X0-201, plus the three additional exams from elective subjects, such as Apache and Web Servers, Sendmail and mail system components, Samba, and PHP and MySQL. With the help of detailed lab exercises, the Sair Linux and GNU Certification team walks you step-by-step through all the areas you need to know in order to pass the certification exam, including theory of operation, base system, shells and commands, system utilities, applications, and troubleshooting. With the growing popularity of Linux, organizations need a set of standards to ensure a high level of expertise among their employees. This book is essential for guaranteeing a command of Linux. The LCE test is based on the Core Concepts and Practices (CCP) Knowledge Matrix, and the book includes: A review of the Knowledge Matrix, objectives, and competencies Outlines of installation and configuration, system administration, networking, and security Study guides, lab exercises, and sample questions from the LCE exam Other books to look for in the Level II series: Level II: Apache and Web Servers Level II: Samba and Resource Sharing Level II: Sendmail and Mail Systems www.linuxcertification.com Wiley Computer Publishing Timely. Practical. Reliable. Visit our Web site at www.wiley.com/compbooks/

Table of Contents

Acknowledgments ix
Introduction xi
Part One Knowledge Matrix 1(284)
Installation and Configuration
3(76)
Objectives
3(1)
Theory of Operation
3(28)
Commercial Imaging Options
4(3)
Open-Source Imaging Options
7(3)
System Recovery Options
10(8)
Display Manager Options
18(3)
Overview of File Systems
21(4)
Logical Volume Management (LVM)
25(1)
What is RAID?
26(4)
Journaling File Systems
30(1)
Base Systems
31(36)
NFS Installation of Linux
32(3)
FTP Installation
35(2)
Creating the Disks
37(3)
Configuring the Display Manager
40(4)
Installing a New Kernel
44(4)
Logical Volume Management (LVM)
48(6)
Advanced Mounting
54(7)
Journaling File Systems versus Database Journaling
61(1)
Different Journaling File Systems
62(5)
System Utilities
67(12)
Advanced Ext2fs Management
68(11)
System Administration
79(64)
Objectives
79(1)
Theory of Operations
80(29)
The Kernel
80(1)
Kernel Version 2.4
80(2)
Minimum Software Requirements
82(1)
Sources of Kernel Documentation
83(1)
Types of Files
83(4)
Overview of the CPU
87(4)
Performance
91(2)
Performance Tuning-Memory
93(1)
Performance-Tuning Storage Devices
94(4)
Strategies for Server Management
98(3)
Monitoring Performance
101(2)
Log Files
103(3)
Interpreting Log Data
106(3)
Base Systems
109(25)
Patching and Upgrading the Kernel
109(2)
Loadable Device Drivers
111(1)
Quotas
112(4)
Sticky Bit
116(4)
SGID
120(3)
SUID
123(3)
Improving the System's Memory
126(1)
Linux Appliances
127(7)
Shells and Commands
134(9)
Basic Permissions
134(2)
Advanced chmod
136(3)
Memory Utilities
139(4)
Networking
143(98)
Objectives
143(1)
Theory of Operations
143(37)
Network Performance Tuning
144(1)
Network Topologies and Protocols
145(1)
DNS
146(2)
How Does DNS Work?
148(2)
Name Servers
150(2)
Resolution
152(4)
Overview and History of NIS/NIS+
156(1)
NIS+ Overview
157(2)
Introduction to NFS
159(3)
Symbolic Links
162(3)
NFS Naming Schemes
165(1)
Introduction to Firewalls
166(1)
Network Configuration
167(1)
Packet Filtering
168(3)
Proxy Service
171(2)
Bastion Host Services
173(1)
TCP / IP Packet Structure Revisited
174(2)
Differences between ipchains and iptables
176(2)
Bastion Host Configuration
178(2)
Base Systems
180(44)
Resource Records
180(3)
Setting Up a Caching-Only Server
183(5)
DNS Server Maintenance
188(1)
How NIS/NIS+ Works
189(2)
RPC Portmapper
191(1)
Setting Up Master / Slave Servers
192(2)
Setting Up NIS Clients
194(3)
Configuration Files
197(7)
/etc/hosts.allow and/etc/hosts.deny
204(4)
Starting Services
208(1)
Configuring an NFS Client
209(4)
Optimizing NFS Services
213(2)
Constructing the DMZ
215(5)
ipchains Syntax, Rules, and Examples
220(4)
Shells and Commands
224(9)
Useful Utilities
224(1)
Using DNS Utilities
225(4)
ipchains Command Components
229(1)
iptables
230(2)
Other Tools of the Firewall Trade
232(1)
Troubleshooting
233(8)
Troubleshooting DNS
233(2)
Troubleshooting NFS
235(6)
Security
241(44)
Objectives
241(1)
Theory of Operations
242(10)
Types of Attacks
242(2)
Securing Your System
244(1)
Local Security
245(4)
Updating Systems
249(3)
Base Systems
252(18)
Security Problems with SUID and SGID
252(1)
Mandatory Locking
253(1)
NFS Security
254(6)
Defining Your Security Policy
260(2)
Isolating Key Systems
262(3)
Web Server Security
265(2)
TCP Wrappers
267(3)
Applications
270(15)
Defensive Programs
270(4)
Popular Cracking Programs
274(11)
Part Two Labs and Exercises 285(58)
Internet Installation of Debian
287(10)
Purpose
287(1)
Theory
288(2)
Lab Exercises
290(4)
Questions
294(1)
Answers
294(1)
Advanced Questions
295(2)
Partition Image
297(6)
Purpose
297(1)
Theory
297(1)
Lab Exercises
298(3)
Questions
301(1)
Answers
301(1)
Advanced Questions
301(2)
Creating a Rescue Disk
303(4)
Purpose
303(1)
Theory
303(1)
Lab Exercises
304(1)
Questions
305(1)
Answers
305(1)
Advanced Question
305(2)
Configuring and Optimizing the Kernel
307(4)
Purpose
307(1)
Theory
307(1)
Lab Exercises
308(2)
Questions
310(1)
Answers
310(1)
Advanced Questions
310(1)
Configuring Linux to Use ReiserFS
311(4)
Purpose
311(1)
Theory
311(1)
Lab Exercises
312(2)
Questions
314(1)
Answers
314(1)
Advanced Question
314(1)
Configuring Linux to Use JFS
315(4)
Purpose
315(1)
Theory
315(1)
Lab Exercises
316(2)
Questions
318(1)
Answers
318(1)
Advanced Question
318(1)
Quotas
319(4)
Purpose
319(1)
Theory
319(2)
Assigning Quotas
320(1)
Checking Quotas
320(1)
Lab Exercises
321(1)
Questions
321(1)
Answers
322(1)
Advanced Question
322(1)
Hardware Turning Using IRQTUNE
323(4)
Purpose
323(1)
Theory
323(1)
Lab Exercises
323(3)
Questions
326(1)
Answers
326(1)
Advanced Question
326(1)
Configuring NIS Clients
327(2)
Purpose
327(1)
Theory
327(1)
Lab Exercises
327(1)
Questions
328(1)
Answers
328(1)
Advanced Question
328(1)
Configuration of NFS and NIS
329(6)
Purpose
329(1)
Theory
329(1)
Lab Exercises
330(4)
Server Side-NIS Server
330(1)
Server Side-NFS Server
331(1)
Client Side-NFS Client
332(1)
Client Side-NIS Client
332(2)
Questions
334(1)
Answers
334(1)
Advanced Question
334(1)
Firewall Configuration with ipchains
335(4)
Purpose
335(1)
Theory
335(1)
Lab Exercises
335(1)
Questions
336(1)
Answers
337(1)
Advanced Questions
337(2)
Trojaning a Tarball
339(4)
Purpose
339(1)
Theory
339(1)
Lab Exercises
340(1)
Questions
341(1)
Answers
342(1)
Advanced Question
342(1)
Part Three Practice Questions and Answers 343(2)
Practice Questions 345(24)
Answers 369(12)
Glossary 381(8)
Index 389

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program