Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010095658 | QA76.76.O63 E246 2005 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Complete with extensive chapter summaries and end-of-chapter review questions, "Linux+ 2005 In Depth" serves as a practical guide that maps completely to CompTIA's 2005 Linux+ certification objectives and is designed to prepare readers to successfully pass the exam. The topics introduced in this book-and covered in the certification exam-are geared toward systems administration; however, they are also well suited for those who plan to use or develop programs for Linux systems.
Author Notes
Jason W. Eckert is a graduate of the University of Waterloo and has 13 years of experience as a UNIX administrator and software developer. He currently teaches at triOS College and holds 12 UNIX and Linux certifications
M. John Schitka is a graduate of McMaster University and currently instructs at triOS College where he teaches UNIX and Linux courses, among others
Table of Contents
Introduction | p. xv |
Chapter 1 Introduction to Linux | p. 1 |
Operating Systems | p. 2 |
The Linux Operating System | p. 4 |
Versions of the Linux Operating System | p. 5 |
Identifying Kernel Versions | p. 5 |
Licensing Linux | p. 7 |
Linux Advantages | p. 10 |
The History of Linux | p. 17 |
UNIX | p. 17 |
The Hacker Culture | p. 18 |
Linux | p. 19 |
Linux Distributions | p. 21 |
Common Uses of Linux | p. 25 |
Internet Servers | p. 26 |
File and Print Servers | p. 31 |
Application Servers | p. 32 |
Supercomputers | p. 33 |
Scientific/Engineering Workstation | p. 34 |
Office Workstation | p. 35 |
Chapter Summary | p. 35 |
Key Terms | p. 36 |
Review Questions | p. 40 |
Chapter 2 Preparing for Linux Installation | p. 43 |
Understanding Hardware | p. 44 |
Central Processing Units (CPUs) | p. 44 |
Physical Memory | p. 46 |
Disk Drives | p. 48 |
Mainboards and Peripheral Components | p. 52 |
Video Adapter Cards and Monitors | p. 55 |
Keyboards and Mice | p. 56 |
Gathering Preinstallation Information | p. 56 |
Gathering Hardware Information | p. 59 |
Gathering Software Information | p. 62 |
Chapter Summary | p. 64 |
Key Terms | p. 65 |
Review Questions | p. 70 |
Chapter 3 Linux Installation and Usage | p. 73 |
Installing Linux | p. 74 |
Installation Methods | p. 74 |
Performing the Installation | p. 75 |
Basic Linux Usage | p. 95 |
Shells, Terminals, and the Kernel | p. 95 |
Basic Shell Commands | p. 99 |
Shell Metacharacters | p. 101 |
Getting Command Help | p. 102 |
Shutting Down the Linux System | p. 107 |
Chapter Summary | p. 108 |
Key Terms | p. 109 |
Review Questions | p. 110 |
Chapter 4 Exploring Linux Filesystems | p. 113 |
The Linux Directory Structure | p. 114 |
Changing Directories | p. 115 |
Viewing Files and Directories | p. 118 |
File Types | p. 118 |
Filenames | p. 119 |
Listing Files | p. 120 |
Wildcard Metacharacters | p. 126 |
Displaying the Contents of Text Files | p. 127 |
Displaying the Contents of Binary Files | p. 134 |
Searching for Text Within Files | p. 135 |
Regular Expressions | p. 136 |
The grep Command | p. 138 |
Editing Text Files | p. 140 |
The vi Editor | p. 140 |
Other Common Text Editors | p. 150 |
Chapter Summary | p. 154 |
Key Terms | p. 154 |
Review Questions | p. 156 |
Chapter 5 Linux Filesystem Management | p. 159 |
The Filesystem Hierarchy Standard | p. 160 |
Managing Files and Directories | p. 162 |
Finding Files | p. 167 |
Linking Files | p. 171 |
File and Directory Permissions | p. 175 |
File and Directory Ownership | p. 176 |
Managing File and Directory Permissions | p. 179 |
Default Permissions | p. 187 |
Special Permissions | p. 189 |
Chapter Summary | p. 193 |
Key Terms | p. 194 |
Review Questions | p. 196 |
Chapter 6 Linux Filesystem Administration | p. 199 |
The/dev Directory | p. 200 |
Filesystems | p. 204 |
Filesystem Types | p. 204 |
Mounting | p. 205 |
Working with Floppy Disks | p. 207 |
Working with CD-ROMs | p. 216 |
Working with Hard Disks | p. 217 |
Hard Disk Partitioning | p. 218 |
Working with Hard Disk Partitions | p. 221 |
Monitoring Filesystems | p. 228 |
Disk Usage | p. 228 |
Checking Filesystems for Errors | p. 231 |
Hard Disk Quotas | p. 235 |
Chapter Summary | p. 239 |
Key Terms | p. 239 |
Review Questions | p. 242 |
Chapter 7 Advanced Installation | p. 245 |
Advanced Hardware Configuration | p. 246 |
SCSI Hard Disk Drive Configuration | p. 246 |
Mainboard Flow Control: IRQs, DMAs, and I/O Addresses | p. 249 |
Plug-and-Play | p. 252 |
APM and ACPI | p. 253 |
RAID Configuration | p. 254 |
Installation Methods | p. 256 |
DVD Installation | p. 257 |
Hard Disk Installation | p. 257 |
Network-Based Installations | p. 261 |
Automating Linux Installations | p. 263 |
Troubleshooting Installation | p. 266 |
Problems Starting the Installation | p. 267 |
Problems During Installation | p. 267 |
Problems after Installation | p. 269 |
Chapter Summary | p. 276 |
Key Terms | p. 276 |
Review Questions | p. 279 |
Chapter 8 Working with the BASH Shell | p. 281 |
Command Input and Output | p. 282 |
Redirection | p. 283 |
Pipes | p. 288 |
Shell Variables | p. 297 |
Environment Variables | p. 298 |
User-Defined Variables | p. 303 |
Other Variables | p. 305 |
Environment Files | p. 306 |
Shell Scripts | p. 307 |
Escape Sequences | p. 309 |
Reading Standard Input | p. 310 |
Decision Constructs | p. 311 |
Chapter Summary | p. 319 |
Key Terms | p. 320 |
Review Questions | p. 322 |
Chapter 9 System Initialization and X Windows | p. 325 |
The Boot Process | p. 326 |
Boot Loaders | p. 327 |
LILO | p. 328 |
GRUB | p. 331 |
Dual Booting Linux | p. 336 |
Linux Initialization | p. 343 |
Runlevels | p. 343 |
The/etc/inittab file | p. 346 |
Configuring Daemon Startup | p. 350 |
The X Windows System | p. 353 |
Linux GUI Components | p. 353 |
Starting and Stopping X Windows | p. 359 |
Configuring X Windows | p. 361 |
Chapter Summary | p. 366 |
Key Terms | p. 367 |
Review Questions | p. 370 |
Chapter 10 Managing Linux Processes | p. 373 |
Linux Processes | p. 374 |
Viewing Processes | p. 376 |
Killing Processes | p. 383 |
Process Execution | p. 386 |
Running Processes in the Background | p. 387 |
Process Priorities | p. 390 |
Scheduling Commands | p. 393 |
Scheduling Commands with atd | p. 393 |
Scheduling Commands with crond | p. 397 |
Chapter Summary | p. 401 |
Key Terms | p. 402 |
Review Questions | p. 404 |
Chapter 11 Common Administrative Tasks | p. 407 |
Printer Administration | p. 408 |
The Common UNIX Printing System | p. 408 |
Managing Print Jobs | p. 410 |
The LPD Printing System | p. 413 |
Configuring Printers | p. 414 |
Log File Administration | p. 418 |
The System Log Daemon | p. 418 |
Managing Log Files | p. 422 |
Administering Users and Groups | p. 424 |
Creating User Accounts | p. 431 |
Modifying User Accounts | p. 435 |
Deleting User Accounts | p. 436 |
Managing Groups | p. 438 |
Chapter Summary | p. 440 |
Key Terms | p. 440 |
Review Questions | p. 443 |
Chapter 12 Compression, System Backup, and Software Installation | p. 445 |
Compression | p. 446 |
The compress Utility | p. 446 |
The gzip utility | p. 449 |
The bzip2 utility | p. 452 |
System Backup | p. 455 |
The tar Utility | p. 456 |
The cpio Utility | p. 461 |
The dump/restore Utility | p. 463 |
Burning Software | p. 469 |
Software Installation | p. 470 |
Compiling Source Code into Programs | p. 470 |
Installing Programs Using RPM | p. 479 |
Chapter Summary | p. 484 |
Key Terms | p. 484 |
Review Questions | p. 486 |
Chapter 13 Troubleshooting and Performance | p. 489 |
Troubleshooting Methodology | p. 490 |
Resolving Common System Problems | p. 493 |
Hardware-Related Problems | p. 493 |
Software-Related Problems | p. 495 |
Performance Monitoring | p. 501 |
Monitoring Performance with sysstat Utilities | p. 502 |
Other Performance Monitoring Utilities | p. 508 |
Customizing the Kernel | p. 510 |
Kernel Modules | p. 510 |
Compiling a New Linux Kernel | p. 513 |
Patching the Linux Kernel | p. 517 |
Chapter Summary | p. 517 |
Key Terms | p. 518 |
Review Questions | p. 520 |
Chapter 14 Network Configuration | p. 523 |
Networks and TCP/IP | p. 524 |
The TCP/IP Protocol | p. 525 |
TCP/IP Classes and Subnetting | p. 528 |
Configuring a NIC Interface | p. 531 |
Configuring a PPP Interface | p. 535 |
Name Resolution | p. 542 |
Connecting to Network Resources | p. 545 |
Downloading Files Using FTP | p. 546 |
Accessing Files with NFS | p. 549 |
Accessing Windows Files | p. 550 |
Running Remote Applications | p. 552 |
Accessing E-mail | p. 555 |
Chapter Summary | p. 558 |
Key Terms | p. 559 |
Review Questions | p. 561 |
Chapter 15 Configuring Network Services and Security | p. 563 |
Network Services | p. 564 |
Identifying Network Services | p. 564 |
Configuring Common Network Services | p. 567 |
Routing and Firewall Services | p. 579 |
Security | p. 584 |
Securing the Local Computer | p. 584 |
Protecting Against Network Attacks | p. 587 |
Detecting Intrusion | p. 589 |
Chapter Summary | p. 591 |
Key Terms | p. 592 |
Review Questions | p. 594 |
Appendix A Certification | p. 597 |
Appendix B GNU Public License | p. 605 |
Appendix C Finding Linux Resources on the Internet | p. 613 |
Appendix D Answers to Chapter Review Questions | p. 617 |
Glossary | p. 623 |
Index | p. 655 |