Foreword | p. vi |
About the Authors | p. ix |
Acknowledgments | p. xi |
Preface | p. xxxiii |
Introduction | p. xxxvii |
Introduction to Linux | p. 1 |
The Linux Community | p. 4 |
Anyone for a Free Operating System? | p. 5 |
Open Source: Fact and Fiction | p. 6 |
Who Uses Linux and Why? | p. 8 |
Introducing Linux Distributions | p. 12 |
Linux Today | p. 16 |
Summary | p. 18 |
Networking Basics | p. 19 |
Identify Basic Network Concepts, Including How a Network Works | p. 21 |
Network Cabling | p. 24 |
Signal Enemies | p. 30 |
Networking Devices | p. 31 |
Media Access Methods | p. 38 |
Networking Standards | p. 40 |
Network Protocols | p. 42 |
QandA | p. 58 |
Hardware Configuration | p. 69 |
Electrostatic Discharge | p. 70 |
Identify Basic Terms, Concepts, and Functions of System Components | p. 72 |
Memory | p. 72 |
Storage Devices | p. 84 |
Identify Proper Procedures for Installing and Configuring ATA Devices | p. 85 |
Identify Proper Procedures for Installing and Configuring SCSI Devices | p. 89 |
IEEE 1394 | p. 102 |
Universal Serial Bus | p. 102 |
Identify Proper Procedures for Installing and Configuring Peripheral Devices | p. 104 |
Cabling, Connectors, and Peripheral Ports | p. 106 |
Identify Available IRQs, DMAs, I/O Addresses, and Procedures for Device Installation | p. 108 |
Identify Basic Procedures for Adding and Removing Field-Replaceable Units | p. 111 |
Identify and Maintain Mobile System Hardware | p. 112 |
QandA | p. 118 |
Hardware Troubleshooting | p. 129 |
Identifying, Troubleshooting, and Isolating Common System Problems | p. 130 |
Identifying Proper Procedures for Diagnosing and Troubleshooting IDE Devices | p. 141 |
Identifying Proper Procedures for Diagnosing and Troubleshooting SCSI Devices | p. 142 |
Identifying Proper Procedures for Diagnosing and Troubleshooting Peripheral Devices | p. 144 |
Identifying Proper Procedures for Diagnosing and Troubleshooting Core System Hardware | p. 149 |
QandA | p. 158 |
Planning the Implementation | p. 171 |
Identifying the Purpose of the Linux System Based on Predetermined Requirements | p. 173 |
Comparing and Contrasting How Major Licensing Schemes Work | p. 178 |
Identifying the Function of Different Linux Services | p. 181 |
Identifying Strengths and Weaknesses of Different Distributions and Their Packaging Solutions | p. 188 |
Popular Linux Distributions | p. 189 |
Describing the Functions, Features, and Benefits of a Linux System | p. 195 |
Identifying How the Linux Kernel Version Numbering Works | p. 201 |
Identifying Where to Obtain Software and Resources | p. 204 |
Determining Customer Resources for a Solution | p. 206 |
QandA | p. 211 |
Pre-Installation Procedures | p. 221 |
General Pre-Installation Considerations | p. 222 |
Identifying Required System Hardware and Validating That It's Supported by Linux | p. 225 |
Determining Which Software and Services Should Be Installed | p. 231 |
Determining How Storage Space Will Be Allocated to File Systems | p. 235 |
Identifying the Best Method of Installation | p. 242 |
Making Linux Boot Disks | p. 244 |
Creating Boot Disks from Linux | p. 245 |
Partitioning According to Your Pre-Installation Plan with FDISK | p. 247 |
Understanding and Configuring File Systems | p. 249 |
QandA | p. 255 |
Linux Installation | p. 267 |
Describing the Different Types of Linux Installation Interaction and Describing Which One to Use for a Given Situation | p. 268 |
Selecting Appropriate Parameters for a Linux Installation | p. 270 |
Selecting Packages Based on the Machine's Role | p. 271 |
Selecting Appropriate Options for Partitions Based on Pre-Installation Choices | p. 272 |
Selecting Appropriate Networking Configuration and Protocols | p. 273 |
Selecting Appropriate Security Settings | p. 276 |
Creating Usernames and Passwords During Installation | p. 277 |
Installing and Configuring XFree86 Server | p. 281 |
Selecting Video Card Support | p. 283 |
Selecting Appropriate Monitor Manufacturers and Settings | p. 284 |
Selecting Appropriate Window Managers or Desktop Environments | p. 284 |
Explaining When and Why the Kernel Needs to Be Recompiled | p. 287 |
Installing a Boot Loader | p. 288 |
Installing and Uninstalling Applications After Installing the Operating System | p. 290 |
Reading Log Files Created During Installation to Verify the Success of the Installation | p. 293 |
Testing an Installed Application's Performance in Both a Test and a Production Environment | p. 294 |
Red Hat Installation | p. 295 |
SuSE Text-Based Installation | p. 308 |
QandA | p. 320 |
Configuration | p. 331 |
Reconfiguring the X Window System with Automated Utilities | p. 332 |
Configuring the Client's Workstation for Remote Access | p. 336 |
Setting Environment Variables | p. 339 |
Configuring Basic Network Services and Settings | p. 342 |
Configuring Basic Server Services | p. 346 |
Configuring Basic Internet Services | p. 354 |
Identifying When Swap Space Needs to Be Increased | p. 359 |
Adding and Configuring Printers | p. 361 |
Reconfiguring Boot Loader | p. 364 |
Identifying the Purposes and Characteristics of Configuration Files | p. 367 |
Editing Basic Configuration Files | p. 371 |
Loading, Removing, and Editing List Modules | p. 373 |
Documenting the Installation of the Operating System, Including Configuration | p. 377 |
Configuring Access Rights | p. 380 |
QandA | p. 388 |
Linux Administration | p. 399 |
Creating and Deleting Users | p. 400 |
Deleting and Disabling User Accounts | p. 406 |
Modifying Existing Users | p. 407 |
Creating, Modifying, and Deleting Groups | p. 411 |
Identifying and Changing File Permissions, Modes, and Types | p. 415 |
Managing and Navigating the Linux Hierarchy and File System | p. 423 |
Performing Administrative Tasks while Logged in as Root or by Using the su Command | p. 431 |
Mounting and Managing File Systems and Devices | p. 433 |
QandA | p. 440 |
Administration: Part Two | p. 449 |
Describing and Using the Features of the Multiuser Environment | p. 450 |
Using Common Shell Commands and Expressions | p. 453 |
Using Network Commands to Connect to and Manage Remote Systems | p. 458 |
Creating, Extracting, and Editing File and Tape Archives with tar | p. 463 |
Managing Runlevels with init and shutdown | p. 465 |
Stopping, Starting, and Restarting Services (Daemons) as Needed | p. 471 |
Managing Print Spools and Queues | p. 473 |
Creating, Editing, and Saving Files with vi | p. 476 |
Managing and Navigating the Graphical User Interface | p. 481 |
Programming Basic Shell Scripts with Common Shell Commands | p. 485 |
QandA | p. 494 |
System Maintenance | p. 503 |
Creating and Managing Local Storage Devices and File Systems | p. 504 |
Verifying User and Root cron Jobs and Understanding the Function of cron | p. 508 |
Identifying Core Dumps and Removing or Forwarding as Appropriate | p. 513 |
Running and Interpreting ifconfig | p. 515 |
Downloading and Installing Patches and Updates | p. 518 |
Identifying, Executing, and Killing Processes | p. 519 |
Differentiating Core Services from Noncritical Services | p. 523 |
Monitoring System Log Files | p. 524 |
Documenting Work Performed on a System | p. 525 |
Performing and Verifying Backups and Restores | p. 527 |
Assessing, Performing, and Verifying Security Best Practices | p. 536 |
Setting Daemons and Processing Permissions | p. 540 |
QandA | p. 545 |
Troubleshooting | p. 555 |
Identifying and Locating the Problem | p. 556 |
Describing Troubleshooting Best Practices | p. 558 |
Editing Configuration Files Based on the Symptoms of a Problem | p. 562 |
Starting and Stopping Processes Based on the Symptoms of a Problem | p. 562 |
Using Tools to Determine System Status | p. 564 |
Using Boot Disks in the Recovery Process | p. 565 |
Determining the Cause of Errors from System Log Files | p. 566 |
Solving File System Problems | p. 570 |
Resolving Problems Based on User Feedback | p. 571 |
Recognizing Common Linux Errors | p. 576 |
Boot and Login Errors | p. 578 |
Identifying Backup and Restore Errors | p. 579 |
Server Application Failure | p. 581 |
Identifying and Using Troubleshooting Commands | p. 582 |
Using Linux Troubleshooting Resources | p. 584 |
Using Network Utilities to Identify Network Connectivity Problems | p. 586 |
QandA | p. 595 |
Command Summary | p. 607 |
Exercises | p. 615 |
| p. 616 |
Modifying File Permissions and Ownership | p. 616 |
| p. 617 |
Mounting and Dismounting a CD-ROM Device | p. 617 |
| p. 618 |
Changing the Default File Permission | p. 618 |
| p. 619 |
Scheduling Jobs Using the at Command | p. 619 |
| p. 620 |
Backing Up Files Using the tar Command | p. 620 |
| p. 621 |
Configuring a Basic Printer Configuration for Testing | p. 621 |
| p. 623 |
Working with Files and Directories | p. 623 |
Answer Key | p. 624 |
| p. 624 |
| p. 625 |
| p. 625 |
| p. 625 |
| p. 625 |
| p. 626 |
| p. 626 |
Resources | p. 627 |
Linux Distribution Web Sites | p. 628 |
Linux-Related Web Sites | p. 628 |
Linux Newsgroups | p. 630 |
Glossary | p. 633 |
About the CD | p. 653 |
Installing CertTrainer | p. 654 |
CertTrainer | p. 654 |
ExamSim | p. 655 |
E-Book | p. 655 |
Help | p. 655 |
Upgrading | p. 655 |
Linux | p. 656 |
Index | p. 657 |
Table of Contents provided by Syndetics. All Rights Reserved. |