Eleventh Hour Linux+: Exam XK0-003 Study Guide
192Eleventh Hour Linux+: Exam XK0-003 Study Guide
192Paperback
-
PICK UP IN STORECheck Availability at Nearby Stores
Available within 2 business hours
Related collections and offers
Overview
- Fast Facts quickly review fundamentals
- Exam Warnings highlight particularly tough sections of the exam
- Crunch Time sidebars point out key concepts to remember
- Did You Know? sidebars cover sometimes forgotten details
- Top Five Toughest Questions and answers help you to prepare
Product Details
ISBN-13: | 9781597494977 |
---|---|
Publisher: | Elsevier Science |
Publication date: | 11/16/2009 |
Series: | Eleventh Hour |
Pages: | 192 |
Product dimensions: | 7.40(w) x 9.10(h) x 0.60(d) |
About the Author
Graham holds a Bachelor's Degree from the Swansea University in Wales and is a member of the ISA.Brian Barber (Linux+, MCSE, MCSA, MCP+I, CNE, CNA-GW) works for the Canada Deposit Insurance Corporation (CDIC) as a project manager and architect for CDIC's IT service management program. He first started using Linux at home with Red Hat 5.1 and since then he has been a staunch advocate of open source software, belonging to the Ottawa Canada Linux User Group (OCLUG) since 2001 and the Ottawa Python Authors Group. His primary areas of interest are operating systems, infrastructure design, multiplatform integration, directory services, and enterprise messaging. In the past he has held the positions of Principal Consultant with Sierra Systems Group Inc., Senior Technical Coordinator at the LGS Group Inc. (now a part of IBM Global Services) and Senior Technical Analyst at MetLife Canada.Chris Happel has over 20 years' experience with voice and data networking and security. He is currently a managing consultant for Liberty Trio, LLC, and is an avid supporter of GNU/Linux and open source software.Terrence V. Lillard (Linux+, CISSP) is an IT Security architect and cybercrime and cyberforensics expert. He is actively involved in computer, intrusion, network, and steganography cybercrime and cyberforensics cases, including investigations, security audits, and assessments both nationally and internationally. Terrence has testified in U.S. District Court as a Computer Forensics/Security Expert Witness. He has designed and implemented security architectures for various government, military, and multi-national corporations. Terrence's background includes positions as principal consultant at Microsoft, the IT Security Operations manager for the District of Columbia's government IT Security Team, and instructor at the Defense Cyber Crime Center's (DC3) Computer Investigation Training Academy Program. He has taught IT security and cybercrime/cyberforensics at the undergraduate and graduate level.
He holds a B.S. in Electrical Engineering, Master of Business Administration (MBA), and is currently pursuing a Ph.D. in Information Security.
Table of Contents
Chapter 1: Installing LinuxChapter 2: Managing Filesystems
Chapter 3: Booting Linux
Chapter 4: Configuring the Base System
Chapter 5: Using BASH
Chapter 6: Installing Applications
Chapter 7: Installing, Configuring as a Workstation
Chapter 8: Installing, Configuring as a Server
Chapter 9: Securing Linux
Chapter 10: Troubleshooting and Maintaining Linux
Glossary