LPI Linux Certification in a Nutshell. 2nd Edition Steven Pritchard, Bruno Gomes Pessanha, Nicolai Langfeldt
(ebook)
(audiobook)
(audiobook)
- Autorzy:
- Steven Pritchard, Bruno Gomes Pessanha, Nicolai Langfeldt
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 992
- Dostępne formaty:
-
ePubMobi
Opis
książki
:
LPI Linux Certification in a Nutshell. 2nd Edition
LPI Linux Certification in a Nutshell,Second Edition is an invaluable resource for determining what you needto practice to pass the Linux Professional Institute exams. This bookwill helpyou determine when you're ready to take the exams, which aretechnically challenging and designed to reflect the skills thatadministrators needin real working environments.
As more corporations adopt Linux as the networking backbone for theirIT systems, the demand for certified technicians will becomeeven greater. Passing the LPI exams will broaden your career optionsbecause the LPICis the most widely known and respected Linux certification program intheworld. Linux Journal recognized the LPI as the bestTraining andCertification Program. The exams were developed by the LinuxProfessional Institute,an international, volunteer-driven organization with affiliates in adozen countries.
The core LPI exams cover two levels. Level 1 tests a basic knowledge ofLinux installation, configuration, and command-lineskills. Level 2 goes into much more depth regarding systemtroubleshooting andnetwork services such as email and the Web. The second edition of LPILinuxCertification in a Nutshell is a thoroughly researchedreference to these exams. The book is divided into four parts, one foreach of theLPI exams. Each part features not only a summary of the core skills youneed, but sample exercises and test questions, along with helpful hintsto letyou focus your energies.
Major topics include:
- GNU and Unix commands
- Linux installation and package management
- Devices, filesystems, and kernel configuration
- Text editing, processing, and printing
- The X Window System
- Networking fundamentals and troubleshooting
- Security, including intrusion detection, SSH, Kerberos, andmore
- DNS, DHCP, file sharing, and other networking infrastructure
- Email, FTP, and Web services
Praise for the first edition:
"Although O'Reilly's Nutshell series are intended as 'DesktopReference' manuals, I have to recommend this one as a goodall-round read; not only as a primer for LPI certification, but as anexcellent introductory text on GNU/Linux. In all, this is a valuableaddition toO'Reilly's already packed stable of Linux titles and I look forward tomore from the author."--First Monday
Wybrane bestsellery
-
Promocja
Linux deployment continues to increase, and so does the demand for qualified and certified Linux system administrators. If you're seeking a job-based certification from the Linux Professional Institute (LPI), this updated guide will help you prepare for the technically challenging LPIC Level 1 Exams 101 and 102.The third edition of this book is a m- ePub + Mobi 152 pkt
LPI Linux Certification in a Nutshell. A Desktop Quick Reference. 3rd Edition
Adam Haeder, Stephen Addison Schneiter, Bruno Gomes Pessanha
(143,65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł (-15%) -
Promocja
To piąte, gruntownie zaktualizowane wydanie podręcznika, który doceni każdy student informatyki i inżynier oprogramowania. Książka obejmuje szeroki zakres zagadnień, od podstawowych pojęć po zaawansowaną problematykę związaną z najnowszymi trendami w systemach operacyjnych. Wyczerpująco omawia procesy, wątki, zarządzanie pamięcią, systemy plików, operacje wejścia-wyjścia, zakleszczenia, interfejsy użytkownika, multimedia czy kompromisy wydajnościowe. Szczegółowo, jako studia przypadków, zostały tu opisane systemy: Windows 11, Unix, Linux i Android. Jasny i przystępny styl, a także liczne przykłady i ćwiczenia ułatwiają zrozumienie nawet bardzo skomplikowanych zagadnień.- PDF + ePub + Mobi
- Druk 89 pkt
(89,50 zł najniższa cena z 30 dni)
89.50 zł
179.00 zł (-50%) -
Promocja
Oto kompleksowe omówienie sposobów wdrażania najnowszych dostępnych środków zabezpieczających systemy linuksowe. Z książki dowiesz się, jak skonfigurować laboratorium do ćwiczeń praktycznych, tworzyć konta użytkowników z odpowiednimi poziomami uprawnień, chronić dane dzięki uprawnieniom i szyfrowaniu, a także skonfigurować zaporę sieciową przy użyciu najnowszych technologii. Nauczysz się też automatyzować takie czynności jak monitorowanie systemu za pomocą auditd i utwardzanie (hardening) konfiguracji jądra Linux. Poznasz również sposoby ochrony przed złośliwym oprogramowaniem i skanowania systemów pod kątem luk w zabezpieczeniach. Znajdziesz tu ponadto podpowiedź, jak używać Security Onion do skonfigurowania systemu wykrywania włamań.- PDF + ePub + Mobi
- Druk 64 pkt
(64,50 zł najniższa cena z 30 dni)
64.50 zł
129.00 zł (-50%) -
Promocja
Ta książka, podobnie jak inne z serii „Biblia”, zawiera zarówno niezbędne teoretyczne informacje, jak i mnóstwo praktycznych wskazówek i instrukcji, dzięki czemu jest znakomitą pomocą w nauce pisania skryptów dla Linuksa. Pokazano tu, kiedy efektywniej jest używać interfejsu graficznego, a kiedy lepiej sięgnąć do wiersza poleceń. Opisano elementy systemu Linux i przedstawiono podstawowe informacje o powłoce, a także o pracy w wierszu poleceń. Zaprezentowano techniki przetwarzania danych użytkownika w skryptach, pracę z systemami plików, wreszcie — sposoby instalacji i aktualizacji oprogramowania. Sporo miejsca poświęcono pracy z wyrażeniami regularnymi i zaawansowanym metodom manipulacji danymi, pokazano też, jak zmodyfikować skrypty powłoki, aby działały w innych powłokach Linuksa.- PDF + ePub + Mobi
- Druk 74 pkt
(74,50 zł najniższa cena z 30 dni)
74.50 zł
149.00 zł (-50%) -
Promocja
Ta książka jest przeznaczona dla programistów i administratorów, którzy poszukują wydajnej metody zarządzania systemami. Pokazano w niej, w jaki sposób działa Ansible i jak należy przygotować go do pracy. Omówiono sposoby tworzenia scenariuszy (są to skrypty do zarządzania konfiguracją), zasady zarządzania zewnętrznymi serwerami, a także zaprezentowano najciekawsze funkcjonalności tego oprogramowania: wbudowane deklaratywne moduły . W tym wydaniu uwzględniono zmiany wynikające z dynamicznego rozwoju Ansible, dodano też kilka rozdziałów poświęconych kontenerom, platformie Molecule, kolekcjom Ansible, obrazom i infrastrukturze chmurowej.- PDF + ePub + Mobi
- Druk 49 pkt
(49,50 zł najniższa cena z 30 dni)
49.50 zł
99.00 zł (-50%) -
Promocja
Ta książka jest przeznaczona dla inżynierów zarządzających infrastrukturą sieciową dowolnego rodzaju. Znajdziesz w niej niezbędne informacje, których potrzebujesz do uruchomienia i skonfigurowania różnych użytecznych usług sieciowych. Najpierw poznasz najważniejsze dystrybucje oraz podstawy konfiguracji sieci w Linuksie. Następnie przejdziesz do diagnozowania sieci, konfigurowania zapory oraz używania Linuksa jako hosta usług sieciowych. W dalszej kolejności uzyskasz informacje o przydatnych usługach oraz o ich wdrażaniu w środowisku korporacyjnym. Sporo miejsca w książce poświęcono też zagadnieniom ochrony przed nieuprawnionym dostępem: omówiono typowe sposoby przeprowadzania ataków oraz techniki skutecznego zabezpieczania usług sieciowych. Ta publikacja dostarczy Ci przydatnych wskazówek, które pozwolą nie tylko skonfigurować potrzebne usługi sieciowe, ale także zbudować centrum danych oparte wyłącznie na Linuksie.- PDF + ePub + Mobi
- Druk 59 pkt
(59,50 zł najniższa cena z 30 dni)
59.50 zł
119.00 zł (-50%) -
Promocja
Autor znanych czytelnikom wydawnictwa Helion książek między innymi na temat otwartoźródłowego systemu operacyjnego przygotował szóstą już edycję przewodnika po komendach i poleceniach Linuksa. W kieszonkowym leksykonie omówił posługiwanie się komputerem z Linuksem na pokładzie za pomocą poleceń, operacje na plikach, plikach specjalnych, katalogach, łączach i potokach, pisanie własnych skryptów powłoki, obsługę programu Midnight Commander.- PDF + ePub + Mobi
- Druk 19 pkt
(19,95 zł najniższa cena z 30 dni)
19.95 zł
39.90 zł (-50%) -
Promocja
To trzecie wydanie bestsellerowego podręcznika dla administratorów systemów Linux. Zostało zaktualizowane i uzupełnione materiałem dotyczącym menedżera LVM, wirtualizacji i kontenerów. Znajdziesz tu informacje o sposobie pracy poszczególnych elementów systemu Linux i o sekwencji jego rozruchu. W książce omówiono też jądro i przybliżono kluczowe procesy przestrzeni użytkowników, w tym wywołania systemowe, operacje wejścia-wyjścia i utrzymywanie systemów plików. Nie zabrakło także dokładnych instrukcji dotyczących narzędzi używanych przez administratorów i programistów, praktycznych przykładów i ćwiczeń opatrzonych szczegółowymi objaśnieniami.- PDF + ePub + Mobi
- Druk 49 pkt
(49,50 zł najniższa cena z 30 dni)
49.50 zł
99.00 zł (-50%) -
Promocja
Security assessment in the ICS environment is often a challenging task that requires divergent thinking. Pentesting Industrial Control Systems covers the nuts and bolts of specifically what to look for when securing an industrial control system.- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
Linux for Networking Professionals Second Edition is your one-stop shop for everything Linux. From networking basics and configuration to diagnosis, troubleshooting, and security – this book is all you need to be successful with Linux.
W przygotowaniu
Powiadom mnie, gdy książka będzie dostępna -
This comprehensive guide is aimed at those who want to take the leap from low-power microcontrollers to high-speed system on chips that can efficiently run Linux. Look no further, this book has everything you need to start your journey.
W przygotowaniu
Powiadom mnie, gdy książka będzie dostępna
Ebooka "LPI Linux Certification in a Nutshell. 2nd Edition" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "LPI Linux Certification in a Nutshell. 2nd Edition" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolonych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "LPI Linux Certification in a Nutshell. 2nd Edition" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły książki
- ISBN Ebooka:
- 978-05-965-5493-4, 9780596554934
- Data wydania ebooka :
- 2006-07-26 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- 1
- Rozmiar pliku ePub:
- 2.7MB
- Rozmiar pliku Mobi:
- 8.6MB
Spis treści książki
- LPI Linux Certification in a Nutshell
- SPECIAL OFFER: Upgrade this ebook with OReilly
- Preface
- The Linux Professional Institute
- Audience for This Book
- Organization
- Book Chapters
- Conventions Used in This Book
- Using Code Examples
- Safari Enabled
- How to Contact Us
- Acknowledgments
- I. General Linux Exam 101
- 1. LPI Exams
- 1.1. Exam 101 Overview
- 2. Exam 101 Study Guide
- 2.1. Exam Preparation
- 3. Hardware and Architecture (Topic 1.101)
- 3.1. Objective 1: Configure Fundamental BIOS Settings
- 3.1.1. BIOS
- 3.1.1.1. Date and time
- 3.1.1.2. Disks and boot devices
- 3.1.2. Resource Assignments
- 3.1.3. 1024-Cylinder Limit
- 3.1.1. BIOS
- 3.2. Objective 3: Configure Modems and Sound Cards
- 3.2.1. Modems
- 3.2.1.1. Modem types
- 3.2.1.2. Modem hardware resources
- 3.2.2. Sound Devices
- 3.2.1. Modems
- 3.3. Objective 4: Set Up Non-IDE Devices
- 3.3.1. SCSI
- 3.3.1.1. SCSI types
- 3.3.2. SCSI IDs
- 3.3.2.1. SCSI logical unit numbers
- 3.3.2.2. Linux SCSI disk device files
- 3.3.2.3. Termination
- 3.3.2.4. SCSI controllers on PCs
- 3.3.1. SCSI
- 3.4. Objective 5: Set Up Different PC Expansion Cards
- 3.4.1. Plug and Play
- 3.4.1.1. Using the /proc filesystem
- 3.4.1. Plug and Play
- 3.5. Objective 6: Configure Communications Devices
- 3.6. Objective 7: Configure USB Devices
- 3.6.1. USB Topology
- 3.6.2. USB Controllers
- 3.6.3. USB Devices
- 3.6.4. USB Drivers
- 3.6.5. USB Hotplug
- 3.1. Objective 1: Configure Fundamental BIOS Settings
- 4. Linux Installation and Package Management (Topic 1.102)
- 4.1. Objective 1: Design a Hard Disk Layout
- 4.1.1. System Considerations
- 4.1.1.1. Limited disk space
- 4.1.1.2. Larger systems
- 4.1.1.3. System role
- 4.1.1.4. Backup
- 4.1.2. Swap Space
- 4.1.3. General Guidelines
- 4.1.1. System Considerations
- 4.2. Objective 2: Install a Boot Manager
- 4.2.1. LILO
- 4.2.1.1. The boot loader
- 4.2.1.2. The LILO map installer and its configuration file
- 4.2.1.3. LILO locations
- 4.2.2. GRUB
- 4.2.2.1. GRUB device naming
- 4.2.2.2. Installing GRUB
- 4.2.2.3. Booting GRUB
- 4.2.2.4. The GRUB configuration file
- 4.2.1. LILO
- 4.3. Objective 3: Make and Install Programs from Source
- 4.3.1. Getting Open Source and Free Software
- 4.3.1.1. Whats a tarball?
- 4.3.1.2. Opening a tarball
- 4.3.2. Compiling Open Source Software
- 4.3.2.1. configure
- 4.3.2.2. make
- 4.3.2.3. Installing the compiled software
- 4.3.2.4. Example:Compiling bash
- 4.3.1. Getting Open Source and Free Software
- 4.4. Objective 4: Manage Shared Libraries
- 4.4.1. Shared Library Dependencies
- 4.4.2. Linking Shared Libraries
- 4.5. Objective 5: Use Debian Package Management
- 4.5.1. Debian Package Management Overview
- 4.5.2. Managing Debian Packages
- 4.6. Objective 6: Use Red Hat Package Manager (RPM)
- 4.6.1. RPM Overview
- 4.6.2. Running rpm
- 4.1. Objective 1: Design a Hard Disk Layout
- 5. GNU and Unix Commands (Topic 1.103)
- 5.1. Objective 1: Work on the Command Line
- 5.1.1. The Interactive Shell
- 5.1.1.1. Shell variable basics
- 5.1.1.2. Entering commands at the command prompt
- 5.1.1.3. Entering commands not in the PATH
- 5.1.1.4. Entering multiple-line commands interactively
- 5.1.1.5. Entering command sequences
- 5.1.2. Command History and Editing
- 5.1.2.1. Command substitution
- 5.1.2.2. Applying commands recursively through a directory tree
- 5.1.1. The Interactive Shell
- 5.2. Objective 2: Process Text Streams Using Filters
- 5.4. Objective 3: Perform Basic File Management
- 5.4.1. Filesystem Objects
- 5.4.1.1. Directories and files
- 5.4.1.2. Inodes
- 5.4.1.3. File and directory management commands
- 5.4.2. File-Naming Wildcards
- 5.4.1. Filesystem Objects
- 5.5. Objective 4: Use Streams, Pipes, and Redirects
- 5.5.1. Standard I/O and Default File Descriptors
- 5.5.2. Pipes
- 5.5.3. Redirection
- 5.5.4. Using the tee Command
- 5.6. Objective 5: Create, Monitor, and Kill Processes
- 5.6.1. Processes
- 5.6.2. Process Monitoring
- 5.6.3. Signaling Active Processes
- 5.6.4. Terminating Processes
- 5.6.5. Shell Job Control
- 5.7. Objective 6: Modify Process Execution Priorities
- 5.7.1. nice
- 5.8. Objective 7: Search Text Files Using Regular Expressions
- 5.8.1. Regular Expression Syntax
- 5.8.1.1. Examples
- 5.8.2. Using sed
- 5.8.2.1. Commands
- 5.8.3. Examples
- 5.8.3.1. Anchors
- 5.8.3.2. Groups and ranges
- 5.8.3.3. Modifiers
- 5.8.3.4. Basic regular expression patterns
- 5.8.3.5. Using regular expressions as addresses in sed
- 5.8.1. Regular Expression Syntax
- 5.9. Objective 8: Perform Basic File Editing Operations Using vi
- 5.9.1. Invoking vi
- 5.9.2. vi Basics
- 5.1. Objective 1: Work on the Command Line
- 6. Devices, Linux Filesystems, and the Filesystem Hierarchy Standard (Topic 1.104)
- 6.1. Objective 1: Create Partitions and Filesystems
- 6.1.1. Disk Drives Under Linux
- 6.1.1.1. Hard disk devices
- 6.1.1.2. Disk partitions
- 6.1.1.3. The root filesystem and mount points
- 6.1.1.4. Managing partitions
- 6.1.1.5. Creating filesystems
- 6.1.1.6. Creating swap partitions
- 6.1.1. Disk Drives Under Linux
- 6.2. Objective 2: Maintain the Integrity of Filesystems
- 6.2.1. Monitoring Free Disk Space and Inodes
- 6.2.2. Monitoring Disk Usage
- 6.2.3. Modifying a Filesystem
- 6.2.4. Checking and Repairing Filesystems
- 6.3. Objective 3: Control Filesystem Mounting and Unmounting
- 6.3.1. Managing the Filesystem Table
- 6.3.2. Mounting Filesystems
- 6.3.3. Unmounting Filesystems
- 6.4. Objective 4: Set and View Disk Quotas
- 6.4.1. Quota Limits
- 6.4.2. Quota Commands
- 6.4.3. Enabling Quotas
- 6.5. Objective 5: Use File Permissions to Control Access to Files
- 6.5.1. Linux Access Control
- 6.5.1.1. The mode bits
- 6.5.1.2. The mode string
- 6.5.2. Setting Access Modes
- 6.5.2.1. New files
- 6.5.2.2. Changing access modes
- 6.5.1. Linux Access Control
- 6.6. Setting Up a Workgroup Directory
- 6.7. Objective 6: Manage File Ownership
- 6.8. Objective 7: Create and Change Hard and Symbolic Links
- 6.8.1. Why Links?
- 6.8.1.1. Preserving links
- 6.8.1.2. Finding links to a file
- 6.8.1. Why Links?
- 6.9. Objective 8: Find System Files and Place Files in the Correct Location
- 6.9.1. Data Types
- 6.9.2. The root Filesystem
- 6.9.2.1. The /usr filesystem
- 6.9.2.2. The /var filesystem
- 6.9.2.3. Linux annex
- 6.9.2.4. Where's that binary?
- 6.9.3. Locating Files
- 6.1. Objective 1: Create Partitions and Filesystems
- 7. The X Window System (Topic 1.1.10)
- 7.1. An Overview of X
- 7.2. Objective 1: Install and Configure X11
- 7.2.1. Selecting and Configuring an X Server
- 7.2.1.1. Supported video hardware
- 7.2.1.2. Installing XFree86
- 7.2.1.3. Configuring an X server and the XF86Config file
- 7.2.2. X Fonts
- 7.2.2.1. Installing fonts
- 7.2.2.2. The X font server
- 7.2.3. Controlling X Applications with .Xresources
- 7.2.1. Selecting and Configuring an X Server
- 7.3. Objective 2: Set Up a Display Manager
- 7.3.1. Configuring xdm
- 7.3.1.1. Running xdm manually
- 7.3.1.2. Running xdm automatically
- 7.3.1.3. Basic xdm customization
- 7.3.2. X Terminals
- 7.3.2.1. xdm for X terminals
- 7.3.1. Configuring xdm
- 7.4. Objective 4: Install and Customize a Window Manager Environment
- 7.4.1. Starting X and a Default Window Manager
- 7.4.1.1. The XFree86 start up process
- 7.4.2. xterm et al.
- 7.4.3. X Libraries
- 7.4.4. Remote X Clients
- 7.4.4.1. Examples
- 7.4.5. X Security
- 7.4.5.1. Host access control
- 7.4.5.2. MIT-MAGIC-COOKIE-1 Authentication
- 7.4.1. Starting X and a Default Window Manager
- 8. Exam 101 Review Questions and Exercises
- 8.1. Hardware and Architecture (Topic 1.101)
- 8.1.1. Review questions
- 8.1.2. Exercises
- 8.2. Linux Installation and Package Management (Topic 1.102)
- 8.2.1. Review Questions
- 8.2.2. Exercises
- 8.3. GNU and Unix Commands (Topic 1.103)
- 8.3.1. Review Questions
- 8.3.2. Exercises
- 8.4. Devices, Linux Filesystems, and the Filesystem Hierarchy Standard (Topic 1.104)
- 8.4.1. Review Questions
- 8.4.2. Exercises
- 8.5. The X Window System (Topic 1.110)
- 8.5.1. Review Questions
- 8.5.2. Exercises
- 8.1. Hardware and Architecture (Topic 1.101)
- 9. Exam 101 Practice Test
- 9.1. Questions
- 9.2. Answers
- 10. Exam 101 Highlighter's Index
- 10.1. Hardware and Architecture
- 10.1.1. Objective 1: Configure Fundamental BIOS Settings
- 10.1.1.1. PC BIOS
- 10.1.1.2. Resource assignments
- 10.1.1.3. 1024-cylinder limit
- 10.1.2. Objective 3: Configure Modems and Sound Cards
- 10.1.2.1. Modems
- 10.1.2.2. Sound devices
- 10.1.3. Objective 4: Set Up Non-IDE Devices
- 10.1.3.1. SCSI
- 10.1.4. Objective 5: Set Up PC Different Expansion Cards
- 10.1.4.1. /proc
- 10.1.4.2. Commands
- 10.1.5. Objective 6: Configure Communication Devices
- 10.1.5.1. Concepts
- 10.1.5.2. Commands
- 10.1.6. Objective 7: Configure USB Devices
- 10.1.6.1. Host Controllers
- 10.1.6.2. Devices
- 10.1.6.3. Drivers
- 10.1.6.4. Commands
- 10.1.1. Objective 1: Configure Fundamental BIOS Settings
- 10.2. Linux Installation and Package Management
- 10.2.1. Objective 1: Design a Hard Disk Layout
- 10.2.1.1. Guidelines
- 10.2.2. Objective 2: Install a Boot Manager
- 10.2.2.1. LILO
- 10.2.2.2. GRUB
- 10.2.3. Objective 3: Make and Install Programs from Source
- 10.2.3.1. Source Files
- 10.2.3.2. make
- 10.2.4. Objective 4: Manage Shared Libraries
- 10.2.4.1. Concepts
- 10.2.4.2. Commands
- 10.2.5. Objective 5: Use Debian Package Management
- 10.2.5.1. Commands
- 10.2.6. Objective 6: Use Red Hat Package Manager (RPM)
- 10.2.6.1. Concepts
- 10.2.1. Objective 1: Design a Hard Disk Layout
- 10.3. GNU and Unix Commands
- 10.3.1. Objective 1: Work Effectively on the Command Line
- 10.3.1.1. The interactive shell and shell variables
- 10.3.1.2. Entering commands
- 10.3.1.3. Command history, editing, and substitution
- 10.3.1.4. Recursive execution
- 10.3.2. Objective 2: Process Text Streams Using Filters
- 10.3.2.1. The Commands
- 10.3.2.2. The stream editor, sed
- 10.3.3. Objective 3: Perform Basic File Management
- 10.3.3.1. Concepts
- 10.3.3.2. File and directory management commands
- 10.3.3.3. File-naming wildcards
- 10.3.4. Objective 4: Use Unix Streams, Pipes, and Redirects
- 10.3.4.1. Concepts
- 10.3.4.2. Standard I/O
- 10.3.4.3. Pipes and redirection
- 10.3.5. Objective 5: Create, Monitor, and Kill Processes
- 10.3.5.1. Concepts
- 10.3.5.2. Monitoring commands
- 10.3.5.3. Signaling processes
- 10.3.5.4. Shell job control
- 10.3.6. Objective 6: Modify Process Execution Priorities
- 10.3.6.1. Concepts
- 10.3.6.2. Commands
- 10.3.7. Objective 7: Search Text Files Using Regular Expressions
- 10.3.7.1. Concepts
- 10.3.7.2. Position anchors
- 10.3.7.3. Character sets
- 10.3.7.4. Modifiers
- 10.3.8. Objective 8: Using vi
- 10.3.8.1. Subcommands
- 10.3.1. Objective 1: Work Effectively on the Command Line
- 10.4. Devices, Linux Filesystems, and the Filesystem Hierarchy Standard
- 10.4.1. Objective 1: Create Partitions and Filesystems
- 10.4.1.1. Disk drives and partitions
- 10.4.1.2. The root filesystem and mount points
- 10.4.1.3. Partition and filesystem management commands
- 10.4.2. Objective 2: Maintain the Integrity of Filesystems
- 10.4.2.1. Filesystem Commands
- 10.4.3. Objective 3: Control Filesystem Mounting and Unmounting
- 10.4.3.1. Managing the filesystem table
- 10.4.3.2. Mounting and unmounting
- 10.4.3.3. Filesystem types
- 10.4.4. Objective 4: Managing Disk Quota
- 10.4.4.1. Quota Types
- 10.4.4.2. Commands
- 10.4.5. Objective 5: Use File Permissions to Control Access to Files
- 10.4.5.1. Access control
- 10.4.5.2. Setting access modes
- 10.4.6. Objective 6: Manage File Ownership
- 10.4.6.1. Concepts
- 10.4.6.2. Commands
- 10.4.7. Objective 7: Create and Change Hard and Symbolic Links
- 10.4.7.1. Concepts
- 10.4.7.2. ln
- 10.4.8. Objective 8: Find System Files and Place Files in the Correct Location
- 10.4.8.1. File Hierarchy Standard (FHS)
- 10.4.8.2. The directory hierarchy
- 10.4.8.3. Locating files
- 10.4.1. Objective 1: Create Partitions and Filesystems
- 10.5. The X Window System
- 10.5.1. Objective 1: Install and Configure X11
- 10.5.1.1. Selecting and configuring an X server
- 10.5.1.2. X fonts
- 10.5.1.3. .Xresources
- 10.5.2. Objective 2: Setup A Display Manager
- 10.5.2.1. xdm
- 10.5.2.2. X terminals
- 10.5.3. Objective 4: Install and Customize a Window Manager Environment
- 10.5.3.1. Concepts
- 10.5.3.2. Window managers
- 10.5.3.3. xterm
- 10.5.3.4. X libraries
- 10.5.3.5. Remote X clients
- 10.5.1. Objective 1: Install and Configure X11
- 10.1. Hardware and Architecture
- 1. LPI Exams
- II. General Linux Exam 102
- 11. Exam 102 Overview
- 12. Exam 102 Study Guide
- 12.1. Exam Preparation
- 13. Kernel (Topic 1.105)
- 13.1. Objective 1: Manage/Query Kernel and Kernel Modules at Runtime
- 13.1.1. Module Files
- 13.1.2. Manipulating Modules
- 13.1.3. Configuring Modules
- 13.1.4. Module Dependency File
- 13.2. Objective 2: Reconfigure, Build, and Install a Custom Kernel and Kernel Modules
- 13.2.1. Kernel Background
- 13.2.1.1. Kernel versions
- 13.2.1.2. Required tools and software
- 13.2.2. Compiling a Custom Kernel
- 13.2.2.1. Creating a kernel configuration
- 13.2.2.2. Compiling the kernel
- 13.2.2.3. Installing the new kernel and configuring LILO
- 13.2.2.4. Examine the new modules
- 13.2.1. Kernel Background
- 13.1. Objective 1: Manage/Query Kernel and Kernel Modules at Runtime
- 14. Boot, Initialization, Shutdown, and Runlevels (Topic 1.106)
- 14.1. Objective 1: Boot the System
- 14.1.1. Boot-time Kernel Parameters
- 14.1.2. Introduction to Kernel Module Configuration
- 14.1.2.1. Kernel boot-time messages
- 14.1.2.2. Reviewing system logs
- 14.2. Objective 2: Change Runlevels and Shut Down or Reboot System
- 14.2.1. Single-User Mode
- 14.2.1.1. Overview of the /etc directory tree and the init process
- 14.2.1.2. Setting the default runlevel
- 14.2.1.3. Determining your system's runlevel
- 14.2.2. Changing Runlevels with init and telinit
- 14.2.3. System Shutdown with shutdown
- 14.2.1. Single-User Mode
- 14.1. Objective 1: Boot the System
- 15. Printing (Topic 1.107)
- 15.1. An Overview of Printing
- 15.2. Objective 2: Manage Printers and Print Queues
- 15.2.1. Linux Printing Overview
- 15.2.2. Managing Print Queues
- 15.2.2.1. Managing print queues with lpc
- 15.3. Objective 3: Print Files
- 15.4. Objective 4: Install and Configure Local and Remote Printers
- 15.4.1. /etc/printcap
- 15.4.2. Filters
- 15.4.2.1. APSfilter
- 15.4.2.2. magicfilter
- 15.4.2.3. Multiple filters
- 15.4.3. Remote lpd and Samba Printers
- 16. Documentation (Topic 1.108)
- 16.1. Objective 1: Use and Manage Local System Documentation
- 16.1.1. Text Files and Paging
- 16.1.1.1. Paging programs
- 16.1.2. Manpages
- 16.1.2.1. Manual sections
- 16.1.2.2. Manpage format
- 16.1.2.3. man mechanics
- 16.1.3. Information in /usr/share/doc
- 16.1.4. Info Pages
- 16.1.1. Text Files and Paging
- 16.2. Objective 2: Find Linux Documentation on the Internet
- 16.2.1. The Linux Documentation Project
- 16.2.2. Usenet Newsgroups
- 16.2.2.1. Newsgroup archives
- 16.2.2.2. Contributing to Usenet
- 16.2.3. Mailing Lists
- 16.2.4. Vendor Web Sites and Other Resources
- 16.3. Objective 5: Notify Users on System-related Issues
- 16.3.1. /etc/issue
- 16.3.1.1. Example
- 16.3.2. /etc/motd
- 16.3.1. /etc/issue
- 16.1. Objective 1: Use and Manage Local System Documentation
- 17. Shells, Scripting, Programming, and Compiling (Topic 1.109)
- 17.1. Objective 1: Customize and Use the Shell Environment
- 17.1.1. An Overview of Shells
- 17.1.2. The Bash Shell
- 17.1.2.1. Shell and environment variables
- 17.1.2.2. Aliases
- 17.1.2.3. Functions
- 17.1.2.4. Configuration files
- 17.1.2.5. .inputrc
- 17.2. Objective 2: Customize or Write Simple Scripts
- 17.2.1. Script Files
- 17.2.1.1. Creating a simple bash script
- 17.2.1.2. Executable files
- 17.2.1.3. She-bang!
- 17.2.1.4. The shell script's environment
- 17.2.1.5. Location, ownership, and permissions
- 17.2.1.6. SUID and GUID rights
- 17.2.2. Basic Bash Scripts
- 17.2.2.1. Return values
- 17.2.2.2. File tests
- 17.2.2.3. Command substitution
- 17.2.2.4. Mailing from scripts
- 17.2.2.5. Abbreviated Bash command reference
- 17.2.1. Script Files
- 17.1. Objective 1: Customize and Use the Shell Environment
- 18. Administrative Tasks (Topic 1.111)
- 18.1. Objective 1: Manage Users and Group Accounts and Related System Files
- 18.1.1. User Accounts and the Password File
- 18.1.2. Groups and the Group File
- 18.1.3. The Shadow Password and Shadow Group Systems
- 18.1.3.1. Group passwords and shadow groups
- 18.1.4. User and Group Management Commands
- 18.1.4.1. Additional shadow password management commands
- 18.2. Objective 2: Tune the User Environment and System Environment Variables
- 18.2.1. Systemwide Startup Scripts
- 18.2.2. Setting the Home Directory for New Accounts
- 18.3. Objective 3: Configure and Use System Log Files to Meet Administrative and Security Needs
- 18.3.1. Configuring syslogd
- 18.3.2. Log File Rotation
- 18.3.3. Examining Log Files
- 18.4. Objective 4: Automate System Administration Tasks by Scheduling Jobs to Run in the Future
- 18.4.1. Using cron
- 18.4.1.1. User crontab files
- 18.4.1.2. System crontab files
- 18.4.2. Using at
- 18.4.3. Controlling User Access to cron and at
- 18.4.1. Using cron
- 18.5. Objective 5: Maintain an Effective Data Backup Strategy
- 18.5.1. Backup Concepts and Strategies
- 18.5.1.1. Backup types
- 18.5.1.2. Backup verification
- 18.5.2. Device Files
- 18.5.3. Using tar and mt
- 18.5.4. Backup Operations
- 18.5.4.1. What should I back up?
- 18.5.4.2. An example backup script
- 18.5.4.3. Verifying tar archives
- 18.5.4.4. File restoration
- 18.5.1. Backup Concepts and Strategies
- 18.6. Objective 6: Maintain System Time
- 18.6.1. NTP Concepts
- 18.6.2. The NTP Software Package Components
- 18.1. Objective 1: Manage Users and Group Accounts and Related System Files
- 19. Networking Fundamentals (Topic 1.112)
- 19.1. Objective 1: Fundamentals of TCP/IP
- 19.1.1. Addressing and Masks
- 19.1.2. Protocols
- 19.1.3. TCP/IP Services
- 19.1.4. TCP/IP Utilities
- 19.2. Objective 3: TCP/IP Configuration and Troubleshooting
- 19.2.1. Network Interfaces
- 19.2.1.1. Configuration files
- 19.2.1.2. Configuration commands
- 19.2.1.3. Common manual network interface tasks
- 19.2.2. DHCP
- 19.2.2.1. Subnets and relays
- 19.2.2.2. Leases
- 19.2.2.3. dhcpd
- 19.2.1. Network Interfaces
- 19.3. Objective 4: Configure Linux as a PPP Client
- 19.3.1. Clients and Servers
- 19.3.1.1. Serial ports and modems
- 19.3.1.2. PPP overview
- 19.3.1.3. Chat scripts
- 19.3.1.4. The PPP daemon
- 19.3.1.5. Manual PPP connection
- 19.3.1.6. Authentication protocols
- 19.3.1.7. PPP over ISDN
- 19.3.1.8. Too many variables
- 19.3.1. Clients and Servers
- 19.1. Objective 1: Fundamentals of TCP/IP
- 20. Networking Services (Topic 1.113)
- 20.1. Objective 1: Configure and Manage inetd, xinetd, and Related Services
- 20.1.1. The inetd Configuration File
- 20.1.2. TCP Wrappers with inetd
- 20.1.3. Starting and Stopping inetd Services
- 20.1.4. xinetd Configuration
- 20.1.4.1. Frequently used xinetd.conf options
- 20.1.4.2. Modular configuration
- 20.2. Objective 2: Operate and Perform Basic Configuration of Mail Transfer Agent (MTA)
- 20.2.1. Configuring sendmail
- 20.2.1.1. The smart host parameter
- 20.2.2. Mail Aliases
- 20.2.2.1. Forwarding mail from your account to another account
- 20.2.3. Queued Mail
- 20.2.4. Starting and Stopping sendmail
- 20.2.1. Configuring sendmail
- 20.3. Objective 3: Operate and Perform Basic Configuration of Apache
- 20.3.1. Configuring Apache
- 20.3.2. Starting and Stopping Apache
- 20.4. Objective 4: Properly Manage the NFS and Samba Daemons
- 20.4.1. NFS
- 20.4.1.1. Exporting (sharing) local filesystems using NFS
- 20.4.1.2. Mounting remote NFS filesystems
- 20.4.1.3. Starting and stopping NFS
- 20.4.2. Samba and the SMB and NMB Daemons
- 20.4.2.1. Getting started
- 20.4.2.2. WINS and browsing
- 20.4.2.3. Using SWAT
- 20.4.1. NFS
- 20.5. Objective 5: Set Up and Configure Basic DNS Services
- 20.5.1. The Resolver
- 20.5.1.1. Domain registration
- 20.5.1.2. Using named as a local caching-only name server
- 20.5.1.3. DNS query utilities
- 20.5.1.4. BIND Version 4 versus Version 8 configuration files
- 20.5.1. The Resolver
- 20.6. Objective 7: Set Up Secure Shell (OpenSSH)
- 20.1. Objective 1: Configure and Manage inetd, xinetd, and Related Services
- 21. Security (Topic 1.114)
- 21.1. Objective 1: Perform Security Administration Tasks
- 21.1.1. TCP Wrappers
- 21.1.1.1. On the attack
- 21.1.1.2. Configuring inetd and tcpd
- 21.1.1.3. tcpd access control
- 21.1.1.4. tcpd logging
- 21.1.2. Finding Executable SUID Files
- 21.1.3. Verifying Packages
- 21.1.3.1. Checking installed packages
- 21.1.3.2. Checking packages prior to installation
- 21.1.4. SGID Workgroups
- 21.1.5. Password Management
- 21.1.1. TCP Wrappers
- 21.2. Objective 2: Set Up Host Security
- 21.2.1. Shadow Passwords
- 21.2.2. inetd Minimalism
- 21.2.3. Logging and Superuser Mail
- 21.2.4. Watching for Security Announcements
- 21.3. Objective 3: Set Up User-level Security
- 21.1. Objective 1: Perform Security Administration Tasks
- 22. Exam 102 Review Questions and Exercises
- 22.1. Kernel (Topic 1.105)
- 22.1.1. Review Questions
- 22.1.2. Exercises
- 22.2. Boot, Initialization, Shutdown, and Runlevels (Topic 1.106)
- 22.2.1. Review Questions
- 22.2.2. Exercises
- 22.2.2.1. Exercise 1.106-1. Boot
- 22.2.2.2. Exercise 1.106-2. Runlevels
- 22.3. Printing (Topic 1.107)
- 22.3.1. Review Questions
- 22.3.2. Exercises
- 22.4. Documentation (Topic 1.108)
- 22.4.1. Review Questions
- 22.4.2. Exercises
- 22.4.2.1. Exercise 1.108-1. man and /usr/doc
- 22.4.2.2. Exercise 1.108-4. Acting as a Linux helpdesk
- 22.5. Shells, Scripting, Programming, and Compiling (Topic 1.109)
- 22.5.1. Review Questions
- 22.5.2. Exercises
- 22.6. Administrative Tasks (Topic 1.111)
- 22.6.1. Review questions
- 22.6.2. Exercises
- 22.6.2.1. Exercise 1.111-1. User accounts
- 22.6.2.2. Exercise 1.111-2. User environment and variables
- 22.6.2.3. Exercise 1.111-3. Syslog and log files
- 22.6.2.4. Exercise 1.111-4. cron and at
- 22.6.2.5. Exercise 1.111-5. Backup
- 22.7. Networking Fundamentals (Topic 1.112)
- 22.7.1. Review Questions
- 22.7.2. Exercises
- 22.8. Networking Services (Topic 1.113)
- 22.8.1. Review Questions
- 22.8.2. Exercises
- 22.9. Security (Topic 1.114)
- 22.9.1. Review Questions
- 22.9.2. Exercises
- 22.1. Kernel (Topic 1.105)
- 23. Exam 102 Practice Test
- 23.1. Questions
- 23.2. Answers
- 24. Exam 102 Highlighter's Index
- 24.1. Kernel (Topic 1.105)
- 24.1.1. Objective 1: Manage/Query Kernel and Kernel Modules at Runtime
- 24.1.2. Objective 2: Reconfigure, Build, and Install a Custom Kernel and Kernel Modules
- 24.2. Boot, Initialization, Shutdown, and Runlevels (Topic 1.106)
- 24.2.1. Objective 1: Boot the System
- 24.2.1.1. LILO, the Linux loader
- 24.2.1.2. Kernel parameters and module configuration
- 24.2.1.3. Boot-time messages
- 24.2.2. Objective 2: Change Runlevels and Shut Down or Reboot System
- 24.2.2.1. Single-user mode
- 24.2.2.2. The /etc/rc.d directory
- 24.2.2.3. Default runlevel, determining runlevel, changing runlevels
- 24.2.1. Objective 1: Boot the System
- 24.3. Printing (Topic 1.107)
- 24.3.1. Objective 2: Manage Printers and Print Queues
- 24.3.2. Objective 3: Print Files
- 24.3.3. Objective 4: Install and Configure Local and Remote Printers
- 24.3.3.1. /etc/printcap
- 24.3.3.2. Filters
- 24.3.3.3. Remote queues and Samba printers
- 24.4. Documentation (Topic 1.108)
- 24.4.1. Objective 1: Use and Manage Local System Documentation
- 24.4.1.1. Text and paging
- 24.4.1.2. The man facility
- 24.4.1.3. /usr/doc
- 24.4.1.4. The info facility
- 24.4.2. Objective 2: Find Linux Documentation on the Internet
- 24.4.2.1. Linux Documentation Project
- 24.4.2.2. Other sources
- 24.4.3. Objective 5: Notify Users on System-related Issues
- 24.4.3.1. /etc/issue
- 24.4.3.2. /etc/issue.net
- 24.4.3.3. /etc/motd
- 24.4.1. Objective 1: Use and Manage Local System Documentation
- 24.5. Shells, Scripting, Programming, and Compiling
- 24.5.1. Objective 1: Customize and Use the Shell Environment
- 24.5.1.1. bash
- 24.5.2. Objective 2: Customize or Write Simple Scripts
- 24.5.2.1. Environment
- 24.5.1. Objective 1: Customize and Use the Shell Environment
- 24.6. Administrative Tasks (Topic 1.111)
- 24.6.1. Objective 1: Manage Users and Group Accounts and Related System Files
- 24.6.1.1. passwd and group
- 24.6.1.2. Shadow files
- 24.6.1.3. User and group management commands
- 24.6.2. Objective 2: Tune the User Environment and System Environment Variables
- 24.6.2.1. Configuration scripts
- 24.6.2.2. New account home directories
- 24.6.3. Objective 3: Configure and Use System Log Files to Meet Administrative and Security Needs
- 24.6.3.1. Syslog
- 24.6.3.2. Log file rotation
- 24.6.3.3. Examining log files
- 24.6.4. Objective 4: Automate System Administration Tasks by Scheduling Jobs to Run in the Future
- 24.6.4.1. Using cron
- 24.6.4.2. Using at
- 24.6.4.3. User access
- 24.6.5. Objective 5: Maintain an Effective Data Backup Strategy
- 24.6.6. Objective 6: Maintain System Time
- 24.6.1. Objective 1: Manage Users and Group Accounts and Related System Files
- 24.7. Networking Fundamentals (Topic 1.112)
- 24.7.1. Objective 1: Fundamentals of TCP/IP
- 24.7.1.1. Addressing and masks
- 24.7.1.2. Protocols
- 24.7.1.3. TCP/IP services
- 24.7.1.4. TCP/IP utilities
- 24.7.2. Objective 3: TCP/IP Configuration and Troubleshooting
- 24.7.2.1. Network interfaces
- 24.7.2.2. DHCP
- 24.7.3. Objective 4: Configure Linux as a PPP Client
- 24.7.1. Objective 1: Fundamentals of TCP/IP
- 24.8. Networking Services (Topic 1.113)
- 24.8.1. Objective 1: Configure and Manage inetd, xinetd, and Related Services
- 24.8.2. Objective 2: Operate and Perform Basic Configuration of Mail Transfer Agent (MTA)
- 24.8.3. Objective 3: Operate and Perform Basic Configuration of Apache
- 24.8.4. Objective 4: Properly Manage the NFS and Samba Daemons
- 24.8.4.1. NFS
- 24.8.4.2. Samba
- 24.8.5. Objective 5: Set Up and Configure Basic DNS Services
- 24.8.5.1. The resolver
- 24.8.5.2. Domain registration
- 24.8.6. Objective 7: Set Up Secure Shell (OpenSSH)
- 24.9. Security (Topic 1.114)
- 24.9.1. Objective 1: Perform Security Administration Tasks
- 24.9.1.1. TCP wrappers
- 24.9.1.2. Finding executable SUID files
- 24.9.1.3. Verifying packages
- 24.9.1.4. SGID workgroups
- 24.9.1.5. The Secure Shell
- 24.9.2. Objective 2: Set Up Host Security
- 24.9.2.1. Shadow passwords
- 24.9.3. Objective 3: Set Up User-level Security
- 24.9.1. Objective 1: Perform Security Administration Tasks
- 24.1. Kernel (Topic 1.105)
- III. General Linux Exam 201
- 25. Linux Kernel
- 25.1. Objective 1: Kernel Components
- 25.1.1. Kernel Image Formats
- 25.1.2. Different Kernel Trees
- 25.1.2.1. Choosing an appropriate kernel
- 25.1.2.2. Hardware support
- 25.1.2.3. Patches
- 25.1.2.4. Kernel modules
- 25.2. Objective 2: Compiling a Kernel
- 25.2.1. Kernel Configuration Tools
- 25.2.1.1. make config
- 25.2.1.2. make menuconfig
- 25.2.1.3. make xconfig
- 25.2.2. Compiling and Installing a Custom Kernel
- 25.2.3. Using initrd
- 25.2.3.1. mkinitrd on Red Hat/Fedora
- 25.2.3.2. mkinitrd in Debian
- 25.2.4. Updating Your Kernel
- 25.2.1. Kernel Configuration Tools
- 25.3. Objective 3: Patching a Kernel
- 25.3.1. Applying the Patch
- 25.3.2. Removing a Patch
- 25.4. Objective 4: Customizing a Kernel
- 25.1. Objective 1: Kernel Components
- 26. System Startup
- 26.1. Objective 1: Customizing System Startup and Boot Processes
- 26.1.1. /etc/inittab
- 26.1.2. System Initialization Scripts
- 26.1.2.1. System initialization
- 26.1.2.2. Runlevel directories
- 26.1.3. Customizing Runlevels
- 26.1.3.1. Customizing runlevels on Red Hat
- 26.1.4. Customizing initrd Images
- 26.1.4.1. initrd and /linuxrc on Debian
- 26.1.4.2. initrd and /linuxrc on Red Hat
- 26.2. Objective 2: System Recovery
- 26.2.1. Filesystem Damage
- 26.2.2. init or the System Initialization Fails
- 26.2.2.1. Bypassing init
- 26.2.2.2. Working in the shell environment
- 26.2.3. Booting from a Rescue CD
- 26.2.3.1. Restoring the bootstrap
- 26.2.3.2. Exploring the damaged system
- 26.2.3.3. Loss of key files
- 26.1. Objective 1: Customizing System Startup and Boot Processes
- 27. Filesystem
- 27.1. Objective 1: Operating the Linux Filesystem
- 27.1.1. Level 1 Review
- 27.1.2. Additional Filesystem Management Files
- 27.1.3. Managing Swap
- 27.1.4. Linux Partitioning Scheme
- 27.2. Objective 2: Maintaining a Linux Filesystem
- 27.2.1. tune2fs
- 27.2.2. dumpe2fs
- 27.2.3. debugfs
- 27.2.4. badblocks and e2fsck
- 27.2.5. fsck
- 27.2.6. mke2fs
- 27.2.7. Filesystem Resizing
- 27.2.8. fsck
- 27.2.9. Self-Monitoring, Analysis, and Reporting Technology System (SMART)
- 27.3. Objective 3: Creating and Configuring Filesystem Options
- 27.3.1. Automounting Filesystems
- 27.3.2. Other Filesystems
- 27.3.2.1. Using ext3
- 27.3.2.2. vfat filesystems
- 27.3.3. ISO9660 Filesystems
- 27.3.3.1. Creating ISO9660 images
- 27.3.3.2. Burning CD-ROMs
- 27.3.3.2.1. Burning with IDE CD burners
- 27.3.3.2.2. Using cdrecord
- 27.3.3.2.3. CD miscellany
- 27.3.4. dd
- 27.1. Objective 1: Operating the Linux Filesystem
- 28. Hardware (Topic 2.204)
- 28.1. Objective 1: Configuring RAID
- 28.1.1. The mkraid Tools
- 28.1.2. How to Create RAID 1 (Mirroring)
- 28.2. Objective 2: Adding New Hardware
- 28.2.1. Reporting Your Hardware
- 28.3. Objective 3: Software and Kernel Configuration
- 28.3.1. hdparm
- 28.3.2. tune2fs
- 28.3.3. Supporting IDE CD Burners
- 28.3.4. Logical Volume Manager (LVM)
- 28.3.4.1. Initializing a disk or partition
- 28.3.4.2. Creating a volume group
- 28.3.4.3. Making a logical volume
- 28.3.4.4. Displaying physical volume properties
- 28.3.4.5. Displaying volume group properties
- 28.3.4.6. Displaying logical volume properties
- 28.3.4.7. Listing disks and volume groups
- 28.3.4.8. Adding disks to a volume group
- 28.3.4.9. Removing a disk from a volume group
- 28.3.4.10. Expanding a logical volume
- 28.3.4.11. Shrinking a logical volume
- 28.3.4.12. Removing a logical volume
- 28.3.4.13. Removing a volume group
- 28.3.4.14. Removing a physical volume
- 28.3.4.15. Starting and stopping LVM
- 28.3.4.16. LVM snapshots
- 28.3.5. Runtime Kernel Configuration
- 28.4. Objective 4: Configuring PCMCIA Devices
- 28.4.1. PCMCIA configuration files
- 28.4.1.1. /etc/pcmcia/config
- 28.4.1.2. /etc/pcmcia/config.opts
- 28.4.1.3. /etc/pcmcia/network.opts
- 28.4.1.4. /etc/pcmcia/*.opts
- 28.4.2. PCMCIA commands
- 28.4.3. PCMCIA Troubleshooting
- 28.4.3.1. Steps for troubleshooting PCMCIA devices
- 28.4.3.2. Boot problems
- 28.4.3.3. Common PCMCIA errors
- 28.4.3.4. Kernel upgrades
- 28.4.1. PCMCIA configuration files
- 28.1. Objective 1: Configuring RAID
- 29. File and Service Sharing (Topic 2.209)
- 29.1. Objective 1: Configuring a Samba Server
- 29.1.1. Basic Configuration File
- 29.1.2. Windows Passwords
- 29.1.3. Acting as a PDC
- 29.1.4. Login Settings
- 29.1.5. Shares
- 29.1.6. Startup
- 29.1.7. Troubleshooting
- 29.2. Objective 2: Configuring an NFS Server
- 29.2.1. The NFS Server
- 29.2.2. Configuring NFS Server Exports
- 29.2.3. NFS Server Security
- 29.2.4. The NFS Client
- 29.2.5. NFS Tools
- 29.1. Objective 1: Configuring a Samba Server
- 30. System Maintenance (Topic 2.211)
- 30.1. Objective 1: System Logging
- 30.1.1. Setting Up a syslog Server
- 30.1.2. Setting Up syslog Clients
- 30.1.3. Using the Central Logs
- 30.2. Objective 2: Packaging Software
- 30.2.1. Building RPM Packages
- 30.2.2. Modifying RPM Packages
- 30.2.3. Building Deb Packages
- 30.2.3.1. Signing the package
- 30.2.3.2. Building the package
- 30.2.4. Modifying Deb Packages
- 30.2.4.1. control
- 30.2.4.2. rules
- 30.3. Objective 3: Backup Operations
- 30.1. Objective 1: System Logging
- 31. System Customization and Automation (Topic 2.213)
- 31.1. Objective 1: Automating Tasks Using Scripts
- 31.1.1. Scripting with Bash and Friends
- 31.1.1.1. Variables
- 31.1.1.2. Checking process status and sending alerts
- 31.1.1.3. Monitoring users and using awk
- 31.1.1.4. Detecting changes
- 31.1.1.5. Log munging with sed
- 31.1.2. Scripting with Perl
- 31.1.2.1. Using CPAN
- 31.1.2.2. Log watching with Perl
- 31.1.2.3. Fetching and processing web logs
- 31.1.2.4. Using Perl to add new disks attached to an HBA controller
- 31.1.2.5. Perl in adverse environments
- 31.1.3. Synchronizing Files Across Machines
- 31.1.4. Scheduled execution
- 31.1.4.1. cron
- 31.1.4.2. Using at
- 31.1.1. Scripting with Bash and Friends
- 31.1. Objective 1: Automating Tasks Using Scripts
- 32. Troubleshooting (Topic 2.214)
- 32.1. Objective 1: Creating Recovery Disks
- 32.2. Objective 2: Identifying Boot Stages
- 32.3. Objective 3: Troubleshooting Boot Loaders
- 32.4. Objective 4: General Troubleshooting
- 32.5. Objective 5: Troubleshooting System Resources
- 32.5.1. Environment Variables and Shells
- 32.5.2. Shell Environment
- 32.5.3. Editors
- 32.5.4. Kernel Parameters
- 32.6. Objective 6: Troubleshooting Environment Configurations
- 32.6.1. Authorization Problems
- 32.6.2. crontab Problems
- 32.6.3. Init Problems
- 32.6.4. Logging Problems
- 33. LPI Exam 201 Review Questions and Exercises
- 33.1. Linux Kernel (Topic 2.201)
- 33.1.1. Review Questions
- 33.1.2. Answers
- 33.1.3. Exercise
- 33.2. System Startup (Topic 2.202)
- 33.2.1. Review Questions
- 33.2.2. Answers
- 33.2.3. Exercises
- 33.3. Filesystem (Topic 2.203)
- 33.3.1. Review Questions
- 33.3.2. Answers
- 33.3.3. Exercises
- 33.4. Hardware (Topic 2.204)
- 33.4.1. Review Questions
- 33.4.2. Answers
- 33.4.3. Exercises
- 33.5. File and Service Sharing (Topic 2.209)
- 33.5.1. Review Questions
- 33.5.2. Answers
- 33.5.3. Exercises
- 33.6. System Maintenance (Topic 2.211)
- 33.6.1. Review Questions
- 33.6.2. Answers
- 33.6.3. Exercises
- 33.7. System Customization and Automation (Topic 2.213)
- 33.7.1. Review Questions
- 33.7.2. Answers
- 33.7.3. Exercises
- 33.8. Troubleshooting (Topic 2.214)
- 33.8.1. Review Questions
- 33.8.2. Answers
- 33.8.3. Exercises
- 33.1. Linux Kernel (Topic 2.201)
- 34. Exam 201 Practice Test
- 34.1. Questions
- 34.2. Answers
- 25. Linux Kernel
- IV. General Linux Exam 202
- 35. Networking Configuration (Topic 2.205)
- 35.1. Objective 1: Basic Networking Configuration
- 35.1.1. Network Configuration Utilities, and What Lies Beneath
- 35.1.2. Common Network Configuration Files
- 35.1.2.1. The /etc/network/interfaces file
- 35.1.2.2. The /etc/sysconfig/network-scripts directory
- 35.1.3. Using ifconfig
- 35.1.3.1. Virtual interfaces
- 35.1.3.2. Other common uses for ifconfig
- 35.1.3.3. Examples
- 35.1.4. The route Command
- 35.1.4.1. Syntax and frequently used options
- 35.1.5. Common Uses
- 35.1.6. ARP and Related Commands
- 35.1.6.1. arp command syntax
- 35.1.6.2. Example #1
- 35.1.6.3. Example #2
- 35.1.7. The arpwatch Command
- 35.1.7.1. arpwatch
- 35.1.7.2. Sample arpwatch results
- 35.1.8. Dial-up Connections
- 35.1.8.1. Connecting with a modem
- 35.1.8.2. Configuration files
- 35.1.8.3. pon
- 35.1.8.4. Checking a dial-up network connection
- 35.1.8.5. The poff command
- 35.1.8.6. The wvdial command
- 35.1.8.7. Configuring wvdial: wvdialconf
- 35.1.8.8. wvdialconf examples
- 35.1.8.9. Sample /etc/wvdial.conf file
- 35.1.8.10. ISDN connections
- 35.1.8.11. The ipppd daemon
- 35.1.8.12. The isdnctrl command
- 35.1.8.13. Using isdnctrl
- 35.1.8.14. Multihomed systems
- 35.1.8.15. IP routing configuration
- 35.1.8.16. IP forwarding versus firewalling and Network Address Translation (NAT)
- 35.2. Objective 2: Advanced Network Configuration and Troubleshooting
- 35.2.1. Simple Connectivity Example: Telnet
- 35.2.1.1. Using tcpdump
- 35.2.1.2. tcpdump expressions
- 35.2.1.3. Example #1
- 35.2.1.4. Example #2
- 35.2.1.5. Example #3
- 35.2.1.6. Example #4
- 35.2.1.7. ethereal and tethereal
- 35.2.1.8. The lsof command
- 35.2.1.9. Example #1
- 35.2.1.10. Example #2
- 35.2.1.11. Example #3
- 35.2.1.12. Example #4
- 35.2.1.13. Example #5
- 35.2.1.14. The netstat command
- 35.2.1.15. Example #1
- 35.2.1.16. Example #2
- 35.2.1.17. Example #3
- 35.2.2. netcat (nc)
- 35.2.2.1. Example #1
- 35.2.2.2. Example #2
- 35.2.2.3. Example #3
- 35.2.1. Simple Connectivity Example: Telnet
- 35.1. Objective 1: Basic Networking Configuration
- 36. Mail and News (Topic 2.206)
- 36.1. Objective 2: Using Sendmail
- 36.1.1. Sendmail Configuration
- 36.1.1.1. Building and editing configuration files: the m4 utility
- 36.1.1.2. Additional configuration files
- 36.1.1.2.1. Restarting Sendmail
- 36.1.2. Securing Sendmail
- 36.1.2.1. Defining a trusted network
- 36.1.2.2. The /etc/mail/access file
- 36.1.2.3. Testing Sendmail configuration
- 36.1.2.4. Defining accepted email domains: local-host-names and sendmail.cw
- 36.1.3. Delivering Email
- 36.1.3.1. SMTP delivery based on DNS lookup
- 36.1.3.1.1. SMTP delivery via a smart host
- 36.1.3.1. SMTP delivery based on DNS lookup
- 36.1.4. Manual Entries
- 36.1.5. Local Delivery
- 36.1.6. Using virtusertable
- 36.1.7. Checking Virtual Users
- 36.1.8. Email Aliases
- 36.1.8.1. The contents of the aliases file
- 36.1.8.2. Reversing virtual user accounts
- 36.1.8.3. The genericstable file
- 36.1.9. Bastion Host Sendmail Server
- 36.1.9.1. Locking down the server
- 36.1.9.2. Configuring Sendmail for a bastion host
- 36.1.10. Managing Mail Traffic
- 36.1.11. Monitoring Mail
- 36.1.12. Log Configuration
- 36.1.1. Sendmail Configuration
- 36.2. Objective 3: Managing Mail Traffic
- 36.2.1. Filtering and Sorting Techniques
- 36.2.1.1. Using Procmail
- 36.2.1.2. Procmail files
- 36.2.1.3. Creating recipes in Procmail
- 36.2.1.3.1. Sample Procmail recipes
- 36.2.1.4. Monitoring and troubleshooting Procmail
- 36.2.1. Filtering and Sorting Techniques
- 36.3. Objective 1: Configuring Mailing Lists
- 36.3.1. Configuring Majordomo
- 36.3.1.1. Preparing Sendmail
- 36.3.1.2. Installing Majordomo
- 36.3.1.3. Creating Majordomo lists
- 36.3.1.3.1. Using the create command
- 36.3.1.3.2. Customizing the list
- 36.3.2. Testing the Implementation and Monitoring Problems
- 36.3.1. Configuring Majordomo
- 36.4. Objective 4: Serving News
- 36.4.1. Overview
- 36.4.1.1. Installing INN
- 36.4.1.2. Configuring INN
- 36.4.1.3. Customizing newsgroups
- 36.4.1.4. Configuring downstream and upstream clients
- 36.4.1.5. Monitoring newsgroups
- 36.4.1.6. Using innwatch
- 36.4.1. Overview
- 36.5. Conclusion
- 36.1. Objective 2: Using Sendmail
- 37. DNS (Topic 2.207)
- 37.1. Objective 1: Basic DNS Server Configuration
- 37.1.1. named.conf
- 37.1.2. Primary DNS
- 37.1.3. Secondary and Tertiary DNS
- 37.2. Objective 2: Create and Maintain DNS Zones
- 37.2.1. Forward DNS Zones
- 37.2.2. Reverse DNS Files
- 37.2.3. DNS Tools
- 37.3. Objective 3: Securing a DNS Server
- 37.3.1. Dedicated Servers
- 37.3.2. Restricting Zone Transfers
- 37.3.3. Using Transaction Signatures (TSIG)
- 37.3.4. Recursive Queries
- 37.3.5. Running BIND in a chroot Jail/Reduced Privileges
- 37.1. Objective 1: Basic DNS Server Configuration
- 38. Web Services (Apache and Squid, Topic 2.208)
- 38.1. Installing Apache
- 38.1.1. Apache Installation from Source
- 38.2. Configuring Apache
- 38.2.1. Access Control
- 38.2.2. Third-Party Modules
- 38.2.2.1. mod_php
- 38.2.2.2. mod_perl
- 38.2.2.3. mod_ssl
- 38.2.2.4. mod_rewrite
- 38.2.2.5. Apache performance tuning
- 38.3. Squid: History and Overview
- 38.3.1. http_port option
- 38.3.2. cache_dir option
- 38.3.3. cache_mem option
- 38.3.4. cache_access_log option
- 38.3.5. acl option
- 38.4. Squid Authentication
- 38.5. Squid as Web Accelerator
- 38.1. Installing Apache
- 39. Network Client Management (Topic 2.210)
- 39.1. Objective 1: DHCP Configuration
- 39.1.1. Setting Up a DHCP Server
- 39.1.1.1. Configuring DHCP options
- 39.1.1.2. Configuring dhcpd for random IP assignment
- 39.1.1.3. Fixed addresses in dhcpd
- 39.1.1.4. bootp support
- 39.1.1.5. dhcpd.leases
- 39.1.2. Using DHCP Clients
- 39.1.2.1. Using pump
- 39.1.2.2. Using dhclient
- 39.1.2.3. Configuring Red Hat as a DHCP client
- 39.1.2.4. Configuring Debian as a DHCP client
- 39.1.3. DHCP Relay
- 39.1.1. Setting Up a DHCP Server
- 39.2. Objective 2: NIS Configuration
- 39.2.1. NIS Master Server
- 39.2.2. NIS Client
- 39.2.2.1. compat
- 39.2.2.2. NIS slave server
- 39.2.3. NIS Maps and Tools
- 39.2.3.1. Map lookups and nicknames
- 39.2.3.2. Keeping maps up to date
- 39.2.3.3. Netgroups
- 39.2.3.4. RPC calls
- 39.3. Objective 3: LDAP Configuration
- 39.3.1. Setting Up OpenLDAP Server
- 39.3.2. Setting Up Client Tools
- 39.4. Objective 4: PAM Authentication
- 39.4.1. PAM Configuration
- 39.4.1.1. module-type
- 39.4.1.2. control-flag
- 39.4.1.3. module-path and arguments
- 39.4.2. LDAP Client Authentication Using PAM
- 39.4.2.1. Packages for LDAP and PAM
- 39.4.2.2. Configuring nss_ldap and nsswitch.conf
- 39.4.2.3. Configuring pam_ldap and /etc/pam.d files
- 39.4.1. PAM Configuration
- 39.1. Objective 1: DHCP Configuration
- 40. System Security (Topic 2.212)
- 40.1. Objective 2: Configuring a Router
- 40.1.1. The Example Networks
- 40.1.2. Getting Routing Working
- 40.1.3. Firewall Rulesets
- 40.1.3.1. ipchains versus iptables
- 40.1.3.2. Antispoofing
- 40.1.4. Using ipchains
- 40.1.4.1. ipchains
- 40.1.4.2. ipmasqadm
- 40.1.4.3. Sample ipchains setup
- 40.1.5. Using iptables
- 40.1.5.1. The iptables command
- 40.1.5.2. Example netfilter configuration
- 40.1.6. Firewalling Miscellanea
- 40.1.6.1. /proc/sys/net/ipv4
- 40.1.6.2. Saving and reloading rulesets
- 40.1.6.3. NAT and security
- 40.1.6.4. Dynamic routing
- 40.2. Objective 3: Securing FTP Servers
- 40.3. Objective 4: Secure Shell (SSH)
- 40.3.1. Installation and Configuration
- 40.3.2. Generating and Using Keys
- 40.3.3. ssh-agent
- 40.3.4. Other ssh Tricks
- 40.4. Objective 5: TCP Wrappers
- 40.4.1. /etc/hosts.allow and /etc/hosts.deny
- 40.4.1.1. Specifying services
- 40.4.1.2. xinetd and access control
- 40.4.1. /etc/hosts.allow and /etc/hosts.deny
- 40.5. Objective 6: Security Tasks
- 40.5.1. Kerberos
- 40.5.1.1. Overview
- 40.5.1.2. Server installation and configuration
- 40.5.1.3. Client configuration
- 40.5.2. Security Auditing Source Code
- 40.5.2.1. Executing subprograms
- 40.5.2.2. Checking input
- 40.5.2.3. Buffer overflows
- 40.5.2.4. Unsafe temporary file creation
- 40.5.3. IDS
- 40.5.3.1. Tripwire
- 40.5.3.1.1. Overview of Tripwire
- 40.5.3.1.2. Tripwire policy file format
- 40.5.3.2. Snort
- 40.5.3.2.1. Configuring Snort
- 40.5.3.2.2. Understanding Snort rules
- 40.5.3.1. Tripwire
- 40.5.4. Miscellaneous
- 40.5.4.1. Scanning in general
- 40.5.4.2. Security alerts
- 40.5.4.3. Updating Linux
- 40.5.4.3.1. Keeping Debian up-to-date
- 40.5.4.3.2. Keeping Red Hat up-to-date
- 40.5.1. Kerberos
- 40.1. Objective 2: Configuring a Router
- 41. Network Troubleshooting (Topic 214)
- 41.1. Network Troubleshooting Essentials
- 41.2. Common Troubleshooting Commands
- 41.2.1. ping
- 41.2.2. telnet and netcat
- 41.2.3. ifconfig
- 41.2.4. traceroute
- 41.2.5. netstat and route
- 41.3. Hardware Problems
- 41.3.1. Physical Connection Issues
- 41.3.1.1. Cabling
- 41.3.1.2. Failed networking devices
- 41.3.2. Problems with the Interface Card
- 41.3.3. Reviewing Screen Output
- 41.3.4. Changes to the Kernel and /etc/modules
- 41.3.5. Checking Log Files
- 41.3.1. Physical Connection Issues
- 41.4. Network Device Configuration Files
- 41.4.1. The /etc/network/interfaces File
- 41.4.2. The /etc/sysconfig/network-scripts Directory
- 41.4.3. PCMCIA Card Configuration
- 41.4.4. The /etc/networks File
- 41.4.5. The /etc/nsswitch File
- 41.4.6. Additional Configuration Files
- 41.4.6.1. /etc/host.conf
- 41.4.6.2. /etc/modprobe.d/aliases
- 41.4.6.3. The /etc/hostname file
- 41.4.7. Application Issues
- 41.5. DNS Errors
- 41.6. Determining the Cause of Inaccessible Services
- 41.6.1. Using netstat
- 41.6.2. nmap
- 41.6.3. Finding Authoritative Information with lsof and strace
- 41.6.4. Unexpected Changes to Files and Settings
- 41.7. Conclusion
- 42. Exam 202 Review Questions and Exercises
- 42.1. Networking Configuration (Topic 2.205)
- 42.1.1. Review Questions
- 42.1.2. Answers
- 42.1.3. Exercise
- 42.2. Mail and News (Topic 2.206)
- 42.2.1. Review Questions
- 42.2.2. Answers
- 42.2.3. Exercises
- 42.3. DNS (Topic 2.207)
- 42.3.1. Review Questions
- 42.3.2. Answers
- 42.3.3. Exercises
- 42.4. Web Services (Topic 2.208)
- 42.4.1. Review Questions
- 42.5. Answers
- 42.5.1. Exercises
- 42.6. Network Client Management (Topic 2.210)
- 42.6.1. Review Questions
- 42.6.2. Answers
- 42.6.3. Exercises
- 42.7. System Security (Topic 2.212)
- 42.7.1. Review Questions
- 42.7.2. Answers
- 42.7.3. Exercises
- 42.8. Network Troubleshooting (Topic 2.214)
- 42.8.1. Review Questions
- 42.8.2. Answers
- 42.8.3. Exercises
- 42.1. Networking Configuration (Topic 2.205)
- 43. Exam 202 Practice Test
- 43.1. Questions
- 43.2. Answers
- 35. Networking Configuration (Topic 2.205)
- Index
- About the Authors
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
Nowość Promocja
Learn to use generative AI techniques to create novel text, images, audio, and even music with this practical, hands-on book. Readers will understand how state-of-the-art generative models work, how to fine-tune and adapt them to their needs, and how to combine existing building blocks to create new models and creative applications in different dom- ePub + Mobi 254 pkt
(245,65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł (-15%) -
Promocja
Already popular among programmers for its memory safety and speed, the Rust programming language is also valuable for asynchrony. This practical book shows you how asynchronous Rust can help you solve problems that require multitasking. You'll learn how to apply async programming to solve problems with an async approach. You will also dive deeper i- ePub + Mobi 194 pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
228.99 zł (-15%) -
Promocja
The software architect role is evolving. As systems and their interactions with the teams that build, run, and evolve them become more complex, it's often impossible for those playing the traditional architect roles to be everywhere they need to be. There's simply too much architecture to be done, and the situation has reached a breaking point. The- ePub + Mobi 220 pkt
(211,65 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł (-15%) -
Promocja
Once you've mastered the basics of Python, how do you skill up to the top 1%? How do you focus your learning time on topics that yield the most benefit for production engineering and data teams—without getting distracted by info of little real-world use? This book answers these questions and more.Based on author Aaron Maxwell's software engineering- ePub + Mobi 211 pkt
(203,15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł (-15%) -
Promocja
This practical book demonstrates why C++ is still one of the dominant production-quality languages for financial applications and systems. Many programmers believe that C++ is too difficult to learn. Author Daniel Hanson demonstrates that this is no longer the case, thanks to modern features added to the C++ Standard beginning in 2011.Financial pro- ePub + Mobi 211 pkt
(194,65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł (-15%) -
Promocja
Large language models (LLMs) are revolutionizing the world, promising to automate tasks and solve complex problems. A new generation of software applications are using these models as building blocks to unlock new potential in almost every domain, but reliably accessing these capabilities requires new skills. This book will teach you the art and sc- ePub + Mobi 254 pkt
(245,65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł (-15%) -
Promocja
Ready to simplify the process of building data lakehouses and data pipelines at scale? In this practical guide, learn how Delta Lake is helping data engineers, data scientists, and data analysts overcome key data reliability challenges with modern data engineering and management techniques.Authors Denny Lee, Tristen Wentling, Scott Haines, and Pras- ePub + Mobi 254 pkt
(245,65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł (-15%) -
Promocja
Business decisions in any context—operational, tactical, or strategic—can have considerable consequences. Whether the outcome is positive and rewarding or negative and damaging to the business, its employees, and stakeholders is unknown when action is approved. These decisions are usually made under the proverbial cloud of uncertainty.With this pra- ePub + Mobi 194 pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
228.99 zł (-15%) -
Promocja
If you're a developer looking to build a distributed, resilient, scalable, high-performance application, you may be evaluating distributed SQL and NoSQL solutions. Perhaps you're considering the Aerospike database.This practical book shows developers, architects, and engineers how to get the highly scalable and extremely low-latency Aerospike datab- ePub + Mobi 254 pkt
Aerospike: Up and Running. Developing on a Modern Operational Database for Globally Distributed Apps
(245,65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł (-15%) -
Promocja
Reinforcement learning (RL) has led to several breakthroughs in AI. The use of the Q-learning (DQL) algorithm alone has helped people develop agents that play arcade games and board games at a superhuman level. More recently, RL, DQL, and similar methods have gained popularity in publications related to financial research.This book is among the fir- ePub + Mobi 220 pkt
(220,15 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł (-15%)
Dzięki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep@ebookpoint.pl
Proszę wybrać ocenę!
Proszę wpisać opinię!
Książka drukowana
* pola obowiązkowe
Proszę czekać...
Oceny i opinie klientów: LPI Linux Certification in a Nutshell. 2nd Edition Steven Pritchard, Bruno Gomes Pessanha, Nicolai Langfeldt (0) Weryfikacja opinii następuje na podstawie historii zamowień na koncie Użytkownika umiejszczającego opinię.