Tài liệu miễn phí Chứng chỉ quốc tế
Download Tài liệu học tập miễn phí Chứng chỉ quốc tế
Tham khảo sách 'sybex 2000 - ccna dictionary', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
8/29/2018 4:42:50 PM +00:00
Ants, single-celled creatures such as the cellular slime mold, plants and animals in
ecosystems, and (even) human beings can congregate and display miraculously complex
behaviors.* Say a colony of ants in a tree needs to move to another tree, perhaps
in search of food. Some ants build a bridge by joining their bodies in a chain stretching
from one limb in one tree to another limb in another tree. Other ants cross over
this ant structure, walking over their peers. Once all the ants have crossed over, the
ants in the bridge begin to gracefully undo the structure, crossing one by one. Each
ant only repeats simple...
8/29/2018 4:42:04 PM +00:00
Some computers have a single-user OS, which means that only one person
can use the computer at a time. Many older OSes (such as MS-DOS)
can also do only one job at a time. But almost any computer can do a lot
mor e if it has a multiuser, multitasking operating system such as Unix.
These powerful OSes let many people use the computer at the same time
and let each user run several jobs at once.
8/29/2018 4:42:04 PM +00:00
The Red Hat Certified Engineer exam is an advanced challenge. As the RHCE course
has a number of prerequisites, this book assumes that you know some basics about
Linux. This chapter covers each of these prerequisite topics in a minimum of detail,
with references to other books and sources for more information. Unlike in other chapters
and other books in this series, the Questions include a number of “zingers” that go beyond this
chapter’s content. That is the only way to see if you have the prerequisite skills necessary for
remaining chapters....
8/29/2018 4:42:04 PM +00:00
Befor e you can use Unix, a system staff person has to set up a Unix
account for you. The account is identified by your user name, which is
usually a single word or an abbreviation. Think of this account as your
of fice—it’s your place in the Unix environment. Other users may also be
at work on the same system. At many sites, there will be a whole network
of Unix computers. So in addition to knowing your username, you may
also need to know the hostname (name) of the computer that has your
account. Alternatively, your account may be shared between all computers
on the local...
8/29/2018 4:42:04 PM +00:00
One of the strong points of Red Hat Linux is its easy installation. There are several
different methods of installation, and each is automated to a considerable degree.
In many cases, it’s now possible to just pop the first Red Hat installation CD in the
drive and install Linux from there.
8/29/2018 4:42:04 PM +00:00
All versions of Unix work with alphanumeric terminals that handle a single
session in a single screen, such as those described in Chapter 1. On
most modern Unix versions, you can also use a window system. A window
system is software that lets a single screen handle many sessions at once.*
Window systems use a mouse or another device (such as a trackball) to
move a pointer acr oss the screen. The pointer can be used to select and
move parts of the screen, copy and paste text, work with menus of commands,
and more. If you’ve used a Macintosh or Microsoft Windows,
among others, you’ve used a...
8/29/2018 4:42:04 PM +00:00
Installation is one of the three parts of the RHCE exam. To pass this part of the exam, you’ll
need to know a lot more than just the basic GUI installation process for a single computer!
Once you’ve studied the installation chapters (2, 3, and 5), you’ll be able to install Red Hat
Linux in a number of ways: directly from the CD, using boot disks, managing special situations
on laptop computers, accessing from networks, and using automated Kickstart-based tools.
8/29/2018 4:42:04 PM +00:00
A file is the unit of storage in Unix, as in most other systems. A file can
hold anything: text (a report you’re writing, a to-do list), a program, digitally
encoded pictures or sound, and so on. All of those are just sequences
of raw data until they’re interpr eted by the right program.
8/29/2018 4:42:04 PM +00:00
After installation is complete on your Red Hat Linux system, you still have some work
to do to customize the system to meet your needs. User accounts need to be set up,
filesystems must be configured, and additional packages may need to be added
or removed.
8/29/2018 4:42:04 PM +00:00
Filenames may contain any character except /, which is reserved as the
separator between files and directories in a pathname. Filenames are usually
made of upper- and lowercase letters, numbers, “.” (dots), and “_”
(underscor es). Other characters (including spaces) are legal in a filename,
but they can be hard to use because the shell gives them special meanings.
So we recommend using only letters, numbers, dots, and underscore
characters. You can also use “–” (dashes), as long as they aren’t the first
character of a filename, which can make a program think the filename is
an option....
8/29/2018 4:42:04 PM +00:00
In this chapter, you will learn how to manage Linux in advanced installation and configuration
scenarios. The installation topics cover creating automated installation scripts and managing
kernel modules. You will learn how to implement a Redundant Array of Inexpensive Disks
(RAID), as well as an array of disks for the Logical Volume Manager (LVM), and master the intricate
details of the automated Kickstart installation process. Finally, you’ll get a basic sense of how you
can modularize the kernel to your advantage....
8/29/2018 4:42:04 PM +00:00
This chapter generally doesn’t apply to full-screen programs, such as the
Pico editor, that take control of your whole terminal window. (The pager
pr ograms, less, more, and pg, do work together in this way.) It also
doesn’t apply to graphical programs, such as StarOffice or Netscape, that
open their own windows on your screen.
8/29/2018 4:42:04 PM +00:00
In this chapter, you will learn how to create and implement policies for managing disk
usage—by user or by group. Next, you will learn how to upgrade, configure, compile, and
install your own custom kernels. You will learn about the advantages and disadvantages of
monolithic and modular kernels. You have three different ways to customize and optimize your
kernel configuration for size and functionality. You will also learn the recommended techniques
for configuring and installing the kernel.
8/29/2018 4:42:04 PM +00:00
This chapter introduces Unix networking: running programs on other
computers, copying files between computers, browsing the World Wide
Web, sending and receiving email messages, reading and posting messages
to Usenet “Net news” discussions, and “chatting” interactively with
other users on your local computer or worldwide.
8/29/2018 4:42:04 PM +00:00
One of the most important aspects of getting a Red Hat Linux system up and running
is configuring the user interface. For most nonadministrative users, this means
configuring the X Window interface. The X Window System is the Linux graphical
user interface (GUI). While the GUI plays an integral part of other operating systems such as
Microsoft Windows, the X Window System on Linux is essentially just another application. Many
administrators don’t even bother with the GUI; the command line interface is enough for most
administrative purposes....
8/29/2018 4:42:04 PM +00:00
With a window system, you can have many applications running at the
same time, with many windows open. But most Unix systems also let you
run more than one program inside the same terminal. This is called job
contr ol. It gives some of the benefits of window systems to users who
don’t have windows. But, even if you’re using a window system, you may
want to use job control to do several things inside the same terminal window.
For instance, you may prefer to do most of your work from one terminal
window, instead of covering your desktop with multiple windows....
8/29/2018 4:42:04 PM +00:00
Unix was developed by AT&T in the late 1960s and early 1970s, and was freely
distributed among a number of major universities during this time. Concurrently,
these universities were developing the network that evolved into the Internet.
8/29/2018 4:42:04 PM +00:00
Now that you’re almost to the end of this guide, let’s look at some ways to
continue learning about Unix. Documentation is an obvious choice, but it
isn’t always in obvious places. You can save time by taking advantage of
other shell features — aliases, functions, and scripts—that let you shorten a
repetitive job and “let the computer do the dirty work.”
8/29/2018 4:42:04 PM +00:00
More complex networking services in Red Hat Linux require more advanced
administration methods. While graphical tools such as Network Configuration
(via the redhat-config-network command) are available to assist in configuring
all aspects of Linux networking, the best way to learn networking is by practicing with the key
command line utilities and associated configuration files.
8/29/2018 4:42:04 PM +00:00
As a Red Hat Linux systems manager, you probably wear several hats, one of which is
security manager. This is especially true if you work for a small company. Even if you
work for a large organization that has a dedicated network or systems security staff,
most of the administrators are probably responsible for other operating systems; you’re
probably responsible for security policies on your Linux systems.
8/29/2018 4:42:04 PM +00:00
Tham khảo sách 'cisco secure intrusion detection systems - version 6.0', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
8/29/2018 4:41:50 PM +00:00
Tham khảo sách 'cisco secure pix firewall advanced exam 9e0-111 - version 6.0', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
8/29/2018 4:41:50 PM +00:00
Tham khảo sách 'cisco secure vpn (csvpn®) 9e0-121 - version 6.0', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
8/29/2018 4:41:50 PM +00:00
Tham khảo sách 'cisco safe implementation exam - version 6.0', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
8/29/2018 4:41:50 PM +00:00
Tham khảo sách 'cisco: enterprise voice over data design - version 6.0', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
8/29/2018 4:41:50 PM +00:00
Tham khảo sách 'cisco: ccie® pre-qualification test for security 350-018 - version 6.0', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
8/29/2018 4:41:50 PM +00:00
Tham khảo sách 'cisco: ccna® 3.0 (cisco® certified network associate 3.0) exam 640-607 - version 6.0', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
8/29/2018 4:41:50 PM +00:00
Tham khảo sách 'cisco: designing for cisco® internetwork solutions (desgn®) 640-861 - version 6.0', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
8/29/2018 4:41:50 PM +00:00
Welcome to the exciting world of Cisco certification! You have picked up this book because
you want something better; namely, a better job with more satisfaction. Rest assured that you
have made a good decision. Cisco certification can help you get your first networking job, or
more money and a promotion if you are already in the field.
Cisco certification can also improve your understanding of the internetworking of more
than just Cisco products: You will develop a complete understanding of networking and how
different network topologies work together to form a network. This is beneficial to every networking
job and is the reason Cisco certification is...
8/29/2018 4:41:49 PM +00:00