Certification Study Companion Series - Sheikh Ahmed / Шейх Ахмед - CompTIA Linux+ Certification Companion / Партнер по сертификации CompTIA Linux+ [2024, PDF/EPUB, ENG]

Reply to topic
DL-List and Torrent activity
Size:  8 MB   |    Registered:  8 months 16 days   |    Completed:  1 time

Seeder not seen: 5 months 3 days

 
   
 
 
Author Message

iPhone ®

Gender: Male

Longevity: 9 years 8 months

Posts: 2207

Post 08-Jun-2024 02:50

[Quote]

CompTIA Linux+ Certification Companion: Hands-on Preparation to Master Linux Administration / Партнер по сертификации CompTIA Linux+: Практическая подготовка к освоению администрирования Linux
Год издания: 2024
Автор: Sheikh Ahmed / Шейх Ахмед
Издательство: Apress Media
ISBN: 979-8-8688-0128-0
Серия: Certification Study Companion Series
Язык: Английский
Формат: PDF/EPUB
Качество: Издательский макет или текст (eBook)
Количество страниц: 315
Описание: The CompTIA Linux+ Certification" book – the ultimate guide to mastering Linux system administration in preparation for the CompTIA Linux+ Certification. Whether you're a beginner or an experienced professional, this comprehensive resource is designed to equip you with the knowledge and skills needed to excel in the world of Linux.
With its comprehensive coverage, this book delves into essential Linux concepts, commands, and techniques, providing you with a complete reference guide. You'll review how to customize and navigate the shell environment, write powerful scripts, configure user interfaces, perform administrative tasks, configure system services, establish network connections, and secure your system. No stone is left unturned in this in-depth exploration of Linux administration.
What sets this book apart is its practical approach. Real-world scenarios and practical applications take center stage, ensuring that you not only understand the theory but also know how to apply it effectively.
Troubleshooting common issues becomes second nature as you gain the skills to diagnose and resolve system problems with ease. You'll discover industry best practices and standards, enabling you to optimize systems, implement robust security measures, and adhere to compliance regulations.
What You Will Learn:
Linux operating systems, including installation, configuration, and management of Linux-based servers and systems.
Essential administrative tasks, such as user and group management, file system administration, network configuration, and security implementation.
Insights into troubleshooting common Linux issues, enabling readers to diagnose and resolve system problems effectively.
Practical techniques for identifying and addressing system errors, performance bottlenecks, network connectivity issues, and other challenges that may arise in a Linux environment.
Industry best practices and standards in Linux administration.
System optimization, backup and recovery strategies, security practices, and adherence to compliance regulations.
Who This Book is for:
Administrators: This book serves as an excellent resource for individuals who are new to Linux administration and wish to develop a strong foundation in this field. They may have basic knowledge of Linux concepts or come from related IT roles and seek to expand their skills to include Linux system management.
IT Professionals Transitioning to Linux: Professionals already working in the IT industry, such as system administrators or network engineers, who want to enhance their skill set and broaden their knowledge by incorporating Linux administration into their repertoire. They may have experience with other operating systems and are seeking to acquire Linux-specific skills.
Experienced Linux Administrators: Seasoned Linux administrators can benefit from this book as well. It serves as a comprehensive reference guide, offering advanced topics, best practices, and insights into the latest trends and developments in the Linux ecosystem. It can be a valuable resource for expanding their expertise and staying up-to-date with industry standards.
Secondary or tertiary audiences may include IT managers, system architects, or developers who work closely with Linux systems and wish to gain a deeper understanding of Linux administration. Additionally, students pursuing computer science or IT-related degrees may find the book beneficial for their coursework and career advancement.
Книга "Сертификация CompTIA Linux+" – это полное руководство по освоению системного администрирования Linux в рамках подготовки к сертификации CompTIA Linux+. Независимо от того, являетесь ли вы новичком или опытным профессионалом, этот всеобъемлющий ресурс предназначен для того, чтобы вооружить вас знаниями и навыками, необходимыми для того, чтобы преуспеть в мире Linux.
Благодаря всестороннему освещению в этой книге рассматриваются основные концепции, команды и методы Linux, и вы получите полное справочное руководство. Вы узнаете, как настраивать среду shell и ориентироваться в ней, писать мощные скрипты, настраивать пользовательские интерфейсы, выполнять административные задачи, настраивать системные службы, устанавливать сетевые подключения и обеспечивать безопасность вашей системы. В этом углубленном исследовании администрирования Linux нет ничего невозможного.
Что отличает эту книгу от других, так это ее практический подход. В центре внимания - реальные сценарии и практические приложения, которые помогут вам не только понять теорию, но и научиться эффективно ее применять.
Устранение распространенных неполадок становится вашей второй натурой по мере того, как вы приобретаете навыки, позволяющие легко диагностировать и устранять системные неполадки. Вы познакомитесь с лучшими отраслевыми практиками и стандартами, которые позволят вам оптимизировать системы, внедрять надежные меры безопасности и соблюдать нормативные требования.
Что вы узнаете:
Операционные системы Linux, включая установку, настройку и управление серверами и системами на базе Linux.
Основные административные задачи, такие как управление пользователями и группами, администрирование файловой системы, настройка сети и обеспечение безопасности.
Информация об устранении распространенных проблем Linux, позволяющая читателям эффективно диагностировать и устранять системные неполадки.
Практические методы выявления и устранения системных ошибок, узких мест производительности, проблем с подключением к сети и других проблем, которые могут возникнуть в среде Linux.
Лучшие отраслевые практики и стандарты в области администрирования Linux.
Оптимизация системы, стратегии резервного копирования и восстановления, методы обеспечения безопасности и соблюдение нормативных требований.
Для кого предназначена эта книга:
Администраторы: Эта книга служит отличным источником информации для тех, кто не знаком с администрированием Linux и хочет получить прочные знания в этой области. Они могут обладать базовыми знаниями о концепциях Linux или работать на смежных ИТ-должностях и стремиться расширить свои навыки, включив в них управление системой Linux.
ИТ-специалисты, переходящие на Linux: Профессионалы, уже работающие в ИТ-индустрии, такие как системные администраторы или сетевые инженеры, которые хотят повысить свою квалификацию и расширить свои знания, включив администрирование Linux в свой репертуар. Возможно, они имеют опыт работы с другими операционными системами и стремятся приобрести навыки, связанные с Linux.
Опытные администраторы Linux: Эта книга также может быть полезна опытным администраторам Linux. Она служит всеобъемлющим справочным руководством, в котором предлагаются расширенные темы, рекомендации и информация о последних тенденциях и разработках в экосистеме Linux. Это может стать ценным ресурсом для расширения их опыта и соответствия отраслевым стандартам.
В число слушателей среднего или высшего звена могут входить ИТ-менеджеры, системные архитекторы или разработчики, которые тесно сотрудничают с системами Linux и хотят получить более глубокое представление об администрировании Linux. Кроме того, студенты, изучающие информатику или связанные с ИТ специальности, могут счесть книгу полезной для своей курсовой работы и карьерного роста.

Примеры страниц (скриншоты)

Оглавление

About the Author ....................................................................................................xxi
About the Technical Reviewer ..............................................................................xxiii
Introduction ...........................................................................................................xxv
Chapter 1: Introduction to Linux and Linux Certification .......................................... 1
What Is Linux? ............................................................................................................................... 1
MULTICS Project ............................................................................................................................ 2
UNIX .............................................................................................................................................. 2
GNU Project ................................................................................................................................... 3
Linux Created ................................................................................................................................ 3
Licensing ....................................................................................................................................... 3
Linux Distributions ........................................................................................................................ 4
Reasons to Use Linux .................................................................................................................... 4
Reduces Total Cost .................................................................................................................. 4
Software Availability ................................................................................................................ 5
Increases Security and Stability .............................................................................................. 5
Runs on Multiple Hardware Platforms ..................................................................................... 5
Linux Certification: Why Get Certified? .......................................................................................... 6
CompTIA Linux+ ...................................................................................................................... 6
Linux Professional Institute (LPI) ............................................................................................. 7
Summary ...................................................................................................................................... 7
Chapter 2: Installing Linux ....................................................................................... 9
Preparing for Installation .............................................................................................................. 9
Step 1: Talk to Key People ..................................................................................................... 10
Step 2: Distributions .............................................................................................................. 10
Resource Requirements for Ubuntu and Fedora ................................................................... 11
Step 3: Naming Conventions ................................................................................................. 12
Step 4: Partitioning ................................................................................................................ 13
Step 5: Default Bootloader ..................................................................................................... 15
File System ............................................................................................................................ 16
Windows and Linux File Systems .......................................................................................... 16
Step 6: Additional Installation Needs ..................................................................................... 17
Methods of Installation ............................................................................................................... 18
Summary .................................................................................................................................... 18
Resources .............................................................................................................................. 19
Chapter 3: Shells, Scripts, and Data Management ................................................. 21
Linux Review ............................................................................................................................... 21
Shell Environment ................................................................................................................. 21
Shell Configuration ................................................................................................................ 22
Environmental Variables ........................................................................................................ 23
PATH Variable ......................................................................................................................... 24
Special Characters ................................................................................................................ 25
BASH Functions ..................................................................................................................... 26
Function: Call from Library Example ...................................................................................... 26
Function Example: Call from Inside Script ............................................................................. 27
Scripts ......................................................................................................................................... 28
Types of Scripts ..................................................................................................................... 29
Script That Executes Commands ........................................................................................... 30
Scripts That Take Input and Use It to Perform an Action ....................................................... 32
The Execute Permission ........................................................................................................ 33
Constructs ............................................................................................................................. 33
if Statement ........................................................................................................................... 34
Case Construct ...................................................................................................................... 39
Difference Between if and case ............................................................................................ 41
Testing Using if and case ....................................................................................................... 41
| | and && Chaining Operators ............................................................................................... 43
Repetition Construct .............................................................................................................. 45
while Statements .................................................................................................................. 47
Status of Script ...................................................................................................................... 49
Databases & SQL Commands ..................................................................................................... 51
Database Services ................................................................................................................. 51
Client/Server Model ............................................................................................................... 53
SQL Commands ..................................................................................................................... 54
Verifying MySQL Is Installed .................................................................................................. 55
Summary .................................................................................................................................... 56
Chapter 4: Boot Process and Shutdown ................................................................ 57
Boot Process ............................................................................................................................... 57
Fedora Boot Process ............................................................................................................. 57
BIOS ....................................................................................................................................... 58
Boot Loader ................................................................................................................................. 59
Kernel .................................................................................................................................... 59
Common Boot Loaders .......................................................................................................... 60
LILO ....................................................................................................................................... 60
GRUB ..................................................................................................................................... 60
GRUB Parameters .................................................................................................................. 61
GRUB2 ................................................................................................................................... 62
Common Options Used in the /etc/default/grub File ............................................................. 64
Runlevels .................................................................................................................................... 65
Runlevels on Fedora .............................................................................................................. 66
Runlevels in Ubuntu ............................................................................................................... 66
Runlevel Commands .............................................................................................................. 67
Kernel Options ....................................................................................................................... 67
Init Scripts ................................................................................................................................... 68
System V Distros ................................................................................................................... 68
BSD Distros ........................................................................................................................... 69
Managing Init Scripts ............................................................................................................ 69
Configuring Init Scripts .......................................................................................................... 70
Additional Scripts .................................................................................................................. 72
Upstart ................................................................................................................................... 73
Systemd ................................................................................................................................. 74
Shutting Down Linux ................................................................................................................... 74
Summary .................................................................................................................................... 75
Chapter 5: Desktop and User Interface ................................................................... 77
X Window System ....................................................................................................................... 77
Video Hardware ..................................................................................................................... 78
X Server ................................................................................................................................. 79
Window Manager ................................................................................................................... 79
Desktop Environment ............................................................................................................ 80
Gnome Desktop Example ....................................................................................................... 81
X Client .................................................................................................................................. 83
X Font Server ......................................................................................................................... 83
Configuring X Server ................................................................................................................... 84
Editing xorg.conf Files in Fedora ........................................................................................... 85
Editing XF86Conf File in Fedora ............................................................................................ 86
Restart X Server .................................................................................................................... 87
Configuring Window Manager and Desktop Environment ........................................................... 88
GUI Problem-Solving Utilities ................................................................................................. 89
Display Manager ......................................................................................................................... 90
Configuring Display Manager ................................................................................................ 90
X Terminal or X Station Support ............................................................................................. 91
Configuration Steps on X Server ........................................................................................... 92
X Display Manager (XDM) ...................................................................................................... 93
XDM Configuration Files ........................................................................................................ 93
Remote X Window ................................................................................................................. 94
KDM ....................................................................................................................................... 96
GDM ....................................................................................................................................... 96
Accessibility .......................................................................................................................... 97
Mouse Accessibility ............................................................................................................. 102
Preferred Applications Menu ............................................................................................... 104
Desktop Themes .................................................................................................................. 107
Summary .................................................................................................................................. 108
Chapter 6: Hardware and Process Settings .......................................................... 111
Device Drivers ........................................................................................................................... 111
Two Ways to Implement ....................................................................................................... 111
The /proc Directory .............................................................................................................. 112
The /sys Directory ............................................................................................................... 113
Tools to Manage Device Drivers .......................................................................................... 113
Managing Kernel Modules ........................................................................................................ 114
Configuration Files ............................................................................................................... 114
Manually Managing Kernel Modules ................................................................................... 115
Tools to Manually Manage Kernel Modules ......................................................................... 115
Hotplug and Coldplug Devices .................................................................................................. 116
Hotplug ................................................................................................................................ 116
Coldplug .............................................................................................................................. 117
Components That Manage Devices ..................................................................................... 117
Processes .................................................................................................................................. 118
What Is a Process? .............................................................................................................. 118
Process ID ............................................................................................................................ 118
Forking and Zombie ............................................................................................................. 119
The ps Command ................................................................................................................. 120
The pstree Command .......................................................................................................... 120
Top Command ...................................................................................................................... 120
Process Management ............................................................................................................... 120
Foreground Processing ....................................................................................................... 121
Background ......................................................................................................................... 121
The nohup Command .......................................................................................................... 121
Prioritizing Processes .......................................................................................................... 122
Terminating a Process .............................................................................................................. 122
Kill Command ...................................................................................................................... 123
Summary .................................................................................................................................. 123
Chapter 7: Users and Groups ................................................................................ 125
User Accounts ........................................................................................................................... 125
Account Locations ............................................................................................................... 125
Types of User Accounts ....................................................................................................... 126
User Account Files ............................................................................................................... 126
/etc/passwd File .................................................................................................................. 127
/etc/shadow File .................................................................................................................. 127
Synchronize passwd and shadow Files ............................................................................... 129
Groups ....................................................................................................................................... 130
Group Accounts ................................................................................................................... 130
Group Account Types ........................................................................................................... 131
Group Account Files ............................................................................................................. 132
Managing User/Group Accounts ................................................................................................ 134
Default Configurations ......................................................................................................... 134
add Command ..................................................................................................................... 135
Skeleton Directory ............................................................................................................... 135
useradd Command .............................................................................................................. 136
Password ............................................................................................................................. 136
Modifying User Accounts ..................................................................................................... 137
CHAGE .................................................................................................................................. 138
Lock/Unlock User Accounts ................................................................................................. 139
Deleting a User Account ...................................................................................................... 140
Group Accounts ................................................................................................................... 141
Best Practices ........................................................................................................................... 143
Summary .................................................................................................................................. 144
Chapter 8: Administrative Tasks ........................................................................... 147
Task Management ..................................................................................................................... 147
ATD Daemon ........................................................................................................................ 147
at Command ........................................................................................................................ 148
Shell Script .......................................................................................................................... 148
at Optional Additions ........................................................................................................... 149
Cron Command .................................................................................................................... 151
Cron Jobs ............................................................................................................................ 152
Configuration Files ............................................................................................................... 152
Content for cron Files .......................................................................................................... 154
Working with cron Jobs ....................................................................................................... 154
Localization ............................................................................................................................... 155
Locale .................................................................................................................................. 155
Locale Code ......................................................................................................................... 155
Environmental Variables ...................................................................................................... 157
Time Management .................................................................................................................... 158
Linux Clocks ........................................................................................................................ 158
Local Time and Universal Time ............................................................................................ 158
Time Zone ............................................................................................................................ 159
Changing the Time Zone ...................................................................................................... 160
Summary .................................................................................................................................. 160
Chapter 9: Working with Linux: Part 1 .................................................................. 163
Kernels, Terminals, and Shells .................................................................................................. 163
Kernel .................................................................................................................................. 163
Shell .................................................................................................................................... 164
Terminal ............................................................................................................................... 164
Shells Available in Linux ...................................................................................................... 164
Kernel Architecture .............................................................................................................. 166
Terminal Session ................................................................................................................. 166
Environment Variables .............................................................................................................. 167
Two Types of Variables ........................................................................................................ 167
Variables Used in Linux ....................................................................................................... 168
Path Variable ........................................................................................................................ 168
Working with Shell Commands ................................................................................................. 169
Shell Commands: Case Sensitive ........................................................................................ 170
Shell Commands: Path ........................................................................................................ 170
Good to Know ...................................................................................................................... 171
History File .......................................................................................................................... 171
Purpose of Configuration Files ............................................................................................ 172
Basic Shell Commands ........................................................................................................ 173
Metacharacters ................................................................................................................... 174
How to Get Help ........................................................................................................................ 175
Man and Info Pages ............................................................................................................. 175
Summary .................................................................................................................................. 176
Resources ............................................................................................................................ 176
Chapter 10: Essential System Services ................................................................ 177
System Time Management ....................................................................................................... 177
Hardware Clock ................................................................................................................... 177
System Clock ....................................................................................................................... 178
Network Time Protocol (NTP) ............................................................................................... 179
System Logging ........................................................................................................................ 180
Logrotate ............................................................................................................................. 182
Mail Transfer Agent (MTA) .................................................................................................... 186
Mail Protocols ...................................................................................................................... 187
MTAs .................................................................................................................................... 188
Redirecting Mail .................................................................................................................. 189
Print Management .................................................................................................................... 190
Linux Printing Systems ........................................................................................................ 190
LPD Printing System ............................................................................................................ 191
Common Unix Printing System (CUPS) ................................................................................ 191
Print Job Flow ...................................................................................................................... 192
CUPS Configuration ............................................................................................................. 193
CUPS Print Job Management ............................................................................................... 194
Summary .................................................................................................................................. 195
Resources ................................................................................................................................. 197
Chapter 11: Working with Linux: Part 2 ................................................................ 199
Directory Structure ................................................................................................................... 199
What Is a Directory Structure? ............................................................................................ 199
Filesystem Hierarchy ........................................................................................................... 200
File Types ............................................................................................................................. 202
Common Filename Extensions ............................................................................................ 203
More Linux Commands ............................................................................................................. 203
Wildcard Characters ............................................................................................................ 204
Regular Expressions ................................................................................................................. 205
Common Regular Expressions ............................................................................................. 205
Extended Regular Expressions ............................................................................................ 205
Compression ............................................................................................................................. 206
Compress Utility .................................................................................................................. 207
GNU Utility ........................................................................................................................... 208
Bzip2 Utility ......................................................................................................................... 209
Archiving ................................................................................................................................... 210
Tar ........................................................................................................................................ 211
Cpio ..................................................................................................................................... 212
Summary .................................................................................................................................. 213
Resources ............................................................................................................................ 214
Chapter 12: Networking Fundamentals ................................................................ 215
Internet Protocol ....................................................................................................................... 215
Networking Models ............................................................................................................. 216
OSI Model ............................................................................................................................ 217
TCP/IP Model ....................................................................................................................... 217
TCP and UDP ........................................................................................................................ 218
Internet Control Message Protocol (ICMP) ........................................................................... 218
Addressing ................................................................................................................................ 219
Physical and Logical Addresses .......................................................................................... 219
IPv4 ...................................................................................................................................... 220
Binary Values ....................................................................................................................... 222
IPv4 Address Classes ........................................................................................................... 223
Subnet Mask ........................................................................................................................ 224
ANDing Process ........................................................................................................................ 224
Default Gateway .................................................................................................................. 225
Broadcast Address .............................................................................................................. 225
Lack of IPv4 Addresses ........................................................................................................ 226
Comparing IPv4 and IPv6 ..................................................................................................... 226
IPv6 Addressing ................................................................................................................... 228
Converting Hex to Decimal or Binary ................................................................................... 229
Parts of an IPv6 Addresses .................................................................................................. 230
Ports .......................................................................................................................................... 231
Port Numbers ...................................................................................................................... 231
Configuring an Interface ........................................................................................................... 233
Network Interface Card (NIC) ............................................................................................... 233
Static Settings ..................................................................................................................... 234
DHCP Settings ..................................................................................................................... 235
ifconfig Command ............................................................................................................... 236
Configuring Routes ................................................................................................................... 236
Routers ................................................................................................................................ 236
Configuring DNS ........................................................................................................................ 237
Name Resolution ................................................................................................................. 237
/etc/hosts ............................................................................................................................ 238
/etc/resolv.conf .................................................................................................................... 238
/etc/nsswitch.conf ............................................................................................................... 239
Configuring with GUI ................................................................................................................. 239
Network Configuration Tool ................................................................................................. 239
Troubleshooting ................................................................................................................... 239
Summary .................................................................................................................................. 242
Chapter 13: Software Installation ......................................................................... 245
Package Managers ................................................................................................................... 245
Source or Binary .................................................................................................................. 246
Red Hat Package Manager (RPM) ........................................................................................ 247
Yellowdog Updater Modified (YUM) ..................................................................................... 249
YUM Configuration Files ...................................................................................................... 250
Debian Package Manager .................................................................................................... 251
Debian APT .......................................................................................................................... 251
KPackageKit Package Manager ........................................................................................... 252
Libraries .............................................................................................................................. 252
Troubleshooting ................................................................................................................... 253
Summary .................................................................................................................................. 255
Chapter 14: Security ............................................................................................. 257
Root User Security .................................................................................................................... 257
su Command ....................................................................................................................... 257
sudo Command ................................................................................................................... 258
Sudoers File ......................................................................................................................... 258
User Security Administration ............................................................................................... 259
Best Practices ...................................................................................................................... 260
User Limits ................................................................................................................................ 261
Changing Limits ................................................................................................................... 262
Auditing Files ............................................................................................................................ 263
Host Security ............................................................................................................................. 264
Open Network Connections (Sockets) ................................................................................. 265
Open Ports ........................................................................................................................... 266
Firewalls .............................................................................................................................. 267
User Running a Service ....................................................................................................... 268
TCP Wrappers ...................................................................................................................... 268
Encryption ................................................................................................................................. 269
Asymmetric Key Encryption ................................................................................................ 270
Symmetric Key Encryption .................................................................................................. 270
Secure Shell ........................................................................................................................ 271
Connection with SSH ........................................................................................................... 272
Key Pair ............................................................................................................................... 272
SSH-Agent Utility ................................................................................................................. 275
SSH Configuration Options .................................................................................................. 275
SSH Port Tunneling .............................................................................................................. 276
SSH Authentication .............................................................................................................. 276
GNU Privacy Guard ............................................................................................................... 277
Key Exchange and Encryption Example .............................................................................. 278
GPG Options ......................................................................................................................... 279
Summary .................................................................................................................................. 280
Chapter 15: Working with Files, Directories, and Permissions ............................. 283
Managing Directories and Files ................................................................................................ 283
Finding Directories and Files .................................................................................................... 284
Structure of Files ...................................................................................................................... 285
Linking Files ........................................................................................................................ 286
Ownership and Permissions ..................................................................................................... 286
Directory and File Permissions ............................................................................................ 286
Ownership ........................................................................................................................... 287
Setting Up Permissions and Ownership .............................................................................. 288
Default Permission .............................................................................................................. 288
Special Permissions ............................................................................................................ 289
Text Editors ............................................................................................................................... 290
The vi Editor ......................................................................................................................... 291
Gedit Editor .......................................................................................................................... 292
Summary .................................................................................................................................. 292
Index ..................................................................................................................... 293
[solely-soft.top].t196959.torrent
Torrent: Registered [ 2024-06-08 02:50 ] · 0B85A3E17473A33CB8827DF17EB75F4B7AEA3F44

11 KB

Status: checked
Completed: 1 times
Size: 8 MB
Rate: 
(Vote: 0)
Have thanked: 0  Thanks
Certification Study Companion Series - Sheikh Ahmed / Шейх Ахмед - CompTIA Linux+ Certification Companion / Партнер по сертификации CompTIA Linux+ [2024, PDF/EPUB, ENG] download torrent for free and without registration
[Profile] [PM]
Forum Topic Author Size
Programming Bey Z., Whittaker S. B. / Бей З., Уиттакер С. Б. - A Master\'s Course in Python with Certification: Basic to Advanced Techniques to Master Python / Магистерский курс по Python с сертификацией [2023,... Programmer 10 MB
Hacking and security Birch M. - CompTIA CASP+ CAS-004 Certification Guide [2022, EPUB, ENG] Find a password 35 MB
Mac OS; Linux, FreeBSD and others *NIX Bresnahan C., Blum R. - LPIC-2: Linux Professional Institute Certification Study Guide: Exam 201 and Exam 202, Second Edition [2016, PDF, ENG] iPhone 15 MB
Networks / VoIP Brian Morgan, Jason Ball - Brian Morgan - CCNA Collaboration CIVND 210-065 Official Certification Guide [2016, PDF] [2015, PDF, ENG] Browser 34 MB
Programs from Microsoft Certification Guide - Poulton D., Holt H., Bellet R. - MCSA 70-697 and 70-698 Cert Guide [2017, PDF, ENG] Download Windows 26 MB
Networks / VoIP Certification Study Guide - Ben Piper [ENCOR 350-401, 2020, EPUB, PDF, MOBI] Browser 12 MB
Computer networks and security CompTIA Network+ Certification Study Guide, Sixth Edition (Exam N10-006) Find a password 74 MB
Mac OS; Linux, FreeBSD and others *NIX David Clinton - Practical LPIC-1 Linux Certification Study Guide [2016, EPUB, ENG] iPhone 658 KB
Display posts:    
Reply to topic

Current time is: 24-Feb 15:14

All times are UTC + 2



You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum