{"title":"Dealing with Linux Devices","authors":"","doi":"10.1002/9781119556060.ch23","DOIUrl":"https://doi.org/10.1002/9781119556060.ch23","url":null,"abstract":"","PeriodicalId":339174,"journal":{"name":"CompTIA Linux+ Study Guide","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122171898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Part IV Securing Your System: Applying Ownership and Permissions","authors":"","doi":"10.1002/9781119556060.ch15","DOIUrl":"https://doi.org/10.1002/9781119556060.ch15","url":null,"abstract":"","PeriodicalId":339174,"journal":{"name":"CompTIA Linux+ Study Guide","volume":"37 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124520993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating User Issues","authors":"","doi":"10.1002/9781119556060.ch22","DOIUrl":"https://doi.org/10.1002/9781119556060.ch22","url":null,"abstract":"","PeriodicalId":339174,"journal":{"name":"CompTIA Linux+ Study Guide","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125333222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Part II Starting Up and Configuring Your System: Explaining the Boot Process","authors":"","doi":"10.1002/9781119556060.ch5","DOIUrl":"https://doi.org/10.1002/9781119556060.ch5","url":null,"abstract":"","PeriodicalId":339174,"journal":{"name":"CompTIA Linux+ Study Guide","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116147504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embracing Best Security Practices","authors":"","doi":"10.1002/9781119556060.ch19","DOIUrl":"https://doi.org/10.1002/9781119556060.ch19","url":null,"abstract":"","PeriodicalId":339174,"journal":{"name":"CompTIA Linux+ Study Guide","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114695424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Part VI Automating Your System: Deploying Bash Scripts","authors":"","doi":"10.1002/9781119556060.ch25","DOIUrl":"https://doi.org/10.1002/9781119556060.ch25","url":null,"abstract":"","PeriodicalId":339174,"journal":{"name":"CompTIA Linux+ Study Guide","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116835048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Part VII Realizing Virtual and Cloud Environments: Understanding Cloud and Virtualization Concepts","authors":"","doi":"10.1002/9781119556060.ch28","DOIUrl":"https://doi.org/10.1002/9781119556060.ch28","url":null,"abstract":"","PeriodicalId":339174,"journal":{"name":"CompTIA Linux+ Study Guide","volume":"419 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115578126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}