Logo

IBM Certification Study Guide AIX V4.3 System Administration

Large book cover: IBM Certification Study Guide AIX V4.3 System Administration

IBM Certification Study Guide AIX V4.3 System Administration
by

Publisher: IBM
ISBN/ASIN: 0738410314
ISBN-13: 9780738410319
Number of pages: 240

Description:
This redbook is designed as a study guide for professionals wishing to prepare for the certification exam to achieve: IBM Certified Specialist - AIX V4.3 System Administration. It helps AIX administrators seeking a comprehensive and task-oriented guide for developing the knowledge and skills required for the certification. It is designed to provide a combination of theory and practical experience needed for a general understanding of the subject matter.

Download or read it online for free here:
Download link
(2.5MB, PDF)

Similar books

Book cover: Conquering the Command LineConquering the Command Line
by - ConqueringTheCommandLine.com
Learn to master the most valuable and useful command line tools for Unix and Linux based systems. In this book you will find not only the most useful command line tools you need to know, but also the most helpful options and flags for those tools.
(5397 views)
Book cover: An Awk PrimerAn Awk Primer
by - Wikibooks
Awk has two faces: it is a utility for performing simple text-processing tasks, and it is a programming language for performing complex text-processing tasks. Awk is useful for simple, quick-and-dirty computational programming.
(5086 views)
Book cover: Advanced Bash-Scripting GuideAdvanced Bash-Scripting Guide
by - Lulu.com
This text progresses rapidly toward an advanced level of instruction, it is a textbook, self-study manual, reference and source of knowledge on UNIX shell scripting. The exercises and examples invite reader participation. Suitable for classroom use.
(7736 views)
Book cover: UNIX System Security: A Guide for Users and System AdministratorsUNIX System Security: A Guide for Users and System Administrators
by - Addison-Wesley
The first up-to-date source to provide the UNIX system user or administrator with the information needed to protect data and system from unauthorized use. By following the procedures described, you can protect your UNIX system from most attackers.
(2287 views)