Verified Document

Computer System Administrator Systems Administrator Literature Review

(2002). System performance tuning: [help for Unix system administrators]. Beijing [u.a.: O'Reilly. Retrieved from http://books.google.co.ke/books?id=L4oyNrsFBbsC&printsec=frontcover&dq=System+performance+tuning&hl=en&sa=X&ei=C5L_UKjmNonMhAen8ICoBw&ved=0CDIQ6AEwAA Adelstein, T., & Lubanovic, B. (2007). Linux system administration. Sebastopol, Calif:

O'Reilly. Retrieved from http://books.google.co.ke/books?id=-

jYe2k1p5tIC&printsec=frontcover&dq=Advanced+system+administration&hl=en&sa=X &ei=fpP_UM6EN8HMhAff9YC4DQ&ved=0CD0Q6AEwBA#v=onepage&q=Advanced

(2009). Principles of computer systems and network management. Dordrecht: Springer. Retrieved http://books.google.co.ke/books?id=dUiNGYCiWg0C&printsec=frontcover&dq=Principles+of+computer+systems+and+network+management&hl=en&sa=X&ei=i5T_UIG3IMaBhQfF2YD4Bg&ved=0CDQQ6AEwAA#v=onepage&q=Principles%20of%20computer%20systems%20and%20network%20management&f=false
Whyte, E. (2004, Feb 09). Be a system administrator. New Straits Times. Retrieved from http://search.proquest.com/docview/271766591?accountid=35812

Sources used in this document:
References

Burgess, M. (2004). Principles of network and system administration. Chichester: Wiley.

Retrieved from http://books.google.co.ke/books?id=JmOTwMrFGskC&printsec=frontcover&dq=Principles+of+network+and+system+administration&hl=en&sa=X&ei=mJD_UP6rNNSWhQfNsoD4Ag&ved=0CDIQ6AEwAA#v=onepage&q=Principles%20of%20network%20and%20system%20administration&f=false

Frisch, a.E. (2002). Essential system administration: tools and techniques for Linux and Unix administration. Beijing [u.a.: O'Reilly. Retrieved from http://books.google.co.ke/books?id=uRW8V9QOL7YC&printsec=frontcover&dq=Essential+system+administration:+tools+and+techniques+for+Linux+and+Unix+administration.&hl=en&sa=X&ei=CZH_ULLhEcm6hAeFnYGAAw&ved=0CCwQ6AEwAA

Henderson, H. (2009). Encyclopedia of computer science and technology. New York: Facts on File. Retrieved from http://books.google.co.ke/books?id=3Tla6d153uwC&printsec=frontcover&dq=Encyclopedia+of+computer+science+and+technology&hl=en&sa=X&ei=dZH_UNjcIcHQhAeRg4C4Bw&ved=0CCwQ6AEwAA
Kizza, J.M. (2005). Computer Network Security. New York, NY: Springer. Retrieved from http://books.google.co.ke/books?id=HsawoKBLZOwC&printsec=frontcover&dq=Computer+Network+Security&hl=en&sa=X&ei=uZH_UJn-NMbNhAeWroDYCA&ved=0CCwQ6AEwAA#v=onepage&q=Computer%20Network%20Security&f=false
Musumeci, G.-P. D., & Loukides, M. (2002). System performance tuning: [help for Unix system administrators]. Beijing [u.a.: O'Reilly. Retrieved from http://books.google.co.ke/books?id=L4oyNrsFBbsC&printsec=frontcover&dq=System+performance+tuning&hl=en&sa=X&ei=C5L_UKjmNonMhAen8ICoBw&ved=0CDIQ6AEwAA
O'Reilly. Retrieved from http://books.google.co.ke/books?id=-
Verma, D.C. (2009). Principles of computer systems and network management. Dordrecht: Springer. Retrieved http://books.google.co.ke/books?id=dUiNGYCiWg0C&printsec=frontcover&dq=Principles+of+computer+systems+and+network+management&hl=en&sa=X&ei=i5T_UIG3IMaBhQfF2YD4Bg&ved=0CDQQ6AEwAA#v=onepage&q=Principles%20of%20computer%20systems%20and%20network%20management&f=false
Whyte, E. (2004, Feb 09). Be a system administrator. New Straits Times. Retrieved from http://search.proquest.com/docview/271766591?accountid=35812
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Security: Corporate Security Documentation Suitable for
Words: 5280 Length: 19 Document Type: Essay

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Computer Security Briefly Support Your
Words: 2728 Length: 8 Document Type: Term Paper

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it

Systems Administration V. Network Administration
Words: 1495 Length: 5 Document Type: Essay

The subject matter of systems administration includes computer systems and the ways people use them in an organization. This entails knowledge of operating systems and applications, as well as hardware and software troubleshooting, but also knowledge of the purposes for which people in the organization use the computers. The most important skill for a system administrator is problem solving. The systems administrator is on call when a computer system goes

System Security Every Organization Which
Words: 2884 Length: 9 Document Type: Thesis

Attacks on the system security include password theft, back doors and bugs, social engineering, protocol failures, authentication failures, Denial of Service attacks, active attacks, botnets, exponential attacks including worms and viruses, and information leakage. (Fortify Software Inc., 2008); (Fortify Software, n. d.) Servers are targets of security attacks due to the fact that servers contain valuable data and services. For instance, if a server contains personal information about employees, it

Computer Careers Nature and Background
Words: 1300 Length: 4 Document Type: Term Paper

However, the specific training and education requirements depend very much on a company's specific needs. Previous computer experience is also of vital importance, as is a diversity of related skills. Employers are currently requiring a larger base of diverse skills around the focus of technical expertise. Elements such as interpersonal skills and creativity may be combined with the technical requirements of the job, for example (Brock, Pers. Comm.). The greatest

Computer Hacker Nefarious Notions III
Words: 9646 Length: 35 Document Type: Term Paper

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now