Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying ChromeOS System Administrator's Guide
  • Table Of Contents Toc
  • Feedback & Rating feedback
ChromeOS System Administrator's Guide

ChromeOS System Administrator's Guide

By : Dr. Willie Sanders, Jr.
3 (2)
close
close
ChromeOS System Administrator's Guide

ChromeOS System Administrator's Guide

3 (2)
By: Dr. Willie Sanders, Jr.

Overview of this book

Google's ChromeOS provides a great platform for technicians, system administrators, developers, and casual users alike, providing a seemingly simplistic architecture that is easy enough for a novice user to begin working with. However, beneath the surface, this operating system boasts a plethora of powerful tools, able to rival any other OS on the market. So, learning how to harness the full potential of the OS is critical for you as a technical worker and user to thrive at your workplace. ChromeOS System Administrator’s Guide will help you reap the benefits of all features of ChromeOS. This book explains ChromeOS’ unique architecture and its built-in tools that perform essential tasks such as managing user accounts, working with data, and launching applications. As you build your foundational knowledge of the OS, you'll be exposed to higher-level concepts such as security, command line, and enterprise management. By the end of this book, you’ll be well-equipped to perform a range of system administration tasks within ChromeOS without requiring an alternative operating system, thereby broadening your options as a technician, system administrator, developer, or engineer.
Table of Contents (16 chapters)
close
close
1
Part 1:Working with ChromeOS
5
Part 2:Security and Troubleshooting
9
Part 3:Advanced Administration

Screen locks and 2FA

When working in a modern computing environment, users will interact regularly with sensitive data and systems. Whether it’s your personal bank account information or the schematics of your company’s next big product, even a glimpse of this data by the prying eyes of a cyber-attacker can have catastrophic effects. This is why security-minded systems administrators follow a best practice called Defense-in-Depth (DiD, aka layered defense).

DiD/layered defense is a security concept that focuses on the strengthening of defenses through the implementation of multiple security measures instead of the hardening of a single security measure. Think of it like this: you want to protect your house from burglars, so you go out and buy the most expensive, high-tech door lock you can find. This lock does a fantastic job of protecting your front door. No one is getting in with it! But what about your windows? And the back door?

On the other hand, taking the...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY