Last edited by Pearson Addison-Wesley
14.07.2021 | History

1 edition of Unix and Linux System Administration Handbook found in the catalog.

Unix and Linux System Administration Handbook

Sample exam : project and construction administration

  • 962 Want to read
  • 1109 Currently reading

Published by Administrator in Pearson Addison-Wesley

    Places:
  • United States
    • Subjects:
    • Pearson Addison-Wesley


      • Download Unix and Linux System Administration Handbook Book Epub or Pdf Free, Unix and Linux System Administration Handbook, Online Books Download Unix and Linux System Administration Handbook Free, Book Free Reading Unix and Linux System Administration Handbook Online, You are free and without need to spend extra money (PDF, epub) format You can Download this book here. Click on the download link below to get Unix and Linux System Administration Handbook book in PDF or epub free.

      • nodata

        StatementPearson Addison-Wesley
        PublishersPearson Addison-Wesley
        Classifications
        LC ClassificationsAugust 8, 2017
        The Physical Object
        Paginationxvi, 104 p. :
        Number of Pages65
        ID Numbers
        ISBN 100134277554
        Series
        1nodata
        2
        3
        Tribute to Evi Preface Foreword Acknowledgments Where to Start 1.1 Essential duties of a system administrator 1.2 Suggested background 1.3 Linux distributions 1.4 Example systems used in this book 1.5 Notation and typographical conventions 1.6 Units 1.7 Man pages and other on-line documentation 1.8 Other authoritative documentation 1.9 Other sources of information 1.10 Ways to find and install software 1.11 Where to host 1.12 Specialization and adjacent disciplines 1.13 Recommended reading Booting and System Management Daemons 2.1 Boot process overview 2.2 System firmware 2.3 Boot loaders 2.4 GRUB: the GRand Unified Boot loader 2.5 The FreeBSD boot process 2.6 System management daemons 2.7 systemd in detail 2.8 FreeBSD init and startup scripts 2.9 Reboot and shutdown procedures 2.10 Stratagems for a nonbooting system Access Control and Rootly Powers 3.1 Standard UNIX access control 3.2 Management of the root account 3.3 Extensions to the standard access control model 3.4 Modern access control 3.5 Recommended reading Process Control 4.1 Components of a process 4.2 The life cycle of a process 4.3 ps: monitor processes 4.4 Interactive monitoring with top 4.5 nice and renice: influence scheduling priority 4.6 The /proc filesystem 4.7 strace and truss: trace signals and system calls 4.8 Runaway processes 4.9 Periodic processes The Filesystem 5.1 Pathnames 5.2 Filesystem mounting and unmounting 5.3 Organization of the file tree 5.4 File types 5.5 File attributes 5.6 Access control lists Software Installation and Management 6.1 Operating system installation 6.2 Managing packages 6.3 Linux package management systems 6.4 High-level Linux package management systems 6.5 FreeBSD software management 6.6 Software localization and configuration 6.7 Recommended reading Scripting and the Shell 7.1 Scripting philosophy 7.2 Shell basics 7.3 sh scripting 7.4 Regular expressions 7.5 Python programming 7.6 Ruby programming 7.7 Library and environment management for Python and Ruby 7.8 Revision control with Git 7.9 Recommended reading User Management 8.1 Account mechanics 8.2 The /etc/passwd file 8.3 The Linux /etc/shadow file 8.4 FreeBSDs /etc/master.passwd and /etc/login.conf files 8.5 The /etc/group file 8.6 Manual steps for adding users 8.7 Scripts for adding users: useradd, adduser, and newusers 8.8 Safe removal of a user’s account and files 8.9 User login lockout 8.10 Risk reduction with PAM 8.11 Centralized account management Cloud Computing 9.1 The cloud in context 9.2 Cloud platform choices 9.3 Cloud service fundamentals 9.4 Clouds: VPS quick start by platform 9.5 Cost control 9.6 Recommended Reading Logging 10.1 Log locations 10.2 The systemd journal 10.3 Syslog 10.4 Kernel and boot-time logging 10.5 Management and rotation of log files 10.6 Management of logs at scale 10.7 Logging policies Drivers and the Kernel 11.1 Kernel chores for system administrators 11.2 Kernel version numbering 11.3 Devices and their drivers 11.4 Linux kernel configuration 11.5 FreeBSD kernel configuration 11.6 Loadable kernel modules 11.7 Booting 11.8 Booting alternate kernels in the cloud 11.9 Kernel errors 11.10 Recommended reading Printing 12.1 CUPS printing 12.2 CUPS server administration 12.3 Troubleshooting tips 12.4 Recommended reading TCP/IP Networking 13.1 TCP/IP and its relationship to the Internet 13.2 Networking basics 13.3 Packet addressing 13.4 IP addresses: the gory details 13.5 Routing 13.6 IPv4 ARP and IPv6 neighbor discovery 13.7 DHCP: the Dynamic Host Configuration Protocol 13.8 Security issues 13.9 Basic network configuration 13.10 Linux networking 13.11 FreeBSD networking 13.12 Network troubleshooting 13.13 Network monitoring 13.14 Firewalls and NAT 13.15 Cloud networking 13.16 Recommended reading Physical Networking 14.1 Ethernet: the Swiss Army knife of networking 14.2 Wireless: Ethernet for nomads 14.3 SDN: software-defined networking 14.4 Network testing and debugging 14.5 Building wiring 14.6 Network design issues 14.7 Management issues 14.8 Recommended vendors 14.9 Recommended reading IP Routing 15.1 Packet forwarding: a closer look 15.2 Routing daemons and routing protocols 15.3 Protocols on parade 15.4 Routing protocol multicast coordination 15.5 Routing strategy selection criteria 15.6 Routing daemons 15.7 Cisco routers 15.8 Recommended reading DNS: The Domain Name System 16.1 DNS architecture 16.2 DNS for lookups 16.3 The DNS namespace 16.4 How DNS works 16.5 The DNS database 16.6 The BIND software 16.7 Split DNS and the view statement 16.8 BIND configuration examples 16.9 Zone file updating 16.10 DNS security issues 16.11 BIND debugging 16.12 Recommended reading Single Sign-On 17.1 Core SSO elements 17.2 LDAP: “lightweight” directory services 17.3 Using directory services for login 17.4 Alternative approaches 17.5 Recommended reading Electronic Mail 18.1 Mail system architecture 18.2 Anatomy of a mail message 18.3 The SMTP protocol 18.4 Spam and malware 18.5 Message privacy and encryption 18.6 Mail aliases 18.7 Email configuration 18.8 sendmail 18.9 Exim 18.10 Postfix 18.11 Recommended reading Web Hosting 19.1 HTTP: the Hypertext Transfer Protocol 19.2 Web software basics 19.3 Web hosting in the cloud 19.4 Apache httpd 19.5 NGINX 19.6 HAProxy 19.7 Recommended reading Storage 20.1 I just want to add a disk! 20.2 Storage hardware 20.3 Storage hardware interfaces 20.4 Attachment and low-level management of drives 20.5 The software side of storage: peeling the onion 20.6 Disk partitioning 20.7 Logical volume management 20.8 RAID: redundant arrays of inexpensive disks 20.9 Filesystems 20.10 Traditional filesystems: UFS, ext4, and XFS 20.11 Next-generation filesystems: ZFS and Btrfs 20.12 ZFS: all your storage problems solved 20.13 Btrfs: “ZFS lite” for Linux 20.14 Data backup strategy 20.15 Recommended reading The Network File System 21.1 Meet network file services 21.2 The NFS approach 21.3 Server-side NFS 21.4 Client-side NFS 21.5 Identity mapping for NFS version 4 21.6 nfsstat: dump NFS statistics 21.7 Dedicated NFS file servers 21.8 Automatic mounting 21.9 Recommended reading SMB 22.1 Samba: SMB server for UNIX 22.2 Installing and configuring Samba 22.3 Mounting SMB file shares 22.4 Browsing SMB file shares 22.5 Ensuring Samba security 22.6 Debugging Samba 22.7 Recommended reading Configuration Management 23.1 Configuration management in a nutshell 23.2 Dangers of configuration management 23.3 Elements of configuration management 23.4 Popular CM systems compared 23.5 Introduction to Ansible 23.6 Introduction to Salt 23.7 Ansible and Salt compared 23.8 Best practices 23.9 Recommended reading Virtualization 24.1 Virtual vernacular 24.2 Virtualization with Linux 24.3 FreeBSD bhyve 24.4 VMware 24.5 VirtualBox 24.6 Packer 24.7 Vagrant 24.8 Recommended reading Containers 25.1 Background and core concepts 25.2 Docker: the open source container engine 25.3 Containers in practice 25.4 Container clustering and management 25.5 Recommended reading Continuous Integration and Delivery 26.1 CI/CD essentials 26.2 Pipelines 26.3 Jenkins: the open source automation server 26.4 CI/CD in practice 26.5 Containers and CI/CD 26.6 Recommended reading Security 27.1 Elements of security 27.2 How security is compromised 27.3 Basic security measures 27.4 Passwords and user accounts 27.5 Security power tools 27.6 Cryptography primer 27.7 SSH, the Secure SHell 27.8 Firewalls 27.9 Virtual private networks (VPNs) 27.10 Certifications and standards 27.11 Sources of security information 27.12 When your site has been attacked 27.13 Recommended reading Monitoring 28.1 An overview of monitoring 28.2 The monitoring culture 28.3 The monitoring platforms 28.4 Data collection 28.5 Network monitoring 28.6 Systems monitoring 28.7 Application monitoring 28.8 Security monitoring 28.9 SNMP: the Simple Network Management Protocol 28.10 Tips and tricks for monitoring 28.11 Recommended reading Performance Analysis 29.1 Performance tuning philosophy 29.2 Ways to improve performance 29.3 Factors that affect performance 29.4 Stolen CPU cycles 29.5 Analysis of performance problems 29.6 System performance checkup 29.7 Help! My server just got really slow! 29.8 Recommended reading Data Center Basics 30.1 Racks 30.2 Power 30.3 Cooling and environment 30.4 Data center reliability tiers 30.5 Data center security 30.6 Tools 30.7 Recommended reading Methodology, Policy, and Politics 31.1 The grand unified theory: DevOps 31.2 Ticketing and task management systems 31.3 Local documentation maintenance 31.4 Environment separation 31.5 Disaster management 31.6 IT policies and procedures 31.7 Service level agreements 31.8 Compliance: regulations and standards 31.9 Legal issues 31.10 Organizations, conferences, and other resources 31.11 Recommended reading A Brief History of System Administration Colophon About the Contributors About the Authors Index

        UNIX and Linux System Administration Handbook, Fifth Edition is today’s definitive guide to installing, configuring and maintaining any Unix or Linux system -- including the systems that provide core Internet and cloud infrastructure. File Size: 7MB.


Share this book
You might also like

Unix and Linux System Administration Handbook by Pearson Addison-Wesley Download PDF EPUB FB2


UNIX and Linux System Administration Handbook by Evi Nemeth

Is your book available as an eBook? The information gathered may enable Pearson but not the third party web trend services to link information with application and system log data. More generally, it's worth noting that this regex is permissive. Marketing preferences may be changed at any time. The authors present the facts along with seasoned advice and real-world examples. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against.

We don't describe the Debian system in this book. When I needed to decide whether I would purchase this book, I opened it on a random page.

UNIX and Linux System Administration Handbook, 4th Edition (豆瓣)

This is one of those cases. Their perspective on the variations among systems is valuable for anyone who runs a heterogeneous computing facility. Many recent grads, such as myself, suffer from having very little Linux training which can result in fundamental misunderstandings and derailed progress.

Last Update: November 17, 2020. A small number of books were sent into distribution with missing pages or with pages out of order. Sometimes I choose a topic which draws my attention from its content and learn it from this book.

Contests and Drawings Occasionally, we may sponsor a contest or drawing. If you spend all day ssh'd into Linux machines, this is the book you need. So you have to work with UNIX, huh? Software Installation and Management Chapter 7.

Have to admit I skipped probably a half of the book — all Unix and Linux System Administration Handbook stuff AIX, HP-UX? If you use UNIX and Linux systems, you need this book in your short-reach library.

Collection and Use of Information To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including: Questions and Inquiries For inquiries and questions, we collect the inquiry or question, together with name, contact details email address, phone number and mailing address and any other additional information voluntarily submitted to us through a Contact Us form or an email. If you use UNIX and Linux systems, you need this book in your short-reach library.