Linux administration handbook / Evi Nemeth, Garth Snyder, Trent R. Hein ; with Lynda McGinley ... [et al.].
Material type: TextPublication details: Upper Saddle River, NJ ; London : Prentice Hall, 2006.Edition: 2nd edDescription: xxxvii, 1001 p. : ill. ; 24 cmISBN:- 0131480049 (pbk. : alk. paper)
- 9780131480049 (pbk. : alk. paper)
- 005.432 NEM
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Standard Loan | Moylish Library Main Collection | 005.432 NEM (Browse shelf(Opens below)) | 1 | Available | 39002100387001 | ||
Standard Loan | Moylish Library Main Collection | 005.432 NEM (Browse shelf(Opens below)) | 2 | Available | 39002100391805 | ||
Standard Loan | Thurles Library Main Collection | 005.432 NEM (Browse shelf(Opens below)) | 1 | Available | R14074KRCT |
Enhanced descriptions from Syndetics:
Examines how Linux systems behave in real-world ecosystems, not how they might behave in ideal environments. The second edition incorporates the changes in Linux systems in the past 18 months, which include current versions of RedHat, SuSE and Debian systems, Logical Volume Manager, X11 basic andministration and Nagios
Includes index.
Ch. 1. Where to start -- Ch. 2. Booting and shutting down -- Ch. 3. Rootly powers -- Ch. 4. Controlling processes -- Ch. 5. The filesystem -- Ch. 6. Adding new users -- Ch. 7. Adding a disk -- Ch. 8. Periodic processes -- Ch. 9. Backups -- Ch. 10. Syslog and log files -- Ch. 11. Software and configuration management -- Ch. 12. TCP/IP networking -- Ch. 13. Routing -- Ch. 14. Network hardware -- Ch. 15. DNS : the domain name system -- Ch. 16. The network file system -- Ch. 17. Sharing system files -- Ch. 18. Electronic mail -- Ch. 19. Network management and debugging -- Ch. 20. Security -- Ch. 21. Web hosting and Internet servers -- Ch. 22. The X Window system -- Ch. 23. Printing -- Ch. 24. Maintenance and environment -- Ch. 25. Performance analysis -- Ch. 26. Cooperating with Windows -- Ch. 27. Serial devices -- Ch. 28. Drivers and the kernel -- Ch. 29. Daemons -- Ch. 30. Management, policy, and politics.
Table of contents provided by Syndetics
- Foreword to the First Edition (p. xxxiii)
- Preface (p. xxxiv)
- Acknowledgments (p. xxxvii)
- Section 1 Basic Administration (p. 1)
- Chapter 1 Where to Start (p. 3)
- Suggested background (p. 4)
- Linux's relationship to UNIX (p. 4)
- Linux in historical context (p. 5)
- Linux distributions (p. 6)
- Notation and typographical conventions (p. 9)
- Where to go for information (p. 11)
- How to find and install software (p. 14)
- Essential tasks of the system administrator (p. 16)
- System administration under duress (p. 18)
- Recommended reading (p. 19)
- Exercises (p. 20)
- Chapter 2 Booting and Shutting Down (p. 21)
- Bootstrapping (p. 21)
- Booting PCs (p. 25)
- Using boot loaders: LILO and GRUB (p. 26)
- Booting single-user mode (p. 31)
- Working with startup scripts (p. 32)
- Rebooting and shutting down (p. 40)
- Exercises (p. 43)
- Chapter 3 Rootly Powers (p. 44)
- Ownership of files and processes (p. 44)
- The superuser (p. 46)
- Choosing a root password (p. 47)
- Becoming root (p. 48)
- Other pseudo-users (p. 51)
- Exercises (p. 52)
- Chapter 4 Controlling Processes (p. 53)
- Components of a process (p. 53)
- The life cycle of a process (p. 56)
- Signals (p. 57)
- Kill and killall: send signals (p. 60)
- Process states (p. 60)
- Nice and renice: influence scheduling priority (p. 61)
- ps: monitor processes (p. 62)
- Top: monitor processes even better (p. 65)
- The /proc filesystem (p. 65)
- Strace: trace signals and system calls (p. 66)
- Runaway processes (p. 67)
- Recommended reading (p. 69)
- Exercises (p. 69)
- Chapter 5 The Filesystem (p. 70)
- Pathnames (p. 72)
- Filesystem mounting and unmounting (p. 73)
- The organization of the file tree (p. 75)
- File types (p. 76)
- File attributes (p. 81)
- Access control lists (p. 88)
- Exercises (p. 92)
- Chapter 6 Adding New Users (p. 93)
- The /etc/passwd file (p. 93)
- The /etc/shadow file (p. 99)
- The /etc/group file (p. 101)
- Adding users (p. 102)
- Removing users (p. 107)
- Disabling logins (p. 108)
- Managing accounts (p. 108)
- Exercises (p. 110)
- Chapter 7 Adding a Disk (p. 111)
- Disk interfaces (p. 111)
- Disk geometry (p. 119)
- Linux filesystems (p. 120)
- An overview of the disk installation procedure (p. 122)
- hdparm: set IDE interface parameters (p. 129)
- fsck: check and repair filesystems (p. 131)
- Adding a disk: a step-by-step guide (p. 133)
- Advanced disk management: RAID and LVM (p. 138)
- Mounting USB drives (p. 147)
- Exercises (p. 148)
- Chapter 8 Periodic Processes (p. 150)
- Cron: schedule commands (p. 150)
- The format of crontab files (p. 151)
- Crontab management (p. 153)
- Some common uses for cron (p. 154)
- Other schedulers: anacron and fcron (p. 156)
- Exercises (p. 157)
- Chapter 9 Backups (p. 158)
- Motherhood and apple pie (p. 159)
- Backup devices and media (p. 163)
- Setting up an incremental backup regime with dump (p. 169)
- Restoring from dumps with restore (p. 173)
- Dumping and restoring for upgrades (p. 176)
- Using other archiving programs (p. 177)
- Using multiple files on a single tape (p. 178)
- Bacula (p. 179)
- Commercial backup products (p. 197)
- Recommended reading (p. 198)
- Exercises (p. 198)
- Chapter 10 Syslog and Log Files (p. 201)
- Logging policies (p. 201)
- Linux log files (p. 204)
- Logrotate: manage log files (p. 208)
- Syslog: the system event logger (p. 209)
- Condensing log files to useful information (p. 220)
- Exercises (p. 222)
- Chapter 11 Software and Configuration Management (p. 223)
- Basic Linux installation (p. 223)
- Diskless clients (p. 232)
- Package management (p. 234)
- High-level package management systems (p. 237)
- Revision control (p. 247)
- Localization and configuration (p. 255)
- Configuration management tools (p. 260)
- Sharing software over NFS (p. 263)
- Recommended software (p. 266)
- Recommended reading (p. 268)
- Exercises (p. 268)
- Section 2 Networking (p. 269)
- Chapter 12 TCP/IP Networking (p. 271)
- TCP/IP and the Internet (p. 272)
- Networking road map (p. 275)
- Packets and encapsulation (p. 276)
- IP addresses: the gory details (p. 282)
- Routing (p. 293)
- ARP: the address resolution protocol (p. 296)
- Addition of a machine to a network (p. 297)
- Distributi
Excerpt provided by Syndetics
Author notes provided by Syndetics
Evi Nemeth is retired from the computer science faculty at the University of Colorado and is a senior staff member in network research at CAIDA, the Cooperative Association for Internet Data Analysis at the San Diego Supercomputer Center.
Garth Snyder has worked at NeXT and Sun and holds a degree in electrical engineering from Swarthmore College. He recently received an M.D./M.B.A. from the University of Rochester.
Trent R. Hein is the cofounder of Applied Trust Engineering, a company that provides network infrastructure security and performance consulting services. Trent holds a B.S. in computer science from the University of Colorado.