gogogo
Syndetics cover image
Image from Syndetics

Linux administration handbook / Evi Nemeth, Garth Snyder, Trent R. Hein ; with Lynda McGinley ... [et al.].

By: Contributor(s): Material type: TextTextPublication details: Upper Saddle River, NJ ; London : Prentice Hall, 2006.Edition: 2nd edDescription: xxxvii, 1001 p. : ill. ; 24 cmISBN:
  • 0131480049 (pbk. : alk. paper)
  • 9780131480049 (pbk. : alk. paper)
Subject(s): DDC classification:
  • 005.432 NEM
Online resources:
Contents:
Ch. 1. Where to start -- Ch. 2. Booting and shutting down -- Ch. 3. Rootly powers -- Ch. 4. Controlling processes -- Ch. 5. The filesystem -- Ch. 6. Adding new users -- Ch. 7. Adding a disk -- Ch. 8. Periodic processes -- Ch. 9. Backups -- Ch. 10. Syslog and log files -- Ch. 11. Software and configuration management -- Ch. 12. TCP/IP networking -- Ch. 13. Routing -- Ch. 14. Network hardware -- Ch. 15. DNS : the domain name system -- Ch. 16. The network file system -- Ch. 17. Sharing system files -- Ch. 18. Electronic mail -- Ch. 19. Network management and debugging -- Ch. 20. Security -- Ch. 21. Web hosting and Internet servers -- Ch. 22. The X Window system -- Ch. 23. Printing -- Ch. 24. Maintenance and environment -- Ch. 25. Performance analysis -- Ch. 26. Cooperating with Windows -- Ch. 27. Serial devices -- Ch. 28. Drivers and the kernel -- Ch. 29. Daemons -- Ch. 30. Management, policy, and politics.
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Moylish Library Main Collection 005.432 NEM (Browse shelf(Opens below)) 1 Available 39002100387001
Standard Loan Moylish Library Main Collection 005.432 NEM (Browse shelf(Opens below)) 2 Available 39002100391805
Standard Loan Thurles Library Main Collection 005.432 NEM (Browse shelf(Opens below)) 1 Available R14074KRCT

Enhanced descriptions from Syndetics:

Examines how Linux systems behave in real-world ecosystems, not how they might behave in ideal environments. The second edition incorporates the changes in Linux systems in the past 18 months, which include current versions of RedHat, SuSE and Debian systems, Logical Volume Manager, X11 basic andministration and Nagios

Includes index.

Ch. 1. Where to start -- Ch. 2. Booting and shutting down -- Ch. 3. Rootly powers -- Ch. 4. Controlling processes -- Ch. 5. The filesystem -- Ch. 6. Adding new users -- Ch. 7. Adding a disk -- Ch. 8. Periodic processes -- Ch. 9. Backups -- Ch. 10. Syslog and log files -- Ch. 11. Software and configuration management -- Ch. 12. TCP/IP networking -- Ch. 13. Routing -- Ch. 14. Network hardware -- Ch. 15. DNS : the domain name system -- Ch. 16. The network file system -- Ch. 17. Sharing system files -- Ch. 18. Electronic mail -- Ch. 19. Network management and debugging -- Ch. 20. Security -- Ch. 21. Web hosting and Internet servers -- Ch. 22. The X Window system -- Ch. 23. Printing -- Ch. 24. Maintenance and environment -- Ch. 25. Performance analysis -- Ch. 26. Cooperating with Windows -- Ch. 27. Serial devices -- Ch. 28. Drivers and the kernel -- Ch. 29. Daemons -- Ch. 30. Management, policy, and politics.

Table of contents provided by Syndetics

  • Foreword to the First Edition (p. xxxiii)
  • Preface (p. xxxiv)
  • Acknowledgments (p. xxxvii)
  • Section 1 Basic Administration (p. 1)
  • Chapter 1 Where to Start (p. 3)
  • Suggested background (p. 4)
  • Linux's relationship to UNIX (p. 4)
  • Linux in historical context (p. 5)
  • Linux distributions (p. 6)
  • Notation and typographical conventions (p. 9)
  • Where to go for information (p. 11)
  • How to find and install software (p. 14)
  • Essential tasks of the system administrator (p. 16)
  • System administration under duress (p. 18)
  • Recommended reading (p. 19)
  • Exercises (p. 20)
  • Chapter 2 Booting and Shutting Down (p. 21)
  • Bootstrapping (p. 21)
  • Booting PCs (p. 25)
  • Using boot loaders: LILO and GRUB (p. 26)
  • Booting single-user mode (p. 31)
  • Working with startup scripts (p. 32)
  • Rebooting and shutting down (p. 40)
  • Exercises (p. 43)
  • Chapter 3 Rootly Powers (p. 44)
  • Ownership of files and processes (p. 44)
  • The superuser (p. 46)
  • Choosing a root password (p. 47)
  • Becoming root (p. 48)
  • Other pseudo-users (p. 51)
  • Exercises (p. 52)
  • Chapter 4 Controlling Processes (p. 53)
  • Components of a process (p. 53)
  • The life cycle of a process (p. 56)
  • Signals (p. 57)
  • Kill and killall: send signals (p. 60)
  • Process states (p. 60)
  • Nice and renice: influence scheduling priority (p. 61)
  • ps: monitor processes (p. 62)
  • Top: monitor processes even better (p. 65)
  • The /proc filesystem (p. 65)
  • Strace: trace signals and system calls (p. 66)
  • Runaway processes (p. 67)
  • Recommended reading (p. 69)
  • Exercises (p. 69)
  • Chapter 5 The Filesystem (p. 70)
  • Pathnames (p. 72)
  • Filesystem mounting and unmounting (p. 73)
  • The organization of the file tree (p. 75)
  • File types (p. 76)
  • File attributes (p. 81)
  • Access control lists (p. 88)
  • Exercises (p. 92)
  • Chapter 6 Adding New Users (p. 93)
  • The /etc/passwd file (p. 93)
  • The /etc/shadow file (p. 99)
  • The /etc/group file (p. 101)
  • Adding users (p. 102)
  • Removing users (p. 107)
  • Disabling logins (p. 108)
  • Managing accounts (p. 108)
  • Exercises (p. 110)
  • Chapter 7 Adding a Disk (p. 111)
  • Disk interfaces (p. 111)
  • Disk geometry (p. 119)
  • Linux filesystems (p. 120)
  • An overview of the disk installation procedure (p. 122)
  • hdparm: set IDE interface parameters (p. 129)
  • fsck: check and repair filesystems (p. 131)
  • Adding a disk: a step-by-step guide (p. 133)
  • Advanced disk management: RAID and LVM (p. 138)
  • Mounting USB drives (p. 147)
  • Exercises (p. 148)
  • Chapter 8 Periodic Processes (p. 150)
  • Cron: schedule commands (p. 150)
  • The format of crontab files (p. 151)
  • Crontab management (p. 153)
  • Some common uses for cron (p. 154)
  • Other schedulers: anacron and fcron (p. 156)
  • Exercises (p. 157)
  • Chapter 9 Backups (p. 158)
  • Motherhood and apple pie (p. 159)
  • Backup devices and media (p. 163)
  • Setting up an incremental backup regime with dump (p. 169)
  • Restoring from dumps with restore (p. 173)
  • Dumping and restoring for upgrades (p. 176)
  • Using other archiving programs (p. 177)
  • Using multiple files on a single tape (p. 178)
  • Bacula (p. 179)
  • Commercial backup products (p. 197)
  • Recommended reading (p. 198)
  • Exercises (p. 198)
  • Chapter 10 Syslog and Log Files (p. 201)
  • Logging policies (p. 201)
  • Linux log files (p. 204)
  • Logrotate: manage log files (p. 208)
  • Syslog: the system event logger (p. 209)
  • Condensing log files to useful information (p. 220)
  • Exercises (p. 222)
  • Chapter 11 Software and Configuration Management (p. 223)
  • Basic Linux installation (p. 223)
  • Diskless clients (p. 232)
  • Package management (p. 234)
  • High-level package management systems (p. 237)
  • Revision control (p. 247)
  • Localization and configuration (p. 255)
  • Configuration management tools (p. 260)
  • Sharing software over NFS (p. 263)
  • Recommended software (p. 266)
  • Recommended reading (p. 268)
  • Exercises (p. 268)
  • Section 2 Networking (p. 269)
  • Chapter 12 TCP/IP Networking (p. 271)
  • TCP/IP and the Internet (p. 272)
  • Networking road map (p. 275)
  • Packets and encapsulation (p. 276)
  • IP addresses: the gory details (p. 282)
  • Routing (p. 293)
  • ARP: the address resolution protocol (p. 296)
  • Addition of a machine to a network (p. 297)
  • Distributi

Excerpt provided by Syndetics

When we wrote the first edition of this book (about five years ago), Linux was just beginning to prove itself in the corporate world. We hoped that Linux Administration Handbook would help spread the news that Linux was a first-tier operating system capable of matching off against offerings from Sun, HP, and IBM. Now Linux is IBM. For anyone awaiting an unambiguous signal that the Linux waters were safe for corporate swimmers, IBM's 2004 announcement of Linux support across its entire server line must have been quite comforting. No one was ever fired for buying IBM; these days, Linux in general is an equally safe proposition.1 We set out to write a book that would be the professional Linux system administrator's best friend. Where appropriate, we've adapted the proven concepts and materials from our popular book, UNIX System Administration Handbook. We've added a truckload of Linux-specific material and updated the rest, but much of the coverage remains similar. We hope you agree that the result is a high-quality guide to Linux administration that benefits from its experience in a past life. None of the other books on Linux system administration supply the breadth and depth of material necessary to effectively use Linux in real-world business environments. Here are the features that distinguish our book: We take a practical approach. Our purpose is not to restate the contents of your manuals but rather to summarize our collective experience in system administration. This book contains numerous war stories and a wealth of pragmatic advice. This is not a book about how to run Linux at home, in your garage, or on your PDA. We describe the use of Linux in production environments such as businesses, government offices, and universities. We cover Linux networking in detail. It is the most difficult aspect of system administration and the area in which we think we can be of most help. We do not oversimplify the material. Our examples reflect true-life situations with all their warts and unsightly complications. In most cases, the examples have been taken directly from production systems. We cover five major Linux distributions. Our Example Distributions Like so many operating systems, Linux has grown and branched in several different directions. Although development of the kernel has remained surprisingly centralized, packaging and distribution of complete Linux operating systems is overseen by a variety of groups, each with its own agenda.We cover five Linux distributions in detail: Red Hat ® Enterprise Linux ® 4.3 ES Fedora TM Core 5 SUSE ® Linux Enterprise 10.2 Debian ® GNU/Linux 3.2 "Etch" (testing release of 9/06) Ubuntu ® 6.06 "Dapper Drake" We chose these distributions because they are among the most popular and because they represent the Linux community as a whole. However, much of the material in this book applies to other mainstream distributions as well. We provide detailed information about each of these example distributions for every topic that we discuss. Comments specific to a particular operating system are marked with the distribution's logo. The Organization of This Book This book is divided into three large chunks: Basic Administration, Networking, and Bunch o' Stuff. Basic Administration presents a broad overview of Linux from a system administrator's perspective. The chapters in this section cover most of the facts and techniques needed to run a stand-alone Linux system. The Networking section describes the protocols used on Linux systems and the techniques used to set up, extend, and maintain networks. High-level network software is also covered here. Among the featured topics are the Domain Name System, the Network File System, routing, sendmail , and network management. Bunch o' Stuff includes a variety of supplemental information. Some chapters discuss optional software packages such as the Linux printing system. Others give advice on topics ranging from hardware maintenance to the politics of running a Linux installation. Each chapter is followed by a set of practice exercises. Items are marked with our estimate of the effort required to complete them, where "effort" is an indicator of both the difficulty of the task and the time required.There are four levels: no stars-- Easy, should be straightforward one star-- Harder or longer, may require lab work two stars-- Hardest or longest, requires lab work and digging three stars-- Semester-long projects (only in a few chapters) Some of the exercises require root or sudo access to the system; others require the permission of the local sysadmin group. Both requirements are mentioned in the text of the exercise. Our Contributors We're delighted that Adam Boggs, Bryan Buus, and Ned McClain were able to join us once again as contributing authors. With this edition, we also welcome Ben Whaley, Tobi Oetiker, Fritz Zaucker, Jeffrey S. Haemer, David Schweikert, and Scott Seidel as contributors and friends. Their deep knowledge of a variety of areas has greatly enriched the content of this book. Above all, we thank and acknowledge Lynda McGinley, who in addition to taking ownership of a substantial amount of text also worked tirelessly to organize and facilitate our contributors' work. Contact Information Please send suggestions, comments, and bug reports to linux@book.admin.com . We answer most mail, but please be patient; it is sometimes a few days before one of us is able to respond. Because of the volume of email that this alias receives, we regret that we are unable to answer technical questions. To get a copy of our current bug list and other late-breaking information, visit our web site, www.admin.com . We hope you enjoy this book, and we wish you the best of luck with your adventures in system administration! Evi Nemeth Garth Snyder Trent R. Hein October 2006 Note 1. At least on servers. Today's battleground is the desktop, a domain over which Microsoft Windows still maintains a near-lock. The outcome of that struggle remains difficult to predict. As of this writing, Windows still provides a more polished user interface. But it's hard to argue with "free." Excerpted from Linux Administration Handbook by Evi Nemeth, Garth Snyder, Trent R. Hein All rights reserved by the original copyright owners. Excerpts are provided for display purposes only and may not be reproduced, reprinted or distributed without the written permission of the publisher.

Author notes provided by Syndetics

Evi Nemeth is retired from the computer science faculty at the University of Colorado and is a senior staff member in network research at CAIDA, the Cooperative Association for Internet Data Analysis at the San Diego Supercomputer Center.

Garth Snyder has worked at NeXT and Sun and holds a degree in electrical engineering from Swarthmore College. He recently received an M.D./M.B.A. from the University of Rochester.

Trent R. Hein is the cofounder of Applied Trust Engineering, a company that provides network infrastructure security and performance consulting services. Trent holds a B.S. in computer science from the University of Colorado.

Powered by Koha