logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Essential System Administration 3rd Edition by Aeleen Frisch ISBN 817366529X 9788173665295

  • SKU: BELL-216837778
Essential System Administration 3rd Edition by Aeleen Frisch ISBN 817366529X 9788173665295
$ 31.00 $ 45.00 (-31%)

5.0

100 reviews

Essential System Administration 3rd Edition by Aeleen Frisch ISBN 817366529X 9788173665295 instant download after payment.

Publisher: O’Reilly Media
File Extension: MOBI
File size: 16.02 MB
Author: Æleen Frisch
Language: English
Year: 2009

Product desciption

Essential System Administration 3rd Edition by Aeleen Frisch ISBN 817366529X 9788173665295 by Æleen Frisch instant download after payment.

Essential System Administration 3rd Edition by Aeleen Frisch - Ebook PDF Instant Download/Delivery: 817366529X, 9788173665295
Full download Essential System Administration 3rd Edition after payment

Product details:

ISBN 10: 817366529X 
ISBN 13: 9788173665295
Author: Aeleen Frisch

Essential System Administration,3rd Edition is the definitive guide for Unix system administration, covering all the fundamental and essential tasks required to run such divergent Unix systems as AIX, FreeBSD, HP-UX, Linux, Solaris, Tru64 and more. Essential System Administration provides a clear, concise, practical guide to the real-world issues that anyone responsible for a Unix system faces daily.The new edition of this indispensable reference has been fully updated for all the latest operating systems. Even more importantly, it has been extensively revised and expanded to consider the current system administrative topics that administrators need most. Essential System Administration,3rd Edition covers: DHCP, USB devices, the latest automation tools, SNMP and network management, LDAP, PAM, and recent security tools and techniques.Essential System Administration is comprehensive. But what has made this book the guide system administrators turn to over and over again is not just the sheer volume of valuable information it provides, but the clear, useful way the information is presented. It discusses the underlying higher-level concepts, but it also provides the details of the procedures needed to carry them out. It is not organized around the features of the Unix operating system, but around the various facets of a system administrator's job. It describes all the usual administrative tools that Unix provides, but it also shows how to use them intelligently and efficiently.Whether you use a standalone Unix system, routinely provide administrative support for a larger shared system, or just want an understanding of basic administrative functions, Essential System Administration is for you. This comprehensive and invaluable book combines the author's years of practical experience with technical expertise to help you manage Unix systems as productively and painlessly as possible.

Essential System Administration 3rd Table of contents:

  1. The Unix Universe
  2. Unix Versions Discussed in This Book
  3. Audience
  4. Organization
  5. Chapter Descriptions
  6. Conventions Used in This Book
  7. Comments and Questions
  8. Acknowledgments
  9. Introduction to System Administration
  10. Thinking About System Administration
  11. Becoming Superuser
  12. Controlling Access to the Superuser Account
  13. Running a Single Command as root
  14. sudo: Selective Access to Superuser Commands
  15. Communicating with Users
  16. Sending a Message
  17. Sending a Message to All Users
  18. The Message of the Day
  19. Specifying the Pre-Login Message
  20. About Menus and GUIs
  21. Ups and Downs
  22. AIX: SMIT and WSM
  23. HP-UX: SAM
  24. Solaris: admintool and Sun Management Console
  25. Linux: Linuxconf
  26. Red Hat Linux: redhat-config-*
  27. SuSE Linux: YaST2
  28. FreeBSD: sysinstall
  29. Tru64: SysMan
  30. Other Freely Available Administration Tools
  31. The Ximian Setup Tools
  32. VNC
  33. Where Does the Time Go?
  34. The Unix Way
  35. Files
  36. File Ownership
  37. Displaying file ownership
  38. Who owns new files?
  39. Changing file ownership
  40. File Protection
  41. Types of file and directory access
  42. Access classes
  43. Setting file protection
  44. Beyond the basics
  45. Specifying numeric file modes
  46. Specifying the default file mode
  47. Special-purpose access modes
  48. Save-text access on directories
  49. Setgid access on directories
  50. Numerical equivalents for special access modes
  51. How to Recognize a File Access Problem
  52. Mapping Files to Disks
  53. Regular files
  54. Directories
  55. Special files: character and block device files
  56. Links
  57. Sockets
  58. Named pipes
  59. Using ls to identify file types
  60. Processes
  61. Interactive Processes
  62. Batch Processes
  63. Daemons
  64. Process Attributes
  65. The life cycle of a process
  66. Setuid and setgid file access and process execution
  67. The relationship between commands and files
  68. Devices
  69. An In-Depth Device Example: Disks
  70. Fixed-disk special files
  71. Special Files for Other Devices
  72. Commands for listing the devices on a system
  73. The AIX Object Data Manager
  74. The Unix Filesystem Layout
  75. The Root Directory
  76. The /usr Directory
  77. The /var Directory
  78. Essential Administrative Tools and Techniques
  79. Getting the Most from Common Commands
  80. Getting Help
  81. Changing the search order
  82. Setting up man –k
  83. Piping into grep and awk
  84. Finding Files
  85. Repeating Commands
  86. Creating Several Directory Levels at Once
  87. Duplicating an Entire Directory Tree
  88. Comparing Directories
  89. Deleting Pesky Files
  90. Putting a Command in a Cage
  91. Starting at the End
  92. Be Creative
  93. Essential Administrative Techniques
  94. Periodic Program Execution: The cron Facility
  95. crontab files
  96. Adding crontab entries
  97. cron log files
  98. Using cron to automate system administration
  99. cron security issues
  100. System Messages
  101. The syslog facility
  102. Configuring syslog
  103. Enhancements to syslog.conf
  104. The logger utility
  105. Hardware Error Messages
  106. The AIX error log
  107. Administering Log Files
  108. Managing log file disk requirements
  109. Monitoring log file contents
  110. Managing Software Packages
  111. HP-UX: Bundles, products, and subproducts
  112. AIX: Apply versus commit
  113. FreeBSD ports
  114. Building Software Packages from Source Code
  115. mtools: Using configure and accepting imperfections
  116. bzip2: Converting Linux-based make procedures
  117. jove: Configuration via make file settings
  118. Internet software archives
  119. Startup and Shutdown
  120. About the Unix Boot Process
  121. From Power On to Loading the Kernel
  122. Booting to Multiuser Mode
  123. Booting to Single-User Mode
  124. Password protection for single-user mode
  125. Firmware passwords
  126. Starting a Manual Boot
  127. AIX
  128. FreeBSD
  129. HP-UX
  130. Linux
  131. Tru64
  132. Solaris
  133. Booting from alternate media
  134. Boot Activities in Detail
  135. Boot messages
  136. Saved boot log files
  137. General considerations
  138. Preliminaries
  139. Preparing filesystems
  140. Checking and mounting the root filesystem
  141. Preparing other local filesystems
  142. Saving a crash dump
  143. Starting paging
  144. Security-related activities
  145. Checking disk quotas
  146. Starting servers and initializing local subsystems
  147. Connecting to the network
  148. Housekeeping activities
  149. Allowing users onto the system
  150. Initialization Files and Boot Scripts
  151. Initialization Files Under FreeBSD
  152. Initialization Files on System V Systems
  153. System V run levels
  154. Using the telinit command to change run levels
  155. Initialization files overview
  156. The init configuration file
  157. The rcn initialization scripts
  158. Boot script configuration files
  159. File location summary
  160. Solaris initialization scripts
  161. Tru64 initialization scripts
  162. Linux initialization scripts
  163. AIX: Making System V work like BSD
  164. Customizing the Boot Process
  165. Adding to the boot scripts
  166. Eliminating certain boot-time activities
  167. Modifying standard scripts
  168. Guidelines for writing initialization scripts
  169. Shutting Down a Unix System
  170. The System V shutdown Command
  171. HP-UX shutdown security
  172. The BSD-Style shutdown Command
  173. The Linux shutdown Command
  174. Ensuring Disk Accuracy with the sync Command
  175. Aborting a Shutdown
  176. Troubleshooting: Handling Crashes and Boot Failures
  177. Power-Failure Scripts
  178. When the System Won’t Boot
  179. Bad or flaky hardware
  180. Unreadable filesystems on working disks
  181. Damage to non-filesystem areas of a disk
  182. Incompatible hardware
  183. System configuration errors
  184. TCP/IP Networking
  185. Understanding TCP/IP Networking
  186. Media and Topologies
  187. Identifying network adapters
  188. Protocols and Layers
  189. Ports, Services, and Daemons
  190. Administrative Commands
  191. A Sample TCP/IP Conversation
  192. Names and Addresses
  193. Subnets and Supernets
  194. Introducing IPv6 host addresses
  195. Connecting Network Segments
  196. Adding a New Network Host
  197. Configuring the Network Interface with ifconfig
  198. Ethernet interface names
  199. Other uses of ifconfig
  200. ifconfig on Solaris systems
  201. Interface configuration at boot time
  202. Dynamic IP Address Assignment with DHCP
  203. AIX
  204. FreeBSD
  205. HP-UX
  206. Linux
  207. Solaris
  208. Tru64
  209. Name Resolution Options
  210. The /etc/hosts file
  211. Configuring a DNS client
  212. The name service switch file
  213. Routing Options
  214. AIX
  215. FreeBSD
  216. HP-UX
  217. Linux
  218. Solaris
  219. Tru64
  220. Network Testing and Troubleshooting
  221. Managing Users and Groups
  222. Unix Users and Groups
  223. The Password File, /etc/passwd
  224. The Shadow Password File, /etc/shadow
  225. The FreeBSD /etc/ master.passwd file
  226. The protected password database under HP-UX and Tru64
  227. The Group File, /etc/group
  228. User-private groups
  229. Dynamic Group Memberships
  230. The Linux group shadow file, /etc/gshadow
  231. The HP-UX /etc/logingroup file
  232. AIX group sets
  233. User Account Database File Protections
  234. Standard Unix Users and Groups
  235. Using Groups Effectively
  236. Managing User Accounts
  237. Adding a New User Account
  238. Defining a New User Account
  239. Assigning a Shell
  240. Captive accounts
  241. Assigning a Password
  242. Creating a Home Directory
  243. User Environment Initialization Files
  244. Sample login initialization files
  245. Sample shell initialization files
  246. The AIX /etc/security/environ file
  247. Desktop environment initialization files
  248. Systemwide initialization files
  249. Setting File Ownership
  250. Adding the User to Other System Facilities
  251. Specifying Other User Account Controls
  252. AIX user account controls
  253. FreeBSD user account controls
  254. Linux user account controls
  255. Solaris login process settings
  256. Specifying login time restrictions under HP-UX and Tru64
  257. Testing the New Account
  258. Using su to re-create a user’s environment
  259. Disabling and Removing User Accounts
  260. Removing a user account
  261. Administrative Tools for Managing User Accounts
  262. Command-Line Utilities
  263. The useradd command: HP-UX, Linux, Solaris, and Tru64
  264. Commands for managing groups
  265. The Linux gpasswd command
  266. The FreeBSD user account utilities
  267. The AIX user account utilities
  268. Graphical User Account Managers
  269. Managing users with SMIT under AIX
  270. Managing users with SAM under HP-UX
  271. Linux graphical user managers
  272. Solaris GUI tools for managing user accounts
  273. Managing user accounts with dxaccounts under Tru64
  274. Automation You Have to Do Yourself
  275. Administering User Passwords
  276. Selecting Effective Passwords
  277. Forcing a password change
  278. Managing dozens of passwords
  279. Educating Users About Selecting Effective Passwords
  280. Password advice in the age of the Internet
  281. Setting Password Restrictions
  282. Password aging
  283. Password triviality checks
  284. The freely available npasswd command
  285. Password history lists
  286. Password settings default values
  287. Testing User Passwords for Weaknesses
  288. John the Ripper
  289. Using Crack to find poorly chosen passwords
  290. How well do they do?
  291. User Authentication with PAM
  292. PAM Defaults
  293. PAM Modules Under Linux
  294. Checking passwords at selection time
  295. Specifying allowed times and locations for system access
  296. MD5 passwords
  297. PAM Modules Provided by Other Unix Systems
  298. More Complex PAM Configuration
  299. LDAP: Using a Directory Service for User Authentication
  300. About LDAP
  301. LDAP Directories
  302. About schemas
  303. Installing and Configuring OpenLDAP: An Overview
  304. More about LDAP searching
  305. Using OpenLDAP for User Authentication
  306. Select an appropriate schema
  307. Convert existing user account data
  308. Specify the name service search order
  309. Configure directory access control
  310. OpenLDAP access control
  311. Securing OpenLDAP Authentication
  312. Wither NIS?
  313. Security
  314. Prelude: What’s Wrong with This Picture?
  315. Thinking About Security
  316. Security Policies and Plans
  317. Security policies
  318. Security plans
  319. Unix Lines of Defense
  320. Physical security
  321. Firewalls and network filters
  322. Passwords
  323. Encrypting data
  324. Backups
  325. Version-Specific Security Facilities
  326. User Authentication Revisited
  327. Smart Cards
  328. One-Time Passwords
  329. Solaris and HP-UX Dialup Passwords
  330. AIX Secondary Authentication Programs
  331. Better Network Authentication: Kerberos
  332. Protecting Files and the Filesystem
  333. Search Path Issues
  334. Small Mistakes Compound into Large Holes
  335. The setuid and setgid Access Modes
  336. Writing setuid/setgid programs
  337. Access Control Lists
  338. Introducing access control lists
  339. Manipulating AIX ACLs
  340. HP-UX ACLs
  341. POSIX access control lists: Linux, Solaris, and Tru64
  342. Encryption
  343. The crypt command
  344. Public key encryption: PGP and GnuPG
  345. Selecting passphrases
  346. Role-Based Access Control
  347. AIX Roles
  348. Solaris Role-Based Access Control
  349. Network Security
  350. Establishing Trust
  351. The implications of trust
  352. The Secure Shell
  353. Securing Network Daemons
  354. TCP Wrappers: Better inetd access control and logging
  355. xinetd
  356. Disable what you don’t need
  357. Port Scanning
  358. Defending the Border: Firewalls and Packet Filtering
  359. Hardening Unix Systems
  360. Plan Before Acting
  361. Secure the Physical System
  362. Install the Operating System
  363. Secure Local Filesystems
  364. Securing Services
  365. Restrict root Access
  366. Configure User Authentication and Account Defaults
  367. Set up Remote Authentication
  368. Install and Configure Ongoing Monitoring
  369. Backup
  370. Other Activities
  371. Detecting Problems
  372. Password File Issues
  373. Monitoring the Filesystem
  374. Checking file ownership and protection
  375. Looking for setuid and setgid files
  376. Checking modification dates and inode numbers
  377. Computing checksums
  378. Run fsck occasionally
  379. Automating Security Monitoring
  380. Trusted computing base checking
  381. System integrity checking with Tripwire
  382. Vulnerability scanning
  383. Scanning for network vulnerabilities
  384. What to Do if You Find a Problem
  385. Investigating System Activity
  386. Monitoring unsuccessful login attempts
  387. su log files
  388. History on the root account
  389. Tracking user activities
  390. Event-auditing systems
  391. Intruders Can Read
  392. Managing Network Services
  393. Managing DNS Servers
  394. Zones
  395. Name Server Types
  396. About BIND
  397. Configuring named
  398. The master configuration file: named.conf
  399. The root hints file
  400. Zone files
  401. Common mistakes to avoid
  402. Using subdomains
  403. Forwarders
  404. Slave name server notifications
  405. Dynamic updates
  406. Incremental zone transfers
  407. Access control
  408. Securing DNS communications
  409. BIND 9 views
  410. Securing the named process
  411. Configuring logging
  412. Name Server Maintenance and Troubleshooting
  413. Controlling the named server process
  414. Using the nslookup and dig utilities
  415. Routing Daemons
  416. Routing Concepts and Protocols
  417. Configuring routed
  418. Configuring gated
  419. Configuring a DHCP Server
  420. AIX
  421. ISC DHCP: FreeBSD and Linux
  422. HP-UX
  423. Solaris
  424. Tru64
  425. Time Synchronization with NTP
  426. How NTP Works
  427. Setting Up NTP
  428. Enabling ntpd under FreeBSD
  429. A Simple Authentic Time Option
  430. Managing Network Daemons under AIX
  431. Monitoring the Network
  432. Standard Networking Utilities
  433. Packet Sniffers
  434. The Solaris snoop command
  435. Packet collecting under AIX and HP-UX
  436. The Simple Network Management Protocol
  437. SNMP concepts and constructs
  438. SNMP implementations
  439. Net-SNMP client utilities
  440. Configuring SNMP agents
  441. SNMP and security
  442. Network Management Packages
  443. Proactive network monitoring
  444. Identifying trends over time
  445. Electronic Mail
  446. About Electronic Mail
  447. Mail Addressing and Delivery
  448. DNS MX records
  449. Mail aliases
  450. Mail forwarding
  451. Putting it all together
  452. Electronic Mail Policies
  453. Configuring User Mail Programs
  454. Automated Email Message Encryption
  455. Configuring Access Agents
  456. Setting Up User Agents to Use POP and IMAP
  457. Configuring the Transport Agent
  458. sendmail
  459. Configuring sendmail
  460. Getting started: A sample mail client configuration
  461. Building sendmail.cf
  462. Configuring the mail hub
  463. Selecting mailers
  464. Some client and mail hub variations
  465. More addressing options
  466. Virtual hosting
  467. The services switch file
  468. Spam suppression
  469. Public blacklists and the access database
  470. sendmail security
  471. Monitoring ongoing operation
  472. Performance
  473. Debugging techniques
  474. Macro summary
  475. Postfix
  476. Installing Postfix
  477. Configuring Postfix
  478. Access control and spam suppression
  479. Postfix security
  480. Monitoring and performance
  481. Debugging
  482. Retrieving Mail Messages
  483. Mail Filtering with procmail
  484. Configuring procmail
  485. Other procmail disposition options
  486. Using procmail to discard spam
  487. Using procmail for security scanning
  488. Debugging procmail
  489. Additional information
  490. A Few Final Tools
  491. Filesystems and Disks
  492. Filesystem Types
  493. About Unix Filesystems: Moments from History
  494. Journaled filesystems
  495. BSD soft updates
  496. Default Local Filesystems
  497. Managing Filesystems
  498. Mounting and Dismounting Filesystems
  499. Disk Special File Naming Conventions
  500. The mount and umount Commands
  501. Figuring Out Who’s Using a File
  502. The Filesystem Configuration File
  503. Solaris: /etc/vfstab
  504. AIX: /etc/filesystems and /etc/swapspaces
  505. Automatic Filesystem Mounting
  506. Using fsck to Validate a Filesystem
  507. After fsck
  508. From Disks to Filesystems
  509. Defining Disk Partitions
  510. Adding Disks
  511. Preparing and connecting the disk
  512. Making special files
  513. FreeBSD
  514. Linux
  515. Solaris
  516. AIX, HP-UX, and Tru64
  517. Remaking an existing filesystem
  518. Logical Volume Managers
  519. Disks, volume groups, and logical volumes
  520. Disk striping
  521. Disk mirroring and RAID
  522. AIX
  523. HP-UX
  524. Tru64
  525. Solaris
  526. Linux
  527. FreeBSD
  528. Floppy Disks
  529. Floppy disk special files
  530. Using DOS disks on Unix systems
  531. The Mtools utilities
  532. Stupid DOS partition tricks
  533. CD-ROM Devices
  534. CD-ROM drives under AIX
  535. The Solaris media-handling daemon
  536. Sharing Filesystems
  537. NFS
  538. Mounting remote directories
  539. Exporting local filesystems
  540. The NFS Automounter
  541. Samba
  542. Samba authentication
  543. Backup and Restor

People also search for Essential System Administration 3rd:

z-system
 
internal system administrator
 
j&s essential transportation
 
kbs essential services
 
l administration
 
mission essential system

 

 

Tags: Aeleen Frisch, System, Administration

Related Products