Essential System Administration 3rd Edition by Aeleen Frisch ISBN 817366529X 9788173665295 by Æleen Frisch instant download after payment.
Essential System Administration 3rd Edition by Aeleen Frisch - Ebook PDF Instant Download/Delivery: 817366529X, 9788173665295
Full download Essential System Administration 3rd Edition after payment

Product details:
ISBN 10: 817366529X
ISBN 13: 9788173665295
Author: Aeleen Frisch
Essential System Administration,3rd Edition is the definitive guide for Unix system administration, covering all the fundamental and essential tasks required to run such divergent Unix systems as AIX, FreeBSD, HP-UX, Linux, Solaris, Tru64 and more. Essential System Administration provides a clear, concise, practical guide to the real-world issues that anyone responsible for a Unix system faces daily.The new edition of this indispensable reference has been fully updated for all the latest operating systems. Even more importantly, it has been extensively revised and expanded to consider the current system administrative topics that administrators need most. Essential System Administration,3rd Edition covers: DHCP, USB devices, the latest automation tools, SNMP and network management, LDAP, PAM, and recent security tools and techniques.Essential System Administration is comprehensive. But what has made this book the guide system administrators turn to over and over again is not just the sheer volume of valuable information it provides, but the clear, useful way the information is presented. It discusses the underlying higher-level concepts, but it also provides the details of the procedures needed to carry them out. It is not organized around the features of the Unix operating system, but around the various facets of a system administrator's job. It describes all the usual administrative tools that Unix provides, but it also shows how to use them intelligently and efficiently.Whether you use a standalone Unix system, routinely provide administrative support for a larger shared system, or just want an understanding of basic administrative functions, Essential System Administration is for you. This comprehensive and invaluable book combines the author's years of practical experience with technical expertise to help you manage Unix systems as productively and painlessly as possible.
Essential System Administration 3rd Table of contents:
- The Unix Universe
- Unix Versions Discussed in This Book
- Audience
- Organization
- Chapter Descriptions
- Conventions Used in This Book
- Comments and Questions
- Acknowledgments
- Introduction to System Administration
- Thinking About System Administration
- Becoming Superuser
- Controlling Access to the Superuser Account
- Running a Single Command as root
- sudo: Selective Access to Superuser Commands
- Communicating with Users
- Sending a Message
- Sending a Message to All Users
- The Message of the Day
- Specifying the Pre-Login Message
- About Menus and GUIs
- Ups and Downs
- AIX: SMIT and WSM
- HP-UX: SAM
- Solaris: admintool and Sun Management Console
- Linux: Linuxconf
- Red Hat Linux: redhat-config-*
- SuSE Linux: YaST2
- FreeBSD: sysinstall
- Tru64: SysMan
- Other Freely Available Administration Tools
- The Ximian Setup Tools
- VNC
- Where Does the Time Go?
- The Unix Way
- Files
- File Ownership
- Displaying file ownership
- Who owns new files?
- Changing file ownership
- File Protection
- Types of file and directory access
- Access classes
- Setting file protection
- Beyond the basics
- Specifying numeric file modes
- Specifying the default file mode
- Special-purpose access modes
- Save-text access on directories
- Setgid access on directories
- Numerical equivalents for special access modes
- How to Recognize a File Access Problem
- Mapping Files to Disks
- Regular files
- Directories
- Special files: character and block device files
- Links
- Sockets
- Named pipes
- Using ls to identify file types
- Processes
- Interactive Processes
- Batch Processes
- Daemons
- Process Attributes
- The life cycle of a process
- Setuid and setgid file access and process execution
- The relationship between commands and files
- Devices
- An In-Depth Device Example: Disks
- Fixed-disk special files
- Special Files for Other Devices
- Commands for listing the devices on a system
- The AIX Object Data Manager
- The Unix Filesystem Layout
- The Root Directory
- The /usr Directory
- The /var Directory
- Essential Administrative Tools and Techniques
- Getting the Most from Common Commands
- Getting Help
- Changing the search order
- Setting up man –k
- Piping into grep and awk
- Finding Files
- Repeating Commands
- Creating Several Directory Levels at Once
- Duplicating an Entire Directory Tree
- Comparing Directories
- Deleting Pesky Files
- Putting a Command in a Cage
- Starting at the End
- Be Creative
- Essential Administrative Techniques
- Periodic Program Execution: The cron Facility
- crontab files
- Adding crontab entries
- cron log files
- Using cron to automate system administration
- cron security issues
- System Messages
- The syslog facility
- Configuring syslog
- Enhancements to syslog.conf
- The logger utility
- Hardware Error Messages
- The AIX error log
- Administering Log Files
- Managing log file disk requirements
- Monitoring log file contents
- Managing Software Packages
- HP-UX: Bundles, products, and subproducts
- AIX: Apply versus commit
- FreeBSD ports
- Building Software Packages from Source Code
- mtools: Using configure and accepting imperfections
- bzip2: Converting Linux-based make procedures
- jove: Configuration via make file settings
- Internet software archives
- Startup and Shutdown
- About the Unix Boot Process
- From Power On to Loading the Kernel
- Booting to Multiuser Mode
- Booting to Single-User Mode
- Password protection for single-user mode
- Firmware passwords
- Starting a Manual Boot
- AIX
- FreeBSD
- HP-UX
- Linux
- Tru64
- Solaris
- Booting from alternate media
- Boot Activities in Detail
- Boot messages
- Saved boot log files
- General considerations
- Preliminaries
- Preparing filesystems
- Checking and mounting the root filesystem
- Preparing other local filesystems
- Saving a crash dump
- Starting paging
- Security-related activities
- Checking disk quotas
- Starting servers and initializing local subsystems
- Connecting to the network
- Housekeeping activities
- Allowing users onto the system
- Initialization Files and Boot Scripts
- Initialization Files Under FreeBSD
- Initialization Files on System V Systems
- System V run levels
- Using the telinit command to change run levels
- Initialization files overview
- The init configuration file
- The rcn initialization scripts
- Boot script configuration files
- File location summary
- Solaris initialization scripts
- Tru64 initialization scripts
- Linux initialization scripts
- AIX: Making System V work like BSD
- Customizing the Boot Process
- Adding to the boot scripts
- Eliminating certain boot-time activities
- Modifying standard scripts
- Guidelines for writing initialization scripts
- Shutting Down a Unix System
- The System V shutdown Command
- HP-UX shutdown security
- The BSD-Style shutdown Command
- The Linux shutdown Command
- Ensuring Disk Accuracy with the sync Command
- Aborting a Shutdown
- Troubleshooting: Handling Crashes and Boot Failures
- Power-Failure Scripts
- When the System Won’t Boot
- Bad or flaky hardware
- Unreadable filesystems on working disks
- Damage to non-filesystem areas of a disk
- Incompatible hardware
- System configuration errors
- TCP/IP Networking
- Understanding TCP/IP Networking
- Media and Topologies
- Identifying network adapters
- Protocols and Layers
- Ports, Services, and Daemons
- Administrative Commands
- A Sample TCP/IP Conversation
- Names and Addresses
- Subnets and Supernets
- Introducing IPv6 host addresses
- Connecting Network Segments
- Adding a New Network Host
- Configuring the Network Interface with ifconfig
- Ethernet interface names
- Other uses of ifconfig
- ifconfig on Solaris systems
- Interface configuration at boot time
- Dynamic IP Address Assignment with DHCP
- AIX
- FreeBSD
- HP-UX
- Linux
- Solaris
- Tru64
- Name Resolution Options
- The /etc/hosts file
- Configuring a DNS client
- The name service switch file
- Routing Options
- AIX
- FreeBSD
- HP-UX
- Linux
- Solaris
- Tru64
- Network Testing and Troubleshooting
- Managing Users and Groups
- Unix Users and Groups
- The Password File, /etc/passwd
- The Shadow Password File, /etc/shadow
- The FreeBSD /etc/ master.passwd file
- The protected password database under HP-UX and Tru64
- The Group File, /etc/group
- User-private groups
- Dynamic Group Memberships
- The Linux group shadow file, /etc/gshadow
- The HP-UX /etc/logingroup file
- AIX group sets
- User Account Database File Protections
- Standard Unix Users and Groups
- Using Groups Effectively
- Managing User Accounts
- Adding a New User Account
- Defining a New User Account
- Assigning a Shell
- Captive accounts
- Assigning a Password
- Creating a Home Directory
- User Environment Initialization Files
- Sample login initialization files
- Sample shell initialization files
- The AIX /etc/security/environ file
- Desktop environment initialization files
- Systemwide initialization files
- Setting File Ownership
- Adding the User to Other System Facilities
- Specifying Other User Account Controls
- AIX user account controls
- FreeBSD user account controls
- Linux user account controls
- Solaris login process settings
- Specifying login time restrictions under HP-UX and Tru64
- Testing the New Account
- Using su to re-create a user’s environment
- Disabling and Removing User Accounts
- Removing a user account
- Administrative Tools for Managing User Accounts
- Command-Line Utilities
- The useradd command: HP-UX, Linux, Solaris, and Tru64
- Commands for managing groups
- The Linux gpasswd command
- The FreeBSD user account utilities
- The AIX user account utilities
- Graphical User Account Managers
- Managing users with SMIT under AIX
- Managing users with SAM under HP-UX
- Linux graphical user managers
- Solaris GUI tools for managing user accounts
- Managing user accounts with dxaccounts under Tru64
- Automation You Have to Do Yourself
- Administering User Passwords
- Selecting Effective Passwords
- Forcing a password change
- Managing dozens of passwords
- Educating Users About Selecting Effective Passwords
- Password advice in the age of the Internet
- Setting Password Restrictions
- Password aging
- Password triviality checks
- The freely available npasswd command
- Password history lists
- Password settings default values
- Testing User Passwords for Weaknesses
- John the Ripper
- Using Crack to find poorly chosen passwords
- How well do they do?
- User Authentication with PAM
- PAM Defaults
- PAM Modules Under Linux
- Checking passwords at selection time
- Specifying allowed times and locations for system access
- MD5 passwords
- PAM Modules Provided by Other Unix Systems
- More Complex PAM Configuration
- LDAP: Using a Directory Service for User Authentication
- About LDAP
- LDAP Directories
- About schemas
- Installing and Configuring OpenLDAP: An Overview
- More about LDAP searching
- Using OpenLDAP for User Authentication
- Select an appropriate schema
- Convert existing user account data
- Specify the name service search order
- Configure directory access control
- OpenLDAP access control
- Securing OpenLDAP Authentication
- Wither NIS?
- Security
- Prelude: What’s Wrong with This Picture?
- Thinking About Security
- Security Policies and Plans
- Security policies
- Security plans
- Unix Lines of Defense
- Physical security
- Firewalls and network filters
- Passwords
- Encrypting data
- Backups
- Version-Specific Security Facilities
- User Authentication Revisited
- Smart Cards
- One-Time Passwords
- Solaris and HP-UX Dialup Passwords
- AIX Secondary Authentication Programs
- Better Network Authentication: Kerberos
- Protecting Files and the Filesystem
- Search Path Issues
- Small Mistakes Compound into Large Holes
- The setuid and setgid Access Modes
- Writing setuid/setgid programs
- Access Control Lists
- Introducing access control lists
- Manipulating AIX ACLs
- HP-UX ACLs
- POSIX access control lists: Linux, Solaris, and Tru64
- Encryption
- The crypt command
- Public key encryption: PGP and GnuPG
- Selecting passphrases
- Role-Based Access Control
- AIX Roles
- Solaris Role-Based Access Control
- Network Security
- Establishing Trust
- The implications of trust
- The Secure Shell
- Securing Network Daemons
- TCP Wrappers: Better inetd access control and logging
- xinetd
- Disable what you don’t need
- Port Scanning
- Defending the Border: Firewalls and Packet Filtering
- Hardening Unix Systems
- Plan Before Acting
- Secure the Physical System
- Install the Operating System
- Secure Local Filesystems
- Securing Services
- Restrict root Access
- Configure User Authentication and Account Defaults
- Set up Remote Authentication
- Install and Configure Ongoing Monitoring
- Backup
- Other Activities
- Detecting Problems
- Password File Issues
- Monitoring the Filesystem
- Checking file ownership and protection
- Looking for setuid and setgid files
- Checking modification dates and inode numbers
- Computing checksums
- Run fsck occasionally
- Automating Security Monitoring
- Trusted computing base checking
- System integrity checking with Tripwire
- Vulnerability scanning
- Scanning for network vulnerabilities
- What to Do if You Find a Problem
- Investigating System Activity
- Monitoring unsuccessful login attempts
- su log files
- History on the root account
- Tracking user activities
- Event-auditing systems
- Intruders Can Read
- Managing Network Services
- Managing DNS Servers
- Zones
- Name Server Types
- About BIND
- Configuring named
- The master configuration file: named.conf
- The root hints file
- Zone files
- Common mistakes to avoid
- Using subdomains
- Forwarders
- Slave name server notifications
- Dynamic updates
- Incremental zone transfers
- Access control
- Securing DNS communications
- BIND 9 views
- Securing the named process
- Configuring logging
- Name Server Maintenance and Troubleshooting
- Controlling the named server process
- Using the nslookup and dig utilities
- Routing Daemons
- Routing Concepts and Protocols
- Configuring routed
- Configuring gated
- Configuring a DHCP Server
- AIX
- ISC DHCP: FreeBSD and Linux
- HP-UX
- Solaris
- Tru64
- Time Synchronization with NTP
- How NTP Works
- Setting Up NTP
- Enabling ntpd under FreeBSD
- A Simple Authentic Time Option
- Managing Network Daemons under AIX
- Monitoring the Network
- Standard Networking Utilities
- Packet Sniffers
- The Solaris snoop command
- Packet collecting under AIX and HP-UX
- The Simple Network Management Protocol
- SNMP concepts and constructs
- SNMP implementations
- Net-SNMP client utilities
- Configuring SNMP agents
- SNMP and security
- Network Management Packages
- Proactive network monitoring
- Identifying trends over time
- Electronic Mail
- About Electronic Mail
- Mail Addressing and Delivery
- DNS MX records
- Mail aliases
- Mail forwarding
- Putting it all together
- Electronic Mail Policies
- Configuring User Mail Programs
- Automated Email Message Encryption
- Configuring Access Agents
- Setting Up User Agents to Use POP and IMAP
- Configuring the Transport Agent
- sendmail
- Configuring sendmail
- Getting started: A sample mail client configuration
- Building sendmail.cf
- Configuring the mail hub
- Selecting mailers
- Some client and mail hub variations
- More addressing options
- Virtual hosting
- The services switch file
- Spam suppression
- Public blacklists and the access database
- sendmail security
- Monitoring ongoing operation
- Performance
- Debugging techniques
- Macro summary
- Postfix
- Installing Postfix
- Configuring Postfix
- Access control and spam suppression
- Postfix security
- Monitoring and performance
- Debugging
- Retrieving Mail Messages
- Mail Filtering with procmail
- Configuring procmail
- Other procmail disposition options
- Using procmail to discard spam
- Using procmail for security scanning
- Debugging procmail
- Additional information
- A Few Final Tools
- Filesystems and Disks
- Filesystem Types
- About Unix Filesystems: Moments from History
- Journaled filesystems
- BSD soft updates
- Default Local Filesystems
- Managing Filesystems
- Mounting and Dismounting Filesystems
- Disk Special File Naming Conventions
- The mount and umount Commands
- Figuring Out Who’s Using a File
- The Filesystem Configuration File
- Solaris: /etc/vfstab
- AIX: /etc/filesystems and /etc/swapspaces
- Automatic Filesystem Mounting
- Using fsck to Validate a Filesystem
- After fsck
- From Disks to Filesystems
- Defining Disk Partitions
- Adding Disks
- Preparing and connecting the disk
- Making special files
- FreeBSD
- Linux
- Solaris
- AIX, HP-UX, and Tru64
- Remaking an existing filesystem
- Logical Volume Managers
- Disks, volume groups, and logical volumes
- Disk striping
- Disk mirroring and RAID
- AIX
- HP-UX
- Tru64
- Solaris
- Linux
- FreeBSD
- Floppy Disks
- Floppy disk special files
- Using DOS disks on Unix systems
- The Mtools utilities
- Stupid DOS partition tricks
- CD-ROM Devices
- CD-ROM drives under AIX
- The Solaris media-handling daemon
- Sharing Filesystems
- NFS
- Mounting remote directories
- Exporting local filesystems
- The NFS Automounter
- Samba
- Samba authentication
- Backup and Restor
People also search for Essential System Administration 3rd:
z-system
internal system administrator
j&s essential transportation
kbs essential services
l administration
mission essential system
Tags: Aeleen Frisch, System, Administration