UNIX System Administration Handbook 3rd Edition by Evi Nemeth, Garth Snyder, Scott Seebass, Trent R. Hein – Ebook PDF Instant Download/Delivery:0130206016 , 978-0130206015
Full download UNIX System Administration Handbook 3rd Edition after payment
Product details:
ISBN 10: 0130206016
ISBN 13: 978-0130206015
Author: Evi Nemeth, Garth Snyder, Scott Seebass, Trent R. Hein
Now covers Red Hat Linux!
Written by Evi Nemeth, Garth Snyder, Scott Seebass, and Trent R. Hein with Adam Boggs, Rob Braun, Ned McClain, Dan Crawl, Lynda McGinley, and Todd Miller
“This is not a nice, neat book for a nice, clean world. It’s a nasty book for a nasty world. This is a book for the rest of us.”
Eric Allman and Marshall Kirk McKusick“I am pleased to welcome Linux to the UNIX System Administration Handbook!”
Linus Torvalds, Transmeta“This book is most welcome!”
Dennis Ritchie, AT&T Bell Laboratories
This new edition of the world’s most comprehensive guide to UNIX system administration is an ideal tutorial for those new to administration and an invaluable reference for experienced professionals. The third edition has been expanded to include “direct from the frontlines” coverage of Red Hat Linux. UNIX System Administration Handbook describes every aspect of system administrationfrom basic topics to UNIX esotericaand provides explicit coverage of four popular UNIX systems:
This book stresses a practical approach to system administration. It’s packed with war stories and pragmatic advice, not just theory and watered-down restatements of the manuals. Difficult subjects such as sendmail, kernel building, and DNS configuration are tackled head-on. Examples are provided for all four versions of UNIX and are drawn from real-life systemswarts and all.
“This book is where I turn first when I have system administration questions. It is truly a wonderful resource and always within reach of my terminal.”
W. Richard Stevens, author of numerous books on UNIX and TCP/IP“This is a comprehensive guide to the care and feeding of UNIX systems. The authors present the facts along with seasoned advice and numerous real-world examples. Their perspective on the variations among systems is valuable for anyone who runs a heterogeneous computing facility.”
Pat Parseghian, Transmeta“We noticed your book on the staff recommendations shelf at our local bookstore: ‘Very clear, a masterful interpretation of the subject.’ We were most impressed, until we noticed that the same staff member had also recommended Aunt Bea’s Mayberry Cookbook.”
Shannon Bloomstran, history teacher
UNIX System Administration Handbook 3rd Table of contents:
CHAPTER 1: WHERE TO START
- The sordid history of UNIX
- Example UNIX systems
- Notation and typographical conventions
- How to use your manuals
- Essential tasks of the system administrator
- How to find files on the Internet
- System administration under duress
- Recommended reading
- Bootstrapping
- Booting PCs
- Booting in single-user mode
- Startup scripts
- Rebooting and shutting down
- Ownership of files and processes
- Choosing a root password
- Becoming root
- Other pseudo-users
- Components of a process
- The life cycle of a process
- Signals
- Process states
- nice and renice: influence scheduling priority
- ps: monitor processes
- Runaway processes
CHAPTER 5: THE FILESYSTEM
- Pathnames
- Mounting and unmounting filesystems
- The organization of the file tree
- File types
- File attributes
- The /etc/passwd file
- The FreeBSD /etc/master.passwd file
- The Solaris and Red Hat /etc/shadow file
- The /etc/group file
- Adding users
- Disabling logins
- Vendor-supplied account management utilities
CHAPTER 10: BACKUPS
- Motherhood and apple pie
- Backup devices and media
- Setting up an incremental backup regime
- Restoring from dumps
- Using other archiving programs
- Using multiple files on a single tape
- Amanda
- Commercial backup products
- Recommended reading
CHAPTER 12: DRIVERS AND THE KERNEL
- Kernel types
- Configuring a Solaris kernel
- Building an HP-UX kernel
- Configuring a Linux kernel
- Building a FreeBSD kernel
- Creating a BSD configuration file
- Adding device drivers
- Naming conventions for devices
- Loadable kernel modules
- Recommended reading
CHAPTER 13: TCP/IP NETWORKING
- TCP/IP and the Internet
- Networking road map
- Packets and encapsulation
- IP addresses: the gory details
- Routing
- ARP: The address resolution protocol
- DHCP: the Dynamic Host Configuration Protocol
- PPP: the Point-to-Point Protocol
- Security issues
- Addition of machines to a network
- Vendor-specific network configuration
CHAPTER 14: ROUTING
- Packet forwarding: a closer look
- Routing daemons and routing protocols
- Protocols on parade
- routed: RIP yourself a new hole
- gated: a better routing daemon
- Routing strategy selection criteria
- Cisco routers
- Recommended reading
CHAPTER 19: ELECTRONIC MAIL
- Mail systems
- The anatomy of a mail message
- Mail philosophy
- Mail aliases
- sendmail: ringmaster of the electronic mail circus
- sendmail configuration
- Basic sendmail configuration primitives
- Fancier sendmail configuration primitives
- Configuration file examples
- Spam-related features in sendmail
- Security and sendmail
- sendmail statistics, testing, and debugging
- The Postfix mail system
- Recommended reading
CHAPTER 20: NETWORK MANAGEMENT AND DEBUGGING
- Troubleshooting a network
- ping: check to see if a host is alive
- traceroute: trace IP packets
- netstat: get tons o’ network statistics
- Packet sniffers
- Network management protocols
- SNMP: the Simple Network Management Protocol
- SNMP agents
- Network management applications
- Recommended reading
CHAPTER 21: SECURITY
- Seven common-sense rules of security
- How security is compromised
- Security problems in the /etc/passwd file
- Setuid programs
- Important file permissions
- Miscellaneous security issues
- Security power tools
- Cryptographic security tools
- Firewalls
- Sources of security information
- What to do when your site has been attacked
- Recommended reading
CHAPTER 23: PRINTING
- Mini-glossary of printing terms
- Types of printers
- BSD printing
- System V printing
- Adding a printer
- LPRng
- Debugging printing problems
- Common printing software
- Printer philosophy
- Maintenance basics
- Maintenance contracts
CHAPTER 25: PERFORMANCE ANALYSIS
- What you can do to improve performance
- Factors that affect performance
- System performance checkup
- Help! My system just got really slow!
- Recommended reading
CHAPTER 27: POLICY AND POLITICS
- Policy and procedure
- Legal issues
- Sysadmin surveys
- Scope of service
- Trouble-reporting systems
- Hiring, firing, and training
- War stories and ethics
- Localization and upgrades
- Local documentation
- Procurement
- Decommissioning hardware
- Software patents
- Organizations, conferences, and other resources
- Standards
- Sample documents
- Recommended reading
CHAPTER 28: DAEMONS
- init: the primordial process
- inetd: manage daemons
- System daemons
- NFS daemons
- NIS daemons
- Internet daemons
- Time synchronization daemons
- Booting and configuration daemons
People also search for UNIX System Administration Handbook 3rd :
linux and unix system administration handbook
automating linux and unix system administration pdf
automating linux and unix system administration
unix system administrator interview questions and answers
evi nemeth unix & linux system administration handbook
Tags:
Evi Nemeth,Garth Snyder,Scott Seebass,Trent Hein,UNIX,System,Administration,Handbook 3rd