Book description
Essential System Administration,3rd Edition is the definitive guide for Unix system administration, covering all the fundamental and essential tasks required to run such divergent Unix systems as AIX, FreeBSD, HP-UX, Linux, Solaris, Tru64 and more. Essential System Administration provides a clear, concise, practical guide to the real-world issues that anyone responsible for a Unix system faces daily.The new edition of this indispensable reference has been fully updated for all the latest operating systems. Even more importantly, it has been extensively revised and expanded to consider the current system administrative topics that administrators need most. Essential System Administration,3rd Edition covers: DHCP, USB devices, the latest automation tools, SNMP and network management, LDAP, PAM, and recent security tools and techniques.Essential System Administration is comprehensive. But what has made this book the guide system administrators turn to over and over again is not just the sheer volume of valuable information it provides, but the clear, useful way the information is presented. It discusses the underlying higher-level concepts, but it also provides the details of the procedures needed to carry them out. It is not organized around the features of the Unix operating system, but around the various facets of a system administrator's job. It describes all the usual administrative tools that Unix provides, but it also shows how to use them intelligently and efficiently.Whether you use a standalone Unix system, routinely provide administrative support for a larger shared system, or just want an understanding of basic administrative functions, Essential System Administration is for you. This comprehensive and invaluable book combines the author's years of practical experience with technical expertise to help you manage Unix systems as productively and painlessly as possible.
Publisher resources
Table of contents
- Essential System Administration, 3rd Edition
- Dedication
- Preface
-
1. Introduction to System Administration
- 1.1. Thinking About System Administration
- 1.2. Becoming Superuser
- 1.3. Communicating with Users
-
1.4. About Menus and GUIs
- 1.4.1. Ups and Downs
- 1.4.2. AIX: SMIT and WSM
- 1.4.3. HP-UX: SAM
- 1.4.4. Solaris: admintool and Sun Management Console
- 1.4.5. Linux: Linuxconf
- 1.4.6. Red Hat Linux: redhat-config-*
- 1.4.7. SuSE Linux: YaST2
- 1.4.8. FreeBSD: sysinstall
- 1.4.9. Tru64: SysMan
- 1.4.10. Other Freely Available Administration Tools
- 1.4.11. VNC
- 1.5. Where Does the Time Go?
-
2. The Unix Way
-
2.1. Files
- 2.1.1. File Ownership
-
2.1.2. File Protection
- 2.1.2.1. Types of file and directory access
- 2.1.2.2. Access classes
- 2.1.2.3. Setting file protection
- 2.1.2.4. Beyond the basics
- 2.1.2.5. Specifying numeric file modes
- 2.1.2.6. Specifying the default file mode
- 2.1.2.7. Special-purpose access modes
- 2.1.2.8. Save-text access on directories
- 2.1.2.9. Setgid access on directories
- 2.1.2.10. Numerical equivalents for special access modes
- 2.1.3. How to Recognize a File Access Problem
- 2.1.4. Mapping Files to Disks
- 2.2. Processes
- 2.3. Devices
-
2.1. Files
-
3. Essential AdministrativeTools and Techniques
-
3.1. Getting the Most from Common Commands
- 3.1.1. Getting Help
- 3.1.2. Piping into grep and awk
- 3.1.3. Finding Files
- 3.1.4. Repeating Commands
- 3.1.5. Creating Several Directory Levels at Once
- 3.1.6. Duplicating an Entire Directory Tree
- 3.1.7. Comparing Directories
- 3.1.8. Deleting Pesky Files
- 3.1.9. Putting a Command in a Cage
- 3.1.10. Starting at the End
- 3.1.11. Be Creative
-
3.2. Essential Administrative Techniques
- 3.2.1. Periodic Program Execution: The cron Facility
- 3.2.2. System Messages
- 3.2.3. Hardware Error Messages
- 3.2.4. Administering Log Files
- 3.2.5. Managing Software Packages
- 3.2.6. Building Software Packages from Source Code
-
3.1. Getting the Most from Common Commands
-
4. Startup and Shutdown
-
4.1. About the Unix Boot Process
- 4.1.1. From Power On to Loading the Kernel
- 4.1.2. Booting to Multiuser Mode
- 4.1.3. Booting to Single-User Mode
- 4.1.4. Starting a Manual Boot
-
4.1.5. Boot Activities in Detail
- 4.1.5.1. Boot messages
- 4.1.5.2. Saved boot log files
- 4.1.5.3. General considerations
- 4.1.5.4. Preliminaries
- 4.1.5.5. Preparing filesystems
- 4.1.5.6. Checking and mounting the root filesystem
- 4.1.5.7. Preparing other local filesystems
- 4.1.5.8. Saving a crash dump
- 4.1.5.9. Starting paging
- 4.1.5.10. Security-related activities
- 4.1.5.11. Checking disk quotas
- 4.1.5.12. Starting servers and initializing local subsystems
- 4.1.5.13. Connecting to the network
- 4.1.5.14. Housekeeping activities
- 4.1.5.15. Allowing users onto the system
-
4.2. Initialization Files and Boot Scripts
- 4.2.1. Initialization Files Under FreeBSD
-
4.2.2. Initialization Files on System V Systems
- 4.2.2.1. System V run levels
- 4.2.2.2. Using the telinit command to change run levels
- 4.2.2.3. Initialization files overview
- 4.2.2.4. The init configuration file
- 4.2.2.5. The rcn initialization scripts
- 4.2.2.6. Boot script configuration files
- 4.2.2.7. File location summary
- 4.2.2.8. Solaris initialization scripts
- 4.2.2.9. Tru64 initialization scripts
- 4.2.2.10. Linux initialization scripts
- 4.2.2.11. AIX: Making System V work like BSD
- 4.2.3. Customizing the Boot Process
- 4.3. Shutting Down a Unix System
- 4.4. Troubleshooting: Handling Crashes and Boot Failures
-
4.1. About the Unix Boot Process
-
5. TCP/IP Networking
- 5.1. Understanding TCP/IP Networking
- 5.2. Adding a New Network Host
- 5.3. Network Testing and Troubleshooting
-
6. Managing Users and Groups
- 6.1. Unix Users and Groups
-
6.2. Managing User Accounts
- 6.2.1. Adding a New User Account
- 6.2.2. Defining a New User Account
- 6.2.3. Assigning a Shell
- 6.2.4. Assigning a Password
- 6.2.5. Creating a Home Directory
- 6.2.6. User Environment Initialization Files
- 6.2.7. Setting File Ownership
- 6.2.8. Adding the User to Other System Facilities
- 6.2.9. Specifying Other User Account Controls
- 6.2.10. Testing the New Account
- 6.2.11. Disabling and Removing User Accounts
-
6.3. Administrative Tools for Managing User Accounts
- 6.3.1. Command-Line Utilities
- 6.3.2. Graphical User Account Managers
- 6.3.3. Automation You Have to Do Yourself
- 6.4. Administering User Passwords
- 6.5. User Authentication with PAM
- 6.6. LDAP: Using a Directory Service for User Authentication
-
7. Security
- 7.1. Prelude: What’s Wrong with This Picture?
- 7.2. Thinking About Security
- 7.3. User Authentication Revisited
- 7.4. Protecting Files and the Filesystem
- 7.5. Role-Based Access Control
- 7.6. Network Security
-
7.7. Hardening Unix Systems
- 7.7.1. Plan Before Acting
- 7.7.2. Secure the Physical System
- 7.7.3. Install the Operating System
- 7.7.4. Secure Local Filesystems
- 7.7.5. Securing Services
- 7.7.6. Restrict root Access
- 7.7.7. Configure User Authentication and Account Defaults
- 7.7.8. Set up Remote Authentication
- 7.7.9. Install and Configure Ongoing Monitoring
- 7.7.10. Backup
- 7.7.11. Other Activities
- 7.8. Detecting Problems
-
8. Managing Network Services
-
8.1. Managing DNS Servers
- 8.1.1. Zones
- 8.1.2. Name Server Types
- 8.1.3. About BIND
-
8.1.4. Configuring named
- 8.1.4.1. The master configuration file: named.conf
- 8.1.4.2. The root hints file
- 8.1.4.3. Zone files
- 8.1.4.4. Common mistakes to avoid
- 8.1.4.5. Using subdomains
- 8.1.4.6. Forwarders
- 8.1.4.7. Slave name server notifications
- 8.1.4.8. Dynamic updates
- 8.1.4.9. Incremental zone transfers
- 8.1.4.10. Access control
- 8.1.4.11. Securing DNS communications
- 8.1.4.12. BIND 9 views
- 8.1.4.13. Securing the named process
- 8.1.4.14. Configuring logging
- 8.1.5. Name Server Maintenance and Troubleshooting
- 8.2. Routing Daemons
- 8.3. Configuring a DHCP Server
- 8.4. Time Synchronization with NTP
- 8.5. Managing Network Daemons under AIX
-
8.6. Monitoring the Network
- 8.6.1. Standard Networking Utilities
- 8.6.2. Packet Sniffers
- 8.6.3. The Simple Network Management Protocol
- 8.6.4. Network Management Packages
-
8.1. Managing DNS Servers
-
9. Electronic Mail
- 9.1. About Electronic Mail
- 9.2. Configuring User Mail Programs
- 9.3. Configuring Access Agents
-
9.4. Configuring the Transport Agent
-
9.4.1. sendmail
- 9.4.1.1. Configuring sendmail
- 9.4.1.2. Getting started: A sample mail client configuration
- 9.4.1.3. Building sendmail.cf
- 9.4.1.4. Configuring the mail hub
- 9.4.1.5. Selecting mailers
- 9.4.1.6. Some client and mail hub variations
- 9.4.1.7. More addressing options
- 9.4.1.8. Virtual hosting
- 9.4.1.9. The services switch file
- 9.4.1.10. Spam suppression
- 9.4.1.11. Public blacklists and the access database
- 9.4.1.12. sendmail security
- 9.4.1.13. Monitoring ongoing operation
- 9.4.1.14. Performance
- 9.4.1.15. Debugging techniques
- 9.4.1.16. Macro summary
- 9.4.2. Postfix
-
9.4.1. sendmail
- 9.5. Retrieving Mail Messages
- 9.6. Mail Filtering with procmail
- 9.7. A Few Final Tools
-
10. Filesystems and Disks
- 10.1. Filesystem Types
- 10.2. Managing Filesystems
-
10.3. From Disks to Filesystems
- 10.3.1. Defining Disk Partitions
- 10.3.2. Adding Disks
- 10.3.3. Logical Volume Managers
- 10.3.4. Floppy Disks
- 10.3.5. CD-ROM Devices
- 10.4. Sharing Filesystems
-
11. Backup and Restore
- 11.1. Planning for Disasters and Everyday Needs
- 11.2. Backup Media
- 11.3. Backing Up Files and Filesystems
- 11.4. Restoring Files from Backups
- 11.5. Making Table of Contents Files
- 11.6. Network Backup Systems
- 11.7. Backing Up and Restoring the System Filesystems
-
12. Serial Lines and Devices
- 12.1. About Serial Lines
- 12.2. Specifying Terminal Characteristics
- 12.3. Adding a New Serial Device
- 12.4. Troubleshooting Terminal Problems
- 12.5. Controlling Access to Serial Lines
- 12.6. HP-UX and Tru64 Terminal Line Attributes
- 12.7. The HylaFAX Fax Service
- 12.8. USB Devices
-
13. Printers and the Spooling Subsystem
- 13.1. The BSD Spooling Facility
- 13.2. System V Printing
- 13.3. The AIX Spooling Facility
- 13.4. Troubleshooting Printers
- 13.5. Sharing Printers with Windows Systems
- 13.6. LPRng
- 13.7. CUPS
- 13.8. Font Management Under X
-
14. Automating Administrative Tasks
- 14.1. Creating Effective Shell Scripts
- 14.2. Perl: An Alternate Administrative Language
- 14.3. Expect: Automating Interactive Programs
- 14.4. When Only C Will Do
- 14.5. Automating Complex Configuration Tasks with Cfengine
- 14.6. Stem: Simplified Creation of Client-Server Applications
- 14.7. Adding Local man Pages
-
15. Managing System Resources
-
15.1. Thinking About System Performance
-
15.1.1. The Tuning Process
- 15.1.1.1. Define the problem in as much detail as you can.
- 15.1.1.2. Determine what’s causing the problem.
- 15.1.1.3. Formulate explicit performance improvement goals.
- 15.1.1.4. Design and implement modifications to the system and applications to achieve those goals.
- 15.1.1.5. Monitor the system to determine how well the changes worked.
- 15.1.1.6. Return to the first step and begin again.
- 15.1.2. Some Tuning Caveats
-
15.1.1. The Tuning Process
- 15.2. Monitoring and Controlling Processes
- 15.3. Managing CPU Resources
- 15.4. Managing Memory
- 15.5. Disk I/O Performance Issues
- 15.6. Monitoring and Managing Disk Space Usage
- 15.7. Network Performance
-
15.1. Thinking About System Performance
- 16. Configuring and Building Kernels
- 17. Accounting
- 18. The Profession of System Administration
-
A. Administrative Shell Programming
- A.1. Basic Syntax
- A.2. The if Statement
- A.3. Other Control Structures
- A.4. Getting Input: The read Command
- A.5. Other Useful Commands
- A.6. Shell Functions
- About the Author
- Colophon
- Copyright
Product information
- Title: Essential System Administration, 3rd Edition
- Author(s):
- Release date: August 2002
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596003432
You might also like
book
The Best Damn Cybercrime and Digital Forensics Book Period
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched …
book
Cybercrime Investigation Case Studies
Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing …
book
Unix® and Linux® System Administration Handbook, Fourth Edition
“As an author, editor, and publisher, I never paid much attention to the competition–except in a …
book
Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Examine how to keep iOS devices safe in the physical world, including creating company policies for …