Book description
UNIX and Linux System Administration Handbook, Fifth Edition is today’s definitive guide to installing, configuring and maintaining any Unix or Linux system -- including the systems that provide core Internet and cloud infrastructure.
Now fully updated for today’s Linux distributions and cloud environments, it details best practices for every facet of system administration, including storage management, network design and administration, web hosting and scale-out, automation, configuration management, performance analysis, virtualization, DNS, security, management of IT service organizations, and much more. For modern system and network administrators, this edition contains indispensable new coverage of cloud deployments, continuous delivery, Docker and other containerization solutions, and much more.
Table of contents
- Full Table of Contents
- Tribute to Evi
- Preface
- Foreword
- Acknowledgments
-
Where to Start
- 1.1 Essential duties of a system administrator
- 1.2 Suggested background
- 1.3 Linux distributions
- 1.4 Example systems used in this book
- 1.5 Notation and typographical conventions
- 1.6 Units
- 1.7 Man pages and other on-line documentation
- 1.8 Other authoritative documentation
- 1.9 Other sources of information
- 1.10 Ways to find and install software
- 1.11 Where to host
- 1.12 Specialization and adjacent disciplines
- 1.13 Recommended reading
- Booting and System Management Daemons
- Access Control and Rootly Powers
- Process Control
- The Filesystem
- Software Installation and Management
- Scripting and the Shell
-
User Management
- 8.1 Account mechanics
- 8.2 The /etc/passwd file
- 8.3 The Linux /etc/shadow file
- 8.4 FreeBSD's /etc/master.passwd and /etc/login.conf files
- 8.5 The /etc/group file
- 8.6 Manual steps for adding users
- 8.7 Scripts for adding users: useradd, adduser, and newusers
- 8.8 Safe removal of a user’s account and files
- 8.9 User login lockout
- 8.10 Risk reduction with PAM
- 8.11 Centralized account management
- Cloud Computing
- Logging
-
Drivers and the Kernel
- 11.1 Kernel chores for system administrators
- 11.2 Kernel version numbering
- 11.3 Devices and their drivers
- 11.4 Linux kernel configuration
- 11.5 FreeBSD kernel configuration
- 11.6 Loadable kernel modules
- 11.7 Booting
- 11.8 Booting alternate kernels in the cloud
- 11.9 Kernel errors
- 11.10 Recommended reading
- Printing
-
TCP/IP Networking
- 13.1 TCP/IP and its relationship to the Internet
- 13.2 Networking basics
- 13.3 Packet addressing
- 13.4 IP addresses: the gory details
- 13.5 Routing
- 13.6 IPv4 ARP and IPv6 neighbor discovery
- 13.7 DHCP: the Dynamic Host Configuration Protocol
- 13.8 Security issues
- 13.9 Basic network configuration
- 13.10 Linux networking
- 13.11 FreeBSD networking
- 13.12 Network troubleshooting
- 13.13 Network monitoring
- 13.14 Firewalls and NAT
- 13.15 Cloud networking
- 13.16 Recommended reading
- Physical Networking
- IP Routing
- DNS: The Domain Name System
- Single Sign-On
- Electronic Mail
- Web Hosting
-
Storage
- 20.1 I just want to add a disk!
- 20.2 Storage hardware
- 20.3 Storage hardware interfaces
- 20.4 Attachment and low-level management of drives
- 20.5 The software side of storage: peeling the onion
- 20.6 Disk partitioning
- 20.7 Logical volume management
- 20.8 RAID: redundant arrays of inexpensive disks
- 20.9 Filesystems
- 20.10 Traditional filesystems: UFS, ext4, and XFS
- 20.11 Next-generation filesystems: ZFS and Btrfs
- 20.12 ZFS: all your storage problems solved
- 20.13 Btrfs: “ZFS lite” for Linux
- 20.14 Data backup strategy
- 20.15 Recommended reading
- The Network File System
- SMB
- Configuration Management
- Virtualization
- Containers
- Continuous Integration and Delivery
-
Security
- 27.1 Elements of security
- 27.2 How security is compromised
- 27.3 Basic security measures
- 27.4 Passwords and user accounts
- 27.5 Security power tools
- 27.6 Cryptography primer
- 27.7 SSH, the Secure SHell
- 27.8 Firewalls
- 27.9 Virtual private networks (VPNs)
- 27.10 Certifications and standards
- 27.11 Sources of security information
- 27.12 When your site has been attacked
- 27.13 Recommended reading
-
Monitoring
- 28.1 An overview of monitoring
- 28.2 The monitoring culture
- 28.3 The monitoring platforms
- 28.4 Data collection
- 28.5 Network monitoring
- 28.6 Systems monitoring
- 28.7 Application monitoring
- 28.8 Security monitoring
- 28.9 SNMP: the Simple Network Management Protocol
- 28.10 Tips and tricks for monitoring
- 28.11 Recommended reading
- Performance Analysis
- Data Center Basics
-
Methodology, Policy, and Politics
- 31.1 The grand unified theory: DevOps
- 31.2 Ticketing and task management systems
- 31.3 Local documentation maintenance
- 31.4 Environment separation
- 31.5 Disaster management
- 31.6 IT policies and procedures
- 31.7 Service level agreements
- 31.8 Compliance: regulations and standards
- 31.9 Legal issues
- 31.10 Organizations, conferences, and other resources
- 31.11 Recommended reading
- A Brief History of System Administration
- Colophon
- About the Contributors
- About the Authors
- Index
Product information
- Title: UNIX and Linux System Administration Handbook, 5th Edition
- Author(s):
- Release date: August 2017
- Publisher(s): Addison-Wesley Professional
- ISBN: 9780134278308
You might also like
book
Mastering Linux Security and Hardening - Second Edition
A comprehensive guide to securing your Linux system against cyberattacks and intruders Key Features Deliver a …
book
Practical Linux System Administration
This essential guide covers all aspects of Linux system administration, from user maintenance, backups, filesystem housekeeping, …
book
Linux Basics for Hackers
If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for …
video
Linux Fundamentals, 2nd Edition
10+ Hours of Video Instruction More than 10 hours of video instruction to get you up …