Book description
UNIX and Linux System Administration Handbook, Fifth Edition is today’s definitive guide to installing, configuring and maintaining any Unix or Linux system -- including the systems that provide core Internet and cloud infrastructure.
Now fully updated for today’s Linux distributions and cloud environments, it details best practices for every facet of system administration, including storage management, network design and administration, web hosting and scale-out, automation, configuration management, performance analysis, virtualization, DNS, security, management of IT service organizations, and much more. For modern system and network administrators, this edition contains indispensable new coverage of cloud deployments, continuous delivery, Docker and other containerization solutions, and much more.
Table of contents
- Full Table of Contents
- Tribute to Evi
- Preface
- Foreword
- Acknowledgments
-
Where to Start
- 1.1 Essential duties of a system administrator
- 1.2 Suggested background
- 1.3 Linux distributions
- 1.4 Example systems used in this book
- 1.5 Notation and typographical conventions
- 1.6 Units
- 1.7 Man pages and other on-line documentation
- 1.8 Other authoritative documentation
- 1.9 Other sources of information
- 1.10 Ways to find and install software
- 1.11 Where to host
- 1.12 Specialization and adjacent disciplines
- 1.13 Recommended reading
- Booting and System Management Daemons
- Access Control and Rootly Powers
- Process Control
- The Filesystem
- Software Installation and Management
- Scripting and the Shell
-
User Management
- 8.1 Account mechanics
- 8.2 The /etc/passwd file
- 8.3 The Linux /etc/shadow file
- 8.4 FreeBSD's /etc/master.passwd and /etc/login.conf files
- 8.5 The /etc/group file
- 8.6 Manual steps for adding users
- 8.7 Scripts for adding users: useradd, adduser, and newusers
- 8.8 Safe removal of a user’s account and files
- 8.9 User login lockout
- 8.10 Risk reduction with PAM
- 8.11 Centralized account management
- Cloud Computing
- Logging
-
Drivers and the Kernel
- 11.1 Kernel chores for system administrators
- 11.2 Kernel version numbering
- 11.3 Devices and their drivers
- 11.4 Linux kernel configuration
- 11.5 FreeBSD kernel configuration
- 11.6 Loadable kernel modules
- 11.7 Booting
- 11.8 Booting alternate kernels in the cloud
- 11.9 Kernel errors
- 11.10 Recommended reading
- Printing
-
TCP/IP Networking
- 13.1 TCP/IP and its relationship to the Internet
- 13.2 Networking basics
- 13.3 Packet addressing
- 13.4 IP addresses: the gory details
- 13.5 Routing
- 13.6 IPv4 ARP and IPv6 neighbor discovery
- 13.7 DHCP: the Dynamic Host Configuration Protocol
- 13.8 Security issues
- 13.9 Basic network configuration
- 13.10 Linux networking
- 13.11 FreeBSD networking
- 13.12 Network troubleshooting
- 13.13 Network monitoring
- 13.14 Firewalls and NAT
- 13.15 Cloud networking
- 13.16 Recommended reading
- Physical Networking
- IP Routing
- DNS: The Domain Name System
- Single Sign-On
- Electronic Mail
- Web Hosting
-
Storage
- 20.1 I just want to add a disk!
- 20.2 Storage hardware
- 20.3 Storage hardware interfaces
- 20.4 Attachment and low-level management of drives
- 20.5 The software side of storage: peeling the onion
- 20.6 Disk partitioning
- 20.7 Logical volume management
- 20.8 RAID: redundant arrays of inexpensive disks
- 20.9 Filesystems
- 20.10 Traditional filesystems: UFS, ext4, and XFS
- 20.11 Next-generation filesystems: ZFS and Btrfs
- 20.12 ZFS: all your storage problems solved
- 20.13 Btrfs: “ZFS lite” for Linux
- 20.14 Data backup strategy
- 20.15 Recommended reading
- The Network File System
- SMB
- Configuration Management
- Virtualization
- Containers
- Continuous Integration and Delivery
-
Security
- 27.1 Elements of security
- 27.2 How security is compromised
- 27.3 Basic security measures
- 27.4 Passwords and user accounts
- 27.5 Security power tools
- 27.6 Cryptography primer
- 27.7 SSH, the Secure SHell
- 27.8 Firewalls
- 27.9 Virtual private networks (VPNs)
- 27.10 Certifications and standards
- 27.11 Sources of security information
- 27.12 When your site has been attacked
- 27.13 Recommended reading
-
Monitoring
- 28.1 An overview of monitoring
- 28.2 The monitoring culture
- 28.3 The monitoring platforms
- 28.4 Data collection
- 28.5 Network monitoring
- 28.6 Systems monitoring
- 28.7 Application monitoring
- 28.8 Security monitoring
- 28.9 SNMP: the Simple Network Management Protocol
- 28.10 Tips and tricks for monitoring
- 28.11 Recommended reading
- Performance Analysis
- Data Center Basics
-
Methodology, Policy, and Politics
- 31.1 The grand unified theory: DevOps
- 31.2 Ticketing and task management systems
- 31.3 Local documentation maintenance
- 31.4 Environment separation
- 31.5 Disaster management
- 31.6 IT policies and procedures
- 31.7 Service level agreements
- 31.8 Compliance: regulations and standards
- 31.9 Legal issues
- 31.10 Organizations, conferences, and other resources
- 31.11 Recommended reading
- A Brief History of System Administration
- Colophon
- About the Contributors
- About the Authors
- Index
Product information
- Title: UNIX and Linux System Administration Handbook, 5th Edition
- Author(s):
- Release date: August 2017
- Publisher(s): Addison-Wesley Professional
- ISBN: 9780134278308
You might also like
book
Building Microservices, 2nd Edition
As organizations shift from monolithic applications to smaller, self-contained microservices, distributed systems have become more fine-grained. …
book
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to …
book
Learning Go
Go is rapidly becoming the preferred language for building web services. While there are plenty of …
book
The Staff Engineer's Path
For years, companies have rewarded their most effective engineers with management positions. But treating management as …