Book description
Now covers Red Hat Linux!
Written by Evi Nemeth, Garth Snyder, Scott Seebass, and Trent R. Hein with Adam Boggs, Rob Braun, Ned McClain, Dan Crawl, Lynda McGinley, and Todd Miller
"This is not a nice, neat book for a nice, clean world. It's a
nasty book for a nasty world. This is a book for the rest of
us."
–Eric Allman and Marshall Kirk McKusick
"I am pleased to welcome Linux to the UNIX System Administration
Handbook!"
–Linus Torvalds, Transmeta
"This book is most welcome!"
–Dennis Ritchie, AT&T Bell Laboratories
This new edition of the world's most comprehensive guide to UNIX system administration is an ideal tutorial for those new to administration and an invaluable reference for experienced professionals. The third edition has been expanded to include "direct from the frontlines" coverage of Red Hat Linux. UNIX System Administration Handbook describes every aspect of system administration–from basic topics to UNIX esoterica–and provides explicit coverage of four popular UNIX systems:
This book stresses a practical approach to system administration. It's packed with war stories and pragmatic advice, not just theory and watered-down restatements of the manuals. Difficult subjects such as sendmail, kernel building, and DNS configuration are tackled head-on. Examples are provided for all four versions of UNIX and are drawn from real-life systems–warts and all.
"This book is where I turn first when I have system
administration questions. It is truly a wonderful resource and
always within reach of my terminal."
–W. Richard Stevens, author of numerous books on UNIX and
TCP/IP
"This is a comprehensive guide to the care and feeding of UNIX
systems. The authors present the facts along with seasoned advice
and numerous real-world examples. Their perspective on the
variations among systems is valuable for anyone who runs a
heterogeneous computing facility."
–Pat Parseghian, Transmeta
"We noticed your book on the staff recommendations shelf at our
local bookstore: 'Very clear, a masterful interpretation of the
subject.' We were most impressed, until we noticed that the same
staff member had also recommended Aunt Bea's Mayberry
Cookbook."
–Shannon Bloomstran, history teacher
Table of contents
- Title Page
- Copyright Page
- Table of Contents
- Foreword
- Foreword to the Second Edition
- Foreword to the First Edition
- Preface
- Acknowledgments
-
Basic Administration
- Chapter 1 Where to Start
- Chapter 2 Booting and Shutting Down
- Chapter 3 Rootly Powers
- Chapter 4 Controlling Processes
- Chapter 5 The Filesystem
- Chapter 6 Adding New Users
-
Chapter 7 Serial Devices
- Serial standards
- Alternative connectors
- Hard and soft carrier
- Hardware flow control
- Cable length
- Serial device files
- Software configuration for serial devices
- Configuration of hardwired terminals
- Special characters and the terminal driver
- stty: set terminal options
- tset: set options automatically
- How to unwedge a terminal
- Modems
- Debugging a serial line
- Other common I/O ports
- Chapter 8 Adding a Disk
- Chapter 9 Periodic Processes
- Chapter 10 Backups
- Chapter 11 Syslog and Log Files
- Chapter 12 Drivers and the Kernel
-
Networking
-
Chapter 13 TCP/IP Networking
- TCP/IP and the Internet
- Networking road map
- Packets and encapsulation
- IP addresses: the gory details
- Routing
- ARP: The address resolution protocol
- DHCP: the Dynamic Host Configuration Protocol
- PPP: the Point-to-Point Protocol
- Security issues
- Addition of machines to a network
- Vendor-specific network configuration
- Solaris network configuration
- HP-UX network configuration
- Network configuration for Red Hat
- Network configuration for FreeBSD
- Recommended reading
- Chapter 14 Routing
-
Chapter 15 Network Hardware
- LAN, WAN, or MAN?
- Ethernet: the common LAN
- FDDI: the disappointing and expensive LAN
- ATM: the promised (but sorely defeated) LAN
- Frame relay: the sacrificial WAN
- ISDN: the indigenous WAN
- DSL: the people’s WAN
- Where is the network going?
- Network testing and debugging
- Building wiring
- Network design issues
- Management issues
- Recommended vendors
- Recommended reading
-
Chapter 16 The Domain Name System
- DNS for the impatient: adding a new machine
- The history of DNS
- Who needs DNS?
- What’s new in DNS
- The DNS namespace
- The BIND software
- How DNS works
- BIND client issues
- BIND server configuration
- BIND configuration examples
- The DNS database
- Updating zone files
- Security issues
- Testing and debugging
- Loose ends
- Vendor specifics
- Recommended reading
- Chapter 17 The Network File System
- Chapter 18 Sharing System Files
-
Chapter 19 Electronic Mail
- Mail systems
- The anatomy of a mail message
- Mail philosophy
- Mail aliases
- sendmail: ringmaster of the electronic mail circus
- sendmail configuration
- Basic sendmail configuration primitives
- Fancier sendmail configuration primitives
- Configuration file examples
- Spam-related features in sendmail
- Security and sendmail
- sendmail statistics, testing, and debugging
- The Postfix mail system
- Recommended reading
- Chapter 20 Network Management and Debugging
-
Chapter 21 Security
- Seven common-sense rules of security
- How security is compromised
- Security problems in the /etc/passwd file
- Setuid programs
- Important file permissions
- Miscellaneous security issues
- Security power tools
- Cryptographic security tools
- Firewalls
- Sources of security information
- What to do when your site has been attacked
- Recommended reading
- Chapter 22 Web Hosting and Internet Servers
-
Chapter 13 TCP/IP Networking
-
Bunch O’ Stuff
- Chapter 23 Printing
- Chapter 24 Maintenance and Environment
- Chapter 25 Performance Analysis
- Chapter 26 Cooperating with Windows
-
Chapter 27 Policy and Politics
- Policy and procedure
- Legal issues
- Sysadmin surveys
- Scope of service
- Trouble-reporting systems
- Managing management
- Hiring, firing, and training
- War stories and ethics
- Localization and upgrades
- Local documentation
- Procurement
- Decommissioning hardware
- Software patents
- Organizations, conferences, and other resources
- Standards
- Sample documents
- Recommended reading
- Chapter 28 Daemons
- Colophon
- About the Authors
- Index
Product information
- Title: UNIX System Administration Handbook, Third Edition
- Author(s):
- Release date: August 2000
- Publisher(s): Pearson
- ISBN: 9780137002740
You might also like
book
Practical LPIC-1 Linux Certification Study Guide
This book is your complete guide to studying for the Linux Professional Institute's Server Professional (LPIC-1) …
book
Unix® and Linux® System Administration Handbook, Fourth Edition
“As an author, editor, and publisher, I never paid much attention to the competition–except in a …
book
Design and Implementation of the FreeBSD Operating System, The
As in earlier Addison-Wesley books on the UNIX-based BSD operating system, Kirk McKusick and George Neville-Neil …
book
CentOS 8 Essentials
Learn how to install, use, and administer CentOS 8 with the help of expert guidance and …