UNIX and Linux System Administration Handbook 5th edition by Evi Nemeth, Garth Snyder, Trent Hein, Ben Whaley, Dan Mackin – Ebook PDF Instant Download/Delivery: 0134278291, 9780134278292
Full download UNIX and Linux System Administration Handbook 5th edition after payment

Product details:
ISBN 10: 0134278291
ISBN 13: 9780134278292
Author: Evi Nemeth, Garth Snyder, Trent Hein, Ben Whaley, Dan Mackin
As an author, editor, and publisher, I never paid much attention to the competition—except in a few cases. This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against.” —Tim O’Reilly, founder of O’Reilly Media “This edition is for those whose systems live in the cloud or in virtualized data centers; those whose administrative work largely takes the form of automation and configuration source code; those who collaborate closely with developers, network engineers, compliance officers, and all the other worker bees who inhabit the modern hive.” —Paul Vixie, Internet Hall of Fame-recognized innovator and founder of ISC and Farsight Security “This book is fun and functional as a desktop reference. If you use UNIX and Linux systems, you need this book in your short-reach library. It covers a bit of the systems’ history but doesn’t bloviate. It’s just straight-forward information delivered in a colorful and memorable fashion.” —Jason A. Nunnelley UNIX® and Linux® System Administration Handbook, Fifth Edition, is today’s definitive guide to installing, configuring, and maintaining any UNIX or Linux system, including systems that supply core Internet and cloud infrastructure. Updated for new distributions and cloud environments, this comprehensive guide covers best practices for every facet of system administration, including storage management, network design and administration, security, web hosting, automation, configuration management, performance analysis, virtualization, DNS, security, and the management of IT service organizations. The authors—world-class, hands-on technologists—offer indispensable new coverage of cloud platforms, the DevOps philosophy, continuous deployment, containerization, monitoring, and many other essential topics. Whatever your role in running systems and networks built on UNIX or Linux, this conversational, well-written ¿guide will improve your efficiency and help solve your knottiest problems.
UNIX and Linux System Administration Handbook 5th Table of contents:
1. System Administration Overview
1.1 Essential duties of a system administrator
1.2 Suggested background
1.3 Linux distributions
1.4 Example systems used in this book
1.5 Notation and typographical conventions
1.6 Units
1.7 Man pages and other on-line documentation
1.8 Other authoritative documentation
1.9 Other sources of information
1.10 Ways to find and install software
1.11 Where to host
1.12 Specialization and adjacent disciplines
1.13 Recommended reading
2. Booting and System Management Daemons
2.1 Boot process overview
2.2 System firmware
2.3 Boot loaders
2.4 GRUB: the GRand Unified Boot loader
2.5 The FreeBSD boot process
2.6 System management daemons
2.7 systemd in detail
2.8 FreeBSD init and startup scripts
2.9 Reboot and shutdown procedures
2.10 Stratagems for a nonbooting system
3. Access Control and Rootly Powers
3.1 Standard UNIX access control
3.2 Management of the root account
3.3 Extensions to the standard access control model
3.4 Modern access control
3.5 Recommended reading
4. Process Control
4.1 Components of a process
4.2 The life cycle of a process
4.3 ps: monitor processes
4.4 Interactive monitoring with top
4.5 nice and renice: influence scheduling priority
4.6 The /proc filesystem
4.7 strace and truss: trace signals and system calls
4.8 Runaway processes
4.9 Periodic processes
5. The Filesystem
5.1 Pathnames
5.2 Filesystem mounting and unmounting
5.3 Organization of the file tree
5.4 File types
5.5 File attributes
5.6 Access control lists
6. Software Installation and Management
6.1 Operating system installation
6.2 Managing packages
6.3 Linux package management systems
6.4 High-level Linux package management systems
6.5 FreeBSD software management
6.6 Software localization and configuration
6.7 Recommended reading
7. Scripting and the Shell
7.1 Scripting philosophy
7.2 Shell basics
7.3 sh scripting
7.4 Regular expressions
7.5 Python programming
7.6 Ruby programming
7.7 Library and environment management for Python and Ruby
7.8 Revision control with Git
7.9 Recommended reading
8. User Management
8.1 Account mechanics
8.2 The /etc/passwd file
8.3 The Linux /etc/shadow file
8.4 FreeBSD’s /etc/master.passwd and /etc/login.conf files
8.5 The /etc/group file
8.6 Manual steps for adding users
8.7 Scripts for adding users: useradd, adduser, and newusers
8.8 Safe removal of a user’s account and files
8.9 User login lockout
8.10 Risk reduction with PAM
8.11 Centralized account management
9. Cloud Computing
9.1 The cloud in context
9.2 Cloud platform choices
9.3 Cloud service fundamentals
9.4 Clouds: VPS quick start by platform
9.5 Cost control
9.6 Recommended reading
10. Logging
10.1 Log locations
10.2 The systemd journal
10.3 Syslog
10.4 Kernel and boot-time logging
10.5 Management and rotation of log files
10.6 Management of logs at scale
10.7 Logging policies
11. Drivers and the Kernel
11.1 Kernel chores for system administrators
11.2 Kernel version numbering
11.3 Devices and their drivers
11.4 Linux kernel configuration
11.5 FreeBSD kernel configuration
11.6 Loadable kernel modules
11.7 Booting
11.8 Booting alternate kernels in the cloud
11.9 Kernel errors
11.10 Recommended reading
12. Printing
12.1 CUPS printing
12.2 CUPS server administration
12.3 Troubleshooting tips
12.4 Recommended reading
13. TCP/IP Networking
13.1 TCP/IP and its relationship to the Internet
13.2 Networking basics
13.3 Packet addressing
13.4 IP addresses: the gory details
13.5 Routing
13.6 IPv4 ARP and IPv6 neighbor discovery
13.7 DHCP: the Dynamic Host Configuration Protocol
13.8 Security issues
13.9 Basic network configuration
13.10 Linux networking
13.11 FreeBSD networking
13.12 Network troubleshooting
13.13 Network monitoring
13.14 Firewalls and NAT
13.15 Cloud networking
13.16 Recommended reading
14. Physical Networking
14.1 Ethernet: the Swiss Army knife of networking
14.2 Wireless: Ethernet for nomads
14.3 SDN: software-defined networking
14.4 Network testing and debugging
14.5 Building wiring
14.6 Network design issues
14.7 Management issues
14.8 Recommended vendors
14.9 Recommended reading
15. IP Routing
15.1 Packet forwarding: a closer look
15.2 Routing daemons and routing protocols
15.3 Protocols on parade
15.4 Routing protocol multicast coordination
15.5 Routing strategy selection criteria
15.6 Routing daemons
15.7 Cisco routers
15.8 Recommended reading
16. DNS: The Domain Name System
16.1 DNS architecture
16.2 DNS for lookups
16.3 The DNS namespace
16.4 How DNS works
16.5 The DNS database
16.6 The BIND software
16.7 Split DNS and the view statement
16.8 BIND configuration examples
16.9 Zone file updating
16.10 DNS security issues
16.11 BIND debugging
16.12 Recommended reading
17. Single Sign-On
17.1 Core SSO elements
17.2 LDAP: “lightweight” directory services
17.3 Using directory services for login
17.4 Alternative approaches
17.5 Recommended reading
18. Electronic Mail
18.1 Mail system architecture
18.2 Anatomy of a mail message
18.3 The SMTP protocol
18.4 Spam and malware
18.5 Message privacy and encryption
18.6 Mail aliases
18.7 Email configuration
18.8 sendmail
18.9 Exim
18.10 Postfix
18.11 Recommended reading
19. Web Hosting
19.1 HTTP: the Hypertext Transfer Protocol
19.2 Web software basics
19.3 Web hosting in the cloud
19.4 Apache httpd
19.5 NGINX
19.6 HAProxy
19.7 Recommended reading
20. Storage
20.1 I just want to add a disk!
20.2 Storage hardware
20.3 Storage hardware interfaces
20.4 Attachment and low-level management of drives
20.5 The software side of storage: peeling the onion
20.6 Disk partitioning
20.7 Logical volume management
20.8 RAID: redundant arrays of inexpensive disks
20.9 Filesystems
20.10 Traditional filesystems: UFS, ext4, and XFS
20.11 Next-generation filesystems: ZFS and Btrfs
20.12 ZFS: all your storage problems solved
20.13 Btrfs: “ZFS lite” for Linux
20.14 Data backup strategy
20.15 Recommended reading
21. The Network File System
21.1 Meet network file services
21.2 The NFS approach
21.3 Server-side NFS
21.4 Client-side NFS
21.5 Identity mapping for NFS version 4
21.6 nfsstat: dump NFS statistics
21.7 Dedicated NFS file servers
21.8 Automatic mounting
21.9 Recommended reading
22. SMB
22.1 Samba: SMB server for UNIX
22.2 Installing and configuring Samba
22.3 Mounting SMB file shares
22.4 Browsing SMB file shares
22.5 Ensuring Samba security
22.6 Debugging Samba
22.7 Recommended reading
23. Configuration Management
23.1 Configuration management in a nutshell
23.2 Dangers of configuration management
23.3 Elements of configuration management
23.4 Popular CM systems compared
23.5 Introduction to Ansible
23.6 Introduction to Salt
23.7 Ansible and Salt compared
23.8 Best practices
23.9 Recommended reading
24. Virtualization
24.1 Virtual vernacular
24.2 Virtualization with Linux
24.3 FreeBSD bhyve
24.4 VMware
24.5 VirtualBox
24.6 Packer
24.7 Vagrant
24.8 Recommended reading
25. Containers
25.1 Background and core concepts
25.2 Docker: the open source container engine
25.3 Containers in practice
25.4 Container clustering and management
25.5 Recommended reading
26. Continuous Integration and Delivery
26.1 CI/CD essentials
26.2 Pipelines
26.3 Jenkins: the open source automation server
26.4 CI/CD in practice
26.5 Containers and CI/CD
26.6 Recommended reading
27. Security
27.1 Elements of security
27.2 How security is compromised
27.3 Basic security measures
27.4 Passwords and user accounts
27.5 Security power tools
27.6 Cryptography primer
27.7 SSH, the Secure SHell
27.8 Firewalls
27.9 Virtual private networks (VPNs)
27.10 Certifications and standards
27.11 Sources of security information
27.12 When your site has been attacked
27.13 Recommended reading
28. Monitoring
28.1 An overview of monitoring
28.2 The monitoring culture
28.3 The monitoring platforms
28.4 Data collection
28.5 Network monitoring
28.6 Systems monitoring
28.7 Application monitoring
28.8 Security monitoring
28.9 SNMP: the Simple Network Management Protocol
28.10 Tips and tricks for monitoring
28.11 Recommended reading
29. Performance Analysis
29.1 Performance tuning philosophy
29.2 Ways to improve performance
29.3 Factors that affect performance
29.4 Stolen CPU cycles
29.5 Analysis of performance problems
29.6 System performance checkup
29.7 Help! My server just got really slow!
29.8 Recommended reading
30. Data Center Basics
30.1 Racks
30.2 Power
30.3 Cooling and environment
30.4 Data center reliability tiers
30.5 Data center security
30.6 Tools
30.7 Recommended reading
31. Methodology, Policy, and Politics
31.1 The grand unified theory: DevOps
31.2 Ticketing and task management systems
31.3 Local documentation maintenance
31.4 Environment separation
31.5 Disaster management
31.6 IT policies and procedures
31.7 Service level agreements
31.8 Compliance: regulations and standards
31.9 Legal issues
31.10 Organizations, conferences, and other resources
31.11 Recommended reading
A. A Brief History of System Administration
B. Colophon
C. About the Contributors
D. About the Authors
E. Index
People also search for UNIX and Linux System Administration Handbook 5th:
unix and linux system administration handbook pdf
unix and linux system administration handbook 6th edition
fundamentals of unix and linux system administration
unix and linux system administration handbook 6th edition pdf
unix and linux system administration handbook 4th edition
Tags:
Evi Nemeth,Garth Snyder,Trent Hein,Ben Whaley,Dan Mackin,Linux System