Linux Administration Handbook, 2/e (Paperback)
暫譯: Linux 管理手冊,第 2 版 (平裝本)
Evi Nemeth, Garth Snyder, Trent R. Hein
- 出版商: Prentice Hall
- 出版日期: 2006-11-09
- 售價: $2,220
- 貴賓價: 9.5 折 $2,109
- 語言: 英文
- 頁數: 1040
- 裝訂: Paperback
- ISBN: 0131480049
- ISBN-13: 9780131480049
-
相關分類:
Linux
已過版
買這商品的人也買了...
-
$780$616 -
$880$695 -
$880$695 -
$880$695 -
$650$514 -
$780$663 -
$650$507 -
$550$435 -
$450$356 -
$980$774 -
$320$272 -
$480$379 -
$720$569 -
$650$514 -
$1,200$948 -
$780$616 -
$580$493 -
$420$357 -
$620$490 -
$880$695 -
$990$891 -
$580$452 -
$600$480 -
$490$387 -
$350$277
商品描述
The first edition of this book became known for its thorough and lucid
coverage of some of the toughest topics in system administration including
DNS, sendmail and security. The new edition will focus on many open source
tools that have gained acceptance since 1/e was published, including Nagios
for network monitoring.
Most titles on Linux administration focus on the configuration of a single box.
LAH was the first title in this area to focus on the administration of a Linux
system in a production environment. Linux Administration Handbook
examines how Linux systems behave in real-world ecosystems, not how they
might behave in ideal environments. The Second Edition incorporates the
changes in Linux systems in the past 18 months, which include current versions
of RedHat, SuSE and Debian systems, new topics like Logical Volume
Manager, X11 basic administration and Nagios. Chapters on system admin
policy, bind, sendmail and security have been updated.
Table of Contents
Foreword to the First Edition xxxiii
Preface xxxiv
Acknowledgments xxxvii
Section One: Basic Administration 1
Chapter 1: Where to Start 3
Suggested background 4Linux’s relationship to UNIX 4
Linux in historical context 5
Linux distributions 6
Notation and typographical conventions 9
Where to go for information 11
How to find and install software 14
Essential tasks of the system administrator 16
System administration under duress 18
Recommended reading 19
Exercises 20
Chapter 2: Booting and Shutting Down 21
Bootstrapping 21Booting PCs 25
Using boot loaders: LILO and GRUB 26
Booting single-user mode 31
Working with startup scripts 32
Rebooting and shutting down 40
Exercises 43
Chapter 3: Rootly Powers 44
Ownership of files and processes 44The superuser 46
Choosing a root password 47
Becoming root 48
Other pseudo-users 51
Exercises 52
Chapter 4: Controlling Processes 53
Components of a process 53The life cycle of a process 56
Signals 57
kill and killall: send signals 60
Process states 60
nice and renice: influence scheduling priority 61
ps: monitor processes 62
top: monitor processes even better 65
The /proc filesystem 65
strace: trace signals and system calls 66
Runaway processes 67
Recommended reading 69
Exercises 69
Chapter 5: The Filesystem 70
Pathnames 72Filesystem mounting and unmounting 73
The organization of the file tree 75
File types 76
File attributes 81
Access control lists 88
Exercises 92
Chapter 6: Adding New Users 93
The /etc/passwd file 93The /etc/shadow file 99
The /etc/group file 101
Adding users 102
Removing users 107
Disabling logins 108
Managing accounts 108
Exercises 110
Chapter 7: Adding a Disk 111
Disk interfaces 111Disk geometry 119
Linux filesystems 120
An overview of the disk installation procedure 122
hdparm: set IDE interface parameters 129
fsck: check and repair filesystems 131
Adding a disk: a step-by-step guide 133
Advanced disk management: RAID and LVM 138
Mounting USB drives 147
Exercises 148
Chapter 8: Periodic Processes 150
cron: schedule commands 150The format of crontab files 151
Crontab management 153
Some common uses for cron 154
Other schedulers: anacron and fcron 156
Exercises 157
Chapter 9: Backups 158
Motherhood and apple pie 159Backup devices and media 163
Setting up an incremental backup regime with dump 169
Restoring from dumps with restore 173
Dumping and restoring for upgrades 176
Using other archiving programs 177
Using multiple files on a single tape 178
Bacula 179
Commercial backup products 197
Recommended reading 198
Exercises 198
Chapter 10: Syslog and Log Files 201
Logging policies 201Linux log files 204
logrotate: manage log files 208
Syslog: the system event logger 209
Condensing log files to useful information 220
Exercises 222
Chapter 11: Software and Configuration Management 223
Basic Linux installation 223Diskless clients 232
Package management 234
High-level package management systems 237
Revision control 247
Localization and configuration 255
Configuration management tools 260
Sharing software over NFS 263
Recommended software 266
Recommended reading 268
Exercises 268
Section Two: Networking 269
Chapter 12: TCP/IP Networking 271
TCP/IP and the Internet 272Networking road map 275
Packets and encapsulation 276
IP addresses: the gory details 282
Routing 293
ARP: the address resolution protocol 296
Addition of a machine to a network 297
Distribution-specific network configuration 307
DHCP: the Dynamic Host Configuration Protocol 311
Dynamic reconfiguration and tuning 314
Security issues 316
Linux NAT 319
PPP: the Point-to-Point Protocol 320
Linux networking quirks 330
Recommended reading 331
Exercises 332
Chapter 13: Routing 334
Packet forwarding: a closer look 335Routing daemons and routing protocols 337
Protocols on parade 341
routed: RIP yourself a new hole 343
gated: gone to the dark side 344
Routing strategy selection criteria 344
Cisco routers 346
Recommended reading 348
Exercises 349
Chapter 14: Network Hardware 350
LAN, WAN, or MAN? 351Ethernet: the common LAN 351
Wireless: nomad’s LAN 359
FDDI: the disappointing, expensive, and outdated LAN 361
ATM: the promised (but sorely defeated) LAN 362
Frame relay: the sacrificial WAN 363
ISDN: the indigenous WAN 364
DSL and cable modems: the people’s WAN 364
Where is the network going? 365
Network testing and debugging 366
Building wiring 366
Network design issues 368
Management issues 370
Recommended vendors 371
Recommended reading 372
Exercises 372
Chapter 15: DNS: The Domain Name System 373
DNS for the impatient: adding a new machine 374The history of DNS 375
Who needs DNS? 377
The DNS namespace 378
How DNS works 383
What’s new in DNS 386
The DNS database 389
The BIND software 409
Designing your DNS environment 415
BIND client issues 418
BIND server configuration 420
BIND configuration examples 439
Starting named 446
Updating zone files 447
Security issues 451
Testing and debugging 466
Distribution specifics 478
Recommended reading 481
Exercises 482
Chapter 16: The Network File System 484
General information about NFS 484Server-side NFS 489
Client-side NFS 492
nfsstat: dump NFS statistics 495
Dedicated NFS file servers 496
Automatic mounting 497
Recommended reading 500
Exercises 501
Chapter 17: Sharing System Files 502
What to share 503nscd: cache the results of lookups 504
Copying files around 505
NIS: the Network Information Service 511
LDAP: the Lightweight Directory Access Protocol 520
Recommended reading 526
Exercises 527
Chapter 18: Electronic Mail 528
Mail systems 530The anatomy of a mail message 534
Mail philosophy 539
Mail aliases 544
Mailing lists and list wrangling software 551
sendmail: ringmaster of the electronic mail circus 557
sendmail configuration 565
Basic sendmail configuration primitives 570
Fancier sendmail configuration primitives 574
Spam-related features in sendmail 588
Configuration file case study 599
Security and sendmail 603
sendmail performance 611
sendmail statistics, testing, and debugging 615
The Exim Mail System 621
Postfix 623
Recommended reading 639
Exercises 640
Chapter 19: Network Management and Debugging 643
Network troubleshooting 644ping: check to see if a host is alive 645
traceroute: trace IP packets 647
netstat: get network statistics 649
sar: inspect live interface activity 654
Packet sniffers 655
Network management protocols 657
SNMP: the Simple Network Management Protocol 659
The NET-SMNP agent 661
Network management applications 662
Recommended reading 667
Exercises 668
Chapter 20: Security 669
Is Linux secure? 670How security is compromised 671
Certifications and standards 673
Security tips and philosophy 676
Security problems in /etc/passwd and /etc/shadow 678
POSIX capabilities 683
Setuid programs 683
Important file permissions 684
Miscellaneous security issues 685
Security power tools 688
Cryptographic security tools 694
Firewalls 701
Linux firewall features: IP tables 704
Virtual private networks (VPNs) 708
Hardened Linux distributions 710
What to do when your site has been attacked 710
Sources of security information 712
Recommended reading 715
Exercises 716
Chapter 21: Web Hosting and Internet Servers 719
Web hosting basics 720HTTP server installation 724
Virtual interfaces 727
The Secure Sockets Layer (SSL) 730
Caching and proxy servers 733
Anonymous FTP server setup 734
Exercises 736
Section Three: Bunch O’ Stuff 739Chapter 22: The X Window System 741
The X display manager 743Running an X application 744
X server configuration 748
Troubleshooting and debugging 754
A brief note on desktop environments 757
Recommended Reading 759
Exercises 759
Chapter 23: Printing 761
Printers are complicated 762Printer languages 763
CUPS architecture 767
CUPS server administration 772
Troubleshooting tips 780
Printer practicalities 782
Other printer advice 784
Printing under KDE 788
Recommended reading 790
Exercises 790
Chapter 24: Maintenance and Environment 791
Hardware maintenance basics 791Maintenance contracts 792
Electronics-handling lore 793
Monitors 794
Memory modules 794
Preventive maintenance 795
Environment 796
Power 798
Racks 799
Data center standards 800
Tools 800
Recommended reading 800
Exercises 802
Chapter 25: Performance Analysis 803
What you can do to improve performance 804Factors that affect performance 806
System performance checkup 807
Help! My system just got really slow! 817
Recommended reading 819
Exercises 819
Chapter 26: Cooperating with Windows 821
Logging in to a Linux system from Windows 821Accessing remote desktops 822
Running Windows and Windows-like applications 825
Using command-line tools with Windows 826
Windows compliance with email and web standards 827
Sharing files with Samba and CIFS 828
Sharing printers with Samba 836
Debugging Samba 840
Recommended reading 841
Exercises 842
Chapter 27: Serial Devices 843
The RS-232C standard 844Alternative connectors 847
Hard and soft carrier 852
Hardware flow control 852
Cable length 853
Serial device files 853
setserial: set serial port parameters 854
Software configuration for serial devices 855
Configuration of hardwired terminals 855
Special characters and the terminal driver 859
stty: set terminal options 860
tset: set options automatically 861
Terminal unwedging 862
Modems 862
Debugging a serial line 864
Other common I/O ports 865
Exercises 866
Chapter 28: Drivers and the Kernel 868
Kernel adaptation 869Drivers and device files 870
Why and how to configure the kernel 873
Tuning Linux kernel parameters 874
Building a Linux kernel 876
Adding a Linux device driver 878
Loadable kernel modules 880
Hot-plugging 882
Setting bootstrap options 883
Recommended reading 884
Exercises 884
Chapter 29: Daemons 885
init: the primordial process 886cron and atd: schedule commands 887
xinetd and inetd: manage daemons 887
Kernel daemons 893
Printing daemons 894
File service daemons 895
Administrative database daemons 896
Electronic mail daemons 897
Remote login and command execution daemons 898
Booting and configuration daemons 898
Other network daemons 900
ntpd: time synchronization daemon 902
Exercises 903
Chapter 30: Management, Policy, and Politics 904
Make everyone happy 904Components of a functional IT organization 906
The role of management 907
The role of administration 915
The role of development 919
The role of operations 924
The work of support 927
Documentation 930
Request-tracking and trouble-reporting systems 934
Disaster recovery 938
Written policy 943
Legal Issues 949
Software patents 957
Standards 958
Linux culture 961
Mainstream Linux 962
Organizations, conferences, and other resources 964
Recommended Reading 968
Exercises 970
Index 973
About the Contributors 999
About the Authors 1001
商品描述(中文翻譯)
描述
本書的第一版因其對系統管理中一些最具挑戰性主題的徹底且清晰的涵蓋而聞名,包括 DNS、sendmail 和安全性。新版本將專注於自第一版出版以來已獲得廣泛接受的許多開源工具,包括用於網絡監控的 Nagios。
大多數有關 Linux 管理的書籍專注於單一系統的配置,而 LAH 是該領域中第一本專注於在生產環境中管理 Linux 系統的書籍。《Linux 管理手冊》探討了 Linux 系統在現實世界生態系統中的行為,而不是它們在理想環境中的行為。第二版納入了過去 18 個月中 Linux 系統的變化,包括 RedHat、SuSE 和 Debian 系統的當前版本、新主題如邏輯卷管理器、X11 基本管理和 Nagios。系統管理政策、bind、sendmail 和安全性的章節也已更新。
目錄
第一部分:基本管理
第 1 章:從哪裡開始
建議的背景
Linux 與 UNIX 的關係
Linux 的歷史背景
Linux 發行版
符號和排版慣例
資訊來源
如何查找和安裝軟體
系統管理員的基本任務
在壓力下的系統管理
推薦閱讀
練習
第 2 章:啟動和關閉
啟動過程
啟動 PC
使用啟動加載器:LILO 和 GRUB
啟動單用戶模式
處理啟動腳本
重新啟動和關閉
練習
第 3 章:根權限
文件和進程的擁有權
超級用戶
選擇根密碼
成為根用戶
其他偽用戶
練習
第 4 章:控制進程
進程的組成部分
進程的生命週期
信號
kill 和 killall:發送信號
進程狀態
nice 和 renice:影響調度優先級
ps:監控進程
top:更好地監控進程
/proc 文件系統
strace:跟蹤信號和系統調用
失控的進程
推薦閱讀
練習
第 5 章:文件系統
路徑名
文件系統的掛載和卸載
文件樹的組織
文件類型
文件屬性
訪問控制列表
練習
第 6 章:添加新用戶
/etc/passwd 文件
/etc/shadow 文件
/etc/group 文件
添加用戶
刪除用戶
禁用登錄
管理帳戶
練習
第 7 章:添加磁碟
磁碟介面
磁碟幾何
Linux 文件系統
磁碟安裝程序概述
hdparm:設置 IDE 介面參數
fsck:檢查和修復文件系統
添加磁碟:逐步指南
高級磁碟管理:RAID 和 LVM
掛載 USB 驅動器
練習
第 8 章:定期進程
cron:排程命令
crontab 文件的格式
crontab 管理
cron 的一些常見用法
其他排程器:anacron 和 fcron
練習
第 9 章:備份
母親和蘋果派
備份設備和媒介
設置增量備份方案
使用 restore 從備份恢復
升級的備份和恢復
使用其他歸檔程序
在單個磁帶上使用多個文件
Bacula
商業備份產品
推薦閱讀
練習
第 10 章:Syslog 和日誌文件
日誌政策
Linux 日誌文件
logrotate:管理日誌文件
Syslog:系統事件記錄器
將日誌文件濃縮為有用信息
練習
第 11 章:軟體和配置管理
基本的 Linux 安裝
無磁碟客戶端
包管理
高級包管理系統
版本控制
本地化和配置
配置管理工具
通過 NFS 共享軟體
推薦軟體
推薦閱讀
練習
第二部分:網絡
第 12 章:TCP/IP 網絡
TCP/IP 和互聯網
網絡路線圖
數據包和封裝
IP 地址:詳細信息
路由
ARP:地址解析協議
將機器添加到網絡
特定發行版的網絡配置
DHCP:動態主機配置協議
動態重新配置和調整
安全問題
Linux NAT
PPP:點對點協議
Linux 網絡特性
推薦閱讀
練習
第 13 章:路由
數據包轉發:更深入的了解
路由守護進程和路由協議
協議展示
routed:RIP 自己一個新洞
gated:走向黑暗面
路由策略選擇標準
Cisco 路由器
推薦閱讀
練習
第 14 章:網絡硬體
LAN、WAN 或 MAN?
以太網:常見的 LAN
無線:遊牧者的 LAN
FDDI:令人失望、昂貴且過時的 LAN
ATM:被承諾(但遭受重創)的 LAN
幀中繼:犧牲的 WAN
ISDN:本土的 WAN
DSL 和電纜調製解調器:人民的 WAN
網絡的未來
網絡測試和調試
建築布線
網絡設計問題
管理問題
推薦供應商
推薦閱讀
練習
第 15 章:DNS:域名系統
不耐煩的 DNS:添加新機器
DNS 的歷史
誰需要 DNS?
DNS 命名空間
DNS 的工作原理
DNS 的新特性
DNS 數據庫
BIND 軟體
設計您的 DNS 環境
BIND 客戶端問題
BIND 伺服器配置