Linux Administration Handbook, 2/e (Paperback)
暫譯: Linux 管理手冊,第 2 版 (平裝本)

Evi Nemeth, Garth Snyder, Trent R. Hein

  • 出版商: Prentice Hall
  • 出版日期: 2006-11-09
  • 售價: $2,220
  • 貴賓價: 9.5$2,109
  • 語言: 英文
  • 頁數: 1040
  • 裝訂: Paperback
  • ISBN: 0131480049
  • ISBN-13: 9780131480049
  • 相關分類: Linux
  • 已過版

買這商品的人也買了...

商品描述

Description

The first edition of this book became known for its thorough and lucid

coverage of some of the toughest topics in system administration including

DNS, sendmail and security. The new edition will focus on many open source

tools that have gained acceptance since 1/e was published, including Nagios

for network monitoring.

Most titles on Linux administration focus on the configuration of a single box.

LAH was the first title in this area to focus on the administration of a Linux

system in a production environment. Linux Administration Handbook

examines how Linux systems behave in real-world ecosystems, not how they

might behave in ideal environments. The Second Edition incorporates the

changes in Linux systems in the past 18 months, which include current versions

of RedHat, SuSE and Debian systems, new topics like Logical Volume

Manager, X11 basic administration and Nagios. Chapters on system admin

policy, bind, sendmail and security have been updated.

 

Table of Contents

Foreword to the First Edition xxxiii
Preface xxxiv
Acknowledgments xxxvii
Section One: Basic Administration 1
Chapter 1: Where to Start 3
Suggested background 4

Linux’s relationship to UNIX 4

Linux in historical context 5

Linux distributions 6

Notation and typographical conventions 9

Where to go for information 11

How to find and install software 14

Essential tasks of the system administrator 16

System administration under duress 18

Recommended reading 19

Exercises 20

Chapter 2: Booting and Shutting Down 21
Bootstrapping 21

Booting PCs 25

Using boot loaders: LILO and GRUB 26

Booting single-user mode 31

Working with startup scripts 32

Rebooting and shutting down 40

Exercises 43

Chapter 3: Rootly Powers 44
Ownership of files and processes 44

The superuser 46

Choosing a root password 47

Becoming root 48

Other pseudo-users 51

Exercises 52

Chapter 4: Controlling Processes 53
Components of a process 53

The life cycle of a process 56

Signals 57

kill and killall: send signals 60

Process states 60

nice and renice: influence scheduling priority 61

ps: monitor processes 62

top: monitor processes even better 65

The /proc filesystem 65

strace: trace signals and system calls 66

Runaway processes 67

Recommended reading 69

Exercises 69

Chapter 5: The Filesystem 70
Pathnames 72

Filesystem mounting and unmounting 73

The organization of the file tree 75

File types 76

File attributes 81

Access control lists 88

Exercises 92

Chapter 6: Adding New Users 93
The /etc/passwd file 93

The /etc/shadow file 99

The /etc/group file 101

Adding users 102

Removing users 107

Disabling logins 108

Managing accounts 108

Exercises 110

Chapter 7: Adding a Disk 111
Disk interfaces 111

Disk geometry 119

Linux filesystems 120

An overview of the disk installation procedure 122

hdparm: set IDE interface parameters 129

fsck: check and repair filesystems 131

Adding a disk: a step-by-step guide 133

Advanced disk management: RAID and LVM 138

Mounting USB drives 147

Exercises 148

Chapter 8: Periodic Processes 150
cron: schedule commands 150

The format of crontab files 151

Crontab management 153

Some common uses for cron 154

Other schedulers: anacron and fcron 156

Exercises 157

Chapter 9: Backups 158
Motherhood and apple pie 159

Backup devices and media 163

Setting up an incremental backup regime with dump 169

Restoring from dumps with restore 173

Dumping and restoring for upgrades 176

Using other archiving programs 177

Using multiple files on a single tape 178

Bacula 179

Commercial backup products 197

Recommended reading 198

Exercises 198

Chapter 10: Syslog and Log Files 201
Logging policies 201

Linux log files 204

logrotate: manage log files 208

Syslog: the system event logger 209

Condensing log files to useful information 220

Exercises 222

Chapter 11: Software and Configuration Management 223
Basic Linux installation 223

Diskless clients 232

Package management 234

High-level package management systems 237

Revision control 247

Localization and configuration 255

Configuration management tools 260

Sharing software over NFS 263

Recommended software 266

Recommended reading 268

Exercises 268

Section Two: Networking 269
Chapter 12: TCP/IP Networking 271
TCP/IP and the Internet 272

Networking road map 275

Packets and encapsulation 276

IP addresses: the gory details 282

Routing 293

ARP: the address resolution protocol 296

Addition of a machine to a network 297

Distribution-specific network configuration 307

DHCP: the Dynamic Host Configuration Protocol 311

Dynamic reconfiguration and tuning 314

Security issues 316

Linux NAT 319

PPP: the Point-to-Point Protocol 320

Linux networking quirks 330

Recommended reading 331

Exercises 332

Chapter 13: Routing 334
Packet forwarding: a closer look 335

Routing daemons and routing protocols 337

Protocols on parade 341

routed: RIP yourself a new hole 343

gated: gone to the dark side 344

Routing strategy selection criteria 344

Cisco routers 346

Recommended reading 348

Exercises 349

Chapter 14: Network Hardware 350
LAN, WAN, or MAN? 351

Ethernet: the common LAN 351

Wireless: nomad’s LAN 359

FDDI: the disappointing, expensive, and outdated LAN 361

ATM: the promised (but sorely defeated) LAN 362

Frame relay: the sacrificial WAN 363

ISDN: the indigenous WAN 364

DSL and cable modems: the people’s WAN 364

Where is the network going? 365

Network testing and debugging 366

Building wiring 366

Network design issues 368

Management issues 370

Recommended vendors 371

Recommended reading 372

Exercises 372

Chapter 15: DNS: The Domain Name System 373
DNS for the impatient: adding a new machine 374

The history of DNS 375

Who needs DNS? 377

The DNS namespace 378

How DNS works 383

What’s new in DNS 386

The DNS database 389

The BIND software 409

Designing your DNS environment 415

BIND client issues 418

BIND server configuration 420

BIND configuration examples 439

Starting named 446

Updating zone files 447

Security issues 451

Testing and debugging 466

Distribution specifics 478

Recommended reading 481

Exercises 482

Chapter 16: The Network File System 484
General information about NFS 484

Server-side NFS 489

Client-side NFS 492

nfsstat: dump NFS statistics 495

Dedicated NFS file servers 496

Automatic mounting 497

Recommended reading 500

Exercises 501

Chapter 17: Sharing System Files 502
What to share 503

nscd: cache the results of lookups 504

Copying files around 505

NIS: the Network Information Service 511

LDAP: the Lightweight Directory Access Protocol 520

Recommended reading 526

Exercises 527

Chapter 18: Electronic Mail 528
Mail systems 530

The anatomy of a mail message 534

Mail philosophy 539

Mail aliases 544

Mailing lists and list wrangling software 551

sendmail: ringmaster of the electronic mail circus 557

sendmail configuration 565

Basic sendmail configuration primitives 570

Fancier sendmail configuration primitives 574

Spam-related features in sendmail 588

Configuration file case study 599

Security and sendmail 603

sendmail performance 611

sendmail statistics, testing, and debugging 615

The Exim Mail System 621

Postfix 623

Recommended reading 639

Exercises 640

Chapter 19: Network Management and Debugging 643
Network troubleshooting 644

ping: check to see if a host is alive 645

traceroute: trace IP packets 647

netstat: get network statistics 649

sar: inspect live interface activity 654

Packet sniffers 655

Network management protocols 657

SNMP: the Simple Network Management Protocol 659

The NET-SMNP agent 661

Network management applications 662

Recommended reading 667

Exercises 668

Chapter 20: Security 669
Is Linux secure? 670

How security is compromised 671

Certifications and standards 673

Security tips and philosophy 676

Security problems in /etc/passwd and /etc/shadow 678

POSIX capabilities 683

Setuid programs 683

Important file permissions 684

Miscellaneous security issues 685

Security power tools 688

Cryptographic security tools 694

Firewalls 701

Linux firewall features: IP tables 704

Virtual private networks (VPNs) 708

Hardened Linux distributions 710

What to do when your site has been attacked 710

Sources of security information 712

Recommended reading 715

Exercises 716

Chapter 21: Web Hosting and Internet Servers 719
Web hosting basics 720

HTTP server installation 724

Virtual interfaces 727

The Secure Sockets Layer (SSL) 730

Caching and proxy servers 733

Anonymous FTP server setup 734

Exercises 736


Section Three: Bunch O’ Stuff 739

Chapter 22: The X Window System 741
The X display manager 743

Running an X application 744

X server configuration 748

Troubleshooting and debugging 754

A brief note on desktop environments 757

Recommended Reading 759

Exercises 759

Chapter 23: Printing 761
Printers are complicated 762

Printer languages 763

CUPS architecture 767

CUPS server administration 772

Troubleshooting tips 780

Printer practicalities 782

Other printer advice 784

Printing under KDE 788

Recommended reading 790

Exercises 790

Chapter 24: Maintenance and Environment 791
Hardware maintenance basics 791

Maintenance contracts 792

Electronics-handling lore 793

Monitors 794

Memory modules 794

Preventive maintenance 795

Environment 796

Power 798

Racks 799

Data center standards 800

Tools 800

Recommended reading 800

Exercises 802

Chapter 25: Performance Analysis 803
What you can do to improve performance 804

Factors that affect performance 806

System performance checkup 807

Help! My system just got really slow! 817

Recommended reading 819

Exercises 819

Chapter 26: Cooperating with Windows 821
Logging in to a Linux system from Windows 821

Accessing remote desktops 822

Running Windows and Windows-like applications 825

Using command-line tools with Windows 826

Windows compliance with email and web standards 827

Sharing files with Samba and CIFS 828

Sharing printers with Samba 836

Debugging Samba 840

Recommended reading 841

Exercises 842

Chapter 27: Serial Devices 843
The RS-232C standard 844

Alternative connectors 847

Hard and soft carrier 852

Hardware flow control 852

Cable length 853

Serial device files 853

setserial: set serial port parameters 854

Software configuration for serial devices 855

Configuration of hardwired terminals 855

Special characters and the terminal driver 859

stty: set terminal options 860

tset: set options automatically 861

Terminal unwedging 862

Modems 862

Debugging a serial line 864

Other common I/O ports 865

Exercises 866

Chapter 28: Drivers and the Kernel 868
Kernel adaptation 869

Drivers and device files 870

Why and how to configure the kernel 873

Tuning Linux kernel parameters 874

Building a Linux kernel 876

Adding a Linux device driver 878

Loadable kernel modules 880

Hot-plugging 882

Setting bootstrap options 883

Recommended reading 884

Exercises 884

Chapter 29: Daemons 885
init: the primordial process 886

cron and atd: schedule commands 887

xinetd and inetd: manage daemons 887

Kernel daemons 893

Printing daemons 894

File service daemons 895

Administrative database daemons 896

Electronic mail daemons 897

Remote login and command execution daemons 898

Booting and configuration daemons 898

Other network daemons 900

ntpd: time synchronization daemon 902

Exercises 903

Chapter 30: Management, Policy, and Politics 904
Make everyone happy 904

Components of a functional IT organization 906

The role of management 907

The role of administration 915

The role of development 919

The role of operations 924

The work of support 927

Documentation 930

Request-tracking and trouble-reporting systems 934

Disaster recovery 938

Written policy 943

Legal Issues 949

Software patents 957

Standards 958

Linux culture 961

Mainstream Linux 962

Organizations, conferences, and other resources 964

Recommended Reading 968

Exercises 970

Index 973
About the Contributors 999
About the Authors 1001

商品描述(中文翻譯)

描述

本書的第一版因其對系統管理中一些最具挑戰性主題的徹底且清晰的涵蓋而聞名,包括 DNS、sendmail 和安全性。新版本將專注於自第一版出版以來已獲得廣泛接受的許多開源工具,包括用於網絡監控的 Nagios。

大多數有關 Linux 管理的書籍專注於單一系統的配置,而 LAH 是該領域中第一本專注於在生產環境中管理 Linux 系統的書籍。《Linux 管理手冊》探討了 Linux 系統在現實世界生態系統中的行為,而不是它們在理想環境中的行為。第二版納入了過去 18 個月中 Linux 系統的變化,包括 RedHat、SuSE 和 Debian 系統的當前版本、新主題如邏輯卷管理器、X11 基本管理和 Nagios。系統管理政策、bind、sendmail 和安全性的章節也已更新。

目錄

第一部分:基本管理
第 1 章:從哪裡開始
建議的背景
Linux 與 UNIX 的關係
Linux 的歷史背景
Linux 發行版
符號和排版慣例
資訊來源
如何查找和安裝軟體
系統管理員的基本任務
在壓力下的系統管理
推薦閱讀
練習

第 2 章:啟動和關閉
啟動過程
啟動 PC
使用啟動加載器:LILO 和 GRUB
啟動單用戶模式
處理啟動腳本
重新啟動和關閉
練習

第 3 章:根權限
文件和進程的擁有權
超級用戶
選擇根密碼
成為根用戶
其他偽用戶
練習

第 4 章:控制進程
進程的組成部分
進程的生命週期
信號
kill 和 killall:發送信號
進程狀態
nice 和 renice:影響調度優先級
ps:監控進程
top:更好地監控進程
/proc 文件系統
strace:跟蹤信號和系統調用
失控的進程
推薦閱讀
練習

第 5 章:文件系統
路徑名
文件系統的掛載和卸載
文件樹的組織
文件類型
文件屬性
訪問控制列表
練習

第 6 章:添加新用戶
/etc/passwd 文件
/etc/shadow 文件
/etc/group 文件
添加用戶
刪除用戶
禁用登錄
管理帳戶
練習

第 7 章:添加磁碟
磁碟介面
磁碟幾何
Linux 文件系統
磁碟安裝程序概述
hdparm:設置 IDE 介面參數
fsck:檢查和修復文件系統
添加磁碟:逐步指南
高級磁碟管理:RAID 和 LVM
掛載 USB 驅動器
練習

第 8 章:定期進程
cron:排程命令
crontab 文件的格式
crontab 管理
cron 的一些常見用法
其他排程器:anacron 和 fcron
練習

第 9 章:備份
母親和蘋果派
備份設備和媒介
設置增量備份方案
使用 restore 從備份恢復
升級的備份和恢復
使用其他歸檔程序
在單個磁帶上使用多個文件
Bacula
商業備份產品
推薦閱讀
練習

第 10 章:Syslog 和日誌文件
日誌政策
Linux 日誌文件
logrotate:管理日誌文件
Syslog:系統事件記錄器
將日誌文件濃縮為有用信息
練習

第 11 章:軟體和配置管理
基本的 Linux 安裝
無磁碟客戶端
包管理
高級包管理系統
版本控制
本地化和配置
配置管理工具
通過 NFS 共享軟體
推薦軟體
推薦閱讀
練習

第二部分:網絡
第 12 章:TCP/IP 網絡
TCP/IP 和互聯網
網絡路線圖
數據包和封裝
IP 地址:詳細信息
路由
ARP:地址解析協議
將機器添加到網絡
特定發行版的網絡配置
DHCP:動態主機配置協議
動態重新配置和調整
安全問題
Linux NAT
PPP:點對點協議
Linux 網絡特性
推薦閱讀
練習

第 13 章:路由
數據包轉發:更深入的了解
路由守護進程和路由協議
協議展示
routed:RIP 自己一個新洞
gated:走向黑暗面
路由策略選擇標準
Cisco 路由器
推薦閱讀
練習

第 14 章:網絡硬體
LAN、WAN 或 MAN?
以太網:常見的 LAN
無線:遊牧者的 LAN
FDDI:令人失望、昂貴且過時的 LAN
ATM:被承諾(但遭受重創)的 LAN
幀中繼:犧牲的 WAN
ISDN:本土的 WAN
DSL 和電纜調製解調器:人民的 WAN
網絡的未來
網絡測試和調試
建築布線
網絡設計問題
管理問題
推薦供應商
推薦閱讀
練習

第 15 章:DNS:域名系統
不耐煩的 DNS:添加新機器
DNS 的歷史
誰需要 DNS?
DNS 命名空間
DNS 的工作原理
DNS 的新特性
DNS 數據庫
BIND 軟體
設計您的 DNS 環境
BIND 客戶端問題
BIND 伺服器配置