The Practice of System and Network Administration: Volume 1 (3rd Edition)
Thomas A. Limoncelli, Christina J. Hogan, Strata R. Chalup
- 出版商: Addison Wesley
- 出版日期: 2016-11-04
- 售價: $2,600
- 貴賓價: 9.5 折 $2,470
- 語言: 英文
- 頁數: 1232
- 裝訂: Paperback
- ISBN: 0321919165
- ISBN-13: 9780321919168
-
相關分類:
DevOps
立即出貨 (庫存=1)
買這商品的人也買了...
-
$1,740$1,653 -
$580$452 -
$880$748 -
$1,754Foundations of Algorithms, 5/e (Paperback)
-
$1,980$1,881 -
$680$530 -
$580$493 -
$1,700$1,700 -
$978$929 -
$580$458 -
$760$646 -
$4,620$4,389 -
$580$458 -
$480$408 -
$580$458 -
$480$336 -
$600$510 -
$1,650$1,568 -
$560$420 -
$980$833 -
$1,980$1,881 -
$2,070Multithreaded JavaScript: Concurrency Beyond the Event Loop
-
$520$390 -
$560$437 -
$750$585
相關主題
商品描述
<About>
Features
Shows students how to maximize their effectiveness as an administrator by promoting simplicity, clarity, generality, automation, and communication, and prioritizing the basics first
Addresses modern administration issues including BYOD and the latest security paradigms
By a team of world-renowned IT administrators, including the legendary SAGE Outstanding Achievement Award winners Christina Hogan and Thomas Limoncelli
Teaches how to make decisions that help students excel
First of 2 volumes: recent companion volume covers DevOps and cloud administration
<Description>
With 28 new chapters, the third edition of The Practice of System and Network Administration innovates yet again! Revised with thousands of updates and clarifications based on reader feedback, this new edition also incorporates DevOps strategies even for non-DevOps environments.
Whether you use Linux, Unix, or Windows, this new edition describes the essential practices previously handed down only from mentor to protégé. This wonderfully lucid, often funny cornucopia of information introduces beginners to advanced frameworks valuable for their entire career, yet is structured to help even experts through difficult projects.
Other books tell you what commands to type. This book teaches you the cross-platform strategies that are timeless!
DevOps techniques: Apply DevOps principles to enterprise IT infrastructure, even in environments without developers
Game-changing strategies: New ways to deliver results faster with less stress
Fleet management: A comprehensive guide to managing your fleet of desktops, laptops, servers and mobile devices
Service management: How to design, launch, upgrade and migrate services
Measurable improvement: Assess your operational effectiveness; a forty-page, pain-free assessment system you can start using today to raise the quality of all services
Design guides: Best practices for networks, data centers, email, storage, monitoring, backups and more
Management skills: Organization design, communication, negotiation, ethics, hiring and firing, and more
Have you ever had any of these problems?
Have you been surprised to discover your backup tapes are blank?
Ever spent a year launching a new service only to be told the users hate it?
Do you have more incoming support requests than you can handle?
Do you spend more time fixing problems than building the next awesome thing?
Have you suffered from a botched migration of thousands of users to a new service?
Does your company rely on a computer that, if it died, can’t be rebuilt?
Is your network a fragile mess that breaks any time you try to improve it?
Is there a periodic “hell month” that happens twice a year? Twelve times a year?
Do you find out about problems when your users call you to complain?
Does your corporate “Change Review Board” terrify you?
Does each division of your company have their own broken way of doing things?
Do you fear that automation will replace you, or break more than it fixes?
Are you underpaid and overworked?
No vague “management speak” or empty platitudes. This comprehensive guide provides real solutions that prevent these problems and more!
<Sample Content>
Table of Contents
Preface xxxix
Acknowledgments xlvii
About the Authors li
Part I: Game-Changing Strategies 1
Chapter 1: Climbing Out of the Hole 3
1.1 Organizing WIP 5
1.2 Eliminating Time Sinkholes 12
1.3 DevOps 16
1.4 DevOps Without Devs 16
1.5 Bottlenecks 18
1.6 Getting Started 20
1.7 Summary 21
Exercises 22
Chapter 2: The Small Batches Principle 23
2.1 The Carpenter Analogy 23
2.2 Fixing Hell Month 24
2.3 Improving Emergency Failovers 26
2.4 Launching Early and Often 29
2.5 Summary 34
Exercises 34
Chapter 3: Pets and Cattle 37
3.1 The Pets and Cattle Analogy 37
3.2 Scaling 39
3.3 Desktops as Cattle 40
3.4 Server Hardware as Cattle 41
3.5 Pets Store State 43
3.6 Isolating State 44
3.7 Generic Processes 47
3.8 Moving Variations to the End 51
3.9 Automation 53
3.10 Summary 53
Exercises 54
Chapter 4: Infrastructure as Code 55
4.1 Programmable Infrastructure 56
4.2 Tracking Changes 57
4.3 Benefits of Infrastructure as Code 59
4.4 Principles of Infrastructure as Code 62
4.5 Configuration Management Tools 63
4.6 Example Infrastructure as Code Systems 67
4.7 Bringing Infrastructure as Code to Your Organization 71
4.8 Infrastructure as Code for Enhanced Collaboration 72
4.9 Downsides to Infrastructure as Code 73
4.10 Automation Myths 74
4.11 Summary 75
Exercises 76
Part II: Workstation Fleet Management 77
Chapter 5: Workstation Architecture 79
5.1 Fungibility 80
5.2 Hardware 82
5.3 Operating System 82
5.4 Network Configuration 84
5.5 Accounts and Authorization 86
5.6 Data Storage 89
5.7 OS Updates 93
5.8 Security 94
5.9 Logging 97
5.10 Summary 98
Exercises 99
Chapter 6: Workstation Hardware Strategies 101
6.1 Physical Workstations 101
6.2 Virtual Desktop Infrastructure 105
6.3 Bring Your Own Device 110
6.4 Summary 113
Exercises 114
Chapter 7: Workstation Software Life Cycle 117
7.1 Life of a Machine 117
7.2 OS Installation 120
7.3 OS Configuration 120
7.4 Updating the System Software and Applications 123
7.5 Rolling Out Changes . . . Carefully 128
7.6 Disposal 130
7.7 Summary 134
Exercises 135
Chapter 8: OS Installation Strategies 137
8.1 Consistency Is More Important Than Perfection 138
8.2 Installation Strategies 142
8.3 Test-Driven Configuration Development 147
8.4 Automating in Steps 148
8.5 When Not to Automate 152
8.6 Vendor Support of OS Installation 152
8.7 Should You Trust the Vendor’s Installation? 154
8.8 Summary 154
Exercises 155
Chapter 9: Workstation Service Definition 157
9.1 Basic Service Definition 157
9.2 Refresh Cycles 161
9.3 Tiered Support Levels 165
9.4 Workstations as a Managed Service 168
9.5 Summary 170
Exercises 171
Chapter 10: Workstation Fleet Logistics 173
10.1 What Employees See 173
10.2 What Employees Don’t See 174
10.3 Configuration Management Database 183
10.4 Small-Scale Fleet Logistics 186
10.5 Summary 188
Exercises 188
Chapter 11: Workstation Standardization 191
11.1 Involving Customers Early 192
11.2 Releasing Early and Iterating 193
11.3 Having a Transition Interval (Overlap) 193
11.4 Ratcheting 194
11.5 Setting a Cut-Off Date 195
11.6 Adapting for Your Corporate Culture 195
11.7 Leveraging the Path of Least Resistance 196
11.8 Summary 198
Exercises 199
Chapter 12: Onboarding 201
12.1 Making a Good First Impression 201
12.2 IT Responsibilities 203
12.3 Five Keys to Successful Onboarding 203
12.4 Cadence Changes 212
12.5 Case Studies 212
12.6 Summary 216
Exercises 217
Part III: Servers 219
Chapter 13: Server Hardware Strategies 221
13.1 All Eggs in One Basket 222
13.2 Beautiful Snowflakes 224
13.3 Buy in Bulk, Allocate Fractions 228
13.4 Grid Computing 235
13.5 Blade Servers 237
13.6 Cloud-Based Compute Services 238
13.7 Server Appliances 241
13.8 Hybrid Strategies 242
13.9 Summary 243
Exercises 244
Chapter 14: Server Hardware Features 245
14.1 Workstations Versus Servers 246
14.2 Server Reliability 249
14.3 Remotely Managing Servers 254
14.4 Separate Administrative Networks 257
14.5 Maintenance Contracts and Spare Parts 258
14.6 Selecting Vendors with Server Experience 261
14.7 Summary 263
Exercises 263
Chapter 15: Server Hardware Specifications 265
15.1 Models and Product Lines 266
15.2 Server Hardware Details 266
15.3 Things to Leave Out 278
15.4 Summary 278
Exercises 279
Part IV: Services 281
Chapter 16: Service Requirements 283
16.1 Services Make the Environment 284
16.2 Starting with a Kick-Off Meeting 285
16.3 Gathering Written Requirements 286
16.4 Customer Requirements 288
16.5 Scope, Schedule, and Resources 291
16.6 Operational Requirements 292
16.7 Open Architecture 298
16.8 Summary 302
Exercises 303
Chapter 17: Service Planning and Engineering 305
17.1 General Engineering Basics 306
17.2 Simplicity 307
17.3 Vendor-Certified Designs 308
17.4 Dependency Engineering 309
17.5 Decoupling Hostname from Service Name 313
17.6 Support 315
17.7 Summary 319
Exercises 319
Chapter 18: Service Resiliency and Performance Patterns 321
18.1 Redundancy Design Patterns 322
18.2 Performance and Scaling 326
18.3 Summary 333
Exercises 334
Chapter 19: Service Launch: Fundamentals 335
19.1 Planning for Problems 335
19.2 The Six-Step Launch Process 336
19.3 Launch Readiness Review 345
19.4 Launch Calendar 348
19.5 Common Launch Problems 349
19.6 Summary 351
Exercises 351
Chapter 20: Service Launch: DevOps 353
20.1 Continuous Integration and Deployment 354
20.2 Minimum Viable Product 357
20.3 Rapid Release with Packaged Software 359
20.4 Cloning the Production Environment 362
20.5 Example: DNS/DHCP Infrastructure Software 363
20.6 Launch with Data Migration 366
20.7 Controlling Self-Updating Software 369
20.8 Summary 370
Exercises 371
Chapter 21: Service Conversions 373
21.1 Minimizing Intrusiveness 374
21.2 Layers Versus Pillars 376
21.3 Vendor Support 377
21.4 Communication 378
21.5 Training 379
21.6 Gradual Roll-Outs 379
21.7 Flash-Cuts: Doing It All at Once 380
21.8 Backout Plan 383
21.9 Summary 385
Exercises 385
Chapter 22: Disaster Recovery and Data Integrity 387
22.1 Risk Analysis 388
22.2 Legal Obligations 389
22.3 Damage Limitation 390
22.4 Preparation 391
22.5 Data Integrity 392
22.6 Redundant Sites 393
22.7 Security Disasters 394
22.8 Media Relations 394
22.9 Summary 395
Exercises 395
Part V: Infrastructure 397
Chapter 23: Network Architecture 399
23.1 Physical Versus Logical 399
23.2 The OSI Model 400
23.3 Wired Office Networks 402
23.4 Wireless Office Networks 406
23.5 Datacenter Networks 408
23.6 WAN Strategies 413
23.7 Routing 419
23.8 Internet Access 420
23.9 Corporate Standards 422
23.10 Software-Defined Networks 425
23.11 IPv6 426
23.12 Summary 428
Exercises 429
Chapter 24: Network Operations 431
24.1 Monitoring 431
24.2 Management 432
24.3 Documentation 437
24.4 Support 440
24.5 Summary 446
Exercises 447
Chapter 25: Datacenters Overview 449
25.1 Build, Rent, or Outsource 450
25.2 Requirements 452
25.3 Summary 456
Exercises 457
Chapter 26: Running a Datacenter 459
26.1 Capacity Management 459
26.2 Life-Cycle Management 465
26.3 Patch Cables 468
26.4 Labeling 471
26.5 Console Access 475
26.6 Workbench 476
26.7 Tools and Supplies 477
26.8 Summary 480
Exercises 481
Part VI: Helpdesks and Support 483
Chapter 27: Customer Support 485
27.1 Having a Helpdesk 485
27.2 Offering a Friendly Face 488
27.3 Reflecting Corporate Culture 488
27.4 Having Enough Staff 488
27.5 Defining Scope of Support 490
27.6 Specifying How to Get Help 493
27.7 Defining Processes for Staff 493
27.8 Establishing an Escalation Process 494
27.9 Defining “Emergency” in Writing 495
27.10 Supplying Request-Tracking Software 496
27.11 Statistical Improvements 498
27.12 After-Hours and 24/7 Coverage 499
27.13 Better Advertising for the Helpdesk 500
27.14 Different Helpdesks for Different Needs 501
27.15 Summary 502
Exercises 503
Chapter 28: Handling an Incident Report 505
28.1 Process Overview 506
28.2 Phase A—Step 1: The Greeting 508
28.3 Phase B: Problem Identification 509
28.4 Phase C: Planning and Execution 515
28.5 Phase D: Verification 518
28.6 Perils of Skipping a Step 519
28.7 Optimizing Customer Care 521
28.8 Summary 525
Exercises 527
Chapter 29: Debugging 529
29.1 Understanding the Customer’s Problem 529
29.2 Fixing the Cause, Not the Symptom 531
29.3 Being Systematic 532
29.4 Having the Right Tools 533
29.5 End-to-End Understanding of the System 538
29.6 Summary 540
Exercises 540
Chapter 30: Fixing Things Once 541
30.1 Story: The Misconfigured Servers 541
30.2 Avoiding Temporary Fixes 543
30.3 Learn from Carpenters 545
30.4 Automation 547
30.5 Summary 549
Exercises 550
Chapter 31: Documentation 551
31.1 What to Document 552
31.2 A Simple Template for Getting Started 553
31.3 Easy Sources for Documentation 554
31.4 The Power of Checklists 556
31.5 Wiki Systems 557
31.6 Findability 559
31.7 Roll-Out Issues 559
31.8 A Content-Management System 560
31.9 A Culture of Respect 561
31.10 Taxonomy and Structure 561
31.11 Additional Documentation Uses 562
31.12 Off-Site Links 562
31.13 Summary 563
Exercises 564
Part VII: Change Processes 565
Chapter 32: Change Management 567
32.1 Change Review Boards 568
32.2 Process Overview 570
32.3 Change Proposals 570
32.4 Change Classifications 571
32.5 Risk Discovery and Quantification 572
32.6 Technical Planning 573
32.7 Scheduling 574
32.8 Communication 576
32.9 Tiered Change Review Boards 578
32.10 Change Freezes 579
32.11 Team Change Management 581
32.12 Starting with Git 583
32.13 Summary 585
Exercises 585
Chapter 33: Server Upgrades 587
33.1 The Upgrade Process 587
33.2 Step 1: Develop a Service Checklist 588
33.3 Step 2: Verify Software Compatibility 591
33.4 Step 3: Develop Verification Tests 592
33.5 Step 4: Choose an Upgrade Strategy 595
33.6 Step 5: Write a Detailed Implementation Plan 598
33.7 Step 6: Write a Backout Plan 600
33.8 Step 7: Select a Maintenance Window 600
33.9 Step 8: Announce the Upgrade 602
33.10 Step 9: Execute the Tests 603
33.11 Step 10: Lock Out Customers 604
33.12 Step 11: Do the Upgrade with Someone 605
33.13 Step 12: Test Your Work 605
33.14 Step 13: If All Else Fails, Back Out 605
33.15 Step 14: Restore Access to Customers 606
33.16 Step 15: Communicate Completion/Backout 606
33.17 Summary 608
Exercises 610
Chapter 34: Maintenance Windows 611
34.1 Process Overview 612
34.2 Getting Management Buy-In 613
34.3 Scheduling Maintenance Windows 614
34.4 Planning Maintenance Tasks 615
34.5 Selecting a Flight Director 616
34.6 Managing Change Proposals 617
34.7 Developing the Master Plan 620
34.8 Disabling Access 621
34.9 Ensuring Mechanics and Coordination 622
34.10 Change Completion Deadlines 628
34.11 Comprehensive System Testing 628
34.12 Post-maintenance Communication 630
34.13 Reenabling Remote Access 631
34.14 Be Visible the Next Morning 631
34.15 Postmortem 631
34.16 Mentoring a New Flight Director 632
34.17 Trending of Historical Data 632
34.18 Providing Limited Availability 633
34.19 High-Availability Sites 634
34.20 Summary 636
Exercises 637
Chapter 35: Centralization Overview 639
35.1 Rationale for Reorganizing 640
35.2 Approaches and Hybrids 642
35.3 Summary 643
Exercises 644
Chapter 36: Centralization Recommendations 645
36.1 Architecture 645
36.2 Security 645
36.3 Infrastructure 648
36.4 Support 654
36.5 Purchasing 655
36.6 Lab Environments 656
36.7 Summary 656
Exercises 657
Chapter 37: Centralizing a Service 659
37.1 Understand the Current Solution 660
37.2 Make a Detailed Plan 661
37.3 Get Management Support 662
37.4 Fix the Problems 662
37.5 Provide an Excellent Service 663
37.6 Start Slowly 663
37.7 Look for Low-Hanging Fruit 664
37.8 When to Decentralize 665
37.9 Managing Decentralized Services 666
37.10 Summary 667
Exercises 668
Part VIII: Service Recommendations 669
Chapter 38: Service Monitoring 671
38.1 Types of Monitoring 672
38.2 Building a Monitoring System 673
38.3 Historical Monitoring 674
38.4 Real-Time Monitoring 676
38.5 Scaling 684
38.6 Centralization and Accessibility 685
38.7 Pervasive Monitoring 686
38.8 End-to-End Tests 687
38.9 Application Response Time Monitoring 688
38.10 Compliance Monitoring 689
38.11 Meta-monitoring 690
38.12 Summary 690
Exercises 691
Chapter 39: Namespaces 693
39.1 What Is a Namespace? 693
39.2 Basic Rules of Namespaces 694
39.3 Defining Names 694
39.4 Merging Namespaces 698
39.5 Life-Cycle Management 699
39.6 Reuse 700
39.7 Usage 701
39.8 Federated Identity 708
39.9 Summary 709
Exercises 710
Chapter 40: Nameservices 711
40.1 Nameservice Data 711
40.2 Reliability 714
40.3 Access Policy 721
40.4 Change Policies 723
40.5 Change Procedures 724
40.6 Centralized Management 726
40.7 Summary 728
Exercises 728
Chapter 41: Email Service 729
41.1 Privacy Policy 730
41.2 Namespaces 730
41.3 Reliability 731
41.4 Simplicity 733
41.5 Spam and Virus Blocking 735
41.6 Generality 736
41.7 Automation 737
41.8 Monitoring 738
41.9 Redundancy 738
41.10 Scaling 739
41.11 Security Issues 742
41.12 Encryption 743
41.13 Email Retention Policy 743
41.14 Communication 744
41.15 High-Volume List Processing 745
41.16 Summary 746
Exercises 747
Chapter 42: Print Service 749
42.1 Level of Centralization 750
42.2 Print Architecture Policy 751
42.3 Documentation 754
42.4 Monitoring 755
42.5 Environmental Issues 756
42.6 Shredding 757
42.7 Summary 758
Exercises 758
Chapter 43: Data Storage 759
43.1 Terminology 760
43.2 Managing Storage 765
43.3 Storage as a Service 772
43.4 Performance 780
43.5 Evaluating New Storage Solutions 784
43.6 Common Data Storage Problems 787
43.7 Summary 789
Exercises 790
Chapter 44: Backup and Restore 793
44.1 Getting Started 794
44.2 Reasons for Restores 795
44.3 Corporate Guidelines 799
44.4 A Data-Recovery SLA and Policy 800
44.5 The Backup Schedule 801
44.6 Time and Capacity Planning 807
44.7 Consumables Planning 809
44.8 Restore-Process Issues 815
44.9 Backup Automation 816
44.10 Centralization 819
44.11 Technology Changes 820
44.12 Summary 821
Exercises 822
Chapter 45: Software Repositories 825
45.1 Types of Repositories 826
45.2 Benefits of Repositories 827
45.3 Package Management Systems 829
45.4 Anatomy of a Package 829
45.5 Anatomy of a Repository 833
45.6 Managing a Repository 837
45.7 Repository Client 841
45.8 Build Environment 843
45.9 Repository Examples 845
45.10 Summary 848
Exercises 849
Chapter 46: Web Services 851
46.1 Simple Web Servers 852
46.2 Multiple Web Servers on One Host 853
46.3 Service Level Agreements 854
46.4 Monitoring 855
46.5 Scaling for Web Services 855
46.6 Web Service Security 859
46.7 Content Management 866
46.8 Summary 868
Exercises 869
Part IX: Management Practices 871
Chapter 47: Ethics 873
47.1 Informed Consent 873
47.2 Code of Ethics 875
47.3 Customer Usage Guidelines 875
47.4 Privileged-Access Code of Conduct 877
47.5 Copyright Adherence 878
47.6 Working with Law Enforcement 881
47.7 Setting Expectations on Privacy and Monitoring 885
47.8 Being Told to Do Something Illegal/Unethical 887
47.9 Observing Illegal Activity 888
47.10 Summary 889
Exercises 889
Chapter 48: Organizational Structures 891
48.1 Sizing 892
48.2 Funding Models 894
48.3 Management Chain’s Influence 897
48.4 Skill Selection 898
48.5 Infrastructure Teams 900
48.6 Customer Support 902
48.7 Helpdesk 904
48.8 Outsourcing 904
48.9 Consultants and Contractors 906
48.10 Sample Organizational Structures 907
48.11 Summary 911
Exercises 911
Chapter 49: Perception and Visibility 913
49.1 Perception 913
49.2 Visibility 925
49.3 Summary 933
Exercises 934
Chapter 50: Time Management 935
50.1 Interruptions 935
50.2 Follow-Through 937
50.3 Basic To-Do List Management 938
50.4 Setting Goals 939
50.5 Handling Email Once 940
50.6 Precompiling Decisions 942
50.7 Finding Free Time 943
50.8 Dealing with Ineffective People 944
50.9 Dealing with Slow Bureaucrats 944
50.10 Summary 946
Exercises 946
Chapter 51: Communication and Negotiation 949
51.1 Communication 949
51.2 I Statements 950
51.3 Active Listening 950
51.4 Negotiation 954
51.5 Additional Negotiation Tips 958
51.6 Further Reading 960
51.7 Summary 961
Exercises 961
Chapter 52: Being a Happy SA 963
52.1 Happiness 963
52.2 Accepting Criticism 965
52.3 Your Support Structure 965
52.4 Balancing Work and Personal Life 966
52.5 Professional Development 967
52.6 Staying Technical 968
52.7 Loving Your Job 969
52.8 Motivation 970
52.9 Managing Your Manager 972
52.10 Self-Help Books 976
52.11 Summary 976
Exercises 977
Chapter 53: Hiring System Administrators 979
53.1 Job Description 980
53.2 Skill Level 982
53.3 Recruiting 983
53.4 Timing 985
53.5 Team Considerations 987
53.6 The Interview Team 990
53.7 Interview Process 991
53.8 Technical Interviewing 994
53.9 Nontechnical Interviewing 998
53.10 Selling the Position 1000
53.11 Employee Retention 1000
53.12 Getting Noticed 1001
53.13 Summary 1002
Exercises 1003
Chapter 54: Firing System Administrators 1005
54.1 Cooperate with Corporate HR 1006
54.2 The Exit Checklist 1007
54.3 Removing Access 1007
54.4 Logistics 1011
54.5 Examples 1011
54.6 Supporting Infrastructure 1014
54.7 Summary 1015
Exercises 1016
Part X: Being More Awesome 1017
Chapter 55: Operational Excellence 1019
55.1 What Does Operational Excellence Look Like? 1019
55.2 How to Measure Greatness 1020
55.3 Assessment Methodology 1021
55.4 Service Assessments 1025
55.5 Organizational Assessments 1029
55.6 Levels of Improvement 1030
55.7 Getting Started 1031
55.8 Summary 1032
Exercises 1033
Chapter 56: Operational Assessments 1035
56.1 Regular Tasks (RT) 1036
56.2 Emergency Response (ER) 1039
56.3 Monitoring and Metrics (MM) 1041
56.4 Capacity Planning (CP) 1043
56.5 Change Management (CM) 1045
56.6 New Product Introduction and Removal (NPI/NPR) 1047
56.7 Service Deployment and Decommissioning (SDD) 1049
56.8 Performance and Efficiency (PE) 1051
56.9 Service Delivery: The Build Phase 1054
56.10 Service Delivery: The Deployment Phase 1056
56.11 Toil Reduction 1058
56.12 Disaster Preparedness 1060
Epilogue 1063
Part XI: Appendices 1065
Appendix A: What to Do When . . . 1067
Appendix B: The Many Roles of a System Administrator 1089
B.1 Common Positive Roles 1090
B.2 Negative Roles 1107
B.3 Team Roles 1109
B.4 Summary 1112
Exercises 1112
Bibliography 1115
Index 1121
商品描述(中文翻譯)
<關於>
特點
教導學生如何通過提倡簡單、清晰、普適、自動化和溝通,並優先考慮基礎知識來最大化他們作為管理員的效能
討論現代管理問題,包括BYOD和最新的安全範式
由一個由世界知名IT管理員組成的團隊撰寫,其中包括傳奇的SAGE傑出成就獎得主Christina Hogan和Thomas Limoncelli
教導如何做出幫助學生優秀的決策
兩卷中的第一卷:最近的附屬卷涵蓋DevOps和雲端管理
<描述>
第三版的《系統和網路管理實踐》新增了28個章節!根據讀者反饋進行了數千次更新和澄清,這個新版還將DevOps策略納入非DevOps環境中。
無論您使用Linux、Unix還是Windows,這本新版書描述了以前只有從師傅到門徒傳授的基本實踐。這本豐富而清晰,時常幽默的資訊寶庫,介紹了對整個職業生涯都有價值的初學者到高級框架,並且結構設計得可以幫助專家完成困難的專案。
其他書籍告訴您要輸入哪些指令。這本書教導您跨平台的策略,這些策略是永恆的!
DevOps技術:將DevOps原則應用於企業IT基礎設施,即使在沒有開發人員的環境中也可以
改變遊戲規則的策略:以更少的壓力更快地交付結果的新方法
車隊管理:全面指南,管理您的桌面、筆記型電腦、伺服器和移動設備
服務管理:如何設計、啟動、升級和遷移服務
可衡量的改進:評估您的運營效能;一個四十頁的無痛評估系統,您可以立即開始使用,提高所有服務的質量
設計指南:網路、資料中心、電子郵件、儲存、監控、備份等最佳實踐
管理技能:組織設計、溝通、談判、倫理、招聘和解雇等
您是否曾經遇到以下問題?
發現您的備份磁帶是空的,感到驚訝嗎?
花了一年時間推出一個新服務,卻被告知用戶討厭它?
收到的支援請求超過您的處理能力嗎?
花費更多時間修復問題,而不是建立下一個令人驚艷的東西嗎?
曾經遭受遷移數千個使用者到新服務的失敗嗎?
您的公司依賴一台如果壞了就無法重建的電腦嗎?
您的網路是一團脆弱的混亂,在您嘗試改進時總是出問題嗎?