SuSE Linux Server
Home > Computing and Information Technology > Operating systems > Open source and other operating systems > SuSE Linux Server
SuSE Linux Server

SuSE Linux Server

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

The SuSE Linux Server demonstrates how to: master the ins and outs of Linux installation and configuration; Manage privileged and ordinary users, groups, and disk quotas; Control, monitor, prioritize, and automate programs using various tools; Set up DNS, SMTP, POP3, HTTP, FTP, IRC and SQL servers; Secure your server using firewalls and tools like Satan, Cops, etc.; Design a load--balanced, multi--server Apache--based Web network; Set up Samba and NFS fileserver for your office network.

Table of Contents:
Foreword. Preface. Acknowledgments. PART I: Installing and Getting Started with SuSE Linux. Chapter 1. Installation and Basic Configuration. The Big Bang! Introducing SuSE Linux. Checking Your Hardware Requirements. Preparing to Install SuSE Linux. Creating a boot disk under MS Windows 9x/2000. Creating a boot disk under Linux. Installation Overview. Installing SuSE Linux. Configuring SuSE Linux Networking. Chapter 2. The Boot and Shutdown Processes. Starting the Linux Kernel. Configuring init. The/sbin/init.d directory. The/etc/rc.d/rc script. The/etc/rc.d/rc 0 6 .d directories. Booting Up Your System. Shutting Down Your System. Canceling a shutdown. Rebooting your server. Rebooting using Ctrl+Alt+Del. Automatic shutdown on power failure. Managing init Files. Using YaST to manage run levels. Removing a service. Examining the network script. The System Configuration Files. Chapter 3. Understanding Linux/UNIX Files and Devices. Understanding File/Directory Permissions. Changing ownership of files/directories using chown. Changing the group of files/directories using chgrp. Understanding access permissions using octal numbers. Understanding access permissions using access strings. Changing access privileges of files/directories using chmod. Special notes on directory permissions. Managing Links. Changing permissions or ownership of a hard link. Changing permissions or ownership of a soft link. Creating a Permission Policy for a Multiuser Server. Setting users' configuration file permissions. Setting default file permissions for users. Setting executable file permissions. Working with Files and Directories. Viewing files and directories. Navigating your way into directories. Determining file type. Viewing the access statistics of a file or directory. Copying files and directories. Moving files and directories. Deleting files and directories. Finding files. Overriding the default file permission mask. Using ext2 File System--Specific Permissions. Chapter 4. Everyday Commands. Understanding the UNIX Command Line. Basics of metacharacters. Basics of regular expressions. How to Use Online man Pages. General File and Directory Commands. cat. chmod. chown. clear. cmp. cp. cut. diff. du. fgrep. file. find. grep. head. In. locate. ls. mkdir. mv. pwd. rm. sort. tail. touch. umask. uniq. vi. wc. whatis. whereis. which. File Compression and Archive--Specific Commands. compress. gunzip. gzip. rpm. tar. uncompress. File System--Specific Commands. dd. df. fdformat. mkfs. mkswap. mount. swapoff. swapon. umount. System Status--Specific Commands. dmesg. free. shutdown. uname. uptime. User Administration Commands. chfn. chsh. groupadd. groupmod. groups. last. passwd. su. useradd. userdel. usermod. who. whoami. User Commands for Accessing Network Services. finger. ftp. mail. rlogin. talk. Telnet. wall. Network Administrator's Commands. hostname. ifconfig. netstat. ping. route. traceroute. Process Management Commands. bg. fg. jobs. kill. killall. ps. top. crontab. Productivity Commands. bc. cal. mesg. write. Shell Commands. alias. history. set. source. unalias. PART II: Managing Users, Processes, and the Networks. Chapter 5. Using YaST. Introducing YaST. What Does YaST Do? Modifying your server's installation features. Choose or install SuSE software packages. Updating the system. Administering your system. Miscellaneous features. Chapter 6. User Administration. Becoming Superuser. Assigning Privileges to Ordinary Users. Managing Users with Command--Line Tools. Creating a new user account. Creating a new group. Modifying an existing user account. Modifying an existing group. Deleting or disabling a user account. Creating default user settings. Managing Users with YaST. Adding a new user account. Modifying an existing user account. Adding, modifying, and deleting groups. Chapter 7. Process Administration. Starting Processes. Controlling and Monitoring Processes. Using ps to get process status. Signaling a running process. Controlling process priority. Monitoring Processes and System Load. Using top. Using vmstat. Using uptime. Logging Processes. Configuring syslog. Monitoring logs using tail. Scheduling Processes. Using at. Using cron. Chapter 8. Network Administration. Basics of TCP/IP Networking. Introducing the TCP/IP protocol. Introducing TCP/IP networks. Dividing a Network into Subnetworks. Introducing IP Routing. Configuring a Network Interface. Manually configuring network interface cards. Modifying the network startup scripts. Configure a network interface card with YaST. Routing Between Two Subnets. Gateway computer configuration. Host computer configuration. PART III: Setting Up Intranet/Internet Services. Chapter 9. Configuring your Domain Name Service. Understanding DNS. Configuring a DNS Client. Configuring a DNS Server. Understanding the/etc/named.conf file. Configuring zone files. Master/primary DNS server. Slave/secondary DNS server. Reverse DNS server. Cache--only/slave DNS server. Controlling the DNS server. Testing Your DNS Server. Managing DNS for Virtual Domains. Balancing Load Using the DNS Server. Chapter 10. E--mail Service. Choosing sendmail. Using the default SuSE sendmail configuration. Configuring sendmail. Modifying the/etc/sendmail.cf and/etc/mail/sendmail.cw files. Configuring DNS to work with sendmail. Starting and stopping sendmail. Describing the/etc/sendmail.cf in detail. Configuring the/etc/mail/ files. Testing Your sendmail Configuration. Testing sendmail address rewrite rules. Testing/etc/mail/ database files. Using sendmail to see the SMTP transaction verbosely. Using the sendmail debug flag. Using a test configuration file. Securing sendmail. Securing your configuration files. Ensuring a stricter mode of operating and privacy. Antispam Measures. Dealing with third--party mail relay vulnerability. Sending spammers to the black hole. Setting Up POP and IMAP Servers. How does it work? Configuring POP service. Using IMAP. Configuring SMTP/POP/IMAP Mail Clients. Commercial Alternatives to sendmail. Sendmail Pro. qmail. Chapter 11. Web Service. System Requirements for Apache. Sufficient disk space. Sufficient RAM. Other requirements. Starting Apache. Configuring Apache. Configuring httpd.conf. srm.conf and access.conf files. Testing the Apache server. Managing Your Apache Server. Configuring Apache for CGI scripts. Configuring Apache for server--side includes. Hosting virtual Web sites. Authenticating Web users. Monitoring server status. Logging hits and errors. Enhancing Web server security. Using SSL for secured transactions. Chapter 12. Configuring an FTP Server. Using Washington State FTP. Configuring FTP service. Creating an anonymous FTP site. Creating a guest FTP account. Creating virtual FTP sites. Using a Commercial FTP Server. Using a Trivial File Transfer Protocol Server. Chapter 13. Other Popular Services. Setting Up Internet Relay Chat Service. Installing an IRC server. Configuring an IRC server. Running an IRC server. Installing and using an IRC client. Setting Up a Usenet News Service. Configuring an INN server. Accessing your INN server. PART IV: Setting Up File Sharing and Database Services. Chapter 14. Sharing Files and Printers with Samba. Installing Samba. Configuring Samba. The global configuration. The homes configuration. The printers configuration. Using GUI Configuration Tools. Testing the/etc/smb.conf configuration. Starting, stopping, and restarting the Samba service. Practical Uses of Samba. Using a Linux file server on Windows. Using a Windows file server on your Linux system. Sharing a Linux printer with Windows. Using an interactive Samba client. Securing Your Samba Server. Using a Windows NT server as a password server. Using encrypted passwords on your Samba server. Chapter 15. Using the Network File System. Introducing the NFS Server. Configuring an NFS Server. Granting read--only access to the exported directory. Granting read/write access to the exported directory. Disabling access to a certain directory. Mapping users between the NFS server and the clients. Using NFS Utilities. Securing Your NFS Server. Distributing Files Using rdist. Chapter 16. Structured Query Language Database Services. What Is SQL? Installing and Configuring a SQL Server: MySQL. Starting the SQL Server. Accessing the SQL Server. Starting MySQL client for the first time. Creating a database. Interacting with the SQL Server Using Scripts. SQL interactions from the UNIX command prompt. Using a CGI script to access a SQL database via a Web browser. PART V: Securing and Monitoring. Chapter 17. Security 101. Securing User Access. Restricting physical access. Restricting normal user access. Restricting superuser access. Restricting all access in an emergency or attack. Securing the User Authentication Process. Using shadow passwords. Understanding Pluggable Authentication Modules. Securing Services. Removing unnecessary services during OS installation. Securing inetd--run services. Protecting Your Files and File Systems. Mounting file systems as read--only. Taking advantage of the EXT2 file system. Using Tripwire for ensuring file integrity. Back Up and Backtrack Everything. Get the Latest Security News. CERT. BUGTRAQ@NETSPACE.ORG. Chapter 18. Network Security. Understanding the Security Problem. Ethernet sniffing. IP spoofing. Designing a Secure Network. Using nonroutable IP addresses. Masquerading IP addresses. What Is a Firewall? IP packet filters. Using a basic packet--filtering firewall: ipchains. An application--level firewall. Using the Squid Proxy Server. Getting and installing Squid. Using Squid for the first time. Modifying Squid to fit your needs. Probing Your Network with nmap. Port scan your Linux server. Port scan another Linux box. Port scan a Windows computer. Fingerprinting your network. Blocking scans with a firewall. PART VI: Tuning for Performance. Chapter 19. Hacking the Kernel. Why Do You Need a Newer Kernel? Customizing the Kernel. Verifying you have the necessary compilers. Installing the Linux kernel source. Configuring the kernel manually. Configuring the kernel using make menuconfig. Compiling, Installing, and Booting the New Kernel. Patching a Kernel. Creating the Initial ramdisk. Configuring LILO. Booting With the New Kernel. Chapter 20. Building a Multiserver Web Network. Requirements for the Web Network. Designing the Web Network. Considering a round--robin DNS solution. Considering a hardware load--balancing solution. Choosing the correct load--balancing solution. Allocating IP Addresses. Configuring the Network. Setting up the network for a name server computer. Setting up the network interfaces for each Web server. Setting up network interfaces of the WSD Pro director. Testing the network configuration. Setting Up the DNS Server. Setting Up the NFS Server. Setting Up the Mail (SMTP/POP3/IMAP) Server. Setting Up the FTP Server. Setting Up rdist on the Name Server. Setting Up Each Web Server. Setting up the NFS client configuration. Setting up sendmail to relay to the smart host. Setting up rdist for file distribution from ns.aminews--lan.com. Setting Up the Web Director. Creating the Web services farm. Creating the related network services farm. Managing the Network. Taking a server out of service. Prioritizing server selection. Monitoring server load and statistics. Adding a new Web server in the Web server farm. Adding Client Web Sites. Appendix A: What's on the CD--ROM. Appendix B: Linux Resources. Appendix C: Linux Printing. Appendix D: The/etc/rc.config File. Index. End--User License Agreement. GNU General Public License. CD--ROM Installation Instructions.


Best Sellers


Product Details
  • ISBN-13: 9780764547652
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Hungry Minds Inc,U.S.
  • Height: 233 mm
  • Returnable: N
  • Width: 191 mm
  • ISBN-10: 0764547658
  • Publisher Date: 15 Nov 2000
  • Binding: SA
  • Language: English
  • Weight: 1106 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
SuSE Linux Server
John Wiley & Sons Inc -
SuSE Linux Server
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

SuSE Linux Server

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!