Red Hat Enterprise Linux Administration Unleashed - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer programming / software engineering > Programming and scripting languages: general > Red Hat Enterprise Linux Administration Unleashed: (Unleashed)
Red Hat Enterprise Linux Administration Unleashed: (Unleashed)

Red Hat Enterprise Linux Administration Unleashed: (Unleashed)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.   Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how to maximize your efficiency and effectiveness by automating day-to-day maintenance through scripting, deploying security updates via Red Hat Network, implementing central identity management services, and providing shared data with NFS and Samba.   Red Hat Enterprise Linux 5 Administration Unleashed contains extensive coverage of network and web services, from the Apache HTTP server and Sendmail email services to remote login with OpenSSH. Fox also describes Red Hat’s most valuable tools for monitoring and optimization and presents thorough coverage of security—including a detailed introduction to Security-Enhanced Linux (SELinux).   Streamline deployment with Kickstart Find, install, update, remove, and verify software Detect, analyze, and manage hardware Manage storage with LVM, RAID, ACLs, and quotas Use Red Hat Enterprise Linux 5 on 64-bit and multi-core systems Administer users and groups more efficiently and securely Ensure trustworthy backup and rapid recovery Script and schedule tasks to run automatically Provide unified identity management services Configure Apache, BIND, Samba, and Sendmail Monitor and tune the kernel and individual applications Protect against intruders with SELinux and ExecShield Set up firewalls with iptables Enable the Linux Auditing System Use virtualization to run multiple operating systems concurrently   Part I     Installation and Configuration Chapter 1 Installing Red Hat Enterprise Linux Chapter 2 Post-Installation Configuration Chapter 3 Operating System Updates   Part II Operating System Core Concepts Chapter 4 Understanding Linux Concepts  Chapter 5 Working with RPM Software Chapter 6 Analyzing Hardware Chapter 7 Managing Storage Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors Part III System Administration Chapter 9 Managing Users and Groups Chapter 10 Techniques for Backup and Recovery Chapter 11 Automating Tasks with Scripts   Part IV Network Services Chapter 12 Identity Management Chapter 13 Network File Sharing Chapter 14 Granting Network Connectivity with DHCP Chapter 15 Creating a Web Server with the Apache HTTP Server   Chapter 16 Hostname Resolution with BIND Chapter 17 Securing Remote Logins with OpenSSH Chapter 18 Setting Up an Email Server with Sendmail Chapter 19 Explaining Other Common Network Services Part V Monitoring and Tuning Chapter 20 Monitoring System Resources   Chapter 21 Monitoring and Tuning the Kernel Chapter 22 Monitoring and Tuning Applications   Chapter 23 Protecting Against Intruders with Security-Enhanced Linux   Chapter 24 Configuring a Firewall Chapter 25 Linux Auditing System Appendixes Appendix A Installing Proprietary Kernel Modules  Appendix B Creating Virtual Machines   Appendix C Preventing Security Breaches with ExecShield Appendix D Troubleshooting Tammy Fox served as technical leader of Red Hat’s documentation group, where she wrote and revised The Red Hat Enterprise Linux System Administration Guide. She was founding editor of Red Hat Magazine, now an online publication reaching more than 800,000 system administrators and others interested in Linux and open source. She wrote Red Hat’s LogViewer tool and has written and contributed to several Red Hat configuration tools. Fox is also the founding leader of the Fedora Docs Project.   Register your book at www.samspublishing.com/register for convenient access to updates and to download example scripts presented in this book.   Category: Linux/Networking Covers: Red Hat Enterprise Linux 5 User Level: Intermediate–Advanced  

Table of Contents:
Part I     Installation and Configuration Chapter 1 Installing Red Hat Enterprise Linux Choosing an Installation Method Creating the Installation Source Starting the Installation Performing the Installation Installing with Kickstart Installing with PXE Performing an Upgrade Red Hat Network Provisioning Summary   Chapter 2 Post-Installation Configuration Red Hat Setup Agent Logging In for the First Time Network Configuration Printer Configuration Adding Boot Parameters Summary   Chapter 3 Operating System Updates Navigating Through the RHN Website Assigning Users for the RHN Website Subscribing to RHN Channels Performing Actions on Individual Systems from the RHN Website Using System Groups on the RHN Website Retrieving Software from RHN with YUM Summary   Part II Operating System Core Concepts   Chapter 4 Understanding Linux Concepts Learning the Desktop Filesystem Hierarchy System Shell Basics Becoming the Root User Manual Pages Editing Text Files File Permissions Initialization Scripts Runlevels Summary   Chapter 5 Working with RPM Software Understanding How RPM Works Finding the Software Installing Software Updating Software Removing Software Verifying Software Files Querying Package Files Building RPM Packages Summary   Chapter 6 Analyzing Hardware Listing Devices Detecting Hardware Gathering Information from the BIOS Listing and Configuring Kernel Modules HAL Summary   Chapter 7 Managing Storage Understanding Partitioning Understanding LVM Understanding RAID Understanding Clustering and GFS Using Access Control Lists Using Disk Quotas Summary   Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors 64-Bit Processors Multi-Core Processors Processors with Hyper-Threading Technology Summary   Part III System Administration   Chapter 9 Managing Users and Groups What Are Users and Groups? Managing Users Managing Groups How It All Works Best Practices Summary   Chapter 10 Techniques for Backup and Recovery Writing a Backup Plan Using Amanda for Backups Other Linux Backup Utilities Recovery and Repair Summary   Chapter 11 Automating Tasks with Scripts Writing Scripts with Bash Additional Scripting Languages Scheduling Tasks with Cron Summary   Part IV Network Services   12 Identity Management Understanding PAM Enabling NIS Enabling LDAP Enabling Kerberos Enabling SMB or Winbind Authentication Enabling with the Authentication Tool Summary   Chapter 13 Network File Sharing Network File System Samba File Sharing Summary   Chapter 14 Granting Network Connectivity with DHCP Allowing Connections Configuring the Server Logging Connections Summary   Chapter 15 Creating a Web Server with the Apache HTTP Server Apache HTTP Server and SELinux Allowing Connections Configuring the Server Logging Connections Starting and Stopping the Server Summary   Chapter 16 Hostname Resolution with BIND Understanding DNS Concepts Allowing Connections Configuring BIND Configuring BIND Graphically Logging Connections Summary   Chapter 17 Securing Remote Logins with OpenSSH Allowing Connections Configuring the Server Connecting from the Client Logging Connections Summary   Chapter 18 Setting Up an Email Server with Sendmail Understanding Email Concepts Configuring Sendmail Using POP and IMAP Logging Sendmail Connections Allowing Email Connections Summary   Chapter 19 Explaining Other Common Network Services The xinetd Super Server Keeping Accurate Time with NTP Creating a Network Printer with CUPS Summary   Part V Monitoring and Tuning   Chapter 20 Monitoring System Resources Reporting Filesystem Usage Reporting Disk Performance Reporting System Processes Reporting on the System Processors Reporting Memory Usage Reporting on the Network Subsystem Generating a System Report Locating Log Files Viewing Log Files with Logwatch Summary   Chapter 21 Monitoring and Tuning the Kernel Using the /proc Directory . Optimizing Virtual Memory Managing Memory with NUMA Using AltSysRq to Execute System Requests Saving Kernel Dumps for Analysis Setting SMP IRQ Affinity Enabling NMI Watchdog for Locked Systems Summary   Chapter 22 Monitoring and Tuning Applications OProfile Valgrind Additional Programs to Consider Summary   Chapter 23 Protecting Against Intruders with Security-Enhanced Linux Selecting an SELinux Mode Selecting and Customizing the SELinux Policy Utilizing the SELinux Troubleshooting Tool Working with Security Contexts Summary   Chapter 24 Configuring a Firewall Selecting a Table and Command for IPTables Selecting IPTables Options Using IPTables Match Extensions Using IPTables Target Extensions Starting and Stopping the IPTables Service Saving the IPTables Rules IPTables Examples Enabling the Default Firewall Summary   Chapter 25 Linux Auditing System Configuring the Audit Daemon Writing Audit Rules and Watches Starting and Stopping the Daemon Analyzing the Records Tracing a Process with Audit Summary   Appendixes   Appendix A Installing Proprietary Kernel Modules Installing Proprietary Modules Installing the nVidia Display Driver Recognizing a Tainted Kernel   Appendix B Creating Virtual Machines Virtualization System Requirements Installing Virtualization Setting Up the VM and Installing the Guest OS Introducing the virsh Command Starting and Stopping the Virtual Machine Modifying Dedicated Resources Performing Additional Actions Managing VMs with the xm Utility   Appendix C Preventing Security Breaches with ExecShield 547 How ExecShield Works Determining Status of ExecShield Disabling ExecShield   Appendix D Troubleshooting Installation and Configuration Troubleshooting OS Core Concepts Troubleshooting System Administration Troubleshooting Network Troubleshooting Monitoring and Tuning Troubleshooting Security Troubleshooting

About the Author :
Tammy Fox has been using Linux for programming, writing, system administration, and all day-to-day computer tasks for more than 10 years. From 2000 until 2005, she worked for Red Hat as a technical writer, team lead, programmer, build script maintainer, magazine editor, and marketing project manager. During her time in documentation, she created a new manual, the Red Hat Linux Customization Guide, which eventually became the Red Hat Enterprise Linux System Administration Guide. She also wrote and contributed to the Red Hat configuration tools, including writing Red Hat Logviewer. Before joining Red Hat, Tammy co-wrote and taught Linux integration and performance classes for a leading computer manufacturer. She has also been a computer consultant for leading computer communication companies. Tammy has founded three efforts to continue the education of Linux users. She is the founding editor of Red Hat Magazine, which continues to be an online publication. She is also the founding leader of the Fedora Docs Project, acting as the organizer, a writer, and an editor. And she continues to provide free online content for new Linux users with her website www.linuxheadquarters.com, which was established with her husband in 2000.


Best Sellers


Product Details
  • ISBN-13: 9780768666557
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Sams Publishing
  • Language: English
  • ISBN-10: 0768666554
  • Publisher Date: 20 Apr 2007
  • Binding: Digital download
  • Series Title: Unleashed


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Red Hat Enterprise Linux Administration Unleashed: (Unleashed)
Pearson Education (US) -
Red Hat Enterprise Linux Administration Unleashed: (Unleashed)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Red Hat Enterprise Linux Administration Unleashed: (Unleashed)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!