Red Hat Enterprise Linux 5 Administration Unleashed

Author:   Tammy Fox
Publisher:   Pearson Education (US)
ISBN:  

9780672328923


Pages:   624
Publication Date:   27 April 2007
Format:   Paperback
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Red Hat Enterprise Linux 5 Administration Unleashed


Add your own review!

Overview

This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.   Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how to maximize your efficiency and effectiveness by automating day-to-day maintenance through scripting, deploying security updates via Red Hat Network, implementing central identity management services, and providing shared data with NFS and Samba.   Red Hat Enterprise Linux 5 Administration Unleashed contains extensive coverage of network and web services, from the Apache HTTP server and Sendmail email services to remote login with OpenSSH. Fox also describes Red Hat’s most valuable tools for monitoring and optimization and presents thorough coverage of security—including a detailed introduction to Security-Enhanced Linux (SELinux).   Streamline deployment with Kickstart Find, install, update, remove, and verify software Detect, analyze, and manage hardware Manage storage with LVM, RAID, ACLs, and quotas Use Red Hat Enterprise Linux 5 on 64-bit and multi-core systems Administer users and groups more efficiently and securely Ensure trustworthy backup and rapid recovery Script and schedule tasks to run automatically Provide unified identity management services Configure Apache, BIND, Samba, and Sendmail Monitor and tune the kernel and individual applications Protect against intruders with SELinux and ExecShield Set up firewalls with iptables Enable the Linux Auditing System Use virtualization to run multiple operating systems concurrently   Part I     Installation and Configuration Chapter 1 Installing Red Hat Enterprise Linux Chapter 2 Post-Installation Configuration Chapter 3 Operating System Updates   Part II Operating System Core Concepts Chapter 4 Understanding Linux Concepts  Chapter 5 Working with RPM Software Chapter 6 Analyzing Hardware Chapter 7 Managing Storage Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors Part III System Administration Chapter 9 Managing Users and Groups Chapter 10 Techniques for Backup and Recovery Chapter 11 Automating Tasks with Scripts   Part IV Network Services Chapter 12 Identity Management Chapter 13 Network File Sharing Chapter 14 Granting Network Connectivity with DHCP Chapter 15 Creating a Web Server with the Apache HTTP Server   Chapter 16 Hostname Resolution with BIND Chapter 17 Securing Remote Logins with OpenSSH Chapter 18 Setting Up an Email Server with Sendmail Chapter 19 Explaining Other Common Network Services Part V Monitoring and Tuning Chapter 20 Monitoring System Resources   Chapter 21 Monitoring and Tuning the Kernel Chapter 22 Monitoring and Tuning Applications   Chapter 23 Protecting Against Intruders with Security-Enhanced Linux   Chapter 24 Configuring a Firewall Chapter 25 Linux Auditing System Appendixes Appendix A Installing Proprietary Kernel Modules  Appendix B Creating Virtual Machines   Appendix C Preventing Security Breaches with ExecShield Appendix D Troubleshooting Tammy Fox served as technical leader of Red Hat’s documentation group, where she wrote and revised The Red Hat Enterprise Linux System Administration Guide. She was founding editor of Red Hat Magazine, now an online publication reaching more than 800,000 system administrators and others interested in Linux and open source. She wrote Red Hat’s LogViewer tool and has written and contributed to several Red Hat configuration tools. Fox is also the founding leader of the Fedora Docs Project.   Register your book at www.samspublishing.com/register for convenient access to updates and to download example scripts presented in this book.   Category: Linux/Networking Covers: Red Hat Enterprise Linux 5 User Level: Intermediate–Advanced  

Full Product Details

Author:   Tammy Fox
Publisher:   Pearson Education (US)
Imprint:   Sams Publishing
Dimensions:   Width: 18.00cm , Height: 3.60cm , Length: 23.10cm
Weight:   0.958kg
ISBN:  

9780672328923


ISBN 10:   0672328925
Pages:   624
Publication Date:   27 April 2007
Audience:   College/higher education ,  Tertiary & Higher Education
Format:   Paperback
Publisher's Status:   Out of Print
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Part I Installation and Configuration Chapter 1 Installing Red Hat Enterprise Linux Choosing an Installation Method Creating the Installation Source Starting the Installation Performing the Installation Installing with Kickstart Installing with PXE Performing an Upgrade Red Hat Network Provisioning Summary Chapter 2 Post-Installation Configuration Red Hat Setup Agent Logging In for the First Time Network Configuration Printer Configuration Adding Boot Parameters Summary Chapter 3 Operating System Updates Navigating Through the RHN Website Assigning Users for the RHN Website Subscribing to RHN Channels Performing Actions on Individual Systems from the RHN Website Using System Groups on the RHN Website Retrieving Software from RHN with YUM Summary Part II Operating System Core Concepts Chapter 4 Understanding Linux Concepts Learning the Desktop Filesystem Hierarchy System Shell Basics Becoming the Root User Manual Pages Editing Text Files File Permissions Initialization Scripts Runlevels Summary Chapter 5 Working with RPM Software Understanding How RPM Works Finding the Software Installing Software Updating Software Removing Software Verifying Software Files Querying Package Files Building RPM Packages Summary Chapter 6 Analyzing Hardware Listing Devices Detecting Hardware Gathering Information from the BIOS Listing and Configuring Kernel Modules HAL Summary Chapter 7 Managing Storage Understanding Partitioning Understanding LVM Understanding RAID Understanding Clustering and GFS Using Access Control Lists Using Disk Quotas Summary Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors 64-Bit Processors Multi-Core Processors Processors with Hyper-Threading Technology Summary Part III System Administration Chapter 9 Managing Users and Groups What Are Users and Groups? Managing Users Managing Groups How It All Works Best Practices Summary Chapter 10 Techniques for Backup and Recovery Writing a Backup Plan Using Amanda for Backups Other Linux Backup Utilities Recovery and Repair Summary Chapter 11 Automating Tasks with Scripts Writing Scripts with Bash Additional Scripting Languages Scheduling Tasks with Cron Summary Part IV Network Services 12 Identity Management Understanding PAM Enabling NIS Enabling LDAP Enabling Kerberos Enabling SMB or Winbind Authentication Enabling with the Authentication Tool Summary Chapter 13 Network File Sharing Network File System Samba File Sharing Summary Chapter 14 Granting Network Connectivity with DHCP Allowing Connections Configuring the Server Logging Connections Summary Chapter 15 Creating a Web Server with the Apache HTTP Server Apache HTTP Server and SELinux Allowing Connections Configuring the Server Logging Connections Starting and Stopping the Server Summary Chapter 16 Hostname Resolution with BIND Understanding DNS Concepts Allowing Connections Configuring BIND Configuring BIND Graphically Logging Connections Summary Chapter 17 Securing Remote Logins with OpenSSH Allowing Connections Configuring the Server Connecting from the Client Logging Connections Summary Chapter 18 Setting Up an Email Server with Sendmail Understanding Email Concepts Configuring Sendmail Using POP and IMAP Logging Sendmail Connections Allowing Email Connections Summary Chapter 19 Explaining Other Common Network Services The xinetd Super Server Keeping Accurate Time with NTP Creating a Network Printer with CUPS Summary Part V Monitoring and Tuning Chapter 20 Monitoring System Resources Reporting Filesystem Usage Reporting Disk Performance Reporting System Processes Reporting on the System Processors Reporting Memory Usage Reporting on the Network Subsystem Generating a System Report Locating Log Files Viewing Log Files with Logwatch Summary Chapter 21 Monitoring and Tuning the Kernel Using the /proc Directory . Optimizing Virtual Memory Managing Memory with NUMA Using AltSysRq to Execute System Requests Saving Kernel Dumps for Analysis Setting SMP IRQ Affinity Enabling NMI Watchdog for Locked Systems Summary Chapter 22 Monitoring and Tuning Applications OProfile Valgrind Additional Programs to Consider Summary Chapter 23 Protecting Against Intruders with Security-Enhanced Linux Selecting an SELinux Mode Selecting and Customizing the SELinux Policy Utilizing the SELinux Troubleshooting Tool Working with Security Contexts Summary Chapter 24 Configuring a Firewall Selecting a Table and Command for IPTables Selecting IPTables Options Using IPTables Match Extensions Using IPTables Target Extensions Starting and Stopping the IPTables Service Saving the IPTables Rules IPTables Examples Enabling the Default Firewall Summary Chapter 25 Linux Auditing System Configuring the Audit Daemon Writing Audit Rules and Watches Starting and Stopping the Daemon Analyzing the Records Tracing a Process with Audit Summary Appendixes Appendix A Installing Proprietary Kernel Modules Installing Proprietary Modules Installing the nVidia Display Driver Recognizing a Tainted Kernel Appendix B Creating Virtual Machines Virtualization System Requirements Installing Virtualization Setting Up the VM and Installing the Guest OS Introducing the virsh Command Starting and Stopping the Virtual Machine Modifying Dedicated Resources Performing Additional Actions Managing VMs with the xm Utility Appendix C Preventing Security Breaches with ExecShield 547 How ExecShield Works Determining Status of ExecShield Disabling ExecShield Appendix D Troubleshooting Installation and Configuration Troubleshooting OS Core Concepts Troubleshooting System Administration Troubleshooting Network Troubleshooting Monitoring and Tuning Troubleshooting Security Troubleshooting

Reviews

Author Information

Tammy Fox has been using Linux for programming, writing, system administration, and all day-to-day computer tasks for more than 10 years. From 2000 until 2005, she worked for Red Hat as a technical writer, team lead, programmer, build script maintainer, magazine editor, and marketing project manager. During her time in documentation, she created a new manual, the Red Hat Linux Customization Guide, which eventually became the Red Hat Enterprise Linux System Administration Guide. She also wrote and contributed to the Red Hat configuration tools, including writing Red Hat Logviewer. Before joining Red Hat, Tammy co-wrote and taught Linux integration and performance classes for a leading computer manufacturer. She has also been a computer consultant for leading computer communication companies. Tammy has founded three efforts to continue the education of Linux users. She is the founding editor of Red Hat Magazine, which continues to be an online publication. She is also the founding leader of the Fedora Docs Project, acting as the organizer, a writer, and an editor. And she continues to provide free online content for new Linux users with her website www.linuxheadquarters.com, which was established with her husband in 2000.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List