Essential system administration

Essential System Administration,3rd Edition is the definitive guide for Unix system administration, covering all the fundamental and essential tasks required to run such divergent Unix systems as AIX, FreeBSD, HP-UX, Linux, Solaris, Tru64 and more. Essential System Administration provides a clear, c...

Descripción completa

Detalles Bibliográficos
Autor principal: Frisch, AEleen (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Sebastopol, California : O'Reilly 2002.
Edición:3rd ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627256106719
Tabla de Contenidos:
  • Essential System Administration, 3rd Edition; Audience; Organization; Conventions Used in This Book; Comments and Questions; Acknowledgments; 1. Introduction to System Administration; 1.2. Becoming Superuser; 1.2.2. Running a Single Command as root; 1.2.3. sudo: Selective Access to Superuser Commands; 1.3. Communicating with Users; 1.3.2. Sending a Message to All Users; 1.3.3. The Message of the Day; 1.3.4. Specifying the Pre-Login Message; 1.4. About Menus and GUIs; 1.4.2. AIX: SMIT and WSM; 1.4.3. HP-UX: SAM; 1.4.4. Solaris: admintool and Sun Management Console; 1.4.5. Linux: Linuxconf
  • 1.4.6. Red Hat Linux: redhat-config-*1.4.7. SuSE Linux: YaST2; 1.4.8. FreeBSD: sysinstall; 1.4.9. Tru64: SysMan; 1.4.10. Other Freely Available Administration Tools; 1.4.11. VNC; 1.5. Where Does the Time Go?; 2. The Unix Way; 2.1.1.2. Who owns new files?; 2.1.1.3. Changing file ownership; 2.1.2. File Protection; 2.1.2.2. Access classes; 2.1.2.3. Setting file protection; 2.1.2.4. Beyond the basics; 2.1.2.5. Specifying numeric file modes; 2.1.2.6. Specifying the default file mode; 2.1.2.7. Special-purpose access modes; 2.1.2.8. Save-text access on directories
  • 2.1.2.9. Setgid access on directories2.1.2.10. Numerical equivalents for special access modes; 2.1.3. How to Recognize a File Access Problem; 2.1.4. Mapping Files to Disks; 2.1.4.2. Directories; 2.1.4.3. Special files: character and block device files; 2.1.4.4. Links; 2.1.4.5. Sockets; 2.1.4.6. Named pipes; 2.1.4.7. Using ls to identify file types; 2.2. Processes; 2.2.2. Batch Processes; 2.2.3. Daemons; 2.2.4. Process Attributes; 2.2.4.2. Setuid and setgid file access and process execution; 2.2.4.3. The relationship between commands and files; 2.3. Devices
  • 2.3.2. Special Files for Other Devices2.3.2.2. The AIX Object Data Manager; 2.3.3. The Unix Filesystem Layout; 2.3.4. The Root Directory; 2.3.5. The /usr Directory; 2.3.6. The /var Directory; 3. Essential AdministrativeTools and Techniques; 3.1.1.2. Setting up man -k; 3.1.2. Piping into grep and awk; 3.1.3. Finding Files; 3.1.4. Repeating Commands; 3.1.5. Creating Several Directory Levels at Once; 3.1.6. Duplicating an Entire Directory Tree; 3.1.7. Comparing Directories; 3.1.8. Deleting Pesky Files; 3.1.9. Putting a Command in a Cage; 3.1.10. Starting at the End; 3.1.11. Be Creative
  • 3.2. Essential Administrative Techniques3.2.1.2. Adding crontab entries; 3.2.1.3. cron log files; 3.2.1.4. Using cron to automate system administration; 3.2.1.4.2. Linux: The /etc/cron.* directories; 3.2.1.5. cron security issues; 3.2.2. System Messages; 3.2.2.2. Configuring syslog; 3.2.2.3. Enhancements to syslog.conf; 3.2.2.3.2. FreeBSD and Linux; 3.2.2.3.3. Solaris; 3.2.2.3.4. The Tru64 syslog log file hierarchy; 3.2.2.4. The logger utility; 3.2.3. Hardware Error Messages; 3.2.3.1.2. The Tru64 binary error logger; 3.2.4. Administering Log Files; 3.2.4.2. Monitoring log file contents
  • 3.2.5. Managing Software Packages