Muutke küpsiste eelistusi

E-raamat: Automating System Administration with Perl: Tools to Make You More Efficient

  • Formaat: 670 pages
  • Sari: OREILLY
  • Ilmumisaeg: 14-May-2009
  • Kirjastus: O'Reilly Media
  • Keel: eng
  • ISBN-13: 9780596550783
  • Formaat - PDF+DRM
  • Hind: 26,90 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 670 pages
  • Sari: OREILLY
  • Ilmumisaeg: 14-May-2009
  • Kirjastus: O'Reilly Media
  • Keel: eng
  • ISBN-13: 9780596550783

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This second edition of a guide to Perl system administration covers the latest operating systems, technologies, and Perl modules, with four new chapters, and new sidebars explaining reasons behind specific processes. The guide suggests best practices for specific problems and for automating recurring tasks. Each chapter addresses a different system administration domain and ends with a list of Perl modules used in that chapter. This edition includes about 50 pages of brief tutorials on technologies such as XML/XPath, LDAP, SNMP, and SQL. Blank-Edelman is the director of technology at Northeastern University's College of Computer and Information Science Annotation ©2009 Book News, Inc., Portland, OR (booknews.com)

Completely updated and expanded, this popular book explains how stressed-out system administrators can increase their productivity by automating everyday activities with secure Perl programs.

If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System Administration with Perl, Second Edition, not only offers you the right tools for your job, but also suggests the best way to approach specific problems and to securely automate recurring tasks.

Updated and expanded to cover the latest operating systems, technologies, and Perl modules, this edition of the "Otter Book" will help you:

  • Manage user accounts
  • Monitor filesystems and processes
  • Work with configuration files in important formats such as XML and YAML
  • Administer databases, including MySQL, MS-SQL, and Oracle with DBI
  • Work with directory services like LDAP and Active Directory
  • Script email protocols and spam control
  • Effectively create, handle, and analyze log files
  • Administer network name and configuration services, including NIS, DNS and DHCP
  • Maintain, monitor, and map network services, using technologies and tools such as SNMP, nmap, libpcap, GraphViz and RRDtool
  • Improve filesystem, process, and network security

This edition includes additional appendixes to get you up to speed on technologies such as XML/XPath, LDAP, SNMP, and SQL. With this book in hand and Perl in your toolbox, you can do more with less -- fewer resources, less effort, and far less hassle.



Completely updated and expanded, this popular book explains how stressed-out system administrators can increase their productivity by automating everyday activities with secure Perl programs.
Preface xv
Introduction
1(14)
Automation Is a Must
1(1)
How Perl Can Help You
2(1)
This Book Will Show You How
3(2)
What You Need
5(1)
Some Notes About the Perl Versions Used for This Book
6(1)
What About Perl 5.10?
6(1)
What About Strawberry Perl?
6(1)
What About Perl 6?
6(1)
Some Notes About Using Vista with the Code in This Book
7(1)
Locating and Installing Modules
8(2)
Installing Modules on Unix
9(1)
Installing Modules on Win32
9(1)
It's Not Easy Being Omnipotent
10(3)
Don't Do It
10(1)
Drop Your Privileges As Soon As Possible
10(1)
Be Careful When Reading Data
11(1)
Be Careful When Writing Data
12(1)
Avoid Race Conditions
12(1)
Enjoy
13(1)
References for More Information
13(2)
Filesystems
15(34)
Perl to the Rescue
15(1)
Filesystem Differences
16(5)
Unix
16(1)
Windows-Based Operating Systems
16(2)
Mac OS X
18(1)
Filesystem Differences Summary
19(1)
Dealing with Filesystem Differences from Perl
19(2)
Walking or Traversing the Filesystem by Hand
21(5)
Walking the Filesystem Using the File::Find Module
26(10)
Walking the Filesystem Using the File::Find::Rule Module
36(2)
Manipulating Disk Quotas
38(7)
Editing Quotas with edquota Trickery
40(4)
Editing Quotas Using the Quota Module
44(1)
Editing NTFS Quotas Under Windows
45(1)
Querying Filesystem Usage
46(2)
Module Information for This
Chapter
48(1)
References for More Information
48(1)
User Accounts
49(50)
Unix User Identities
50(9)
The Classic Unix Password File
50(7)
Changes to the Password File in BSD 4.4 Systems
57(1)
Shadow Passwords
58(1)
Windows-Based Operating System User Identities
59(12)
Windows User Identity Storage and Access
59(2)
Windows User ID Numbers
61(2)
Windows Passwords Don't Play Nice with Unix Passwords
63(1)
Windows Groups
63(5)
Windows User Rights
68(3)
Building an Account System to Manage Users
71(26)
The Backend Database
73(5)
The Low-Level Component Library
78(11)
The Process Scripts
89(5)
Account System Wrap-Up
94(3)
Module Information for This
Chapter
97(1)
References for More Information
97(2)
Unix Password Files
97(1)
Windows User Administration
98(1)
User Activity
99(38)
Process Management
100(25)
Windows-Based Operating System Process Control
100(19)
Unix Process Control
119(6)
File and Network Operations
125(10)
Tracking File Operations on Windows
125(3)
Tracking Network Operations on Windows
128(1)
Tracking File and Network Operations in Unix
129(6)
Module Information for This
Chapter
135(1)
Installing Win32::Setupsup
135(1)
References for More Information
136(1)
TCP/IP Name and Configuration Services
137(48)
Host Files
137(14)
Generating Host Files
140(3)
Error-Checking the Host File Generation Process
143(1)
Improving the Host File Output
144(4)
Incorporating a Source Code Control System
148(3)
NIS, NIS+, and WINS
151(4)
NIS+
154(1)
Windows Internet Name Server (WINS)
154(1)
Domain Name Service (DNS)
155(19)
Generating DNS (BIND) Configuration Files
156(9)
DNS Checking: An Iterative Approach
165(9)
DHCP
174(9)
Active Probing for Rogue DHCP Servers
176(5)
Monitoring Legitimate DHCP Servers
181(2)
Module Information for This
Chapter
183(1)
References for More Information
184(1)
Working with Configuration Files
185(54)
Configuration File Formats
188(47)
Binary
188(1)
Naked Delimited Data
189(1)
Key/Value Pairs
190(2)
Markup Languages
192(43)
All-in-One Modules
235(1)
Advanced Configuration Storage Mechanisms
236(1)
Module Information for This
Chapter
236(1)
References for More Information
237(2)
XML and YAML
237(2)
SQL Database Administration
239(26)
Interacting with a SQL Server from Perl
240(3)
Using the DBI Framework
243(6)
Using ODBC from Within DBI
249(2)
Server Documentation
251(7)
MySQL Server via DBI
252(2)
Oracle Server via DBI
254(1)
Microsoft SQL Server via ODBC
255(3)
Database Logins
258(2)
Monitoring Space Usage on a Database Server
260(3)
Module Information for This
Chapter
263(1)
References for More Information
263(2)
DBI
263(1)
Microsoft SQL Server
264(1)
ODBC
264(1)
Oracle
264(1)
Email
265(48)
Sending Mail
265(8)
Getting sendmail (or a Similar Mail Transport Agent)
266(1)
Using the OS-Specific IPC Framework to Drive a Mail Client
266(2)
Speaking the Mail Protocols Directly
268(5)
Common Mistakes in Sending Email
273(12)
Overzealous Message Sending
273(9)
Subject Line Waste
282(1)
Insufficient Information in the Message Body
282(3)
Fetching Mail
285(6)
Talking POP3 to Fetch Mail
285(2)
Talking IMAP4rev1 to Fetch Mail
287(4)
Processing Mail
291(19)
Dissecting a Single Message
291(5)
Dissecting a Whole Mailbox
296(1)
Dealing with Spam
297(8)
Support Mail Augmentation
305(5)
Module Information for This
Chapter
310(1)
References for More Information
311(2)
Directory Services
313(64)
What's a Directory?
313(1)
Finger: A Simple Directory Service
314(4)
The WHOIS Directory Service
318(3)
LDAP: A Sophisticated Directory Service
321(33)
LDAP Programming with Perl
322(1)
The Initial LDAP Connection
323(2)
Performing LDAP Searches
325(4)
Entry Representation in Perl
329(2)
Adding Entries with LDIF
331(2)
Adding Entries with Standard LDAP Operations
333(1)
Deleting Entries
334(1)
Modifying Entry Names
335(2)
Modifying Entry Attributes
337(2)
Deeper LDAP Topics
339(9)
Putting It All Together
348(6)
Active Directory Service Interfaces
354(19)
ADSI Basics
355(2)
Using ADSI from Perl
357(2)
Dealing with Container/Collection Objects
359(1)
Identifying a Container Object
360(1)
So How Do You Know Anything About an Object?
360(3)
Searching
363(3)
Performing Common Tasks Using the WinNT and LDAP Namespaces
366(1)
Working with Users via ADSI
367(2)
Working with Groups via ADSI
369(1)
Working with File Shares via ADSI
369(1)
Working with Print Queues and Print Jobs via ADSI
370(1)
Working with Windows-Based Operating System Services via ADSI
371(2)
Module Information for This
Chapter
373(1)
References for More Information
373(4)
LDAP
373(1)
ADSI
374(3)
Log Files
377(56)
Reading Text Logs
377(1)
Reading Binary Log Files
378(7)
Using unpack()
378(5)
Calling an OS (or Someone Else's) Binary
383(1)
Using the OS's Logging API
384(1)
Structure of Log File Data
385(3)
Dealing with Log File Information
388(37)
Space Management of Logging Information
388(7)
Log Parsing and Analysis
395(30)
Writing Your Own Log Files
425(4)
Logging Shortcuts and Formatting Help
425(1)
Basic/Intermediate Logging Frameworks
426(2)
Advanced Logging Framework
428(1)
Module Information for This
Chapter
429(1)
References for More Information
430(3)
Security
433(36)
Noticing Unexpected or Unauthorized Changes
434(8)
Local Filesystem Changes
434(6)
Changes in Data Served Over the Network
440(2)
Noticing Suspicious Activities
442(7)
Local Signs of Peril
442(2)
Finding Problematic Patterns
444(5)
Danger on the Wire, or ``Perl Saves the Day''
449(11)
Preventing Suspicious Activities
460(6)
Suggest Better Passwords
460(1)
Reject Bad Passwords
461(5)
Module Information for This
Chapter
466(1)
References for More Information
467(2)
SNMP
469(20)
Using SNMP from Perl
469(17)
Sending and Receiving SNMP Traps, Notifications, and Informs
480(4)
Alternative SNMP Programming Interfaces
484(2)
Module Information for This
Chapter
486(1)
References for More Information
486(3)
Network Mapping and Monitoring
489(40)
Network Mapping
489(14)
Discovering Hosts
490(9)
Discovering Network Services
499(2)
Physical Location
501(2)
Presenting the Information
503(19)
Textual Presentation Tools
503(4)
Graphical Presentation Tools
507(15)
Monitoring Frameworks
522(4)
Extending Existing Monitoring Packages
524(2)
What's Left?
526(1)
Module Information for This
Chapter
527(1)
References for More Information
527(2)
Experiential Learning
529(28)
Playing with Timelines
530(7)
Parsing crontab Files
530(1)
Displaying the Timeline
531(2)
Writing Out the Correct XML File
533(1)
Putting It All Together
534(2)
Summary: What Can We Learn from This?
536(1)
Playing with Geocoding
537(7)
Geocoding from Postal Addresses
537(4)
Geocoding from IP Addresses
541(3)
Summary: What Can We Learn from This?
544(1)
Playing with an MP3 Collection
544(2)
Summary: What Can We Learn from This?
546(1)
One Final Exploration
546(9)
Retrieving the Wiki Page with WWW::Mechanize
547(3)
Extracting the Data
550(1)
Geocoding and Mapping the Data
551(3)
Summary: What Can We Learn from This?
554(1)
Remember to Play
555(1)
Module Information for This
Chapter
555(1)
Source Material for This
Chapter
556(1)
The Eight-Minute XML Tutorial 557(6)
The 10-Minute XPath Tutorial 563(10)
The 10-Minute LDAP Tutorial 573(6)
The 15-Minute SQL Tutorial 579(14)
The Five-Minute RCS Tutorial 593(4)
The Two-Minute VBScript-to-Perl Tutorial 597(6)
The 20-Minute SNMP Tutorial 603(14)
Index 617
David N. Blank-Edelman is the Director of Technology at the Northeastern University College of Computer and Information Science and the author of the O'Reilly book Perl for System Administration (with a second edition due out very soon). He has spent the last 24+ years as a system/network administrator in large multi- platform environments, including Brandeis University, Cambridge Technology Group, and the MIT Media Laboratory. He was the program chair of the LISA 2005 conference and one of the LISA 2006 Invited Talks co-chairs.