Muutke küpsiste eelistusi

Definitive Guide to SUSE Linux Enterprise Server 1st ed. [Kõva köide]

  • Formaat: Hardback, 690 pages, kõrgus x laius: 235x178 mm, kaal: 1521 g, XXX, 690 p., 1 Hardback
  • Ilmumisaeg: 12-Dec-2006
  • Kirjastus: APress
  • ISBN-10: 1590597087
  • ISBN-13: 9781590597088
Teised raamatud teemal:
  • Kõva köide
  • Hind: 53,50 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 62,94 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 3-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 690 pages, kõrgus x laius: 235x178 mm, kaal: 1521 g, XXX, 690 p., 1 Hardback
  • Ilmumisaeg: 12-Dec-2006
  • Kirjastus: APress
  • ISBN-10: 1590597087
  • ISBN-13: 9781590597088
Teised raamatud teemal:
The Definitive Guide to SUSE Linux Enterprise Server is a comprehensive guide to Novell's SUSE Linux Enterprise Server (SLES), one of the most powerful Linux-based server solutions available today. Sander van Vugt, noted author, consultant, and trainer, guides you through the most important aspects of SLES, beginning with an in-depth overview of installation and configuration tasks.



In the opening chapters, you will learn how to configure network capabilities, efficiently manage software updates, and manage the file system. Later chapters are devoted to configuration and deployment of key network services including the MySQL database, CUPS, Samba, PostFix, FTP, DNS, proxy servers, and more.



Along the way, van Vugt illustrates important administration concepts such as instituting strict file system security and server automation. Since increasing demands are placed on these services, you'll learn how to cluster servers together to lessen downtime and increase performance.
About the Author xxiii
About the Technical Reviewer xxv
Acknowledgments xxvii
Introduction xxix
PART 1 Getting Familiar with SUSE Linux Enterprise Server
Installing SUSE Linux Enterprise Server
3(26)
Meeting the Installation Requirements
3(1)
Starting the Installation
3(3)
Preparing the Installation
6(4)
Selecting What to Install
10(4)
Configuring the Server
14(14)
Summary
28(1)
Exploring SUSE Linux Enterprise Server
29(20)
Logging In
29(3)
Exploring the Linux User Accounts
29(1)
Working with Virtual Consoles
30(1)
Getting Administrative Access
31(1)
Finding Your Way in the File System
32(8)
Exploring the Default Directories
32(6)
Performing Essential Tasks in the File System
38(2)
Working with the GNOME Interface
40(5)
Using the GNOME Menu
40(2)
Working with More Applications
42(3)
Modifying the GNOME Desktop
45(2)
Adding Items to the Desktop
45(1)
Changing the Menu
46(1)
Modifying Other Desktop Items
46(1)
Summary
47(2)
Managing SUSE Linux Enterprise Server with YaST
49(24)
Exploring YaST Options
49(21)
The Software Menu
50(1)
The Hardware Menu
51(6)
The System Menu
57(5)
Network Devices
62(1)
Network Services
62(4)
Novell AppArmor
66(1)
Security and Users
66(4)
Miscellaneous Options
70(1)
Working with YaST and Its Configuration Files
70(1)
Working with YaST Modules
71(1)
Summary
72(1)
Finding Your Way on the Command Line
73(18)
Working with the Bash Shell
73(3)
Making the Most of Bash
73(1)
Knowing the Important Key Sequences
74(1)
Working with the Bash History
74(2)
Performing Basic File System Management Tasks
76(3)
Working with Directories
76(1)
Working with Files
76(2)
Viewing the Content of Text Files
78(1)
Creating Empty Files
78(1)
Using Piping and Redirection
79(2)
Using Piping
79(1)
Using Redirection
79(2)
Finding Files
81(1)
Working with an Editor
82(1)
Exploring the vi modes
82(1)
Saving and Quitting
82(1)
Cutting, Copying, and Pasting
83(1)
Deleting Text
83(1)
Getting Help
83(4)
Using man to Get Help
84(2)
Using the -- help Option
86(1)
Learning More About Installed Packages
86(1)
Summary
87(4)
PART 2 Administering SUSE Linux Enterprise Server
Managing Users and Groups
91(18)
Managing Users
91(4)
Using Commands for User Management
91(1)
Assigning Users to Groups
92(1)
Managing the UID
93(1)
Setting a Default Shell
93(1)
Managing Passwords
94(1)
Modifying and Deleting User Accounts
95(1)
Going Behind the Commands: Configuration Files
96(3)
/etc/passwd
96(2)
/etc/shadow
98(1)
/etc/login.defs
98(1)
/etc/default/passwd
99(1)
Managing Users with YaST
99(1)
Managing Groups
100(2)
Using Commands for Group Management
101(1)
Going Behind the Commands: /etc/group
101(1)
Managing Authentication: PAM
102(5)
Creating a Default Policy for Security
103(1)
Discovering PAM Modules
104(3)
Managing the User's Shell Environment
107(1)
Creating Shell Login Scripts
107(1)
Displaying Messages to Users Logging In
108(1)
Summary
108(1)
Managing Linux Permissions
109(16)
Granting Read, Write, and Execute: The Three Basic Linux Permissions
109(3)
Understanding Permissions and the Concept of Ownership
110(1)
Changing File Ownership
111(1)
Understanding Group Ownership
111(1)
Working with Advanced Linux Permissions
112(2)
Setting Permissions
114(3)
Using chmod to Change Permissions
114(2)
Using umask to Set Default Permissions
116(1)
Working with Access Control Lists
117(3)
Using ACLs to Grant Permissions to More Than One Object
118(1)
Working with ACL Masks
119(1)
Using Default ACLs
119(1)
Understanding ACL Limitations
120(1)
Applying File Attributes
120(1)
Apply Quota to Allow a Maximum Amount of Files
121(3)
Installing the Quota Software
122(1)
Preparing the File System for the Quota
122(1)
Initializing the Quota
123(1)
Setting the Quota for Users and Groups
123(1)
Starting the Quota Service
124(1)
Summary
124(1)
Performing Daily File System Management Tasks
125(14)
Mounting Devices
125(5)
Using the Mount Command
125(3)
Unmounting Devices
128(1)
Automating Mounts with /etc/fstab
128(2)
Checking File System Integrity
130(1)
Working with Links
130(2)
Understanding Why You Want to Use Links
131(1)
Working with Symbolic Links
131(1)
Working with Hard Links
132(1)
Creating Backups
132(4)
Using tar to Create and Restore Backups
132(3)
Working with Magnetic Tapes
135(1)
Using dd to Make a Backup
135(1)
Using rsync to Synchronize Files
136(1)
Automating Backups with cron
136(2)
Summary
138(1)
Configuring Storage
139(26)
Comparing File Systems
139(7)
Using ext2
139(3)
Using ext3
142(1)
Using ReiserFS
143(1)
Using XFS
144(2)
Creating File Systems
146(13)
Designing a Partition Layout
146(1)
Creating Traditional Partitions
147(4)
Working with Logical Volumes
151(8)
Setting Up a Software RAID
159(5)
Understanding Your RAID Options
160(1)
Setting Up RAID 0 from the Command Line
160(1)
Creating a RAID 5 Array Using YaST
161(2)
Managing the RAID Array
163(1)
Summary
164(1)
Managing Software
165(14)
Installing Software with YaST
165(5)
Installing from the Installation Media
165(3)
Selecting the Installation Source
168(2)
Installing Nondefault Software with YaST
170(1)
Updating Software
170(4)
Compiling Software from Source
174(1)
Working with RPM
175(2)
Following the RPM Naming Convention
176(1)
Rebuilding the RPM Database
176(1)
Working with the rpm Command
176(1)
Managing Libraries
177(1)
Summary
178(1)
Managing the Boot Procedure
179(24)
Using GRUB and Its Configuration
179(10)
Working with the GRUB Configuration File
180(3)
Installing GRUB
183(6)
Working with the GRUB Boot Menu
189(1)
Understanding the Kernel and Its initrd
189(1)
Using Init and /etc/inittab
189(5)
Working with the Boot Scripts
194(3)
Manually Tuning the Initial Boot Phase
194(2)
Using YaST to Tune the Initial Boot Procedure
196(1)
Including Your Own Services in boot.local
197(1)
Managing Services Start-Up
197(5)
Understanding the Concept of Runlevels
197(1)
Adding Services to a Runlevel Manually
198(3)
Using YaST to Add Services to a Runlevel
201(1)
Summary
202(1)
Managing Processes
203(12)
Understanding the Different Kinds of Processes
203(1)
Running in the Foreground and Background
204(1)
Performing Day-to-Day Process Management
205(7)
Tuning Process Activity
205(3)
Using Other Tools to Monitor System Activity
208(2)
Terminating Processes
210(1)
Setting Process Priority
211(1)
Scheduling Processes
212(2)
Configuring the cron Service
212(2)
Executing Once with at
214(1)
Summary
214(1)
Using System Logging
215(16)
Reading the Boot Messages
215(2)
Getting Hardware Information
217(3)
Browsing the /proc File System
217(2)
Using YaST Hardware Information
219(1)
Using the syslog-ng Service
220(4)
Introducing syslog-ng
220(1)
Understanding syslog-ng.conf
221(2)
Monitoring Log Files
223(1)
Rotating Log Files
224(3)
Summary
227(4)
PART 3 Networking SUSE Linux Enterprise Server
Connecting to the Network
231(36)
Configuring the Network Interface with YaST
231(3)
Adding a Network Card Manually
234(6)
Configuring the Network Interface from the Command Line
240(7)
Working with the network Script
240(1)
Using ifup, ifdown, and Related Tools
241(1)
Using ifconfig
242(2)
Using the ip Tool
244(3)
Managing IPv6
247(2)
IPv6 Addressing
247(1)
Address Types
248(1)
The Neighbor Discovery Protocol
248(1)
Assigning IPv6 Addresses in SUSE Linux Enterprise Server
248(1)
Managing Routes
249(2)
Setting the Default Route with route
249(2)
Using the ip Tool to Specify the Default Gateway
251(1)
Storing Routing Information
251(1)
Configuring the DNS Resolver
251(2)
The Role of nsswitch.conf
252(1)
Using /etc/hosts
252(1)
Tuning and Troubleshooting
253(12)
Testing Connectivity
253(1)
Testing Routability
254(1)
Testing Availability of Services
255(4)
Monitoring the Network Interface
259(2)
Monitoring Network Traffic
261(3)
Using the GNOME Network Tools
264(1)
Summary
265(2)
Configuring a CUPS Print Server
267(18)
Installing a CUPS Printer
267(3)
Understanding CUPS
270(1)
Managing CUPS
271(11)
Managing CUPS with YaST
271(6)
Using the Web Interface for CUPS Management
277(2)
Tuning the CUPS Environment from the Command Line
279(3)
Configuring CUPS Clients
282(2)
Installing a Linux CUPS Client
282(1)
Installing Windows As a Client for CUPS
283(1)
Summary
284(1)
Sharing Files with SUSE Linux Enterprise Server
285(32)
Sharing Files with NFS
285(9)
Using the NFS Server
285(2)
Configuring an NFS Server
287(4)
Configuring an NFS Client
291(3)
Tuning and Monitoring the NFS Server
294(1)
Sharing Files with Samba
294(20)
Recognizing Samba Server Possibilities and Impossibilities
294(1)
Configuring the Samba Server
295(5)
Integrating CUPS with Samba
300(2)
Setting Up Samba As a Domain Controller
302(2)
Configuring Samba with YaST
304(8)
Implementing Client Access to the Samba Server
312(2)
Offering Files with FTP
314(2)
Configuring the pure-ftpd Server
314(1)
Starting the pure-ftpd Server
315(1)
Summary
316(1)
Configuring a Mail Server
317(24)
Understanding How a Mail Solution Works
317(1)
Configuring the Postfix MTA
318(15)
Handling Inbound and Outbound Mail
318(4)
Managing Postfix Components
322(1)
Configuring the Master Daemon
323(1)
Configuring Global Settings
324(4)
Tuning Postfix with Lookup Tables
328(4)
Using Postfix Management Tools
332(1)
Receiving E-mail Using IMAP or POP3
333(4)
Fetching E-mail Using Cyrus IMAPd
333(2)
Filtering Incoming E-mail with Procmail
335(1)
Getting E-mail with POP3 Using Qpopper
336(1)
Using YaST to Set Up an MTA
337(3)
Summary
340(1)
Working with OpenLDAP
341(28)
Centralizing Vital Information
341(1)
Structure of an LDAP Directory
342(2)
The LDAP Hierarchy
342(1)
OpenLDAP Files and Directories
343(1)
Installing an OpenLDAP Directory with YaST
344(10)
Configuring the OpenLDAP Server During Installation
344(3)
Configuring OpenLDAP on an Operational Server
347(7)
Setting Up the SUSE Linux Enterprise Server LDAP Client
354(5)
Tuning LDAP Configuration Files
359(5)
Configuring the OpenLDAP Server
359(4)
Configuring the LDAP Client
363(1)
Adding, Querying, and Modifying Entries in the Directory
364(3)
Creating LDIF Files
364(2)
Adding Entries with Idapadd
366(1)
Modifying Entries with Idapmodify
366(1)
Deleting Entries with Idapdelete
366(1)
Using Idapsearch to Query the Directory
366(1)
Summary
367(2)
Enabling Remote Access
369(14)
Understanding How Secure Shell Works
369(3)
Working with Public/Private Key Pairs
370(1)
Working with Secure Shell
370(2)
Configuring SSH
372(2)
Using Key-Based Authentication
374(3)
Introducing Cryptography
374(1)
Using Public/Private Key-Based Authentication in an SSH Environment
375(1)
Setting Up SSH for Key-Based Authentication
375(1)
Caching Keys with ssh-agent
376(1)
Tunneling Traffic with SSH
377(2)
Using X-Forwarding
377(1)
Using Generic TCP Port Forwarding
378(1)
Using Other Methods for Remote Access
379(3)
Using VNC for Remote Access to Graphical Screens
379(2)
Enabling VNC via xinetd
381(1)
Securing VNC Remote Access with SSH
381(1)
Using screen to Synchronize Remote Sessions
382(1)
Summary
382(1)
Configuring xinetd
383(10)
Configuring xinetd with YaST
383(3)
Tuning xinetd by Hand
386(4)
Managing the xinetd Daemon
386(1)
Setting Default Behavior
386(3)
Tuning the Individual Services
389(1)
Tuning Access to Services with TCP Wrapper
390(2)
Working with /etc/hosts.allow and /etc/hosts.deny
390(2)
Why You Shouldn't Use TCP Wrapper
392(1)
Summary
392(1)
Configuring SUSE Linux Enterprise Server As an NTP Time Server
393(8)
Understanding NTP Fundamentals
393(2)
Configuring a Stand-Alone NTP Time Server
395(1)
Configuring ntp.conf
395(1)
Pulling or Pushing the Time
396(1)
Tuning Your NTP Server
396(2)
Using the NTP Drift File
396(1)
Using the NTP Log File
397(1)
Securing Your NTP Server
397(1)
Configuring an NTP Client
398(1)
Checking NTP Synchronization Status
398(2)
Summary
400(1)
Managing Cryptography
401(18)
Introducing SSL
401(2)
Public and Private Keys
402(1)
The Need for a Certificate Authority
402(1)
Managing Certificates
403(14)
Creating Certificates and a Certificate Authority with YaST
403(10)
Other YaST Certificate Authority Management Options
413(1)
The Common Server Certificate Interface
414(1)
Managing Certificates from the Command Line
414(3)
Summary
417(2)
Configuring the Apache Web Server
419(18)
Understanding How a Web Server Works
419(1)
Installing Apache on SUSE Linux Enterprise Server
420(4)
Installing the Right Packages
420(1)
Starting, Stopping, and Testing the Apache Web Server
421(2)
Exploring the Configuration Files
423(1)
Understanding the Structure of the Apache Configuration Files
423(1)
Checking the Configuration
424(1)
Configuring Apache with YaST
424(5)
Working with Virtual Hosts
429(2)
Managing Access to the Web Server
431(3)
Configuring Host-Based Access Restrictions
431(1)
Configuring User-Based Access Restrictions
432(2)
Using OpenSSL for Encrypted Connections
434(2)
Performance Tuning Your Web Server
436(1)
Summary
436(1)
Configuring DNS
437(24)
Introducing DNS
437(5)
Methods of Name Resolving
437(2)
Organization of the DNS Hierarchy
439(1)
Master and Slave Servers
440(1)
Connecting the Name Servers in the Hierarchy
440(1)
DNS and Reversed DNS
441(1)
Configuring DNS
442(15)
Configuring DNS with YaST
442(11)
Configuring DNS from Its Configuration Files
453(4)
Securing Zone Transfers
457(2)
Summary
459(2)
Configuring a DHCP Server
461(18)
Understanding How DHCP Works
461(1)
Configuring a DHCP Server from YaST
462(7)
Configuring the DHCP Service Manually
469(4)
The DHCP Process
470(1)
The Configuration File /var/lib/dhcp/etc/dhcpd.conf
470(2)
The Start-up Configuration File /etc/sysconfig/dhcpd
472(1)
Setting Advanced Configuration Options
473(4)
Integrating DHCP and DNS
473(2)
The DHCP Relay Agent
475(1)
Setting Up DHCP Failover
475(2)
Summary
477(2)
Configuring the Squid Web Proxy Cache
479(14)
Introducing Squid
479(1)
Installing Squid and Performing the Initial Configuration
480(5)
Network Tags
481(1)
Defining Cache Settings
481(1)
Specifying Log Files and Cache Directories
482(1)
Optimizing Squid Performance
483(1)
Timeout Settings
484(1)
Generic Settings
485(1)
Securing the Proxy with ACLs
485(2)
Configuring User Authentication
487(2)
Squid and URL Filtering
489(1)
Configuring Squid for SSL Traffic
489(1)
Configuring Clients for Squid Usage
490(1)
Using Squid As a Transparent Proxy
490(1)
Summary
491(2)
Understanding the Kernel
493(10)
Understanding Kernel Modules
493(6)
Tuning initrd
494(1)
Loading Modules on Boot
494(1)
Loading Modules Manually
494(1)
Loading Modules Automatically
495(1)
Using udev to Load Kernel Modules
496(3)
Tuning the Kernel Source Files (or Not)
499(3)
Understanding SUSE Kernel Backgrounds
499(1)
Configuring the Kernel
500(1)
Patching the Kernel
501(1)
Summary
502(1)
Introducing Shell Scripting
503(24)
Getting Started
503(7)
To Script or Not to Script?
503(1)
What Shell?
504(1)
Basic Elements of a Shell Script
504(1)
Making It Executable
505(2)
Making a Script Interactive
507(1)
Working with Arguments
508(1)
Regular Expressions
509(1)
Working with Variables
510(4)
Command Substitution
510(1)
Changing Variables
511(1)
Substitution Operators
511(2)
Pattern-Matching Operators
513(1)
Performing Calculations in Scripts
514(3)
Using Flow Control
517(6)
Using if . . . then . . . else
518(2)
case
520(2)
while
522(1)
until
522(1)
for
523(1)
Using a Stream Editor
523(1)
Working with Functions
524(1)
Summary
525(2)
Tuning and Optimizing SUSE Linux
527(16)
Managing Memory
527(3)
Optimizing Usage of Swap Space
528(1)
Monitoring Swap Activity
529(1)
Adding Swap Space on the Fly
529(1)
Using ulimit to Set Resource Limits
530(1)
Tuning the Kernel
531(7)
Understanding the /proc File System
531(2)
Using procinfo
533(1)
Tuning the Kernel
534(3)
Using the Powertweak Utility
537(1)
Crashes and Core Dumps
538(2)
Summary
540(3)
PART 4 Advanced SUSE Linux Enterprise Server Configuration
Configuring SUSE Linux Enterprise Server 10 for High-Availability Clustering
543(30)
Introducing Linux Clustering
543(15)
Designing an HA Cluster Solution
544(1)
Using Shared Storage
545(13)
Using Heartbeat for High Availability
558(5)
Editing the Sample Configuration Files
559(1)
Using Authentication Keys to Ensure Secure Communications
559(1)
Tuning the Main Configuration File ha.cf on Both Nodes
559(2)
Creating Shared Resources by Editing the haresources File
561(2)
Managing the Shared Resource
563(1)
Avoiding Split Brain
564(1)
Configuring a Heartbeat 2--Style Cluster with YaST
565(7)
Creating the Cluster
565(3)
Creating Resources
568(4)
Migrating Resources
572(1)
Summary
572(1)
Managing Access with the SUSE Firewall
573(20)
Before Configuring the Firewall
573(4)
Configuring the SUSE Firewall with YaST
577(7)
Tuning Netfilter with iptables
584(7)
Making Proper Preparations
584(1)
Netfilter Building Blocks
585(1)
Using iptables to Create a Firewall
586(5)
Summary
591(2)
Using Xen to Create a Virtual Environment
593(16)
Working with Xen Virtualization
593(2)
Virtualization Methods
594(1)
Xen Architecture
594(1)
Installing Xen
595(7)
Preparing for Xen Installation
595(1)
Installing the Xen Domain-0
595(2)
Installing the First Virtual Machine
597(5)
Managing Xen Domains
602(4)
Managing Xen from the Command Line
602(3)
Managing Virtual Machines from YaST
605(1)
Managing Xen Networking
606(1)
Migrating Virtual Machines
607(1)
Summary
608(1)
Using AppArmor to Secure Applications
609(12)
Exploring the AppArmor Components
609(2)
Managing AppArmor Profiles with YaST
611(7)
Creating a New Profile
611(5)
Updating a Profile
616(1)
Deleting a Profile
617(1)
Managing AppArmor Profiles from the Command Line
618(2)
Creating a Profile with genprof
618(1)
Monitoring AppArmor's Status
618(2)
Summary
620(1)
Configuring Service Location Protocol
621(10)
Understanding How SLP Works
621(1)
Configuring an SLP Server
622(4)
Configuring OpenSLP from YaST
622(2)
Tweaking /etc/slp.conf
624(2)
Registering Services
626(2)
Browsing Available Services
628(1)
Summary
629(2)
Troubleshooting SUSE Linux Enterprise Server
631(16)
Analyzing the Problem
631(5)
Analyzing the Network
631(3)
Checking Application Availability
634(1)
Checking Logging
635(1)
Troubleshooting from the GRUB Boot Prompt
636(2)
Booting a Rescue System
638(2)
Using the Repair an Installed System Option
640(5)
Summary
645(2)
Creating an Installation Server
647(16)
Creating an Installation Server
648(5)
Configuring TFTP for PXE Boot
653(2)
Installing a Server Automatically with AutoYaST
655(4)
Performing Remote Installations Using SSH or VNC
659(2)
Performing a Remote Installation with SSH
659(1)
Combining SSH with VNC
660(1)
Summary
661(2)
Index 663
Sander van Vugt is an independent trainer and consultant, living in the Netherlands and working throughout the European Union. He specializes in Linux and Novell systems, and has worked with both for more than 10 years. Besides being a trainer, he is also an author, having written more than 20 books and hundreds of technical articles. He is a Master Certified Novell Instructor (MCNI) and holds LPIC-1 and -2 certificates, as well as all important Novell certificates.