Muutke küpsiste eelistusi

E-raamat: Foundations of CentOS Linux: Enterprise Linux On the Cheap

  • Formaat: PDF+DRM
  • Ilmumisaeg: 08-Jan-2010
  • Kirjastus: APress
  • Keel: eng
  • ISBN-13: 9781430219651
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 08-Jan-2010
  • Kirjastus: APress
  • Keel: eng
  • ISBN-13: 9781430219651
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book introduces CentOS servers and discusses how to add and manage Fedora clients. It follows RHEL curriculum closely enough to be used as an RHCE exam preparation text. It also covers many system administration tasks and includes concrete examples.



You need to maintain clients, servers and networks, while acquiring new skills.Foundations of Cent OS Linux: Enterprise Linux On the Cheap covers a free, unencumbered Linux operating system within the Red Hat lineage, but it does not assume you have a Red Hat Enterprise Linux license. Now you can learn CentOS Linux, the most powerful and popular of all Red Hat clones, keep maintaining your network at work, and become an Red Hat Certified Engineer, all just for the cost of this book.

  • Introduces CentOS Linux and Fedora clients as equals to Red Hat Enterprise Linux
  • Sets up CentOS as a secure, high–performance web services back end
  • Prepares you for the RHCE examination, but does not assume an RHEL installation
About the Authors xvii
About the Technical Reviewer xx
Acknowledgments xxi
Introduction xxii
Installation
1(30)
Preinstallation Steps
1(2)
Installation
3(26)
Troubleshooting
29(1)
Summary
30(1)
BASH
31(24)
Working with the Command-Line Interface
31(14)
Identifying the Working User
32(1)
The Linux Filesystem
33(2)
Directory Management
35(1)
Listing the Contents of a Directory
36(3)
Traversing Directories
39(1)
Absolute and Relative Paths
39(1)
Creating Directories
40(1)
Renaming and Moving Files
40(1)
Deleting Directories and Files
41(1)
Creating and Viewing Text Files
42(2)
Viewing the Contents of a File
44(1)
Text Processing
45(3)
Standard I/O Devices
46(1)
Redirection
47(1)
Piping
47(1)
Getting Help
48(3)
Environment Variables
51(1)
Creating and Running Your Own Script
52(2)
Summary
54(1)
Client/Host Configuration
55(16)
The Boot Process
55(8)
The Boot Loader
55(5)
Kernel, Init, and Runlevels
60(2)
Services
62(1)
Keyboard Setting
63(1)
Language Settings
64(1)
Date and Time Settings
65(2)
Network Settings
67(1)
Graphics Settings
68(1)
Printer Settings
69(1)
Summary
70(1)
Data Storage Management
71(16)
Provisioning a New Hard Drive
71(6)
Partitioning a Disk Using RAID
77(4)
Understanding RAID Types and Levels
78(1)
RAID 0
78(1)
RAID 1
78(1)
RAID 5
79(2)
Checking on RAID
81(1)
Partitioning with LVM
81(4)
Understanding How LVM Works
82(1)
Volume Groups
83(1)
Physical Volumes
83(1)
Logical Volumes
84(1)
Making Sure Your Volumes Work
85(1)
Finding More Information on LVM
85(1)
Summary
85(2)
User Management
87(18)
Managing Users and Groups with the Graphical Interface
87(6)
Adding a User
87(2)
Changing User Properties
89(2)
Deleting a User
91(1)
Adding a Group
91(1)
Changing Group Properties
92(1)
Deleting a Group
93(1)
User Management on the Command Line
93(5)
Adding a User
94(1)
Changing User Properties
94(1)
Deleting a User
95(1)
Adding a Group
96(1)
Changing Group Properties
96(1)
Deleting a Group
96(2)
Implementing Disk Quotas
98(2)
Enabling User and Group Quotas on a Filesystem
99(1)
Setting Up the Quota Files
99(1)
Setting Up Quotas
100(2)
Setting Grace Periods
101(1)
Managing Quotas for Group
101(1)
Enabling Quotas
101(1)
Reporting on Quotas
101(1)
Setting Resource Limits
102(1)
Summary
103(2)
X Window System
105(28)
X.Org
106(5)
xorg.conf
106(1)
The Keyboard Section
107(1)
The Device Section
108(1)
The Screen Section
108(2)
The ServerLayout Section
110(1)
Making a New xorg.conf File
111(1)
The GNOME Desktop
111(11)
Top Panel
112(1)
Applications
113(2)
Places
115(2)
System
117(1)
Customizing Menus
118(2)
Launchers
120(1)
Separator, Update, Clock, and Sound Applet
121(1)
Bottom Panel
121(1)
XDMCP Remote Connections
122(3)
GDM Configuration
123(2)
Reloading Options with gdmflexiserver
125(1)
Using XDMCP with GDM
125(5)
Requesting an X Session with XDMCP
126(1)
XDMCP with X Query
126(2)
XDMCP with Xnest
128(2)
X with SSH
130(1)
Summary
131(2)
Package Management
133(20)
RPM
133(1)
The RPM Filename Convention
134(1)
The rpm Command
135(10)
Installing a Package
135(1)
Signed Package
136(1)
Importing Keys
136(1)
Verifying Packages
137(1)
Adding More Output
137(1)
Package Dependencies
138(1)
Upgrading a Package
139(1)
Removing a Package
140(1)
Querying a Package
141(1)
Information and File Contents of a Package
141(1)
Source RPMs
142(1)
The Spec File
143(1)
The rpmbuild Command
144(1)
Building a Binary Package from a Source Package
144(1)
YUM
145(6)
Installing Packages with YUM
146(1)
Removing Packages with YUM
146(1)
Updating Packages with YUM
147(1)
Searching Packages with YUM
148(1)
Adding Sources for YUM
148(2)
Creating Repositories for YUM
150(1)
Summary
151(2)
Basic Linux Security
153(18)
System Logger
153(7)
Using syslog.conf
154(1)
Selectors
155(2)
Actions
157(1)
Detecting Intruders with the System Logger
158(2)
Automating Tasks with cron
160(3)
Using crontab
161(1)
Using cron.allow and cron.deny
161(1)
Working with the crontab File
161(1)
The crontab Task
161(2)
Browsing Available Tasks
163(1)
Removing Tasks
163(1)
Pluggable Authentication Modules
163(7)
Understanding PAM Rules and Configuration Files
165(1)
servicename
166(1)
Management Groups
167(1)
Control
167(1)
modulepath
168(1)
Testing PAM
168(1)
Testing pam_time.so with crond
169(1)
Finding Other PAM Modules
170(1)
Summary
170(1)
Advanced Security
171(32)
Using Digital Certificates
171(1)
Creating Certificates
172(4)
Deploying Certificates
176(5)
Configuration Files
176(2)
Intermediate Certificates
178(1)
Certificate File Formats
178(1)
Signing Your Own Certificates
179(2)
Go Wild
181(1)
Intrusion Detection
181(10)
Monitoring the filesystem with RPM
182(3)
Monitoring the Filesystem with AIDE
185(3)
Monitoring the Network with Netfilter
188(3)
Security Enhanced Linux
191(10)
Why Use SELinux
192(1)
Enabling and Disabling SELinux
192(1)
SELinux Policy
193(1)
Drilling Down on Context
194(2)
Booleans
196(3)
Access Vectors
199(1)
Interactive Users
200(1)
Summary
201(2)
Network Security
203(24)
The Firewall
203(15)
A Basic Firewall
203(4)
An Advanced Firewall
207(1)
How netfilter Works
207(2)
Viewing the Current Firewall
209(2)
Building netfilter Rules
211(5)
Using CentOS as a Router
216(1)
Using netfilter for IP Masquerading
217(1)
Handling Complex Protocols with netfilter
218(1)
tcp_wrappers
218(4)
Centralized Logging
222(4)
Configuring the Server to Receive Logs
225(1)
Configuring the Client to Send Logs
225(1)
Summary
226(1)
Network Services
227(34)
OpenSSH
227(1)
The OpenSSH Configuration File
227(4)
Connecting to the OpenSSH Server
228(1)
Copying Files Securely with scp
229(1)
OpenSSH Keys
229(1)
OpenSSH Fingerprints
230(1)
Getting the Fingerprint Value
230(1)
The known_hosts File
231(1)
Making Your Own Keys
231(1)
The DHCP Server
231(5)
Setting Up the DHCP Server
232(1)
The DHCP Configuration File
233(1)
Assigning Fixed Addresss
234(1)
Organizing with Groups
235(1)
The NTP Server
236(4)
Client-Server Mode
238(1)
Symmetric Active/Passive Mode
238(1)
Broadcast Mode
239(1)
ntpq
240(1)
DNS
240(16)
Name Servers and Zones
242(1)
Name Resolution
242(1)
BIND Utilities
243(1)
rndc-confgen
243(1)
rndc
243(1)
named
243(1)
BIND Configuration Files
243(2)
The Contents of rndc.conf
245(1)
The Contents of named.conf
246(1)
Caching DNS
246(1)
The hints File
246(1)
dig
247(1)
nslookup
248(1)
Configuring a Caching DNS
248(3)
Configuring a Forwarder
251(1)
Configuring a Slave DNS
251(1)
Configuring a Master DNS
252(3)
Reverse Lookup
255(1)
The Squid Web Caching Server
256(4)
Installing Squid
256(1)
The Squid Main Configuration File
256(1)
The visible_hostname directive
256(1)
The cache_dir directive
257(1)
ACLs and ACL-operators
258(1)
Adding ACLs and ACL-operators
258(1)
How ACL-operators Work
259(1)
Talking to Squid Peers
259(1)
More Squid
260(1)
Summary
260(1)
Open Source Databases
261(28)
ACID
261(1)
MySQL
262(10)
Setting Up MySQL
263(1)
Running the MySQL Server
264(1)
MySQL Users
264(1)
MySQL Monitor
264(1)
Securing the MySQL Root User
265(1)
Creating a Database
266(1)
Removing a Database
267(1)
Adding a User
267(1)
Removing a User
267(1)
Granting Privileges
268(1)
Removing Privileges
269(1)
Getting a List of Available Databases
269(1)
Creating Database Backups
269(1)
Restoring Databases Using Backups
270(1)
Restoring the toys Database
271(1)
Customizing the MySQL Server Configuration
271(1)
PostgreSQL
272(8)
Setting up PostgreSQL
272(1)
Starting PostgreSQL
273(1)
PostgreSQL Interactive Terminal
273(1)
Using the Interactive Terminal
273(1)
PostgreSQL Roles
274(1)
Creating a Role
274(1)
Removing a User
275(1)
Creating a Database
275(1)
Dropping a Database
275(1)
PostgreSQL Privileges
275(1)
Granting Privileges to Objects
276(1)
Revoking Privileges on Objects
276(1)
Changing Role Attributes
277(1)
Getting the List of Databases
277(1)
Creating Database Backups
278(1)
Restoring a Database
278(1)
Configuring PostgreSQL
279(1)
pg_hba.conf
279(1)
CRUD and Databases
280(7)
Creating
281(1)
Verifying the Newly Created Tables
282(1)
Viewing the Structures of the Tables
283(1)
Adding Entries to the Table
283(1)
Reading
284(1)
Updating
285(1)
Dropping Entries from a Table
286(1)
Summary
287(2)
Linux Web Services
289(24)
The Role of a Web Server
289(1)
Apache Web Server
290(1)
Setting Up Apache
290(1)
Testing Apache
290(1)
Apache Server Directories
291(2)
The Apache Configuration File
293(4)
Apache Configuration File Sections
293(1)
Commonly Used Directives
294(1)
Global Environment
294(1)
Main Server Configuration
295(2)
Distributed Configuration Files
297(5)
DirectoryIndex
298(1)
Alias
298(1)
ScriptAlias
298(1)
Creating Another Document and cgi-bin Directory
299(3)
Virtual Hosts
302(6)
IP-Based and Name-Based Virtual Hosting
303(1)
The VirtualHost Directive
304(1)
Configuring Name-Based Virtual Hosting
304(4)
Adding PHP to Apache
308(1)
Secure Apache with SSL
309(3)
Securing with OpenSSL
310(1)
Startup Without a Passphrase
311(1)
Summary
312(1)
File Sharing Services
313(22)
Very Secure FTP Daemon
313(2)
Configuring vsftpd
313(1)
vsftpd.conf
313(1)
ftpusers
314(1)
user_list
314(1)
Testing vsftpd
314(1)
NFS
315(6)
Configuring NFS
316(1)
Sharing a Directory Using NFS
317(1)
Sharing Directories Using NFS Daemons
318(1)
Mounting a Shared Directory As the Client
318(1)
Unmounting a Shared Directory as the Client
319(1)
Using exportfs
319(1)
Mounting Shared Directories at Boot Time
320(1)
Setting Up a Samba Server
321(13)
Installing Samba
322(1)
Configuring Samba
322(1)
Imhosts
322(1)
smbusers
322(1)
smb.conf
323(1)
Configuring Stand-Alone Server Options
323(1)
server string
323(1)
netbios name
324(1)
passdb backend
324(1)
Adding a Samba User
324(1)
Testing the Samba Stand-Alone Server
325(1)
Adding Shares
326(2)
Sharing a Printer
328(1)
Preparing the Printer to Pass Print Data in Raw Form
329(3)
Configuring Samba to Share a Printer
332(1)
Installing the Samba Printer to the Windows Client
333(1)
Summary
334(1)
Linux Mail Servers
335(38)
Basic Email Concepts
335(3)
The Mail User Agent
336(1)
Mail Transfer Agent
336(1)
Mail Delivery Agent
337(1)
POP3 and IMAP
337(1)
Sendmail
338(11)
Sending Email with Sendmail
339(1)
Checking Mail with the mail Command
339(3)
sendmail.mc
342(2)
sendmail.cf
344(1)
The Sendmail Administrative Configuration Files
345(1)
local-host-names
345(1)
aliases
345(1)
access
346(2)
The trusted-users File
348(1)
The virtusertable File
348(1)
mailertable
349(1)
Postfix
349(9)
Installing Postfix
350(1)
Switching MTAs
350(1)
Sending Email with Postfix
351(1)
The Postfix Main Configuration File
351(3)
Postfix Administrative Configuration Files
354(1)
access
354(1)
aliases
355(1)
virtual
356(1)
transport
356(1)
generic
356(1)
canonical
357(1)
relocated
357(1)
Mail Servers and DNS
358(1)
Dovecot
359(13)
Installing Dovecot
359(1)
The dovecot.conf Configuration File
359(1)
Configuration Options
360
protocols
260(100)
ssl_cert_file
360(1)
ssl_key_file
360(1)
ssl_key_password
361
mail_location
261(100)
Configuring Dovecot for Maildir
361(1)
Configuring an Email Client to Send and Receive Email Using IMAP
362(4)
Checking the IMAP Maildir contents
366(1)
Receiving Email with POP3
367(2)
Checking the POP3 Maildir contents
369(1)
Dovecot and OpenSSL
370(1)
Using Evolution with OpenSSL
370(2)
Troubleshooting Tactics
372(1)
Summary
372(1)
Directory Services
373(42)
The Need for Unified Authentication
373(2)
Network Information System
375(13)
Setting up NIS
375(1)
The NIS Server
375(1)
Creating Your First Domain
376(1)
ypserv.conf
377(1)
The NIS Client
378(1)
Binding to an NIS Domain
379(1)
yp.conf
379(1)
nsswitch.conf
379(1)
Testing the Setup
380(1)
Maps
381(1)
NIS Utilities
382(1)
ypwhich
382(1)
ypcat
383(1)
ypmatch
383(1)
yppasswd
383(1)
NIS with NFS
384(1)
Using NIS with NFS
384(1)
OpenLDAP
385(1)
Setting up OpenLDAP
385(1)
slapd
386(1)
Idap.conf
386(1)
slapd.conf
386(1)
Modules
387(1)
Schemas
388(2)
Your First Database
390(2)
Using the my-domain.com database
391(1)
LDIF Format
392(1)
Starting OpenLDAP
393(1)
Adding Entries with Idapadd
393(3)
Searching Entries with Idapsearch
396(1)
Changing Entries with Idapmodify
397(1)
Removing Entries Using Idapdelete
398(1)
Creating a Backup
399(1)
OpenLDAP and Samba
399(1)
Installing Perl Modules
400(2)
nss_Idap
402(1)
The nss_Idap Configuration File
403(1)
Idap.secret
404(1)
nsswitch.conf
404(1)
OpenLDAP
405(1)
OpenLDAP Client Configuration File
405(1)
Samba
406(2)
Smbldap-tools
408(3)
smbldap.conf
408(1)
smbldap_bind.conf
408(1)
Installing and Configuring smbldap-tools
409(2)
Joining the DCTOYS Domain Controller
411(1)
Testing the Samba and OpenLDAP Setup
412(1)
Troubleshooting Tactics
413(1)
Cannot log into the domain controller
413(1)
Cannot start the Samba server properly because only the nmbd process is running
413(1)
Summary
413(2)
The Linux Kernel
415(20)
History of the Linux Kernel
415(1)
Types of Linux Kernels
415(2)
Kernel Modules
417(1)
Loading Kernel Modules
418(3)
insmod
418(1)
modprobe
418(1)
modprobe.conf
419(2)
Unloading Kernel Modules
421(1)
rmmod
421(1)
modprobe
422(1)
blacklist
422(1)
When to Recompile the Kernel
422(1)
Getting a New Linux Kernel
423(1)
Preparing to Configure the New Linux Kernel
423(1)
Ways to Configure the Kernel Sources
424(6)
Configuring the Kernel with the Command Line
424(2)
Configuring the Kernel Graphically
426(2)
Configuring the Kernel with menuconfig
428(2)
Preparing for Kernel Compilation
430(1)
Building the Kernel
431(1)
Building the Kernel Modules
432(1)
Making the Boot Loader Initialized RAM Disk
432(1)
Adding the New Kernel into the GRUB Boot Loader
432(2)
Your Turn
434(1)
Summary
434(1)
Linux Virtualization
435(22)
Understanding Virtualization
435(6)
Deciding to Use Virtualization
436(1)
Xen
437(1)
Exploring Virtualization Technologies
437(1)
Full Virtualization
437(1)
Hardware-Assisted Virtualization
437(1)
Operating System Virtualization
437(1)
Paravirtualization
438(1)
Hardware Requirements
439(1)
Installing Xen
440(1)
The xend Daemon
441(2)
The xend Configuration Files
441(1)
xend-config.sxp
441(1)
xend-pci-permissive.sxp and xend-pci-quirks.sxp
442(1)
qemu-ifup
442(1)
The xend Network Configuration Scripts Directory
443(1)
Checking Dom-0
443(1)
Making a Guest with virt-install
444(4)
Preparing the Installation Media
446(1)
Using the virt-install Command
446(2)
Understanding the Guest Configuration File
448(2)
Xen Guest Example Configuration Files
450(1)
Connecting to a Guest
450(3)
Using xm
450(1)
Using virt-viewer
451(1)
Using vncviewer
452(1)
Shutting Down a Guest
453(1)
Starting a Guest
453(1)
Cloning a Guest
453(1)
Cleaning Up
454(1)
Summary
455(2)
Linux Troubleshooting
457(14)
The CentOS Rescue Environment
457(3)
Exploring the Rescue Environment
460(1)
Troubleshooting Checklist
461(3)
Changed the Root Password
461(1)
Bootloader Was Overwritten
462(1)
You're Experimenting with the Files in /etc
463(1)
Skipping/mnt/sysimage
463(1)
Finding the Affected System's Root (/) Directory
464(1)
Mounting Logical Volumes
464(2)
Mounting Logical Volumes
465(1)
Single-User Mode
466(1)
Booting into Single-User Mode
466(1)
My New Kernel Is Stuck!
467(2)
Creating the Required Device Files
468(1)
Summary
469(2)
Index 471
Chivas Sicam occasionally works as an IT instructor and consultant. Prior to his hiatus from working full-time, he indulged himself as one of the system administrators in the engineering team of Defender Technologies Group. Chivas takes pride in being part of DOST-ASTI (Advanced Science and Technology Institute) on Bayanihan Linux. His team advocated the use of open source software for the computing needs of government agencies, schools, and small and medium-size enterprises in the Philippines. He enjoys technology, road trips, and keeping up to date on news of the Utah Jazz.