Muutke küpsiste eelistusi

Linux Administration: A Beginners Guide, Seventh Edition 7th edition [Pehme köide]

  • Formaat: Paperback / softback, 848 pages, kõrgus x laius x paksus: 234x185x43 mm, kaal: 1232 g, 80 Illustrations
  • Sari: Beginner's Guide
  • Ilmumisaeg: 16-Feb-2016
  • Kirjastus: McGraw-Hill Professional
  • ISBN-10: 0071845364
  • ISBN-13: 9780071845366
Teised raamatud teemal:
  • Pehme köide
  • Hind: 53,19 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 848 pages, kõrgus x laius x paksus: 234x185x43 mm, kaal: 1232 g, 80 Illustrations
  • Sari: Beginner's Guide
  • Ilmumisaeg: 16-Feb-2016
  • Kirjastus: McGraw-Hill Professional
  • ISBN-10: 0071845364
  • ISBN-13: 9780071845366
Teised raamatud teemal:

Now with a downloadable virtual machine showcasing the book’s test system configuration and updated for the latest Linux kernel release, the new edition of this bestseller teaches system administrators how to set up and configure Linux quickly and easily.

The seventh edition of Linux Administration: A Beginner's Guide takes a proven, step-by-step approach to teaching the fundamentals of Linux system administration, including set-up, configuration, maintenance, networking, and security. Written for all beginner-level system and network admins, this beginner's guide makes it easy for you to translate your basic admin knowledge to Linux system administration and tackle real-world Linux system administration issues.

Part I begins with instructions for Linux server and software installation. Part II details all that is necessary to manage a stand-alone system and Part III introduces Linux security and networking. The remainder of the book is divided into two parts, Part IV: Internet Services and Part V: Intranet Services. The book’s step-by-step design prompts you to follow along and configure your own system. This new edition features a virtual machine showcasing the example system configuration, allowing you to test and compare your own configuration.

  • Covers the major distributions of Linux server for Ubuntu, Fedora, Centos, and openSUSE, and the latest Linux kernel release -- Linux 3.20
  • Now with a virtual machine! Available for download, the virtual machine showcases the final system configuration you will achieve by working through the book
  • Complete with instructor resource materials, featuring PowerPoint slides for classroom use and a test bank of questions that can be used for homework assignments, quizzes, or a final exam
Acknowledgments xxiii
Introduction xxv
Part I Introduction, Installation, and Software Management
1 Technical Summary of Linux Distributions
3(14)
Linux: The Operating System
4(1)
What Is Open Source Software and GNU All About?
5(4)
What Is the GNU Public License?
7(1)
Upstream and Downstream
8(1)
The Advantages of Open Source Software
9(2)
Understanding the Differences Between Windows and Linux
11(5)
Single Users vs. Multiple Users vs. Network Users
11(1)
The Monolithic Kernel and the Micro-Kernel
12(1)
Separation of the GUI and the Kernel
12(2)
My Network Places
14(1)
The Registry vs. Text Files
15(1)
Domains and Active Directory
15(1)
Summary
16(1)
2 Installing Linux in a Server Configuration
17(30)
Hardware and Environmental Considerations
18(1)
Server Design
19(1)
Uptime
20(1)
Methods of Installation
20(1)
Installing Fedora
21(2)
Project Prerequisites
21(2)
The Installation
23(1)
Installation Summary
24(17)
Localization Section
24(1)
Software Section
25(1)
System Section
26(13)
Start the Installation, Set the Root Password, and Create a User Account
39(1)
Complete the Installation
40(1)
Log In
41(1)
Installing Ubuntu Server
41(5)
Start the Installation
42(1)
Configure the Network
43(1)
Set Up Users and Passwords
43(1)
Configure the Time Zone
43(1)
Set Up the Disk Partition
44(1)
Other Miscellaneous Tasks
45(1)
Summary
46(1)
3 The Command Line
47(40)
An Introduction to Bash
48(5)
Job Control
49(1)
Environment Variables
50(2)
Pipes
52(1)
Redirection
53(1)
Command-Line Shortcuts
53(3)
Filename Expansion
53(1)
Environment Variables as Parameters
54(1)
Multiple Commands
54(1)
Backticks
55(1)
Documentation Tools
56(2)
The man Command
56(2)
The texinfo System
58(1)
Files, File Types, File Ownership, and File Permissions
58(6)
Normal Files
58(1)
Directories
58(1)
Hard Links
59(1)
Symbolic Links
59(1)
Block Devices
59(1)
Character Devices
59(1)
Named Pipes
60(1)
Listing Files: ls
60(1)
Change Ownership: chown
61(1)
Change Group: chgrp
61(1)
Change Mode: chmod
62(2)
File Management and Manipulation
64(9)
Copy Files: cp
65(1)
Move Files: my
65(1)
Link Files: In
66(1)
Find a File: find
66(1)
File Compression: gzip
67(1)
File Compression: bzip2
68(1)
File Compression: xz
68(1)
Create a Directory: mkdir
68(1)
Remove a Directory: rmdir
69(1)
Show Present Working Directory: pwd
69(1)
Tape Archive: tar
69(2)
Concatenate Files: cat
71(1)
Display a File One Screen at a Time: more
72(1)
Show the Directory Location of a File: which
72(1)
Locate a Command: whereis
72(1)
Editors
73(1)
vi
73(1)
emacs
74(1)
joe
74(1)
pico
74(1)
Miscellaneous Tools
74(9)
Disk Utilization: du
75(1)
Disk Free: df
75(1)
Synchronize Disks: sync
76(1)
List Processes: ps
76(1)
Show an Interactive List of Processes: top
77(2)
Send a Signal to a Process: kill
79(2)
Show System Name: uname
81(1)
Who Is Logged In: who
82(1)
A Variation on who: w
82(1)
Switch User: su
82(1)
Putting It All Together (Moving a User and Its Home Directory)
83(3)
Summary
86(1)
4 Managing Software
87(34)
The Red Hat Package Manager
88(3)
Managing Software Using RPM
91(11)
Querying for Information the RPM Way (Getting to Know One Another)
91(3)
Installing Software with RPM (Moving in Together)
94(4)
Uninstalling Software with RPM (Ending the Relationship)
98(1)
Other Things RPM Can Do
99(3)
Yum
102(1)
DNF
103(1)
GUI RPM Package Managers
104(1)
Fedora
104(1)
openSUSE and SLE
104(1)
The Debian Package Management System
105(1)
APT
106(1)
Software Management in Ubuntu
106(4)
Querying for Information
107(1)
Installing Software in Ubuntu
107(1)
Removing Software in Ubuntu
108(2)
Compile and Install GNU Software
110(7)
Getting and Unpacking the Source Package
111(2)
Looking for Documentation
113(1)
Configuring the Package
113(1)
Compiling the Package
114(1)
Installing the Package
115(1)
Testing the Software
116(1)
Cleanup
116(1)
Common Problems When Building from Source Code
117(1)
Problems with Libraries
117(1)
Missing Configure Script
118(1)
Broken Source Code
118(1)
Summary
118(3)
Part II Single-Host Administration
5 Managing Users and Groups
121(32)
What Exactly Constitutes a User?
122(1)
Where User Information Is Kept
123(7)
The /etc/passwd File
123(5)
The /etc/shadow File
128(1)
The /etc/group File
129(1)
User Management Tools
130(8)
Command-Line User Management
130(6)
GUI User Managers
136(2)
Users and Access Permissions
138(2)
Understanding SetUID and SetGID Programs
138(1)
Sticky Bit
139(1)
Pluggable Authentication Modules
140(7)
How PAM Works
140(1)
PAM's Files and Their Locations
141(1)
Configuring PAM
142(2)
An Example PAM Configuration File
144(2)
The "Other" File
146(1)
D'oh! I Can't Log In!
146(1)
Debugging PAM
147(1)
A Grand Tour
147(4)
Creating Users with useradd
147(2)
Creating Groups with groupadd
149(1)
Modifying User Attributes with usermod
150(1)
Modifying Group Attributes with groupmod
150(1)
Deleting Users and Groups with userdel and groupdel
151(1)
Summary
151(2)
6 Booting and Shutting Down
153(28)
Boot Loaders
154(13)
GRUB Legacy
154(5)
GRUB 2
159(6)
LILO
165(1)
Bootstrapping
166(1)
The init Process
167(1)
rc Scripts
168(6)
Writing Your Own rc Script
169(5)
Enabling and Disabling Services
174(1)
Enabling a Service
174(1)
Disabling a Service
175(1)
Graphical Service Managers
175(3)
Odds and Ends of Booting and Shutting Down
178(2)
fsck!
178(1)
Booting into Single-User ("Recovery") Mode
179(1)
Summary
180(1)
7 File Systems
181(32)
The Makeup of File Systems
182(5)
i-Nodes
182(1)
Blocks
182(1)
Superblocks
183(1)
ext3
184(1)
ext4
185(1)
Btrfs
186(1)
XFS
186(1)
Which File System Should You Use?
187(1)
Managing File Systems
187(8)
Mounting and Unmounting Local Disks
188(5)
Using fsck
193(2)
Adding a New Disk
195(2)
Overview of Partitions
196(1)
Traditional Disk and Partition Naming Conventions
196(1)
Volume Management
197(11)
Creating Partitions and Logical Volumes
198(10)
Creating File Systems
208(2)
Summary
210(3)
8 Core System Services
213(32)
The init Daemon
214(8)
upstart: Die init. Die Now!
215(7)
xinetd and inetd
222(8)
The /etc/xinetd.conf File
224(4)
Examples: A Simple Service Entry and Enabling/Disabling a Service
228(2)
The Logging Daemon
230(10)
rsyslogd
230(8)
systemd-journald (journald)
238(2)
The cron Program
240(3)
The crontab File
241(1)
Editing the crontab File
242(1)
Summary
243(2)
9 The Linux Kernel
245(24)
What Exactly Is a Kernel?
246(2)
Finding the Kernel Source Code
248(2)
Getting the Correct Kernel Version
248(1)
Unpacking the Kernel Source Code
249(1)
Building the Kernel
250(13)
Preparing to Configure the Kernel
251(2)
Kernel Configuration
253(4)
Compiling the Kernel
257(2)
Installing the Kernel
259(2)
Booting the Kernel
261(1)
The Author Lied—It Didn't Work!
262(1)
Patching the Kernel
263(4)
Downloading and Applying Patches
263(3)
If the Patch Worked
266(1)
If the Patch Didn't Work
266(1)
Summary
267(2)
10 Knobs and Dials: API (Virtual) File Systems
269(18)
What's Inside the /proc Directory?
270(2)
Tweaking Files Inside of /proc
271(1)
Some Useful /proc Entries
272(2)
Enumerated /proc Entries
274(1)
Common proc Settings and Reports
274(3)
SYN Flood Protection
276(1)
Issues on High-Volume Servers
277(1)
Debugging Hardware Conflicts
277(1)
SysFS
277(3)
cgroupfs
280(1)
tmpfs
281(2)
tmpfs Example
282(1)
Summary
283(4)
Part III Networking and Security
11 TCP/IP for System Administrators
287(42)
The Layers
288(7)
Packets
288(3)
TCP/IP Model and the OSI Model
291(4)
Headers
295(9)
Ethernet
295(2)
IP (IPv4)
297(3)
TCP
300(3)
UDP
303(1)
A Complete TCP Connection
304(3)
Opening a Connection
304(2)
Transferring Data
306(1)
Closing the Connection
307(1)
How ARP Works
307(3)
The ARP Header: ARP Works with Other Protocols, Too!
309(1)
Bringing IP Networks Together
310(10)
Hosts and Networks
310(1)
Subnetting
311(1)
Netmasks
312(1)
Static Routing
313(2)
Dynamic Routing with RIP
315(5)
tcpdump Bits and Bobs
320(4)
Reading and Writing Dumpfiles
321(1)
Capturing More or Less per Packet
322(1)
Performance Impact
322(1)
Don't Capture Your Own Network Traffic
322(1)
Troubleshooting Slow Name Resolution (DNS) Issues
323(1)
IPv6
324(3)
IPv6 Address Format
324(1)
IPv6 Address Types
325(1)
IPv6 Backward-Compatibility
326(1)
Summary
327(2)
12 Network Configuration
329(26)
Modules and Network Interfaces
330(13)
Network Device Configuration Utilities (ip, ifconfig, and nmcli)
332(2)
Sample Usage—ifconfig, ip, and nmcli
334(5)
Setting Up NICs at Boot Time
339(4)
Managing Routes
343(4)
Sample Usage: Route Configuration
343(2)
Displaying Routes
345(2)
A Simple Linux Router
347(4)
Routing with Static Routes
348(3)
How Linux Chooses an IP Address
351(1)
Hostname Configuration
351(2)
Summary
353(2)
13 Linux Firewall (Netfilter)
355(32)
How Netfilter Works
356(8)
A NAT Primer
358(3)
NAT-Friendly Protocols
361(1)
Chains
361(3)
Installing Netfilter
364(4)
Enabling Netfilter in the Kernel
365(3)
Configuring Netfilter
368(12)
Saving Your Netfilter Configuration
368(2)
The iptables Command
370(8)
firewalld
378(2)
Cookbook Solutions
380(5)
Simple NAT: iptables
381(1)
Simple NAT: nftables
382(1)
Simple Firewall: iptables
382(3)
Summary
385(2)
14 Local Security
387(18)
Common Sources of Risk
389(4)
SetUID Programs
389(2)
Unnecessary Processes
391(2)
Picking the Right Runlevel
393(1)
Nonhuman User Accounts
393(1)
Limited Resources
394(2)
Mitigating Risk
396(5)
chroot
396(4)
SELinux
400(1)
AppArmor
401(1)
Monitoring Your System
401(2)
Logging
402(1)
Using ps and netstat
402(1)
Using df
402(1)
Automated Monitoring
403(1)
Mailing Lists
403(1)
Summary
403(2)
15 Network Security
405(16)
TCP/IP and Network Security
406(1)
The Importance of Port Numbers
406(1)
Tracking Services
407(2)
Using the netstat Command
407(1)
Security Implications of netstat's Output
408(1)
Binding to an Interface
409(1)
Shutting Down Services
410(2)
Shutting Down xinetd and inetd Services
411(1)
Shutting Down Non-xinetd Services
412(1)
Monitoring Your System
412(2)
Making the Best Use of syslog
413(1)
Monitoring Bandwidth with MRTG
414(1)
Handling Attacks
414(1)
Trust Nothing (and No One)
414(1)
Change Your Passwords
415(1)
Pull the Plug
415(1)
Network Security Tools
415(2)
nmap
416(1)
Snort
416(1)
Nessus
416(1)
Wireshark/tcpdump
417(1)
Summary
417(4)
Part IV Internet Services
16 Domain Name System (DNS)
421(38)
The Hosts File
422(1)
How DNS Works
423(7)
Domain and Host Naming Conventions
423(1)
The Root Domain
424(2)
Subdomains
426(1)
The in-addr.arpa Domain
427(1)
Types of Servers
428(2)
Installing a DNS Server
430(5)
Understanding the BIND Configuration File
432(1)
The Specifics
432(3)
Configuring a DNS Server
435(3)
Defining a Primary Zone in the named.conf File
435(2)
Defining a Secondary Zone in the named.conf File
437(1)
Defining a Caching Zone in the named.conf File
437(1)
DNS Records Types
438(5)
SOA: Start of Authority
438(2)
NS: Name Server
440(1)
A: Address Record
440(1)
PTR: Pointer Record
440(1)
MX: Mail Exchanger
441(1)
CNAME: Canonical Name
442(1)
RP and TXT: The Documentation Entries
442(1)
Setting Up BIND Database Files
443(6)
DNS Server Setup Walk-Through
444(5)
The DNS Toolbox
449(5)
host
449(1)
dig
450(1)
nslookup
451(1)
whois
452(1)
nsupdate
453(1)
The rndc Tool
453(1)
Configuring DNS Clients
454(3)
The Resolver
454(3)
Configuring the Client
457(1)
Summary
457(2)
17 File Transfer Protocol (FTP)
459(20)
The Mechanics of
460(2)
Client/Server Interactions
460(2)
Obtaining and Installing vsftpd
462(8)
Configuring vsftpd
462(5)
Starting and Testing the FTP Server
467(3)
Customizing the FTP Server
470(7)
Setting Up an Anonymous-Only HP Server
471(1)
Setting Up an HT Server with Virtual Users
472(5)
Summary
477(2)
18 Apache Web Server
479(20)
Understanding HTTP
480(3)
Headers
480(1)
Ports
481(1)
Process Ownership and Security
482(1)
Installing the Apache HTTP Server
483(3)
Apache Modules
485(1)
Starting Up and Shutting Down Apache
486(2)
Starting Apache at Boot Time
487(1)
Testing Your Installation
488(1)
Configuring Apache
489(8)
Creating a Simple Root-Level Page
489(1)
Apache Configuration Files
489(1)
Common Configuration Options
490(7)
Troubleshooting Apache
497(1)
Summary
498(1)
19 Simple Mail Transfer Protocol (SMTP)
499(14)
Understanding SMTP
500(3)
Rudimentary SMTP Details
500(2)
Security Implications
502(1)
Email Components
502(1)
Installing the Postfix Server
503(4)
Installing Postfix via RPM in Fedora
503(1)
Installing Postfix via APT in Ubuntu
504(1)
Installing Postfix from Source Code
505(2)
Configuring the Postfix Server
507(3)
The main.cf File
507(2)
Checking Your Configuration
509(1)
Running the Server
510(2)
Checking the Mail Queue
510(1)
Flushing the Mail Queue
511(1)
The newaliases Command
511(1)
Making Sure Everything Works
511(1)
Summary
512(1)
20 Post Office Protocol and Internet Mail Access Protocol (POP and IMAP)
513(22)
POP3 and IMAP Protocol Basics
516(1)
Dovecot (IMAP and POP3 Server)
517(1)
Installing Dovecot
517(12)
Dovecot Configuration Files and Options
519(1)
Configuring Dovecot
520(5)
Running Dovecot
525(2)
Checking Basic POP3 Functionality
527(1)
Checking Basic IMAP Functionality
527(2)
Other Issues with Mail Services
529(4)
SSL Security
529(3)
Availability
532(1)
Log Files
533(1)
Summary
533(2)
21 Voice over Internet Protocol (VoIP)
535(46)
VoIP Overview
536(5)
VoIP Server
537(1)
Analog Telephone Adapter (ATA)
537(1)
IP Phones
537(1)
VoIP Protocols
538(3)
VoIP Implementations
541(1)
Asterisk
542(1)
How Asterisk Works
542(1)
Asterisk Installation
542(3)
Starting and Stopping Asterisk
544(1)
Understanding Asterisk Configuration Files and Structure
545(10)
SIP Channel Config: sip.conf
545(5)
The Dialplan: extensions.conf
550(2)
Modules: modules.conf
552(3)
Asterisk Network, Port, and Firewall Requirements
555(2)
Configuring the Local Firewall for Asterisk
556(1)
Configuring the PBX
557(19)
Local Extensions
558(7)
Outside Connection—(VoIP Trunking)
565(1)
Trunking Using Google Voice
566(10)
Asterisk Maintenance and Troubleshooting
576(3)
Asterisk CLI Commands
576(1)
Helpful CLI Commands
576(1)
Common Issues with VoIP
577(2)
Summary
579(2)
22 Secure Shell (SSH)
581(22)
Understanding Public Key Cryptography
582(3)
Key Characteristics
584(1)
Cryptography References
585(1)
Understanding SSH Versions
585(6)
OpenSSH and OpenBSD
586(1)
Alternative Vendors for SSH Clients
586(2)
Installing OpenSSH via RPM in Fedora
588(1)
Installing OpenSSH via APT in Ubuntu
588(3)
Server Start-up and Shutdown
591(1)
SSHD Configuration File
592(1)
Using OpenSSH
593(6)
Secure Shell (ssh) Client Program
593(5)
Secure Copy (scp) Program
598(1)
Secure FTP (sftp) Program
598(1)
Files Used by the OpenSSH Client
599(1)
Summary
599(4)
Part V Intranet Services
23 Network File System (NFS)
603(20)
The Mechanics of NFS
604(3)
Versions of NFS
605(1)
Security Considerations for NFS
606(1)
Mount and Access a Partition
606(1)
Enabling NFS in Fedora, RHEL, and Centos
607(1)
Enabling NFS in Ubuntu
608(1)
The Components of NFS
609(1)
Kernel Support for NFS
610(1)
Configuring an NFS Server
610(4)
The /etc/exports Configuration File
610(4)
Configuring NFS Clients
614(4)
The mount Command
614(2)
Soft vs. Hard Mounts
616(1)
Cross-Mounting Disks
617(1)
The Importance of the intr Option
617(1)
Performance Tuning
617(1)
Troubleshooting Client-Side NFS Issues
618(1)
Stale File Handles
618(1)
Permission Denied
618(1)
Sample NFS Client and NFS Server Configuration
619(2)
Common Uses for NFS
621(1)
Summary
622(1)
24 Samba
623(20)
The Mechanics of SMB
624(5)
Usernames and Passwords
624(1)
Encrypted Passwords
625(1)
Samba Daemons
626(1)
Installing Samba via RPM
627(1)
Installing Samba via APT
627(2)
Samba Administration
629(1)
Starting and Stopping Samba
630(1)
Creating a Share
630(5)
Using smbclient
632(3)
Mounting Remote Samba Shares
635(1)
Samba Users
636(2)
Creating Samba Users
637(1)
Allowing Null Passwords
637(1)
Changing Passwords with smbpasswd
638(1)
Using Samba to Authenticate Against a Windows Server
638(3)
winbindd Daemon
639(2)
Troubleshooting Samba
641(1)
Summary
642(1)
25 Distributed File Systems (DFS)
643(12)
DFS Overview
644(3)
DFS Implementations
647(7)
GlusterFS
649(5)
Summary
654(1)
26 Network Information Service (NIS)
655(26)
Inside NIS
656(1)
The NIS Servers
657(1)
Domains
658(1)
Configuring the Master NIS Server
658(9)
Establishing the Domain Name
659(1)
Starting NIS
660(1)
Editing the Makefile
661(3)
Using ypinit
664(3)
Configuring an NIS Client
667(2)
Install NIS Client-Side Package
667(1)
Editing the /etc/yp.conf File
668(1)
Enabling and Starting ypbind
669(1)
Editing the /etc/nsswitch.conf File
669(3)
NIS at Work
672(2)
Testing Your NIS Client Configuration
674(1)
Configuring a Secondary NIS Server
674(2)
Setting the Domain Name
674(1)
Setting Up the NIS Master to Push to Slaves
675(1)
Running ypinit
675(1)
NIS Tools
676(2)
Using NIS in Configuration Files
677(1)
Implementing NIS in a Real Network
678(1)
A Small Network
678(1)
A Segmented Network
678(1)
Networks Bigger than Buildings
679(1)
Summary
679(2)
27 Lightweight Directory Access Protocol (LDAP)
681(22)
LDAP Basics
682(3)
LDAP Directory
683(1)
Client/Server Model
684(1)
Uses of LDAP
684(1)
LDAP Terminology
685(1)
OpenLDAP
685(9)
Server-Side Daemons
686(1)
OpenLDAP Utilities
686(1)
Installing OpenLDAP
687(1)
Configuring OpenLDAP
688(2)
Configuring slapd
690(3)
Starting and Stopping slapd
693(1)
Configuring OpenLDAP Clients
694(3)
Creating Directory Entries
695(2)
Searching, Querying, and Modifying the Directory
697(1)
Using OpenLDAP for User Authentication
698(4)
Configuring the Server
699(1)
Configuring the Client
700(2)
Summary
702(1)
28 Printing
703(18)
Printing Terminologies
704(1)
The CUPS System
705(3)
Running CUPS
705(1)
Installing CUPS
705(2)
Configuring CUPS
707(1)
Adding Printers
708(6)
Local Printers and Remote Printers
708(2)
Using the Web Interface to Add a Printer
710(3)
Using Command-Line Tools to Add a Printer
713(1)
Routine CUPS Administration
714(3)
Setting the Default Printer
714(1)
Enabling, Disabling, and Deleting Printers
714(1)
Accepting and Rejecting Print Jobs
715(1)
Managing Printing Privileges
715(1)
Managing Printers via the Web Interface
716(1)
Using Client-Side Printing Tools
717(2)
lpr
717(1)
lpq
718(1)
lprm
718(1)
Summary
719(2)
29 Dynamic Host Configuration Protocol (DHCP)
721(14)
The Mechanics of DHCP
722(1)
The DHCP Server
723(10)
Installing DHCP Software via RPM
723(1)
Installing DHCP Software via APT in Ubuntu
724(1)
Configuring the DHCP Server
725(6)
A Sample dhcpd.conf File
731(2)
The DHCP Client Daemon
733(1)
Configuring the DHCP Client
733(1)
Summary
734(1)
30 Virtualization
735(20)
Why Virtualize?
736(2)
Virtualization Concepts
737(1)
Virtualization Implementations
738(2)
Hyper-V
738(1)
Kernel-Based Virtual Machine (KVM)
738(1)
QEMU
739(1)
User-Mode Linux (UML)
739(1)
VirtualBox
739(1)
VMware
739(1)
Xen
739(1)
KVM
740(5)
KVM Example
741(3)
Managing KVM Virtual Machines
744(1)
Setting Up KVM in Ubuntu/Debian
745(3)
Containers
748(5)
Containers vs. Virtual Machines
749(1)
Docker
749(4)
Summary
753(2)
31 Backups
755(18)
Evaluating Your Backup Needs
756(7)
Amount of Data
756(1)
Backup Hardware and Backup Medium
757(1)
Network Throughput
758(1)
Speed and Ease of Data Recovery
759(1)
Data Deduplication
759(1)
Tape Management
760(3)
Command-Line Backup Tools
763(6)
dump and restore
764(4)
tar
768(1)
rsync
769(1)
Miscellaneous Backup Solutions
769(1)
Summary
770(3)
Part VI Appendixes
A Creating a Linux Installer on Flash/USB Devices
773(12)
Creating a Linux Installer on Flash/USB Devices (via Linux OS)
774(2)
Creating a Linux Installer on Flash/USB Devices (via Microsoft Windows)
776(9)
Fedora Installer Using Live USB Creator on Windows
777(2)
Ubuntu Installer Using UNetbootin on Windows
779(2)
OpenSUSE Installer Using Pendrivelinux.com's Universal USB Installer on Windows
781(4)
B Demo Virtual Machine
785(18)
Basic Host System Requirements
787(1)
Installing the Virtualization Applications and Utilities
788(1)
Download and Prep the Demo VM Image File
789(2)
Import the Demo VM Image and Create a New VM Instance
791(3)
Managing the Demo Virtual Machine
791(3)
Connecting to the Demo VM
794(8)
Virtual Network Computing (VNC)
794(2)
Connecting via SSH
796(1)
Virtual Serial TTY Console
797(1)
Cockpit Application
798(3)
Just Use It!
801(1)
Feedback
802(1)
Index 803
Wale Soyinka wears many hats, all fitting to varying degrees. he is a father, an author, a producer, a system administrator, an open source evangelist, a network administrator, a hacker, an entrepreneur, and a chef. Wale has written an extensive librar of Linux administration training materials, including the fifth, and sixth editions of Linux Administration: A Beginner's Guide. He is also the author or Wireless Netowrk Administration: A Beginner's Guide.