Muutke küpsiste eelistusi

Linux Bible 10th edition [Pehme köide]

(Gig Harbor, Washington)
  • Formaat: Paperback / softback, 928 pages, kõrgus x laius x paksus: 234x188x46 mm, kaal: 1270 g
  • Sari: Bible
  • Ilmumisaeg: 08-Jun-2020
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119578884
  • ISBN-13: 9781119578888
Teised raamatud teemal:
  • Pehme köide
  • Hind: 59,75 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 70,30 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Raamatukogudele
  • Formaat: Paperback / softback, 928 pages, kõrgus x laius x paksus: 234x188x46 mm, kaal: 1270 g
  • Sari: Bible
  • Ilmumisaeg: 08-Jun-2020
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119578884
  • ISBN-13: 9781119578888
Teised raamatud teemal:
The industry favorite Linux guide

Linux Bible, 10th Edition is the ultimate hands-on Linux user guide, whether you're a true beginner or a more advanced user navigating recent changes. This updated ninth edition covers the latest versions of Red Hat Enterprise Linux 7 (RHEL 8), Fedora 30, and Ubuntu 18.10 LTS, and includes new information on cloud computing and development with guidance on Openstack and Cloudforms. With a focus on RHEL 8, this practical guide gets you up to speed quickly on the new enhancements for enterprise-quality file systems, the new boot process and services management, firewalld, and the GNOME 3 desktop. Written by a Red Hat expert, this book provides the clear explanations and step-by-step instructions that demystify Linux and bring the new features seamlessly into your workflow.

This useful guide assumes a base of little or no Linux knowledge, and takes you step by step through what you need to know to get the job done.

  • Get Linux up and running quickly
  • Master basic operations and tackle more advanced tasks
  • Get up to date on the recent changes to Linux server system management
  • Bring Linux to the cloud using Openstack and Cloudforms
  • Simplified Linux administration through the Cockpit Web Interface 
  • Automated Linux Deployment with Ansible 
  • Learn to navigate Linux with Amazon (AWS), Google (GCE), and Microsofr Azure Cloud services 

Linux Bible, 10th Edition is the one resource you need, and provides the hands-on training that gets you on track in a flash.

Acknowledgments xi
Introduction xxxv
Part I Getting Started
1(58)
Chapter 1 Starting with Linux
3(24)
Understanding What Linux Is
4(2)
Understanding How Linux Differs from Other Operating Systems
6(1)
Exploring Linux History
7(9)
Free-flowing UNIX culture at Bell Labs
7(2)
Commercial UNIX
9(1)
Berkeley Software Distribution arrives
9(1)
UNIX Laboratory and commercialization
10(1)
GNU transitions UNIX to freedom
11(1)
BSD loses some steam
12(1)
Linus builds the missing piece
13(1)
OSI open source definition
14(2)
Understanding How Linux Distributions Emerged
16(3)
Choosing a Red Hat distribution
16(1)
Using Red Hat Enterprise Linux
17(1)
Using Fedora
18(1)
Choosing Ubuntu or another Debian distribution
19(1)
Finding Professional Opportunities with Linux Today
19(6)
Understanding how companies make money with Linux
20(1)
Becoming Red Hat certified
21(1)
RHCSA topics
22(1)
RHCE topics
23(2)
Summary
25(2)
Chapter 2 Creating the Perfect Linux Desktop
27(32)
Understanding Linux Desktop Technology
28(2)
Starting with the Fedora GNOME Desktop Live image
30(1)
Using the GNOME 3 Desktop
31(15)
After the computer boots up
31(1)
Navigating with the mouse
32(4)
Navigating with the keyboard
36(2)
Setting up the GNOME 3 desktop
38(1)
Extending the GNOME 3 desktop
39(1)
Using GNOME shell extensions
39(1)
Using the GNOME Tweak Tool
40(1)
Starting with desktop applications
41(1)
Managing files and folders with Nautilus
42(1)
Installing and managing additional software
43(2)
Playing music with Rhythmbox
45(1)
Stopping the GNOME 3 desktop
46(1)
Using the GNOME 2 Desktop
46(11)
Using the Metacity window manager
48(1)
Changing GNOME's appearance
49(1)
Using the GNOME panels
50(1)
Using the Applications and System menus
51(1)
Adding an applet
51(1)
Adding another panel
52(1)
Adding an application launcher
52(1)
Adding a drawer
53(1)
Changing panel properties
54(1)
Adding 3D effects with AIGLX
54(3)
Summary
57(1)
Exercises
57(2)
Part II Becoming a Linux Power User
59(106)
Chapter 3 Using the Shell
61(32)
About Shells and Terminal Windows
62(3)
Using the shell prompt
63(1)
Using a Terminal window
63(2)
Using virtual consoles
65(1)
Choosing Your Shell
65(1)
Running Commands
66(6)
Understanding command syntax
67(3)
Locating commands
70(2)
Recalling Commands Using Command History
72(6)
Command-line editing
73(2)
Command-line completion
75(1)
Command-line recall
76(2)
Connecting and Expanding Commands
78(3)
Piping between commands
78(1)
Sequential commands
79(1)
Background commands
79(1)
Expanding commands
80(1)
Expanding arithmetic expressions
80(1)
Expanding variables
80(1)
Using Shell Variables
81(3)
Creating and using aliases
81(2)
Exiting the shell
83(1)
Creating Your Shell Environment
84(4)
Configuring your shell
84(1)
Setting your prompt
85(2)
Adding environment variables
87(1)
Getting Information about Commands
88(2)
Summary
90(1)
Exercises
90(3)
Chapter 4 Moving Around the Filesystem
93(20)
Using Basic Filesystem Commands
96(2)
Using Metacharacters and Operators
98(3)
Using file-matching metacharacters
98(1)
Using file-redirection metacharacters
99(2)
Using brace expansion characters
101(1)
Listing Files and Directories
101(4)
Understanding File Permissions and Ownership
105(4)
Changing permissions with chmod (numbers)
106(1)
Changing permissions with chmod (letters)
107(1)
Setting default file permission with umask
108(1)
Changing file ownership
109(1)
Moving, Copying, and Removing Files
109(2)
Summary
111(1)
Exercises
111(2)
Chapter 5 Working with Text Files
113(18)
Editing Files with vim and vi
113(7)
Starting with vi
115(1)
Adding text
115(1)
Moving around in the text
116(1)
Deleting, copying, and changing text
117(1)
Pasting (putting) text
118(1)
Repeating commands
118(1)
Exiting vi
118(1)
Skipping around in the file
119(1)
Searching for text
119(1)
Using ex mode
120(1)
Learning more about vi and vim
120(1)
Finding Files
120(9)
Using locate to find files by name
121(1)
Searching for files with find
122(1)
Finding files by name
123(1)
Finding files by size
124(1)
Finding files by user
124(1)
Finding files by permission
125(1)
Finding files by date and time
125(1)
Using `not' and `or' when finding files
126(1)
Finding files and executing commands
127(1)
Searching in files with grep
128(1)
Summary
129(1)
Exercises
129(2)
Chapter 6 Managing Running Processes
131(16)
Understanding Processes
131(1)
Listing Processes
132(5)
Listing processes with ps
132(2)
Listing and changing processes with top
134(2)
Listing processes with System Monitor
136(1)
Managing Background and Foreground Processes
137(3)
Starting background processes
138(1)
Using foreground and background commands
139(1)
Killing and Renicing Processes
140(3)
Killing processes with kill and killall
140(1)
Using kill to signal processes by PID
140(1)
Using killall to signal processes by name
141(1)
Setting processor priority with nice and renice
142(1)
Limiting Processes with cgroups
143(1)
Summary
144(1)
Exercises
145(2)
Chapter 7 Writing Simple Shell Scripts
147(18)
Understanding Shell Scripts
147(16)
Executing and debugging shell scripts
148(1)
Understanding shell variables
149(1)
Special shell positional parameters
150(1)
Reading in parameters
151(1)
Parameter expansion in bash
151(1)
Performing arithmetic in shell scripts
152(1)
Using programming constructs in shell scripts
153(1)
The "if...then" statements
153(3)
The case command
156(1)
The "for...do" loop
157(1)
The "while...do" and "until...do" loops
158(1)
Trying some useful text manipulation programs
159(1)
The general regular expression parser
159(1)
Remove sections of lines of text (cut)
159(1)
Translate or delete characters (tr)
160(1)
The stream editor (sed)
160(1)
Using simple shell scripts
161(1)
Telephone list
161(1)
Backup script
162(1)
Summary
163(1)
Exercises
163(2)
Part III Becoming a Linux System Administrator
165(140)
Chapter 8 Learning System Administration
167(28)
Understanding System Administration
167(2)
Using Graphical Administration Tools
169(5)
Using Cockpit browser-based administration
169(2)
Using system-config-* tools
171(2)
Using other browser-based admin tools
173(1)
Using the root User Account
174(4)
Becoming root from the shell (su command)
175(1)
Allowing administrative access via the GUI
176(1)
Gaining administrative access with sudo
176(2)
Exploring Administrative Commands, Configuration Files, and Log Files
178(7)
Administrative commands
178(1)
Administrative configuration files
179(4)
Administrative log files and systemd journal
183(1)
Using journalctl to view the systemd journal
184(1)
Managing log messages with rsyslogd
184(1)
Using Other Administrative Accounts
185(1)
Checking and Configuring Hardware
186(7)
Checking your hardware
187(2)
Managing removable hardware
189(2)
Working with loadable modules
191(1)
Listing loaded modules
191(1)
Loading modules
192(1)
Removing modules
192(1)
Summary
193(1)
Exercises
193(2)
Chapter 9 Installing Linux
195(26)
Choosing a Computer
196(2)
Installing Fedora from Live Media
198(3)
Installing Red Hat Enterprise Linux from Installation Media
201(3)
Understanding Cloud-Based Installations
204(1)
Installing Linux in the Enterprise
205(2)
Exploring Common Installation Topics
207(12)
Upgrading or installing from scratch
207(1)
Dual booting
208(1)
Installing Linux to run virtually
209(1)
Using installation boot options
210(1)
Boot options for disabling features
210(1)
Boot options for video problems
210(1)
Boot options for special installation types
210(1)
Boot options for kickstarts and remote repositories
211(1)
Miscellaneous boot options
212(1)
Using specialized storage
213(1)
Partitioning hard drives
214(1)
Understanding different partition types
215(1)
Tips for creating partitions
215(2)
Using the GRUB boot loader
217(2)
Summary
219(1)
Exercises
219(2)
Chapter 10 Getting and Managing Software
221(28)
Managing Software on the Desktop
221(2)
Going Beyond the Software Window
223(1)
Understanding Linux RPM and DEB Software Packaging
224(5)
Understanding DEB packaging
225(1)
Understanding RPM packaging
226(1)
What is in an RPM?
226(1)
Where do RPMs come from?
227(1)
Installing RPMs
228(1)
Managing RPM Packages with YUM
229(12)
Transitioning from yum to dnf
229(1)
Understanding how yum works
229(4)
Using YUM with third-party software repositories
233(1)
Managing software with the yum command
233(1)
Searching for packages
234(2)
Installing and removing packages
236(2)
Updating packages
238(1)
Updating groups of packages
239(1)
Maintaining your RPM package database and cache
240(1)
Downloading RPMs from a YUM repository
241(1)
Installing, Querying, and Verifying Software with the rpm Command
241(4)
Installing and removing packages with rpm
241(1)
Querying rpm information
242(2)
Verifying RPM packages
244(1)
Managing Software in the Enterprise
245(1)
Summary
246(1)
Exercises
247(2)
Chapter 11 Managing User Accounts
249(24)
Creating User Accounts
249(10)
Adding users with useradd
252(3)
Setting user defaults
255(2)
Modifying users with usermod
257(1)
Deleting users with userdel
258(1)
Understanding Group Accounts
259(2)
Using group accounts
259(1)
Creating group accounts
260(1)
Managing Users in the Enterprise
261(8)
Setting permissions with Access Control Lists
262(1)
Setting ACLs with setfacl
262(2)
Setting default ACLs
264(1)
Enabling ACLs
265(2)
Adding directories for users to collaborate
267(1)
Creating group collaboration directories (set GID bit)
267(1)
Creating restricted deletion directories (sticky bit)
268(1)
Centralizing User Accounts
269(1)
Summary
270(1)
Exercises
270(3)
Chapter 12 Managing Disks and Filesystems
273(32)
Understanding Disk Storage
273(2)
Partitioning Hard Disks
275(10)
Understanding partition tables
275(1)
Viewing disk partitions
276(1)
Creating a single-partition disk
277(4)
Creating a multiple-partition disk
281(4)
Using Logical Volume Manager Partitions
285(6)
Checking an existing LVM
286(3)
Creating LVM logical volumes
289(1)
Growing LVM logical volumes
290(1)
Mounting Filesystems
291(9)
Supported filesystems
291(2)
Enabling swap areas
293(1)
Disabling swap area
294(1)
Using the fstab file to define mountable file systems
295(2)
Using the mount command to mount file systems
297(1)
Mounting a disk image in loopback
298(1)
Using the umount command
299(1)
Using the mkfs Command to Create a Filesystem
300(1)
Managing Storage with Cockpit
301(2)
Summary
303(1)
Exercises
303(2)
Part IV Becoming a Linux Server Administrator
305(258)
Chapter 13 Understanding Server Administration
307(32)
Starting with Server Administration
308(8)
Step 1 Install the server
308(2)
Step 2 Configure the server
310(1)
Using configuration files
310(1)
Checking the default configuration
310(1)
Step 3 Start the server
311(1)
Step 4 Secure the server
312(1)
Password protection
312(1)
Firewalls
313(1)
TCP Wrappers
313(1)
SELinux
313(1)
Security settings in configuration files
314(1)
Step 5 Monitor the server
314(1)
Configure logging
314(1)
Run system activity reports
314(1)
Watch activity live with Cockpit
314(1)
Keep system software up to date
315(1)
Check the filesystem for signs of crackers
315(1)
Checking and Setting Servers
316(1)
Managing Remote Access with the Secure Shell Service
316(10)
Starting the openssh-server service
317(1)
Using SSH client tools
318(1)
Using ssh for remote login
318(2)
Using ssh for remote execution
320(1)
Copying files between systems with scp and rsync
321(3)
Interactive copying with sftp
324(1)
Using key-based (passwordless) authentication
324(2)
Configuring System Logging
326(6)
Enabling system logging with rsyslog
326(1)
Understanding the rsyslog.conf file
327(2)
Understanding the messages log file
329(1)
Setting up and using a loghost with rsyslogd
330(1)
Watching logs with logwatch
331(1)
Checking System Resources with sar
332(2)
Checking System Space
334(2)
Displaying system space with df
334(1)
Checking disk usage with du
334(1)
Finding disk consumption with find
335(1)
Managing Servers in the Enterprise
336(1)
Summary
336(1)
Exercises
337(2)
Chapter 14 Administering Networking
339(30)
Configuring Networking for Desktops
340(13)
Checking your network interfaces
342(1)
Checking your network from NetworkManager
342(1)
Checking your network from Cockpit
343(2)
Checking your network from the command line
345(4)
Configuring network interfaces
349(1)
Setting IP addresses manually
349(1)
Setting IP address aliases
350(1)
Setting routes
351(1)
Configuring a network proxy connection
352(1)
Configuring Networking from the Command Line
353(11)
Configure networking with nmtui
354(1)
Editing a NetworkManager TUI connection
354(1)
Understanding networking configuration files
355(1)
Network interface files
356(2)
Other networking files
358(2)
Setting alias network interfaces
360(1)
Setting up Ethernet channel bonding
361(2)
Setting custom routes
363(1)
Configuring Networking in the Enterprise
364(2)
Configuring Linux as a router
364(1)
Configuring Linux as a DHCP server
365(1)
Configuring Linux as a DNS server
365(1)
Configuring Linux as a proxy server
366(1)
Summary
366(1)
Exercises
367(2)
Chapter 15 Starting and Stopping Services
369(34)
Understanding the Initialization Daemon (init or systemd)
370(14)
Understanding the classic init daemons
371(6)
Understanding systemd initialization
377(1)
Learning systemd basics
377(5)
Learning systemd's backward compatibility to SysVinit
382(2)
Checking the Status of Services
384(3)
Checking services for SysVinit systems
385(2)
Stopping and Starting Services
387(4)
Stopping and starting SysVinit services
387(2)
Stopping a service with systemd
389(1)
Starting a service with systemd
389(1)
Restarting a service with systemd
389(1)
Reloading a service with systemd
390(1)
Enabling Persistent Services
391(3)
Configuring persistent services for SysVinit
391(1)
Enabling a service with systemd
392(1)
Disabling a service with systemd
393(1)
Configuring a Default Runlevel or Target Unit
394(2)
Configuring the SysVinit default runlevel
394(2)
Adding New or Customized Services
396(5)
Adding new services to SysVinit
396(1)
Step 1 Create a new or customized service script file
396(2)
Step 2 Add the service script to /etc/rc.d/init.d
398(1)
Step 3 Set appropriate permission on the script
398(1)
Step 4 Add the service to runlevel directories
398(1)
Adding new services to systemd
399(1)
Step 1 Create a new or customized service configuration unit file
399(1)
Step 2 Move the service configuration unit file
399(1)
Step 3 Add the service to the Wants directory
400(1)
Summary
401(1)
Exercises
401(2)
Chapter 16 Configuring a Print Server
403(24)
Common UNIX Printing System
403(2)
Setting Up Printers
405(10)
Adding a printer automatically
405(1)
Using web-based CUPS administration
406(1)
Allow remote printing administration
406(1)
Add a printer not automatically detected
407(2)
Using the Print Settings window
409(1)
Configuring local printers with the Print Settings window
409(3)
Configuring remote printers
412(1)
Adding a remote CUPS printer
413(1)
Adding a remote UNIX (LDP/LPR) printer
413(1)
Adding a Windows (SMB) printer
414(1)
Working with CUPS Printing
415(3)
Configuring the CUPS server (cupsd.conf)
415(2)
Starting the CUPS server
417(1)
Configuring CUPS printer options manually
417(1)
Using Printing Commands
418(2)
Printing with lp
419(1)
Listing status with lpstat-t
419(1)
Removing print jobs with lprm
419(1)
Configuring Print Servers
420(4)
Configuring a shared CUPS printer
420(2)
Configuring a shared Samba printer
422(1)
Understanding smb.conf for printing
422(1)
Setting up SMB clients
423(1)
Summary
424(1)
Exercises
424(3)
Chapter 17 Configuring a Web Server
427(28)
Understanding the Apache Web Server
427(1)
Getting and Installing Your Web Server
428(4)
Understanding the httpd package
428(3)
Installing Apache
431(1)
Starting Apache
432(17)
Securing Apache
433(1)
Apache file permissions and ownership
433(1)
Apache and firewalls
433(1)
Apache and SELinux
434(1)
Understanding the Apache configuration files
435(1)
Using directives
435(3)
Understanding default settings
438(2)
Adding a virtual host to Apache
440(2)
Allowing users to publish their own web content
442(1)
Securing your web traffic with SSL/TLS
443(2)
Understanding how SSL is configured
445(2)
Generating an SSL key and self-signed certificate
447(1)
Generating a certificate signing request
448(1)
Troubleshooting Your Web Server
449(4)
Checking for configuration errors
449(2)
Accessing forbidden and server internal errors
451(2)
Summary
453(1)
Exercises
453(2)
Chapter 18 Configuring an FTP Server
455(20)
Understanding FTP
455(2)
Installing the vsftpd FTP Server
457(1)
Starting the vsftpd Service
458(3)
Securing Your FTP Server
461(4)
Opening up your firewall for FTP
461(2)
Configuring SELinux for your FTP server
463(2)
Relating Linux file permissions to vsftpd
465(1)
Configuring Your FTP Server
465(4)
Setting up user access
465(2)
Allowing uploading
467(1)
Setting up vsftpd for the Internet
468(1)
Using FTP Clients to Connect to Your Server
469(4)
Accessing an FTP server from Firefox
470(1)
Accessing an FTP server with the Iftp command
470(2)
Using the gFTP client
472(1)
Summary
473(1)
Exercises
473(2)
Chapter 19 Configuring a Windows File Sharing (Samba) Server
475(24)
Understanding Samba
475(1)
Installing Samba
476(2)
Starting and Stopping Samba
478(4)
Starting the Samba (smb) service
478(2)
Starting the NetBIOS (nmbd) name server
480(1)
Stopping the Samba (smb) and NetBIOS (nmb) services
481(1)
Securing Samba
482(4)
Configuring firewalls for Samba
482(2)
Configuring SELinux for Samba
484(1)
Setting SELinux Booleans for Samba
484(1)
Setting SELinux file contexts for Samba
485(1)
Configuring Samba host/user permissions
486(1)
Configuring Samba
486(7)
Configuring the [ global] section
486(1)
Configuring the [ homes] section
487(2)
Configuring the [ printers] section
489(1)
Creating a Samba shared folder
489(1)
Adding the shared folder to Samba
490(1)
Checking the Samba share
490(3)
Accessing Samba Shares
493(4)
Accessing Samba shares in Linux
493(1)
Accessing Samba shares from a Linux file manager
493(2)
Mounting a Samba share from a Linux command line
495(1)
Accessing Samba shares in Windows
496(1)
Using Samba in the Enterprise
497(1)
Summary
497(1)
Exercises
498(1)
Chapter 20 Configuring an NFS File Server
499(24)
Installing an NFS Server
502(1)
Starting the NFS service
502(1)
Sharing NFS Filesystems
503(5)
Configuring the /etc/exports file
504(1)
Hostnames in /etc/exports
505(1)
Access options in /etc/exports
506(1)
User mapping options in /etc/exports
506(1)
Exporting the shared filesystems
507(1)
Securing Your NFS Server
508(4)
Opening up your firewall for NFS
508(2)
Allowing NFS access in TCP wrappers
510(1)
Configuring SELinux for your NFS server
511(1)
Using NFS Filesystems
512(8)
Viewing NFS shares
512(1)
Manually mounting an NFS filesystem
512(1)
Mounting an NFS filesystem at boot time
513(1)
Mounting noauto filesystems
514(1)
Using mount options
515(2)
Using autofs to mount NFS filesystems on demand
517(1)
Automounting to the /net directory
517(1)
Automounting home directories
518(2)
Unmounting NFS filesystems
520(1)
Summary
521(1)
Exercises
521(2)
Chapter 21 Troubleshooting Linux
523(40)
Boot-Up Troubleshooting
523(19)
Understanding Startup Methods
524(1)
Starting with System V init scripts
524(1)
Starting with systemd
525(1)
Starting from the firmware (BIOS or UEFI)
526(1)
Troubleshooting BIOS setup
526(1)
Troubleshooting boot order
527(1)
Troubleshooting the GRUB boot loader
528(1)
The GRUB Legacy boot loader
528(2)
GRUB 2 Boot loader
530(2)
Starting the kernel
532(1)
Troubleshooting the initialization system
533(1)
Troubleshooting System V initialization
533(1)
Troubleshooting rc.sysinit
533(1)
Troubleshooting runlevel processes
534(4)
Troubleshooting systemd initialization
538(4)
Troubleshooting Software Packages
542(5)
Fixing RPM databases and cache
545(2)
Troubleshooting Networking
547(6)
Troubleshooting outgoing connections
547(1)
View network interfaces
547(1)
Check physical connections
548(1)
Check routes
548(1)
Check hostname resolution
549(1)
Troubleshooting incoming connections
550(1)
Check if the client can reach your system at all
551(1)
Check if the service is available to the client
551(1)
Check the firewall on the server
552(1)
Check the service on the server
553(1)
Troubleshooting Memory
553(6)
Uncovering memory issues
554(2)
Checking for memory problems
556(2)
Dealing with memory problems
558(1)
Troubleshooting in Rescue Mode
559(2)
Summary
561(1)
Exercises
561(2)
Part V Learning Linux Security Techniques
563(128)
Chapter 22 Understanding Basic Linux Security
565(34)
Implementing Physical Security
565(15)
Implementing disaster recovery
566(1)
Securing user accounts
566(1)
One user per user account
567(1)
Limiting access to the root user account
567(1)
Setting expiration dates on temporary accounts
567(1)
Removing unused user accounts
568(2)
Securing passwords
570(1)
Choosing good passwords
570(1)
Setting and changing passwords
571(1)
Enforcing best password practices
572(2)
Understanding the password files and password hashes
574(2)
Securing the filesystem
576(1)
Managing dangerous filesystem permissions
576(1)
Securing the password files
577(1)
Locking down the filesystem
578(1)
Managing software and services
579(1)
Updating software packages
579(1)
Keeping up with security advisories
580(1)
Advanced implementation
580(1)
Monitoring Your Systems
580(15)
Monitoring log files
581(3)
Monitoring user accounts
584(1)
Detecting counterfeit new accounts and privileges
584(2)
Detecting bad account passwords
586(1)
Monitoring the filesystem
587(1)
Verifying software packages
588(1)
Scanning the filesystem
589(1)
Detecting viruses and rootkits
590(5)
Auditing and Reviewing Linux
595(1)
Conducting compliance reviews
595(1)
Conducting security reviews
596(1)
Summary
596(1)
Exercises
597(2)
Chapter 23 Understanding Advanced Linux Security
599(36)
Implementing Linux Security with Cryptography
599(19)
Understanding hashing
600(2)
Understanding encryption/decryption
602(1)
Understanding cryptographic ciphers
602(1)
Understanding cryptographic cipher keys
603(5)
Understanding digital signatures
608(2)
Implementing Linux cryptography
610(1)
Ensuring file integrity
610(1)
Encrypting a Linux filesystem at installation
611(2)
Encrypting a Linux directory
613(3)
Encrypting a Linux file
616(1)
Encrypting Linux with miscellaneous tools
616(1)
Using Encryption from the Desktop
617(1)
Implementing Linux Security with PAM
618(15)
Understanding the PAM authentication process
619(1)
Understanding PAM contexts
619(1)
Understanding PAM control flags
620(1)
Understanding PAM modules
621(1)
Administering PAM on your Linux system
622(1)
Managing PAM-aware application configuration files
622(1)
Managing PAM system event configuration files
623(3)
Implementing time restrictions with PAM
626(2)
Enforcing good passwords with PAM
628(4)
Encouraging sudo use with PAM
632(1)
Obtaining more information on PAM
633(1)
Summary
633(1)
Exercises
633(2)
Chapter 24 Enhancing Linux Security with SELinux
635(28)
Understanding SELinux Benefits
635(2)
Understanding How SELinux Works
637(8)
Understanding Type Enforcement
637(1)
Understanding Multi-Level Security
638(1)
Implementing SELinux security models
639(1)
Understanding SELinux operational modes
639(1)
Understanding SELinux security contexts
640(3)
Understanding SELinux Policy types
643(1)
Understanding SELinux policy rule packages
644(1)
Configuring SELinux
645(9)
Setting the SELinux mode
645(2)
Setting the SELinux policy type
647(1)
Managing SELinux security contexts
648(1)
Managing the user security context
649(1)
Managing the file security context
650(1)
Managing the process security context
651(1)
Managing SELinux policy rule packages
651(2)
Managing SELinux via Booleans
653(1)
Monitoring and Troubleshooting SELinux
654(5)
Understanding SELinux logging
654(1)
Reviewing SELinux messages in the audit log
655(1)
Reviewing SELinux messages in the messages log
655(1)
Troubleshooting SELinux logging
656(1)
Troubleshooting common SELinux problems
657(1)
Using a nonstandard directory for a service
657(1)
Using a nonstandard port for a service
658(1)
Moving files and losing security context labels
658(1)
Booleans set incorrectly
658(1)
Putting It All Together
659(1)
Obtaining More Information on SELinux
659(1)
Summary
660(1)
Exercises
660(3)
Chapter 25 Securing Linux on a Network
663(28)
Auditing Network Services
663(9)
Evaluating access to network services with nmap
665(3)
Using nmap to audit your network services advertisements
668(4)
Working with Firewalls
672(16)
Understanding firewalls
673(1)
Implementing firewalls
674(1)
Starting with firewalld
675(2)
Changing firewall rules with Cockpit
677(1)
Understanding the iptables utility
678(2)
Using the iptables utility
680(8)
Summary
688(1)
Exercises
688(3)
Part VI Engaging with Cloud Computing
691(94)
Chapter 26 Shifting to Clouds and Containers
693(16)
Understanding Linux Containers
694(3)
Namespaces
695(1)
Container registries
695(1)
Base images and layers
696(1)
Starting with Linux Containers
697(9)
Pulling and running containers
697(1)
Pulling a container
697(1)
Running a shell from a container
698(1)
Running an FTP server from a container
699(2)
Starting and stopping containers
701(1)
Building a container image
702(1)
Build a simple container image
702(1)
Build an FTP container from GitHub
703(2)
Tagging and pushing an image to a registry
705(1)
Using containers in the enterprise
706(1)
Summary
706(1)
Exercises
707(2)
Chapter 27 Using Linux for Cloud Computing
709(20)
Overview of Linux and Cloud Computing
710(3)
Cloud hypervisors (aka compute nodes)
710(1)
Cloud controllers
711(1)
Cloud storage
711(1)
Cloud authentication
712(1)
Cloud deployment and configuration
712(1)
Cloud platforms
712(1)
Trying Basic Cloud Technology
713(1)
Setting Up a Small Cloud
714(13)
Configuring hypervisors
715(1)
Step 1 Get Linux software
715(1)
Step 2 Check your computers
715(1)
Step 3 Install Linux on hypervisors
716(1)
Step 4 Start services on the hypervisors
717(1)
Step 5 Edit /etc/hosts, or set up DNS
718(1)
Configuring storage
718(1)
Step 1 Install Linux software
718(1)
Step 2 Configure NFS share
719(1)
Step 3 Start the NFS service
719(1)
Step 4 Mount the NFS share on the hypervisors
720(1)
Creating virtual machines
720(1)
Step 1 Get images to make virtual machines
721(1)
Step 2 Check the network bridge
721(1)
Step 3 Start Virtual Machine Manager (virt-manager)
722(1)
Step 4 Check connection details
722(1)
Step 5 Create a new virtual machine
722(2)
Managing virtual machines
724(1)
Migrating virtual machines
725(1)
Step 1 Identify other hypervisors
726(1)
Step 2 Migrate running VM to Other hypervisor
726(1)
Summary
727(1)
Exercises
727(2)
Chapter 28 Deploying Linux to the Cloud
729(20)
Getting Linux to Run in a Cloud
729(2)
Creating Linux Images for Clouds
731(8)
Configuring and running a cloud-init cloud instance
731(2)
Investigating the cloud instance
733(1)
Cloning the cloud instance
734(1)
Expanding your cloud-init configuration
735(1)
Adding ssh keys with cloud-init
736(1)
Adding software with cloud-init
737(1)
Using cloud-init in enterprise computing
738(1)
Using OpenStack to Deploy Cloud Images
739(5)
Starting from the OpenStack Dashboard
739(1)
Configuring your OpenStack virtual network
739(2)
Configuring keys for remote access
741(1)
Launching a virtual machine in OpenStack
742(1)
Accessing the virtual machine via ssh
743(1)
Using Amazon EC2 to Deploy Cloud Images
744(2)
Summary
746(1)
Exercises
746(3)
Chapter 29 Automating Apps and Infrastructure with Ansible
749(16)
Understanding Ansible
750(1)
Exploring Ansible Components
751(2)
Inventories
751(1)
Playbooks
752(1)
Plays
752(1)
Tasks
752(1)
Modules
752(1)
Roles, imports, and includes
753(1)
Stepping Through an Ansible Deployment
753(3)
Prerequisites
754(1)
Setting up SSH keys to each node
754(2)
Installing Ansible
756(4)
Creating an inventory
756(1)
Authenticating to the hosts
757(1)
Creating a playbook
757(1)
Run the playbook
758(2)
Running Ad-Hoc Ansible Commands
760(2)
Trying ad-hoc commands
761(1)
Automating Tasks with Ansible Tower Automation Framework
762(1)
Summary
763(1)
Exercises
763(2)
Chapter 30 Deploying Applications as Containers with Kubernetes
765(20)
Understanding Kubernetes
766(2)
Kubernetes masters
766(1)
Kubernetes workers
767(1)
Kubernetes applications
767(1)
Kubernetes interfaces
768(1)
Trying Kubernetes
768(3)
Getting Kubernetes
769(1)
Starting the Kubernetes Basics Tutorial
769(1)
Starting Minikube
770(1)
Running the Kubernetes Basics tutorial
771(11)
Get information about your cluster
771(1)
Deploy a Kubernetes application
772(1)
Get information on the deployment's pods
773(3)
Expose applications with services
776(1)
Label a service
777(1)
Delete a service
778(1)
Scale up an application
779(1)
Check the load balancer
780(1)
Scale down an application
781(1)
Enterprise-Quality Kubernetes with OpenShift
782(1)
Summary
783(1)
Exercises
783(2)
Part VII Appendixes
785(2)
Appendix A Media 787(10)
Appendix B Exercise Answers 797(66)
Index 863
Christopher Negus has been teaching and writing about Linux and UNIX for more than 25 years. He is an instructor and principal technical writer for Red Hat, Inc., and the author of dozens of Linux and UNIX books, including Red Hat Linux Bible (all editions), CentOS Bible, Fedora Bible, Ubuntu Linux Toolbox, Linux Troubleshooting Bible, Linux Toys, and Linux Toys II.