Muutke küpsiste eelistusi

Practical Guide to Fedora and Red Hat Enterprise Linux 4th edition [Multiple-component retail product]

  • Formaat: Multiple-component retail product, 1184 pages, kõrgus x laius x paksus: 234x186x56 mm, kaal: 1820 g, Contains 1 Paperback / softback and 1 DVD-ROM
  • Ilmumisaeg: 03-Jul-2008
  • Kirjastus: Prentice Hall
  • ISBN-10: 0137142951
  • ISBN-13: 9780137142958
Teised raamatud teemal:
  • Multiple-component retail product
  • Hind: 54,98 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Multiple-component retail product, 1184 pages, kõrgus x laius x paksus: 234x186x56 mm, kaal: 1820 g, Contains 1 Paperback / softback and 1 DVD-ROM
  • Ilmumisaeg: 03-Jul-2008
  • Kirjastus: Prentice Hall
  • ISBN-10: 0137142951
  • ISBN-13: 9780137142958
Teised raamatud teemal:
Master All the Techniques You Need to Succeed with Fedora and Red Hat Enterprise Linux in the Workplace

 

Youre studying Fedora and Red Hat Enterprise Linux with a single goal: to succeed with these state-of-the-art operating systems in real workplace environments. In this book, one of the worlds leading Linux experts brings together all the knowledge youll need to achieve that goal. Writing in plain English, best-selling author Mark Sobell explains Linux clearly and effectively, focusing on the skills you will actually use as a professional administrator, user, or programmer. Sobell assumes no prior Linux knowledge: He starts at the very beginning and walks you through every topic and skill that matters.

 

Step by step, youll learn how to install and configure Linux from the accompanying DVD, navigate its graphical user interfaces, set up Linux to provide file/print sharing and Internet services, make sure Linux desktops and networks are as secure as possible, work with the powerful command line, and administer Linux in real business environments.

 

Mark Sobell has taught hundreds of thousands of Linux and UNIX  professionals. He knows every Linux nook and crannyand he never forgets what its like to be new to Linux. Whatever your Linux-related career goals, this book gives you all you needand more.

 

Compared with the other Linux books out there, A Practical Guide to Fedora and Red Hat® Enterprise Linux®, College Edition, delivers





Complete, up-to-the-minute coverage of Fedora 8 and Enterprise Linux 5 Deeper coverage of the command line and the GNOME and KDE GUIs, including customizing the desktop More practical coverage of file sharing using Samba, NFS, and FTP More usable, realistic coverage of Internet server configuration, including Apache, sendmail, NFS, DNS/BIND, and LDAP More state-of-the-art security techniques, including SELinux (Security Enhanced Linux), ACLs (Access Control Lists), firewall setup using both the Red Hat GUI and iptables, and a full chapter on OpenSSH More and better coverage of meat-and-potatoes system/network administration tasks A more practical introduction to writing bash shell scripts Complete instructions on keeping Linux systems up-to-date using yum And much more...including a 500+ term glossary and a comprehensive index to help you find what you need fast!

Includes DVD! Get the full version of the Fedora 8 release!

Arvustused

Praise for A Practical Guide to Red Hat® Linux®, Second Edition

 

Since Im in an educational environment, I found the content of Sobells book to be right on target and very helpful for anyone managing Linux in the enterprise. His style of writing is very clear. He builds up to the chapter exercises, which I find to be relevant to real-world scenarios a user or admin would encounter. An IT/IS student would find this book a valuable complement to their education. The vast amount of information is extremely well balanced and Sobell manages to present the content without complicated asides and meandering prose. This is a `must have for anyone managing Linux systems in a networked environment or anyone running a Linux server. I would also highly recommend it to an experienced computer user who is moving to the Linux platform.

Mary Norbury, IT Director, Barbara Davis Center/University of Colorado at Denver, from a review posted on slashdot.org





 

I had the chance to use your UNIX books when I when was in college years ago at Cal Poly San Luis Obispo, CA. I have to say that your books are among the best! Theyre quality books that teach the theoretical aspects and applications of the operating system.

Benton Chan, IS Engineer

 

The book has more than lived up to my expectations from the many reviews I read, even though it targets FC2. I have found something very rare with your book: It doesnt read like the standard technical text, it reads more like a story. Its a pleasure to read and hard to put down. Did I say that?! :-)

David Hopkins, Business Process Architect

 

Thanks for your work and for the book you wrote. There are really few books that can help people to become more efficient administrators of different workstations. We hope (in Russia) that you will continue bringing us a new level of understanding of Linux/UNIX systems.

Anton Petukhov

 

Mark Sobell has written a book as approachable as it is authoritative.

Jeffrey Bianchine, Advocate, Author, Journalist

 

Excellent reference book, well suited for the sysadmin of a Linux cluster, or the owner of a PC contemplating installing a recent stable Linux. Dont be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs.

Wes Boudville, Inventor

 

A Practical Guide to Red Hat® Linux® is a brilliant book. Thank you Mark Sobell.

C. Pozrikidis, University of California at San Diego

 

This book presents the best overview of the Linux operating system that I have found. . . . [ It] should be very helpful and understandable no matter what the readers background is: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows. . . . The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready.

Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group [ FRUUG], Boulder, Colorado

 

Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. Theres no other book that discusses so many different topics and in such depth.

Eugenia Loli-Queru, Editor in Chief, OSNews.com

Muu info

Praise for A Practical Guide to Red Hat(R) Linux(R), Second Edition "Since I'm in an educational environment, I found the content of Sobell's book to be right on target and very helpful for anyone managing Linux in the enterprise. His style of writing is very clear. He builds up to the chapter exercises, which I find to be relevant to real-world scenarios a user or admin would encounter. An IT/IS student would find this book a valuable complement to their education. The vast amount of information is extremely well balanced and Sobell manages to present the content without complicated asides and meandering prose. This is a 'must have' for anyone managing Linux systems in a networked environment or anyone running a Linux server. I would also highly recommend it to an experienced computer user who is moving to the Linux platform." --Mary Norbury, IT Director, Barbara Davis Center/University of Colorado at Denver, from a review posted on slashdot.org "I had the chance to use your UNIX books when I when was in college years ago at Cal Poly San Luis Obispo, CA. I have to say that your books are among the best! They're quality books that teach the theoretical aspects and applications of the operating system." --Benton Chan, IS Engineer "The book has more than lived up to my expectations from the many reviews I read, even though it targets FC2. I have found something very rare with your book: It doesn't read like the standard technical text, it reads more like a story. It's a pleasure to read and hard to put down. Did I say that?! :-)" --David Hopkins, Business Process Architect "Thanks for your work and for the book you wrote. There are really few books that can help people to become more efficient administrators of different workstations. We hope (in Russia) that you will continue bringing us a new level of understanding of Linux/UNIX systems." --Anton Petukhov "Mark Sobell has written a book as approachable as it is authoritative." --Jeffrey Bianchine, Advocate, Author, Journalist "Excellent reference book, well suited for the sysadmin of a Linux cluster, or the owner of a PC contemplating installing a recent stable Linux. Don't be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs." --Wes Boudville, Inventor "A Practical Guide to Red Hat(R) Linux(R) is a brilliant book. Thank you Mark Sobell." --C. Pozrikidis, University of California at San Diego "This book presents the best overview of the Linux operating system that I have found... [It] should be very helpful and understandable no matter what the reader's background is: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows... The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready." --Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group [FRUUG], Boulder, Colorado "Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. There's no other book that discusses so many different topics and in such depth." --Eugenia Loli-Queru, Editor in Chief, OSNews.com Master All the Techniques You Need to Succeed with Fedora and Red Hat Enterprise Linux in the Workplace You're studying Fedora and Red Hat Enterprise Linux with a single goal: to succeed with these state-of-the-art operating systems in real workplace environments. In this book, one of the world's leading Linux experts brings together all the knowledge you'll need to achieve that goal. Writing in plain English, best-selling author Mark Sobell explains Linux clearly and effectively, focusing on the skills you will actually use as a professional administrator, user, or programmer. Sobell assumes no prior Linux knowledge: He starts at the very beginning and walks you through every topic and skill that matters. Step by step, you'll learn how to install and configure Linux from the accompanying DVD, navigate its graphical user interfaces, set up Linux to provide file/print sharing and Internet services, make sure Linux desktops and networks are as secure as possible, work with the powerful command line, and administer Linux in real business environments. Mark Sobell has taught hundreds of thousands of Linux and UNIX professionals. He knows every Linux nook and cranny--and he never forgets what it's like to be new to Linux. Whatever your Linux-related career goals, this book gives you all you need--and more. Compared with the other Linux books out there, A Practical Guide to Fedora and Red Hat(R) Enterprise Linux(R), College Edition, delivers *Complete, up-to-the-minute coverage of Fedora 8 and Enterprise Linux 5*Deeper coverage of the command line and the GNOME and KDE GUIs, including customizing the desktop*More practical coverage of file sharing using Samba, NFS, and FTP *More usable, realistic coverage of Internet server configuration, including Apache, sendmail, NFS, DNS/BIND, and LDAP*More state-of-the-art security techniques, including SELinux (Security Enhanced Linux), ACLs (Access Control Lists), firewall setup using both the Red Hat GUI and iptables, and a full chapter on OpenSSH *More and better coverage of "meat-and-potatoes" system/network administration tasks *A more practical introduction to writing bash shell scripts *Complete instructions on keeping Linux systems up-to-date using yum *And much more...including a 500+ term glossary and a comprehensive index to help you find what you need fast! Includes DVD! Get the full version of the Fedora 8 release!
Preface xxxi
Welcome To Linux
1(20)
The GNU-Linux Connection
2(3)
The History of GNU-Linux
2(2)
The Code Is Free
4(1)
Have Fun!
5(1)
The Linux 2.6 Kernel
5(1)
The Heritage of Linux: UNIX
5(1)
What Is So Good About Linux?
6(4)
Why Linux Is Popular with Hardware Companies and Developers
7(1)
Linux Is Portable
8(1)
Standards
8(1)
The C Programming Language
9(1)
Overview of Linux
10(4)
Linux Has a Kernel Programming Interface
10(1)
Linux Can Support Many Users
10(1)
Linux Can Run Many Tasks
11(1)
Linux Provides a Secure Hierarchical Filesystem
11(1)
The Shell: Command Interpreter and Programming Language
12(2)
A Large Collection of Useful Utilities
14(1)
Interprocess Communication
14(1)
System Administration
14(1)
Additional Features of Linux
14(2)
GUIs: Graphical User Interfaces
15(1)
(Inter) Networking Utilities
16(1)
Software Development
16(1)
Conventions Used in This Book
16(3)
Chapter Summary
19(1)
Exercises
19(2)
PART I Installing Fedora and Red Hat Enterprise Linux
21(70)
Installation Overview
23(24)
The Desktop Live Media CD and the Install Media DVD
24(1)
Planning the Installation
24(12)
Considerations
25(1)
Requirements
25(1)
Interfaces: Installer and Installed System
26(1)
Which Are You Installing: Fedora or Red Hat Enterprise Linux?
27(1)
Upgrading an Existing Fedora/RHEL System Versus Installing a Fresh Copy
28(1)
Setting Up the Hard Disk
29(4)
RAID
33(2)
LVM: Logical Volume Manager
35(1)
The Installation Process
36(1)
The Medium: Where Is the Source Data?
36(1)
Downloading a CD/DVD (FEDORA)
37(4)
The Easy Way to Download a CD ISO Image File
38(1)
Finding a Mirror Site to Download from
39(2)
Using BitTorrent to Download a CD/DVD ISO Image File
41(1)
Checking and Burning the CD/DVD
41(1)
Checking the File
41(1)
Burning the CD/DVD
42(1)
Rescue CD
42(1)
Gathering Information About the System
43(1)
Finding the Installation Manual
44(1)
More Information
44(1)
Chapter Summary
45(1)
Exercises
46(1)
Advanced Exercises
46(1)
Step-By-Step Installation
47(44)
Running a Fedora Live Session
48(2)
Booting the System
48(2)
Installing Fedora/RHEL Linux
50(13)
Installing from a Live Session
51(1)
Installing/Upgrading from the Install DVD
51(1)
The Disc Found Screen
52(1)
The Anaconda Installer
53(8)
Firstboot: When You Reboot
61(2)
Initializing Database and Updating the System
63(1)
Installation Tasks
63(17)
Modifying Boot Parameters (Options)
63(3)
Partitioning the Disk
66(3)
gparted: The GNOME Partition Editor
69(3)
parted: Reports on and Partitions a Hard Disk
72(3)
LVs: Logical Volumes
75(3)
Using the Kickstart Configurator
78(1)
Setting Up a Dual-Boot System
79(1)
The X Window System
80(8)
system-config-display: Configures the Display
80(2)
The xorg.conf File
82(6)
gdm: Displays a Graphical Login
88(1)
More Information
88(1)
Chapter Summary
88(1)
Exercises
89(1)
Advanced Exercises
89(2)
PART II Getting Started With Fedora and Red Hat Enterprise Linux
91(152)
Introduction to Fedora and Red Hat Enterprise Linux
93(44)
Curbing Your Power: Superuser/root Access
94(1)
A Tour of the Fedora/RHEL Desktop
94(20)
Logging In on the System
96(1)
Getting the Most from the Desktop
96(10)
Using Konqueror to Manage Files, Run Programs, and Browse the Web
106(3)
Customizing Your Desktop with the KDE Control Center
109(3)
Customizing the Main Panel Using the Panel Menu
112(2)
Getting the Facts: Where to Find Documentation
114(9)
The KDE Help Center
114(1)
GNOME Help
115(1)
man: Displays the System Manual
116(2)
info: Displays Information About Utilities
118(2)
The --help Option
120(1)
HOWTOs: Finding Out How Things Work
121(1)
Getting Help with the System
121(2)
More About Logging In
123(8)
The Login Screen
124(1)
What to Do if You Cannot Log In
124(1)
Logging Out
125(1)
Using Virtual Consoles
125(1)
Logging In Remotely: Terminal Emulation and ssh or telnet
125(1)
Changing Your Password
126(2)
Logging In on a Terminal
128(3)
Controlling Windows: Advanced Operations
131(3)
Changing the Input Focus
131(1)
Changing the Resolution of the Display
132(1)
The Window Manager
133(1)
Chapter Summary
134(1)
Exercises
135(1)
Advanced Exercises
136(1)
The Linux Utilities
137(40)
Special Characters
138(1)
Basic Utilities
139(2)
Is: Lists the Names of Files
139(1)
cat: Displays a Text File
139(1)
rm: Deletes a File
140(1)
Less Is more: Display a Text File One Screen at a Time
140(1)
hostname: Displays the System Name
141(1)
Working with Files
141(7)
cp: Copies a File
141(1)
mv: Changes the Name of a File
142(1)
ipr: Prints a File
143(1)
grep: Searches for a String
143(1)
head: Displays the Beginning of a File
144(1)
tail: Displays the End of a File
144(1)
sort: Displays a File in Order
145(1)
uniq: Removes Duplicate Lines from a File
146(1)
diff: Compares Two Files
147(1)
file: Tests the Contents of a File
147(1)
I (Pipe): Communicates Between Processes
148(1)
Four More Utilities
149(2)
echo: Displays Text
149(1)
date: Displays the Time and Date
149(1)
script: Records a Shell Session
150(1)
unix2dos: Converts Linux and Macintosh Files to Windows Format
151(1)
Compressing and Archiving Files
151(5)
bzip2: Compresses a File
152(1)
bunzip2 and bzcat: Decompress a File
152(1)
gzip: Compresses a File
153(1)
tar: Packs and Unpacks Archives
153(3)
Locating Commands
156(2)
which and whereis: Locate a Utility
156(1)
apropos: Searches for a Keyword
157(1)
locate: Searches for a File
158(1)
Obtaining User and System Information
158(4)
who: Lists Users on the System
159(1)
finger: Lists Users on the System
159(2)
w: Lists Users on the System
161(1)
Communicating with Other Users
162(2)
write: Sends a Message
162(1)
mesg: Denies or Accepts Messages
163(1)
Email
164(1)
Tutorial: Creating and Editing a File with vim
164(7)
Starting vim
165(1)
Command and Input Modes
166(1)
Entering Text
167(1)
Getting Help
168(3)
Ending the Editing Session
171(1)
The compatible Parameter
171(1)
Chapter Summary
171(3)
Exercises
174(1)
Advanced Exercises
175(2)
The Linux Filesystem
177(36)
The Hierarchical Filesystem
178(1)
Directory Files and Ordinary Files
178(5)
Filenames
179(3)
The Working Directory
182(1)
Your Home Directory
182(1)
Pathnames
183(2)
Absolute Pathnames
183(1)
Relative Pathnames
184(1)
Directory Commands
185(5)
mkdir: Creates a Directory
185(3)
Important Standard Directories and Files
188(2)
Working with Directories
190(2)
rmdir: Deletes a Directory
190(1)
Using Pathnames
191(1)
mv, cp: Move or Copy Files
191(1)
mv: Moves a Directory
192(1)
Access Permissions
192(5)
Is -I: Displays Permissions
193(1)
chmod: Changes Access Permissions
194(1)
Setuid and Setgid Permissions
195(1)
Directory Access Permissions
196(1)
ACLs: Access Control Lists
197(5)
Enabling ACLs
198(1)
Working with Access Rules
198(3)
Setting Default Rules for a Directory
201(1)
Links
202(6)
Hard Links
204(2)
Symbolic Links
206(2)
rm: Removes a Link
208(1)
Chapter Summary
208(2)
Exercises
210(2)
Advanced Exercises
212(1)
The Shell
213(30)
The Command Line
214(6)
Syntax
214(3)
Processing the Command Line
217(2)
Executing the Command Line
219(1)
Editing the Command Line
219(1)
Standard Input and Standard Output
220(11)
The Screen as a File
220(1)
The Keyboard and Screen as Standard Input and Standard Output
221(1)
Redirection
222(6)
Pipes
228(3)
Running a Program in the Background
231(2)
Filename Generation/Pathname Expansion
233(4)
The ? Special Character
233(1)
The * Special Character
234(1)
The [ ] Special Characters
235(2)
Builtins
237(1)
Chapter Summary
238(1)
Exercises
239(2)
Advanced Exercises
241(2)
PART III Digging Into Fedora and Red Hat Enterprise Linux
243(158)
Linux GUIs: X, GNOME, and KDE
245(34)
X Window System
246(9)
Using X
248(5)
Window Managers
253(2)
Using GNOME
255(11)
The Nautilus File Manager
255(6)
GNOME Utilities
261(1)
Searching for Files
261(5)
Using KDE
266(10)
Konqueror Browser/File Manager
266(7)
KDE Utilities
273(3)
Chapter Summary
276(1)
Exercises
277(1)
Advanced Exercises
277(2)
The Bourne Again Shell
279(78)
Background
280(1)
Shell Basics
281(18)
Startup Files
281(3)
Commands That Are Symbols
284(1)
Redirecting Standard Error
284(2)
Writing a Simple Shell Script
286(4)
Separating and Grouping Commands
290(4)
Job Control
294(2)
Manipulating the Directory Stack
296(3)
Parameters and Variables
299(14)
User-Created Variables
300(3)
Variable Attributes
303(2)
Keyword Variables
305(8)
Special Characters
313(1)
Processes
314(2)
Process Structure
314(1)
Process Identification
314(2)
Executing a Command
316(1)
History
316(16)
Variables That Control History
316(2)
Reexecuting and Editing Commands
318(8)
The Readline Library
326(6)
Aliases
332(3)
Single Versus Double Quotation Marks in Aliases
333(1)
Examples of Aliases
334(1)
Functions
335(3)
Controlling bash Features and Options
338(4)
Command Line Options
338(1)
Shell Features
338(4)
Processing the Command Line
342(9)
History Expansion
342(1)
Alias Substitution
342(1)
Parsing and Scanning the Command Line
342(1)
Command Line Expansion
343(8)
Chapter Summary
351(2)
Exercises
353(2)
Advanced Exercises
355(2)
Networking and the Internet
357(44)
Types of Networks and How They Work
359(15)
Broadcast Networks
360(1)
Point-to-Point Networks
360(1)
Switched Networks
360(1)
LAN: Local Area Network
361(1)
WAN: Wide Area Network
362(1)
Internetworking Through Gateways and Routers
362(3)
Network Protocols
365(2)
Host Address
367(4)
CIDR: Classless Inter-Domain Routing
371(1)
Hostnames
372(2)
Communicate Over a Network
374(2)
finger: Displays Information About Remote Users
374(1)
Sending Mail to a Remote User
375(1)
Mailing List Servers
376(1)
Network Utilities
376(7)
Trusted Hosts
376(1)
OpenSSH Tools
377(1)
telnet: Logs In on a Remote System
377(2)
ftp: Transfers Files Over a Network
379(1)
ping: Tests a Network Connection
379(1)
traceroute: Traces a Route Over the Internet
380(2)
host and dig: Query Internet Nameservers
382(1)
jwhois: Looks Up Information About an Internet Site
382(1)
Distributed Computing
383(9)
The Client/Server Model
384(1)
DNS: Domain Name Service
385(2)
Ports
387(1)
NIS: Network Information Service
387(1)
NFS: Network Filesystem
387(1)
Internet Services
388(3)
Proxy Servers
391(1)
RPC Network Services
391(1)
Usenet
392(3)
WWW: World Wide Web
395(2)
URL: Uniform Resource Locator
396(1)
Browsers
396(1)
Search Engines
396(1)
Chapter Summary
397(1)
Exercises
398(1)
Advanced Exercises
399(2)
PART IV System Administration
401(188)
System Administration: Core Concepts
403(58)
System Administrator and Superuser
405(6)
System Administration Tools
407(4)
Rescue Mode
411(3)
Avoiding a Trojan Horse
412(1)
Getting Help
413(1)
SELinux
414(3)
More Information
415(1)
config: The SELinux Configuration File
415(1)
sestatus: Displays the State of SELinux
416(1)
Setting the Targeted Policy with system-config-selinux
416(1)
System Operation
417(12)
Booting the System
417(1)
Init Scripts: Start and Stop System Services
418(5)
Single-User Mode
423(1)
Going to Multiuser Mode
423(1)
Multiuser/Graphical mode
424(1)
Logging In
424(1)
Logging Out
425(1)
Bringing the System Down
426(2)
Crash
428(1)
System Administration Utilities
429(6)
Fedora/RHEL Configuration Tools
429(3)
Command Line Utilities
432(3)
Setting Up a Server
435(14)
Standard Rules in Configuration Files
435(2)
rpcinfo: Displays Information About portmap
437(2)
The xinetd Superserver
439(2)
Securing a Server
441(4)
DHCP: Configures Hosts
445(4)
nsswitch.conf: Which Service to Look at First
449(3)
How nsswitch.conf Works
449(3)
PAM
452(5)
More Information
453(1)
Configuration Files, Module Types, and Control Flags
453(2)
Example
455(1)
Modifying the PAM Configuration
456(1)
Chapter Summary
457(1)
Exercises
458(1)
Advanced Exercises
459(2)
Files, Directories, and Filesystems
461(28)
Important Files and Directories
462(11)
File Types
473(5)
Ordinary Files, Directories, Links, and Inodes
474(1)
Special Files
474(4)
Filesystems
478(9)
mount: Mounts a Filesystem
480(3)
umount: Unmounts a Filesystem
483(1)
fstab: Keeps Track of Filesystems
483(1)
fsck: Checks Filesystem Intergrity
484(1)
tune2fs: Changes Filesystem Parameters
485(2)
RAID Filesystem
487(1)
Chapter Summary
487(1)
Exercises
488(1)
Advanced Exercises
488(1)
Downloading and Installing Software
489(22)
yum: Keeps the System Up-to-Date
490(7)
Configuring yum
490(2)
Using yum to Update, Install, and Remove Packages
492(3)
Yum Groups
495(1)
Other yum Commands
496(1)
yum-updatesd: Runs yum Automatically
496(1)
Upgrading a System with yum
496(1)
Downloading rpm Package Files with yumdownloader
496(1)
pirut: Adds and Removes Software Packages
497(1)
BitTorrent
498(3)
rpm: Red Hat Package Manager
501(3)
Querying Packages and Files
502(1)
Installing, Upgrading, and Removing Packages
502(1)
Installing a Linux Kernel Binary
503(1)
Installing Non-rpm Software
504(2)
The/opt and /usr/local Directories
504(1)
GNU Configure and Build System
504(2)
Keeping Software Up-to-Date
506(2)
Bugs
506(1)
Errata
507(1)
Red Hat Network (RHEL)
507(1)
wget: Downloads Files Noninteractively
508(1)
Chapter Summary
509(1)
Exercises
509(1)
Advanced Exercises
509(2)
Printing with Cups
511(26)
Introduction
512(1)
Prerequisites
512(1)
More Information
513(1)
Notes
513(1)
JumpStart I: Configuring a Local Printer
513(1)
system-config-printer: Configuring a Printer
514(4)
Configuration Tabs
515(1)
Setting Up a Remote Printer
515(3)
JumpStart II: Configuring a Remote Printer Using the CUPS Web Interface
518(5)
Traditional UNIX Printing
523(1)
Configuring Printers
524(7)
The CUPS Web Interface
524(2)
CUPS on the Command Line
526(3)
Sharing CUPS Printers
529(2)
The KDE Printing Manager
531(1)
Printing from Windows
532(2)
Printing Using CUPS
532(1)
Printing Using Samba
533(1)
Printing to Windows
534(1)
Chapter Summary
534(1)
Exercises
535(1)
Advanced Exercises
535(2)
Rebuilding the Linux Kernel
537(12)
Preparing the Source Code
538(2)
Locating the Source Code
538(1)
Installing the Source Code
539(1)
Read the Documentation
540(1)
Configuring and Compiling the Linux Kernel
541(3)
Cleaning the Source Tree
541(1)
Configuring the Linux Kernel
541(2)
Compiling the Linux Kernel
543(1)
Using Loadable Kernel Modules
543(1)
Installing the Kernel and Associated Files
544(1)
Rebooting
544(1)
Boot Loader
545(2)
grub: The Linux Loader
545(2)
dmesg: Displays Kernel Messages
547(1)
Chapter Summary
547(1)
Exercises
548(1)
Advanced Exercises
548(1)
Administration Tasks
549(30)
Configuring User and Group Accounts
550(2)
system-config-users: Manages User Accounts
550(1)
useradd: Adds a User Account
551(1)
userdel: Removes a User Account
552(1)
groupadd: Adds a Group
552(1)
Backing Up Files
552(7)
Choosing a Backup Medium
553(1)
Backup Utilities
554(2)
Performing a Simple Backup
556(1)
dump, restore: Back Up and Restore Filesystems
557(2)
Scheduling Tasks
559(1)
crond and crontab: Schedule Routine Tasks
559(1)
at: Runs Occasional Tasks
559(1)
kcron: Schedules Tasks
560(1)
System Reports
560(3)
vmstat: Reports Virtual Memory Statistics
561(1)
top: Lists Processes Using the Most Resources
562(1)
Keeping Users Informed
563(1)
Creating Problems
564(1)
Failing to Perform Regular Backups
564(1)
Not Reading and Following Instructions
564(1)
Failing to Ask for Help When Instructions Are Not Clear
564(1)
Deleting or Mistyping a Critical File
564(1)
Solving Problems
565(11)
Helping When a User Cannot Log In
565(1)
Speeding Up the System
566(1)
Isof: Finds Open Files
567(1)
Keeping a Machine Log
567(1)
Keeping the System Secure
568(1)
Log Files and Mail for root
569(1)
Monitoring Disk Usage
569(2)
Iogrotate: Manages Log Files
571(1)
Removing Unused Space from Directories
572(1)
Disk Quota System
573(1)
rsyslogd: Logs System Messages
574(2)
Chapter Summary
576(1)
Exercises
576(1)
Advanced Exercises
577(2)
Configuring a Lan
579(10)
Setting Up the Hardware
580(2)
Connecting the Computers
580(1)
Gateways and Routers
581(1)
NIC: Network Interface Card
581(1)
Configuring the Systems
582(4)
system-config-network: Configures the Hardware
583(1)
iwconfig: Configures a Wireless NIC
584(2)
Setting Up Servers
586(1)
More Information
587(1)
Chapter Summary
587(1)
Exercises
588(1)
Advanced Exercises
588(1)
PART V Using Clients and Setting Up Servers
589(266)
OpenSSH: Secure Network Communication
591(22)
Introduction
592(1)
About OpenSSH
592(3)
Files
592(2)
How OpenSSH Works
594(1)
More Information
594(1)
OpenSSH Clients
595(8)
Prerequisites
595(1)
JumpStart: Using ssh and scp
595(1)
Setup
596(1)
ssh: Connects to or Executes Commands on a Remote System
597(3)
scp: Copies Files from/to a Remote System
600(1)
sftp: A Secure FTP Client
601(1)
~/.ssh/config and /etc/ssh/ssh_config Configuration Files
601(2)
sshd: OpenSSH Server
603(4)
Prerequisites
603(1)
Notes
603(1)
JumpStart: Starting the sshd Daemon
603(1)
Authorized Keys: Automatic Login
604(1)
Command Line Options
605(1)
/etc/ssh/sshd_config Configuration File
605(2)
Troubleshooting
607(1)
Tunneling/Port Forwarding
608(2)
Chapter Summary
610(1)
Exercises
610(1)
Advanced Exercises
611(2)
FTP: Transferring Files Across A Network
613(26)
Introduction
614(1)
More Information
615(1)
FTP Client
615(9)
Prerequisites
615(1)
JumpStart: Downloading Files Using ftp
616(3)
Notes
619(1)
Anonymous FTP
619(1)
Automatic Login
619(1)
Binary Versus ASCII Transfer Mode
620(1)
Ftp Specifics
620(4)
FTP Server (vsftpd)
624(12)
Prerequisites
624(1)
Notes
624(1)
JumpStart: Starting a vsftpd Server
625(1)
Testing the Setup
625(1)
vsftpd.conf: The vsftpd Configuration File
626(10)
Chapter Summary
636(1)
Exercises
637(1)
Advanced Exercises
637(2)
sendmail: Setting Up Mail Clients, Servers, and More
639(28)
Introduction
640(2)
Prerequisites
641(1)
Notes
641(1)
More Information
642(1)
JumpStart I: Configuring sendmail on a Client
642(1)
JumpStart II: Configuring sendmail on a Server
643(1)
How sendmail Works
644(3)
Mail logs
644(1)
Aliases and Forwarding
645(1)
Related Programs
646(1)
Configuring sendmail
647(5)
The sendmail.mc and sendmail.cf Files
647(3)
Other Files in /etc/mail
650(2)
Additional Email Tools
652(10)
SpamAssassin
652(4)
Webmail
656(2)
Mailing Lists
658(1)
Setting Up an IMAP or POP3 Server
659(1)
Setting Up KMail
659(3)
Authenticated Relaying
662(2)
Alternatives to sendmail
664(1)
Chapter Summary
664(1)
Exercises
665(1)
Advanced Exercises
665(2)
NIS and LDAP
667(30)
Introduction to NIS
668(1)
How NIS Works
668(3)
More Information
670(1)
Setting Up an NIS Client
671(4)
Prerequisites
671(1)
Notes
671(1)
Step-by-Step Setup
671(2)
Testing the Setup
673(1)
yppasswd: Changes NIS Passwords
674(1)
Setting Up an NIS Server
675(7)
Prerequisites
675(1)
Notes
676(1)
Step-by-Step Setup
676(5)
Testing
681(1)
yppasswdd: The NIS Password Update Daemon
681(1)
LDAP
682(3)
More Information
684(1)
Setting Up an LDAP Server
685(8)
Prerequisites
685(1)
Note
685(1)
Step-by-Step Setup
685(5)
Other Tools for Working with LDAP
690(3)
Chapter Summary
693(1)
Exercises
694(1)
Advanced Exercises
694(3)
NFS: Sharing Filesystems
697(22)
Introduction
698(2)
More Information
700(1)
Setting Up an NFS Client
700(6)
Prerequisites
700(1)
JumpStart I: Mounting a Remote Directory Hierarchy
700(2)
mount: Mounts a Directory Hierarchy
702(2)
Improving Performance
704(1)
/etc/fstab: Mounts Directory Hierarchies Automatically
705(1)
Setting Up an NFS Server
706(8)
Prerequisites
706(1)
Notes
706(1)
JumpStart II: Configuring an NFS Server Using system-config-nfs
707(1)
Exporting a Directory Hierarchy
708(4)
exportfs: Maintains the List of Exported Directory Hierarchies
712(1)
Testing the Server Setup
713(1)
automount: Automatically Mounts Directory Hierarchies
714(2)
Chapter Summary
716(1)
Exercises
716(1)
Advanced Exercises
717(2)
Samba: Integrating Linux and Windows
719(24)
Introduction
720(1)
About Samba
721(2)
Prerequisites
721(1)
More Information
721(1)
Notes
721(1)
Samba Users, User Maps, and Passwords
722(1)
JumpStart: Configuring a Samba Server Using system-config-samba
723(2)
swat: Configures a Samba Server
725(4)
Manually Configuring a Samba Server
729(6)
Parameters in the smbd.conf File
730(5)
The [ homes] Share: Sharing Users' Home Directories
735(1)
Accessing Linux Shares from Windows
735(1)
Browsing Shares
735(1)
Mapping a Share
736(1)
Accessing Windows Shares from Linux
736(2)
smbtree: Displays Windows Shares
736(1)
smbclient: Connects to Windows Shares
737(1)
Browsing Windows Networks
737(1)
Mounting Windows Shares
737(1)
Troubleshooting
738(2)
Chapter Summary
740(1)
Exercises
741(1)
Advanced Exercises
741(2)
DNS/BIND: Tracking Domain Names and Addresses
743(46)
Introduction to DNS
744(11)
Nodes, Domains, and Subdomains
744(2)
Zones
746(1)
Queries
747(1)
Servers
748(1)
Resource Records
749(3)
DNS Query and Response
752(1)
Reverse Name Resolution
753(2)
About DNS
755(2)
How DNS Works
755(1)
Prerequisites
755(1)
More Information
756(1)
Notes
756(1)
JumpStart I: Setting Up a DNS Cache
757(2)
JumpStart II: Setting Up a Domain Using system-config-bind
759(4)
Notes
759(1)
Using the BIND Configuration GUI Window
760(1)
Setting Up a Domain Server
761(1)
Adding Resource Records
762(1)
Setting Up BIND
763(12)
named.conf: The named Configuration File
764(2)
Zone Files
766(1)
A DNS Cache
767(5)
DNS Glue Records
772(1)
TSIGs: Transaction Signatures
773(1)
Running BIND in a chroot Jail
774(1)
Troubleshooting
775(2)
A Full-Functioned Nameserver
777(3)
A Slave Server
780(1)
A Split Horizon Server
781(5)
Chapter Summary
786(1)
Exercises
786(1)
Advanced Exercises
787(2)
iptables: Setting Up a Firewall
789(22)
How iptables Works
790(2)
About iptables
792(2)
More Information
792(1)
Prerequisites
793(1)
Notes
793(1)
JumpStart: Building a Firewall Using system-config-firewall
794(1)
Anatomy of an iptables Command
795(1)
Building a Set of Rules
796(7)
Commands
797(1)
Packet Match Criteria
798(1)
Display Criteria
798(1)
Match Extensions
799(2)
Targets
801(1)
Copying Rules to and from the Kernel
802(1)
system-config-firewall: Generates a Set of Rules
803(2)
Sharing an Internet Connection Using NAT
805(4)
Connecting Several Clients to a Single Internet Connection
806(2)
Connecting Several Servers to a Single Internet Connection
808(1)
Chapter Summary
809(1)
Exercises
809(1)
Advanced Exercises
809(2)
Apache (httpd): Setting Up a Web Server
811(44)
Introduction
812(1)
About Apache
812(2)
Prerequisites
813(1)
More Information
813(1)
Notes
814(1)
JumpStart I: Getting Apache Up and Running
814(2)
Modifying the httpd.conf Configuration File
815(1)
Testing Apache
815(1)
Putting Your Content in Place
816(1)
JumpStart II: Setting Up Apache Using system-config-httpd
816(2)
Filesystem Layout
818(2)
Configuration Directives
820(20)
Directives I: Directives You May Want to Modify as You Get Started
820(4)
Contexts and Containers
824(4)
Directives II: Advanced Directives
828(12)
The Fedora/RHEL httpd.conf File
840(3)
Global Environment
841(1)
Main Server Configuration
842(1)
Virtual Hosts
843(1)
Redirects
843(1)
Multiviews
844(1)
Server-Generated Directory Listings (Indexing)
844(1)
Virtual Hosts
844(1)
Troubleshooting
845(1)
Modules
846(5)
Module List
846(1)
mod_cgi and CGI Scripts
847(1)
mod_ssl
847(3)
Authentication Modules and .htaccess
850(1)
Scripting Modules
851(1)
webalizer: Analyzes Web Traffic
851(1)
MRTG: Monitors Traffic Loads
852(1)
Error Codes
852(1)
Chapter Summary
853(1)
Exercises
854(1)
Advanced Exercises
854(1)
PART VI Programming
855(136)
Programming Tools
857(46)
Programming in C
858(8)
Checking Your Compiler
858(1)
A C Programming Example
859(3)
Compiling and Linking a C Program
862(4)
Using Shared Libraries
866(2)
Fixing Broken Binaries
867(1)
Creating Shared Libraries
868(1)
make: Keeps a Set of Programs Current
868(8)
Implied Dependencies
871(3)
Macros
874(2)
Debugging C Programs
876(10)
Gcc Compiler Warning Options
878(2)
Symbolic Debuggers
880(6)
Threads
886(1)
System Calls
887(2)
strace: Traces System Calls
887(1)
Controlling Processes
888(1)
Accessing the Filesystem
888(1)
Source Code Management
889(10)
CVS: Concurrent Versions System
890(9)
Chapter Summary
899(1)
Exercises
900(1)
Advanced Exercises
901(2)
Programming the Bourne Again Shell
903(88)
Control Structures
904(33)
if...then
904(4)
if...then...else
908(3)
if...then...elif
911(6)
for...in
917(1)
for
918(2)
while
920(4)
until
924(2)
break and continue
926(1)
case
927(6)
select
933(2)
Here Document
935(2)
File Descriptors
937(3)
Parameters and Variables
940(12)
Array Variables
940(2)
Locality of Variables
942(2)
Special Parameters
944(2)
Positional Parameters
946(5)
Expanding Null and Unset Variables
951(1)
Builtin Commands
952(14)
type: Displays Information About a Command
953(1)
read: Accepts User Input
953(3)
exec: Executes a Command
956(3)
trap: Catches a Signal
959(3)
kill: Aborts a Process
962(1)
getopts: Parses Options
962(3)
A Partial List of Builtins
965(1)
Expressions
966(8)
Arithmetic Evaluation
966(1)
Logical Evaluation (Conditional Expressions)
967(1)
String Pattern Matching
968(1)
Operators
969(5)
Shell Programs
974(10)
A Recursive Shell Script
975(3)
The quiz Shell Script
978(6)
Chapter Summary
984(2)
Exercises
986(2)
Advanced Exercises
988(3)
PART VII Appendixes
991(52)
Appendix A: Regular Expressions
993(1)
Characters
994(1)
Delimiters
994(1)
Simple Strings
994(1)
Special Characters
994(3)
Periods
995(1)
Brackets
995(1)
Asterisks
996(1)
Carets and Dollar Signs
996(1)
Quoting Special Characters
997(1)
Rules
997(1)
Longest Match Possible
997(1)
Empty Regular Expressions
998(1)
Bracketing Expressions
998(1)
The Replacement String
998(1)
Ampersand
999(1)
Quoted Digit
999(1)
Extended Regular Expressions
999(2)
Appendix Summary
1001(2)
Appendix B: Help
1003(1)
Solving a Problem
1004(1)
Finding Linux-Related Information
1005(5)
Documentation
1005(1)
Useful Linux Sites
1006(1)
Linux Newsgroups
1007(1)
Mailing Lists
1007(1)
Words
1008(1)
Software
1008(2)
Office Suites and Word Processors
1010(1)
Specifying a Terminal
1010(3)
Appendix C: Security
1013(1)
Encryption
1014(5)
Public Key Encryption
1015(1)
Symmetric Key Encryption
1016(1)
Encryption Implementation
1017(1)
GnuPG/PGP
1018(1)
File Security
1019(1)
Email Security
1019(1)
MTAs (Mail Transfer Agents)
1019(1)
MUAs (Mail User Agents)
1020(1)
Network Security
1020(3)
Network Security Solutions
1021(1)
Network Security Guidelines
1021(2)
Host Security
1023(5)
Login Security
1024(1)
Remote Access Security
1025(1)
Viruses and Worms
1026(1)
Physical Security
1026(2)
Security Resources
1028(3)
Appendix Summary
1031(2)
Appendix D: The Free Software Definition
1033(4)
Appendix E: The Linux 2.6 Kernel
1037(1)
Native Posix Thread Library (NPTL)
1038(1)
IPSecurity (IPSec)
1038(1)
Asynchronous I/O (AIO)
1038(1)
O (1) Scheduler
1039(1)
OProfile
1039(1)
kksymoops
1039(1)
Reverse Map Virtual Memory (rmap VM)
1039(1)
HugeTLBFS: Translation Look-Aside Buffer Filesystem
1040(1)
remap_file_pages
1040(1)
2.6 Network Stack Features (IGMPv3, IPv6, and Others)
1040(1)
Internet Protocol Virtual Server (IPVS)
1040(1)
Access Control Lists (ACLs)
1041(1)
4GB-4GB Memory Split: Physical Address Extension (PAE)
1041(1)
Scheduler Support for Hyper Threaded CPUs
1041(1)
Block I/O (BIO) Block Layer
1041(1)
Support for Filesystems Larger Than 2 Terabytes
1042(1)
New I/O Elevators
1042(1)
Interactive Scheduler Response Tuning
1042(1)
Glossary 1043(48)
Index 1091
Mark G. Sobell is President of Sobell Associates Inc., a consulting firm that specializes in UNIX/Linux training, support, and custom software development. He has more than twenty-five years of experience working with UNIX and Linux systems and is the author of many best-selling books, including A Practical Guide to Red Hat® Linux®, Third Edition; A Practical Guide to Linux® Commands, Editors, and Shell Programming; and A Practical Guide to Ubuntu Linux®, all from Prentice Hall, and A Practical Guide to the UNIX System from Addison-Wesley.