Unix System Management: Primer PlusSams Publishing, 2002 - 531 lappuses Annotation Thsi book jump-starts the educational process, providing the essential concepts and fundamental strategies that are used by UNIX system administrators every day. Offers a thorough and detailed approach to the concepts and methodologies that govern UNIX system management. Covers a wide range of systems topics not covered in any other books on UNIX system administration. Written by an practicing UNIX system administrator with eight years of experience managing enterprise-level UNIX systems. UNIX System Management Primer Plusdescribes in detail the concepts and methodologies that govern UNIX system administration. Its focus is both analytical and task-oriented. It covers the entire lifecycle of a system, from design to decommission, and explores the readers role as an administrator. Topics not usually covered in more specific books are discussed, such as collocation facilities, user communication, and disaster recovery. The focus of this book is "how to be a system administrator," not "how to administer your system." Jeffrey S. Horwitzhas worked with UNIX systems for over eight years, both as a user and an administrator. He has administered a wide range of systems, from single-user workstations to highly tuned enterprise database servers. At the University of Michigan, he managed several campus UNIX services for over 65,000 users. In the ISP world at LaserLink.Net and Covad Communications, he managed over 150 servers providing e-mail, dial-up, and billing services to over 800,000 users across the country. Currently he is the manager of production systems at TargetRx, Inc., where he maintains their entire UNIX infrastructure, having designed and built it from scratch. Jeff holds a B.S in Cellular & Molecular Biology from the University of Michigan, is an active member of Usenix and SAGE, and is a Sun Certified System Administrator. |
Saturs
Fire Suppression | 30 |
Securing Access to Your Data Center | 43 |
OutofBand Management for Maintenance and Repair | 50 |
Recording Your Deployment Procedures | 62 |
Maintenance | 89 |
Support Administration | 115 |
Monitoring Services | 137 |
File Size | 159 |
Planning for CPU Resources | 295 |
Tuning Disk and File System Performance | 305 |
Gauging Memory Performance and Capacity | 311 |
Tuning Memory and Swap Performance | 317 |
Process Automation | 335 |
Implementing System Security | 359 |
Bad Path Verification | 376 |
Securing Data with Encryption | 382 |
Internal Versus External Monitoring | 165 |
Patches Upgrades and Decommissions | 171 |
Service Outages | 197 |
Preparing for Disaster Recovery | 219 |
A WellOiled Machine | 247 |
RAID4 | 263 |
Data Redundancy Using Snapshots | 269 |
HighAvailability Options for Internet Services | 277 |
Alternative Authentication Methods | 392 |
The Human Aspect | 405 |
Interacting with Users | 429 |
Launching Attacks on Your System | 442 |
Summary | 451 |
Appendixes | 469 |
Bieži izmantoti vārdi un frāzes
application backup bandwidth bash bytes cables cfengine chapter client command communication configuration file connections crontab data center database decommission denial-of-service attack disaster recovery disk documentation downtime encryption equipment file system functionality hardware help desk host HVAC inetd infrastructure install interface Internet load balancing log files login machine memory messages monitoring multiple on-call OpenBSD operating system option oracle organization outage packages password patch performance port power supplies problem procedures public key rack Real-World Example reboot recovery plan Red Hat Linux redundancy remote requests require response root rotation router rsync schedule setuid Solaris space specify staff swap switch syslog syslog-ng system administrator TCP Wrappers tcpdump Telnet tion traffic types Unix system upgrade usage users vendor Web server