Skip to content

UNIX System Administration Handbook

Best in textbook rentals since 2012!

ISBN-10: 0130206016

ISBN-13: 9780130206015

Edition: 3rd 2001 (Revised)

Authors: Evi Nemeth, Garth Snyder, Trent H. Hein, Scott Seebass

List price: $88.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

For courses in UNIX-Intro/Advanced and System Administration. This classic, best-selling guide to Unix system administration combines theory with practical application to explore Solaris, HP-UX, Free BSD, and significant coverage of Linux. Professional insight from those in the field helps make this in-depth treatment an indispensable tutorial.
Customers also bought

Book details

List price: $88.99
Edition: 3rd
Copyright year: 2001
Publisher: Prentice Hall PTR
Publication date: 8/29/2000
Binding: Paperback
Pages: 896
Size: 6.75" wide x 9.00" long x 1.25" tall
Weight: 2.750
Language: English

Foreword
Foreword to the Second Edition
Foreword to the First Edition
Preface
Acknowledgments
Basic Administration
Where to Start
Suggested background
The sordid history of UNIX
Example UNIX systems
Notation and typographical conventions
How to use your manuals
Essential tasks of the system administrator
How to find files on the Internet
System administration under duress
Recommended reading
Booting and Shutting Down
Bootstrapping
Booting PCs
Booting in single-user mode
Startup scripts
Rebooting and shutting down
Rootly Powers
Ownership of files and processes
The superuser
Choosing a root password
Becoming root
Other pseudo-users
Controlling Processes
Components of a process
The life cycle of a process
Signals
kill: send signals
Process states
nice and renice: influence scheduling priority
ps: monitor processes
top: monitor processes even better
Runaway processes
The Filesystem
Pathnames
Mounting and unmounting filesystems
The organization of the file tree
File types
File attributes
Adding New Users
The /etc/passwd file
The FreeBSD /etc/master.passwd file
The FreeBSD /etc/login.conf file
The Solaris and Red Hat /etc/shadow file
The /etc/group file
Adding users
Removing users
Disabling logins
Vendor-supplied account management utilities
Serial Devices
Serial standards
Alternative connectors
Hard and soft carrier
Hardware flow control
Cable length
Serial device files
Software configuration for serial devices
Configuration of hardwired terminals
Special characters and the terminal driver
stty: set terminal options
test: set options automatically
How to unwedge a terminal
Modems
Debugging a serial line
Other common I/O ports
Adding a Disk
Disk interfaces
Disk geometry
An overview of the disk installation procedure
fsck: check and repair filesystems
Vendor specifics
Periodic Processes
cron: schedule commands
The format of crontab files
Crontab management
Some common uses for cron
Vendor specifics
Backups
Motherhood and apple pie
Backup devices and media
Setting up an incremental backup regime
Restoring from dumps
Dumping and restoring for upgrades
Using other archiving programs
Using multiple files on a single tape
Amanda
Commercial backup products
Recommended reading
Syslog and Log Files
Logging policies
Finding log files
Files NOT to manage
Vendor specifics
Syslog: the system event logger
Condensing log files to useful information
Drivers and the Kernel
Kernel types
Why configure the kernel?
Configuring a Solaris kernel
Building an HP-UX kernel
Configuring a Linux kernel
Building a FreeBSD kernel
Creating a BSD configuration file
Adding device drivers
Device files
Naming conventions for devices
Loadable kernel modules
Recommended reading
Networking
TCP/IP Networking
TCP/IP and the Internet
Networking road map
Packets and encapsulation
IP addresses: the gory details
Routing
ARP: The address resolution protocol
DHCP: the Dynamic Host Configuration Protocol
PPP: the Point-to-Point Protocol
Security issues
Addition of machines to a network
Vendor-specific network configuration
Solaris network configuration
HP-UX network configuration
Network configuration for Red Hat
Network configuration for FreeBSD
Recommended reading
Routing
Packet forwarding: a closer look
Routing daemons and routing protocols
Protocols on parade
routed: RIP yourself a new hole
gated: a better routing daemon
Vendor specifics
Routing strategy selection criteria
Cisco routers
Recommended reading
Network Hardware
LAN, WAN, or MAN?
Ethernet: the common LAN
FDDI: the disappointing and expensive LAN
ATM: the promised (but sorely defeated) LAN
Frame relay: the sacrificial WAN
ISDN: the indigenous WAN
DSL: the people's WAN
Where is the network going?
Network testing and debugging
Building wiring
Network design issues
Management issues
Recommended vendors
Recommended reading
The Domain Name System
DNS for the impatient: adding a new machine
The history of DNS
Who needs DNS?
What's new in DNS
The DNS namespace
The BIND software
How DNS works
BIND client issues
BIND server configuration
BIND configuration examples
The DNS database
Updating zone files
Security issues
Testing and debugging
Loose ends
Vendor specifics
Recommended reading
The Network File System
General information about NFS
Server-side NFS
Client-side NFS
nfsstat: dump NFS statistics
Dedicated NFS file servers
Automatic mounting
automount: the original automounter
amd: a more sophisticated automounter
Recommended reading
Sharing System Files
What to share
Copying files around
NIS: the Network Information Service
NIS+: son of NIS
LDAP: the Lightweight Directory Access Protocol
Electronic Mail
Mail systems
The anatomy of a mail message
Mail philosophy
Mail aliases
sendmail: ringmaster of the electronic mail circus
sendmail configuration
Basic sendmail configuration primitives
Fancier sendmail configuration primitives
Configuration file examples
Spam-related features in sendmail
Security and sendmail
sendmail statistics, testing, and debugging
The Postfix mail system
Recommended reading
Network Management and Debugging
Troubleshooting a network
ping: check to see if a host is alive
traceroute: trace IP packets
netstat: get tons o' network statistics
Packet sniffers
Network management protocols
SNMP: the Simple Network Management Protocol
SNMP agents
Network management applications
Recommended reading
Security
Seven common-sense rules of security
How security is compromised
Security problems in the /etc/passwd file
Setuid programs
Important file permissions
Miscellaneous security issues
Security power tools
Cryptographic security tools
Firewalls
Sources of security information
What to do when your site has been attacked
Recommended reading
Web Hosting and Internet Servers
Web hosting
Web hosting basics
HTTP server installation
Virtual interfaces
Caching and proxy servers
Anonymous FTP server setup
Usenet news
Bunch O'Stuff
Printing
Mini-glossary of printing terms
Types of printers
BSD printing
System V printing
Adding a printer
LPRng
Debugging printing problems
Common printing software
Printer philosophy
Maintenance and Environment
Maintenance basics
Maintenance contracts
Board-handling lore
Monitors
Memory modules
Preventive maintenance
Environment
Power
Racks
Tools
Performance Analysis
What you can do to improve performance
Factors that affect performance
System performance checkup
Help! My system just got really slow!
Recommended reading
Cooperating with Windows
File and print sharing
Secure terminal emulation with SSH
X Windows emulators
PC mail clients
PC backups
Dual booting
Running Windows applications under UNIX
PC hardware tips
Policy and Politics
Policy and procedure
Legal issues
Sysadmin surveys
Scope of service
Trouble-reporting systems
Managing management
Hiring, firing, and training
War stories and ethics
Localization and upgrades
Local documentation
Procurement
Decommissioning hardware
Software patents
Organizations, conferences, and other resources
Standards
Sample documents
Recommended reading
Daemons
init: the primordial process
cron: schedule commands
inetd: manage daemons
System daemons
Printing daemons
NFS daemons
NIS daemons
Internet daemons
Time synchronization daemons
Booting and configuration daemons
Colophon
Index