Mastering Linux System Administration

Mastering Linux System Administration

1. Aufl.

von: Christine Bresnahan, Richard Blum

32,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 30.06.2021
ISBN/EAN: 9781119794479
Sprache: englisch
Anzahl Seiten: 576

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.


<p><b>Achieve Linux system administration mastery with time-tested and proven techniques </b></p> <p>In <i>Mastering Linux System Administration</i>, Linux experts and system administrators Christine Bresnahan and Richard Blum deliver a comprehensive roadmap to go from Linux beginner to expert Linux system administrator with a learning-by-doing approach. Organized by do-it-yourself tasks, the book includes instructor materials like a sample syllabus, additional review questions, and slide decks. </p> <p>Amongst the practical applications of the Linux operating system included within, you’ll find detailed and easy-to-follow instruction on: </p> <ul> <li>Installing Linux servers, understanding the boot and initialization processes, managing hardware, and working with networks </li> <li>Accessing the Linux command line, working with the virtual directory structure, and creating shell scripts to automate administrative tasks </li> <li>Managing Linux user accounts, system security, web and database servers, and virtualization environments </li> </ul> <p>Perfect for entry-level Linux system administrators, as well as system administrators familiar with Windows, Mac, NetWare, or other UNIX systems, <i>Mastering Linux System Administration</i> is a must-read guide to manage and secure Linux servers. </p>
<p>Introduction xxv</p> <p><b>Part 1 Basic Admin Functions 1</b></p> <p><b>Chapter 1 Understanding the Basics 3</b></p> <p>What is Linux? 3</p> <p>Looking into the Linux Kernel 4</p> <p>The GNU Utilities 12</p> <p>Linux User Interfaces 12</p> <p>Linux Distributions 18</p> <p>Core Linux Distributions 19</p> <p>Specialized Linux Distributions 19</p> <p>The Bottom Line 20</p> <p><b>Chapter 2 Installing an Ubuntu Server 23</b></p> <p>Pre-Installation Requirements 23</p> <p>Hardware Requirements 24</p> <p>Virtual Server Requirements 25</p> <p>Finding the Software 26</p> <p>Oracle VirtualBox 26</p> <p>Ubuntu Server 26</p> <p>Running the Installation 29</p> <p>Oracle VirtualBox 29</p> <p>Ubuntu Server 33</p> <p>Checking the Installation 49</p> <p>The Bottom Line 50</p> <p><b>Chapter 3 Installing and Maintaining Software in Ubuntu 53</b></p> <p>Exploring Package Management 53</p> <p>Inspecting the Debian-Based Systems 54</p> <p>Managing Packages with <i>apt </i>54</p> <p>Installing Software Packages with <i>apt </i>56</p> <p>Upgrading Software with <i>apt </i>59</p> <p>Uninstalling Software with <i>apt </i>60</p> <p>The <i>apt </i>Repositories 61</p> <p>Using Snap Containers 62</p> <p>Installing from Source Code 64</p> <p>The Bottom Line 66</p> <p><b>Chapter 4 Installing a Red Hat Server 69</b></p> <p>Pre-Installation Requirements 69</p> <p>Hardware Requirements 70</p> <p>Virtual Server Requirements 71</p> <p>Finding the Software 72</p> <p>Oracle VirtualBox 72</p> <p>CentOS 73</p> <p>Running the Installation 76</p> <p>Oracle VirtualBox 77</p> <p>CentOS 77</p> <p>Checking the Installation 96</p> <p>The Bottom Line 97</p> <p><b>Chapter 5 Installing and Maintaining Software in Red Hat 99</b></p> <p>Exploring Red Hat Packages 99</p> <p>Automated Package Management 100</p> <p>Listing Installed Packages 100</p> <p>Installing Software with <i>dnf </i>102</p> <p>Upgrading Software with <i>dnf </i>104</p> <p>Uninstalling Software with <i>dnf </i>104</p> <p>Handling Broken Dependencies 105</p> <p>Working with RPM Repositories 106</p> <p>Working Directly with Packages 107</p> <p>Finding Package Files 107</p> <p>Inspecting Package Files 108</p> <p>Installing Package Files 109</p> <p>Removing Package Files 110</p> <p>Using Flatpak Containers 111</p> <p>The Bottom Line 113</p> <p><b>Chapter 6 Working with the Shell 115</b></p> <p>Exploring the Shell 115</p> <p>The Shell Prompt 116</p> <p>The Shell Manual 117</p> <p>Working with Commands 121</p> <p>Entering Commands 121</p> <p>Retrieving Past Commands 123</p> <p>Redirecting Commands 125</p> <p>Environment Variables 129</p> <p>Global Environment Variables 129</p> <p>User-Defined Environment Variables 131</p> <p>The Bottom Line 133</p> <p><b>Chapter 7 Exploring Linux File Management 135</b></p> <p>Filesystem Navigation 135</p> <p>The Linux Filesystem 135</p> <p>Traversing Directories 138</p> <p>Linux Files 139</p> <p>Determining File Types 139</p> <p>Filenames 140</p> <p>Hidden Files 140</p> <p>File Inodes 141</p> <p>File and Directory Listing 142</p> <p>Basic Listing 142</p> <p>Modifying Listing Information 143</p> <p>The Complete Parameter List 143</p> <p>Directory Handling 146</p> <p>Creating Directories 146</p> <p>Deleting Directories 146</p> <p>File Handling 147</p> <p>Creating Files 147</p> <p>Copying Files 148</p> <p>Linking Files 150</p> <p>Renaming Files 152</p> <p>Deleting Files 152</p> <p>File Features 154</p> <p>Using Wildcards 154</p> <p>Quoting 155</p> <p>Case Sensitivity 156</p> <p>Finding Files 156</p> <p>The <i>which </i>Command 156</p> <p>The <i>locate </i>Command 156</p> <p>The <i>whereis </i>Command 157</p> <p>The <i>find </i>Command 157</p> <p>Archiving Files 159</p> <p>Compressing Files 159</p> <p>Creating Archive Files 160</p> <p>Archiving Scenarios 161</p> <p>The Bottom Line 163</p> <p><b>Chapter 8 Working with Text Files 165</b></p> <p>The <i>vim </i>Editor 165</p> <p>Checking Your <i>vim </i>Editor Program 166</p> <p>Using the <i>vim </i>Editor 167</p> <p>The <i>nano </i>Editor 170</p> <p>Working with Data Files 172</p> <p>Sorting 172</p> <p>Searching 175</p> <p>Compressing 181</p> <p>Archiving 182</p> <p>The Bottom Line 187</p> <p><b>Part 2 Intermediate Admin Functions 189</b></p> <p><b>Chapter 9 Managing Hardware 191</b></p> <p>Device Driver Modules 191</p> <p>Listing Installed Modules 192</p> <p>Installing New Modules 193</p> <p>Removing Modules 196</p> <p>Communicating with Devices 196</p> <p>Device Interfaces 196</p> <p>The <i>/dev </i>Directory 198</p> <p>The <i>/proc </i>Directory 199</p> <p>The <i>/sys </i>Directory 202</p> <p>Working with Devices 203</p> <p>Finding Devices 203</p> <p>Working with PCI Cards 205</p> <p>Working with USB Devices 206</p> <p>Using Hot Pluggable Devices 207</p> <p>Detecting Dynamic Devices 208</p> <p>Working with Dynamic Devices 208</p> <p>The Bottom Line 209</p> <p><b>Chapter 10 Booting Linux 211</b></p> <p>Understanding the Boot Process 211</p> <p>Overview of the Boot Process 211</p> <p>Watching the Boot Process 212</p> <p>The Firmware Startup 212</p> <p>The GRUB2 Bootloader 214</p> <p>Configuring the GRUB2 Bootloader 215</p> <p>Exploring the GRUB2 Configuration 215</p> <p>Interacting with GRUB2 217</p> <p>The systemd Initialization Process 219</p> <p>Exploring Unit Files 220</p> <p>Focusing on Service Unit Files 221</p> <p>Focusing on Target Unit Files 225</p> <p>Changing a Unit Configuration File 226</p> <p>Changing the systemd Configuration File 227</p> <p>Looking at <i>systemctl 227</i></p> <p>Jumping Targets 230</p> <p>Analyzing with systemd 232</p> <p>The Bottom Line 234</p> <p><b>Chapter 11 Working with Storage Devices 235</b></p> <p>Storage Basics 235</p> <p>Drive Connections 235</p> <p>Partitioning Drives 236</p> <p>Automatic Drive Detection 236</p> <p>Partitioning Tools 237</p> <p>Working with <i>fdisk </i>237</p> <p>Working with <i>gdisk </i>239</p> <p>The GNU <i>parted </i>Command 241</p> <p>Formatting Filesystems 243</p> <p>Common Filesystem Types 243</p> <p>Creating Filesystems 245</p> <p>Mounting Filesystems 246</p> <p>Manually Mounting Devices 246</p> <p>Automatically Mounting Devices 247</p> <p>Managing Filesystems 249</p> <p>Retrieving Filesystem Stats 249</p> <p>Filesystem Tools 250</p> <p>Storage Alternatives 251</p> <p>Multipath 251</p> <p>Logical Volume Manager 251</p> <p>Using RAID Technology 253</p> <p>The Bottom Line 254</p> <p><b>Chapter 12 Configuring Network Settings 255</b></p> <p>Network Settings 255</p> <p>Ubuntu Servers 256</p> <p>Red Hat Servers 258</p> <p>Using Network Command-Line Tools 260</p> <p>NetworkManager Tools 260</p> <p>Other Tools 262</p> <p>Basic Network Troubleshooting 269</p> <p>Sending Test Packets 269</p> <p>Finding Host Information 271</p> <p>Advanced Network Troubleshooting 273</p> <p>The <i>netstat </i>Command 273</p> <p>Examining Sockets 276</p> <p>The Bottom Line 277</p> <p><b>Chapter 13 Managing Users and Groups 279</b></p> <p>Understanding Linux Permissions 279</p> <p>Understanding Ownership 280</p> <p>Controlling Access Permissions 282</p> <p>Exploring Special Permissions 284</p> <p>Managing Default Permissions 285</p> <p>Using Access Control Lists 288</p> <p>Managing User Accounts 290</p> <p>Adding Accounts 290</p> <p>Maintaining Accounts 298</p> <p>Removing Accounts 301</p> <p>Maintaining the Environment 302</p> <p>Setting Environment Variables 302</p> <p>Exploring User Entries 302</p> <p>Exploring Global Entries 303</p> <p>Managing Groups 304</p> <p>Adding Groups 305</p> <p>Removing Groups 306</p> <p>The Bottom Line 307</p> <p><b>Chapter 14 Working with Processes and Jobs 309</b></p> <p>Looking at Processes 309</p> <p>Monitoring Processes in Real Time 311</p> <p>Managing Processes 314</p> <p>Setting Priorities 314</p> <p>Stopping Processes 315</p> <p>Running Programs in Background Mode 317</p> <p>Running in the Background 317</p> <p>Running Multiple Background Jobs 318</p> <p>Running Programs Without a Console 319</p> <p>Job Control 320</p> <p>Viewing Jobs 320</p> <p>Restarting Stopped Jobs 322</p> <p>Scheduling Jobs 323</p> <p>Scheduling a Job Using the <i>at </i>Command 323</p> <p>Scheduling Recurring Programs 326</p> <p>The Bottom Line 328</p> <p><b>Chapter 15 Managing Log Files 329</b></p> <p>The systemd Journaling System 329</p> <p>Configuring <i>systemd-journald </i>330</p> <p>Looking at Journal Files 331</p> <p>Making the Journal Persistent 332</p> <p>Viewing Journal Entries 332</p> <p>Maintaining the Journal 335</p> <p>Viewing Different Journal Files 337</p> <p>Protecting Journal Files 337</p> <p>Making Journal Entries 337</p> <p>The rsyslog Legacy System 338</p> <p>The syslog Protocol 338</p> <p>Basic Logging Using <i>rsyslogd </i>340</p> <p>Layering Your Logging 342</p> <p>Making Log Entries 343</p> <p>Finding Event Messages 344</p> <p>The Bottom Line 344</p> <p><b>Chapter 16 Managing Printers 347</b></p> <p>The Common Unix Printing System 347</p> <p>Printer Drivers 347</p> <p>Web Interface 348</p> <p>Command-Line Commands 348</p> <p>Printer Sharing 349</p> <p>Printer Classes 350</p> <p>Installing and Configuring CUPS 350</p> <p>Installing CUPS 351</p> <p>Preparing the Server to Use CUPS 354</p> <p>Using CUPS 356</p> <p>Administration Functions 356</p> <p>Managing Printers and Jobs in CUPS 360</p> <p>The Bottom Line 361</p> <p><b>Part 3 Advanced Admin Functions 363</b></p> <p><b>Chapter 17 Exploring Ubuntu Security 365</b></p> <p>Locking Down Root 365</p> <p>Looking at Linux Account Types 366</p> <p>Gaining Super User Privileges 367</p> <p>Using OpenSSH on Ubuntu 369</p> <p>Exploring Basic SSH Concepts 370</p> <p>Configuring SSH 372</p> <p>Generating SSH Keys 373</p> <p>Authenticating with SSH Keys 374</p> <p>The AppArmor System 376</p> <p>Network Security Using Firewalls 380</p> <p>Understanding UFW 380</p> <p>Configuring UFW 381</p> <p>The Bottom Line 385</p> <p><b>Chapter 18 Exploring Red Hat Security 387</b></p> <p>Working with Root Access 387</p> <p>Keeping Track of Root Logins 388</p> <p>Disabling Root Access from SSH 388</p> <p>Enabling Automatic Logout 389</p> <p>Blocking Root Access 390</p> <p>Using SELinux 391</p> <p>Enabling SELinux 391</p> <p>Understanding Security Context 392</p> <p>Using Policies 393</p> <p>Network Security Using Firewalls 395</p> <p>Red Hat Firewall Concepts 395</p> <p>Checking the Firewall Status 397</p> <p>Working with Zones 398</p> <p>Working with Firewall Rules 399</p> <p>The Bottom Line 401</p> <p><b>Chapter 19 Writing Scripts 403</b></p> <p>Beginning a Shell Script 403</p> <p>Creating a Script File 403</p> <p>Displaying Messages 405</p> <p>Using Variables 407</p> <p>Environment Variables 407</p> <p>User Variables 408</p> <p>Command Substitution 409</p> <p>Exiting the Script with Status 410</p> <p>Passing Parameters 411</p> <p>Adding Conditional Expressions 414</p> <p>Working with the <i>if-then </i>Statement 414</p> <p>Using Compound Tests 417</p> <p>Working with the <i>if-then-else </i>Statement 418</p> <p>Trying the <i>case </i>Statement 419</p> <p>Using Loops 420</p> <p>Looking at the <i>for </i>Command 420</p> <p>Working with the <i>while </i>Format 423</p> <p>Using the <i>until </i>Command 424</p> <p>Using Functions 427</p> <p>Creating Functions 427</p> <p>Calling Functions 427</p> <p>The Bottom Line 430</p> <p><b>Chapter 20 Managing Web Servers 433</b></p> <p>Linux Web Servers 433</p> <p>Apache 433</p> <p>nginx 434</p> <p>The Apache Web Server 435</p> <p>Installing an Apache Server 435</p> <p>Configuring the Apache Server 437</p> <p>Hosting Dynamic Web Applications 445</p> <p>Creating a Secure Web Server 447</p> <p>The nginx Server 448</p> <p>Installing nginx 448</p> <p>Configuring nginx 449</p> <p>The Bottom Line 451</p> <p><b>Chapter 21 Managing Database Servers 453</b></p> <p>Linux Database Servers 453</p> <p>Organizing the Data 454</p> <p>Querying the Data 455</p> <p>Controlling the Data 456</p> <p>Installing and Using MySQL/MariaDB 457</p> <p>Conducting a MariaDB Installation 458</p> <p>Accessing a MariaDB Database 462</p> <p>Populating and Using MariaDB Database 466</p> <p>Installing and Using PostgreSQL 471</p> <p>Conducting a PostgreSQL Installation 471</p> <p>Accessing a PostgreSQL Database 474</p> <p>Populating and Using a PostgreSQL Database 477</p> <p>The Bottom Line 478</p> <p><b>Chapter 22 Exploring the Virtualization Environment 481</b></p> <p>Hypervisors 481</p> <p>Managing VMs 481</p> <p>Creating a Virtual Machine 483</p> <p>Integrating via Linux Extensions 485</p> <p>Containers 486</p> <p>Exploring Container Types 487</p> <p>Looking at Container Software 487</p> <p>Organizing Containers 489</p> <p>Software Packaging 491</p> <p>Looking at Ubuntu Snap 491</p> <p>Looking at Flatpak 499</p> <p>The Bottom Line 503</p> <p><b>Appendix The Bottom Line 505</b></p> <p>Chapter 1: Understanding the Basics 505</p> <p>Chapter 2: Installing an Ubuntu Server 506</p> <p>Chapter 3: Installing and Maintaining Software in Ubuntu 507</p> <p>Chapter 4: Installing a Red Hat Server 509</p> <p>Chapter 5: Installing and Maintaining Software in Red Hat 510</p> <p>Chapter 6: Working with the Shell 512</p> <p>Chapter 7: Exploring Linux File Management 513</p> <p>Chapter 8: Working with Text Files 515</p> <p>Chapter 9: Managing Hardware 516</p> <p>Chapter 10: Booting Linux 517</p> <p>Chapter 11: Working with Storage Devices 519</p> <p>Chapter 12: Configuring Network Settings 520</p> <p>Chapter 13: Managing Users and Groups 521</p> <p>Chapter 14: Working with Processes and Jobs 523</p> <p>Chapter 15: Managing Log Files 524</p> <p>Chapter 16: Managing Printers 526</p> <p>Chapter 17: Exploring Ubuntu Security 527</p> <p>Chapter 18: Exploring Red Hat Security 528</p> <p>Chapter 19: Writing Scripts 529</p> <p>Chapter 20: Managing Web Servers 532</p> <p>Chapter 21: Managing Database Servers 533</p> <p>Chapter 22: Exploring the Virtualization Environment 535</p> <p>Index 537</p>
<p><b>Christine Bresnahan</b> has over thirty years of experience working in the IT industry. She is an Adjunct Professor at Ivy Tech Community College where she teaches Linux certification and Python programming classes. She is co-author with Richard Blum of <i>CompTIA Linux+ Study Guide, Linux Essentials,</i> and the <i>Linux Command Line and Scripting Bible</i>. <p><b>Richard Blum</b> has over thirty years of experience working as a system and network administrator. He teaches online courses in Linux and Web programming and is co-author with Christine Bresnahan of several Linux titles, including <i>CompTIA Linux+ Study Guide, Linux Essentials,</i> and the <i>Linux Command Line and Scripting Bible.</i></p>
<p>Achieve Linux System Administration Mastery With This Hands-On Guide</p><p>Whether you’re already a Linux system administrator or just learning the ropes, <i>Mastering Linux<sup>®</sup> System Administration</i> gives you a comprehensive roadmap to Linux proficiency. An expert author team delivers a learning-by-doing approach to Linux system administration, offering do-it-yourself tasks and detailed, easy-to-follow instructions. Included instructor materials provide readers with a sample syllabus, additional review questions, and slide decks for classroom use.</p><p>The book prepares you to manage and secure Linux servers on private networks and over the Internet and is ideal for entry-level administrators as well as those familiar with Windows, Mac, NetWare, and other UNIX servers.</p><p>Coverage includes:</p><ul><li><b>Understanding the components of Linux servers</b></li><li><b>Navigating file management and storage on a Linux system </b></li><li><b>Adding a computer to a Linux network </b></li><li><b>Using the command line to create, move, delete, and archive files </b></li><li><b>Turning commands into scripts and using the command line editor </b></li><li><b>Identifying user types and creating users and groups </b></li><li><b>Setting permissions and ownership and creating special directories </b></li><li><b>Securing Linux systems on public and private networks </b></li><li><b>Encrypting connections to Linux systems over a network </b></li><li><b>Installing and managing Web and Database servers </b></li></ul><p><b>Understand the Kernel, Interface, and GNU</b></p><p><b>Install Ubuntu and Red Hat Servers</b></p><p><b>Install and Maintain Linux Software</b></p><p><b>Work With The Linux Shell</b></p><p><b>Manage and Explore Files in Linux</b></p>

Diese Produkte könnten Sie auch interessieren:

Windows Vista For Dummies
Windows Vista For Dummies
von: Andy Rathbone
PDF ebook
15,99 €
The Mac OS X Command Line
The Mac OS X Command Line
von: Kirk McElhearn
PDF ebook
25,99 €