Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Red Hat Enterprise Linux 5 Administration Unleashed

Buy
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how to maximize your efficiency and effectiveness by automating day-to-day maintenance through scripting, deploying security updates via Red Hat Network, implementing central identity management services, and providing shared data with NFS and Samba.

 

Red Hat Enterprise Linux 5 Administration Unleashed contains extensive coverage of network and web services, from the Apache HTTP server and Sendmail email services to remote login with OpenSSH. Fox also describes Red Hat’s most valuable tools for monitoring and optimization and presents thorough coverage of security–including a detailed introduction to Security-Enhanced Linux (SELinux).

  • Streamline deployment with Kickstart
  • Find, install, update, remove, and verify software
  • Detect, analyze, and manage hardware
  • Manage storage with LVM, RAID, ACLs, and quotas
  • Use Red Hat Enterprise Linux 5 on 64-bit and multi-core systems
  • Administer users and groups more efficiently and securely
  • Ensure trustworthy backup and rapid recovery
  • Script and schedule tasks to run automatically
  • Provide unified identity management services
  • Configure Apache, BIND, Samba, and Sendmail
  • Monitor and tune the kernel and individual applications
  • Protect against intruders with SELinux and ExecShield
  • Set up firewalls with iptables
  • Enable the Linux Auditing System
  • Use virtualization to run multiple operating systems concurrently

Tammy Fox served as technical leader of Red Hat’s documentation group, where she wrote and revised The Red Hat Enterprise Linux System Administration Guide. She was founding editor of Red Hat Magazine, now an online publication reaching more than 800,000 system administrators and others interested in Linux and open source. She wrote Red Hat’s LogViewer tool and has written and contributed to several Red Hat configuration tools. Fox is also the founding leader of the Fedora Docs Project.

 

Register your book at www.samspublishing.com/register for convenient access to updates and to download example scripts presented in this book.

 

Category: Linux/Networking

Covers: Red Hat Enterprise Linux 5

User Level: Intermediate—Advanced

 

About the Author


Tammy Fox has been using Linux for programming, writing, system administration, and all day-to-day computer tasks for more than 10 years. From 2000 until 2005, she worked for Red Hat as a technical writer, team lead, programmer, build script maintainer, magazine editor, and marketing project manager. During her time in documentation, she created a new manual, the Red Hat Linux Customization Guide, which eventually became the Red Hat Enterprise Linux System Administration Guide. She also wrote and contributed to the Red Hat configuration tools, including writing Red Hat Logviewer. Before joining Red Hat, Tammy co-wrote and taught Linux integration and performance classes for a leading computer manufacturer. She has also been a computer consultant for leading computer communication companies.

Tammy has founded three efforts to continue the education of Linux users. She is the founding editor of Red Hat Magazine, which continues to be an online publication. She is also the founding leader of the Fedora Docs Project, acting as the organizer, a writer, and an editor. And she continues to provide free online content for new Linux users with her website www.linuxheadquarters.com, which was established with her husband in 2000.

 

(HTML tags aren't allowed.)

Risk Analysis of Complex and Uncertain Systems (International Series in Operations Research & Management Science)
Risk Analysis of Complex and Uncertain Systems (International Series in Operations Research & Management Science)
This book is motivated by the following convictions:

1) Quantitative risk assessment (QRA) can be a powerful discipline for improving risk management decisions and policies.
2) Poorly conducted QRAs can produce results and recommendations that are worse than useless.
3) Sound risk assessment methods provide the benefits of QRA
...
SQL and Relational Theory: How to Write Accurate SQL Code
SQL and Relational Theory: How to Write Accurate SQL Code
Understanding SQL's underlying theory is the best way to guarantee that your SQL code is correct and your database schema is robust and maintainable. On the other hand, if you're not well versed in the theory, you can fall into several traps. In SQL and Relational Theory, author C.J. Date demonstrates how you can apply relational theory...
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
This lecture is a review of what is known about modeling human speech recognition (HSR). A model is proposed, and data are tested against the model.

There seem to be a large number of theories, or points of view, on how human speech recognition functions, yet few of these theories are comprehensive. What is needed is a set of models that are...


The Earth After Us: What Legacy Will Humans Leave in the Rocks?
The Earth After Us: What Legacy Will Humans Leave in the Rocks?

Geologist Jan Zalasiewicz takes the reader on a fascinating trip one hundred million years into the future--long after the human race becomes extinct--to explore what will remain of our brief but dramatic sojourn on Earth. He describes how geologists in the far future might piece together the history of the planet, and slowly decipher the...

Genetics and Genomics of Cotton (Plant Genetics and Genomics: Crops and Models)
Genetics and Genomics of Cotton (Plant Genetics and Genomics: Crops and Models)

A few members of the Gossypium (cotton) genus are cultivated for the production of elongated single-celled fibers valued worldwide at about $20 billion annually at the farm gate, and which sustain one of the world’s largest industries (textiles) with an annual worldwide economic impact of about $500 billion. In a number of ways, cotton...

Digital Security: Cyber Terror and Cyber Security
Digital Security: Cyber Terror and Cyber Security
These days, it is not unusual for 10- to 12-year-olds to be pub- lishing their own Web sites or for second and third graders to begin computer classes. At the same time, computer games are becoming increasingly popular as major publishing houses continue to churn out educational computer programs for children in pre- school....
©2019 LearnIT (support@pdfchm.net) - Privacy Policy