Linux System Administration: Craig Hunt Linux Library (Second Edition)
--2001 Linux Journal Readers Choice Awards
Authoritative Answers to All Your Linux Questions
You can rely on the fully updated second edition of Linux System Administration for answers to all your questions about installing, configuring, and administering Linux. Written by two Linux experts, this book teaches you, step-by-step, all the standard and advanced techniques you need to know to set up and maintain a secure, effective Linux environment. Scores of clear, consistent examples illustrate these techniques in detail--so you stay on track and accomplish all your goals. Coverage includes:
* Installing a Linux server
* Setting up and maintaining user and group accounts
* Setting up Linux system security
* Sharing files using Samba and NFS
* Implementing a backup strategy
* Troubleshooting common Linux problems
* Setting up the X Window System
* Setting up TCP/IP and connecting to the Internet
* Setting up a mail server
* Maintaining filesystems and partitions
* Configuring printers
* Improving system performance
* Writing shell scripts
* Using Webmin for cross-distribution GUI administration
The Craig Hunt Linux Library
The Craig Hunt Linux Library provides in-depth, advanced coverage of the key topics for Linux administrators. Topics include Samba, Network Servers, DNS Server Administration, Apache, Security, and Sendmail. Each book in the series is either written by or meticulously reviewed by Craig Hunt to ensure the highest quality and most complete coverage for networking professionals working specifically in Linux environments.
Roderick W. Smith is a Linux networking expert and author of several books, including Linux Samba Server Administration and the Linux+ Study Guide, both from Sybex. Craig Hunt is a Linux expert who lectures regularly at major networking trade shows. He serves as author and series editor for the Craig Hunt Linux Library.
Table of Contents
Part 1: The Basics.
Chapter 1: The Basics of System Administration.
Chapter 2: Installing Linux.
Chapter 3: Startup and Shutdown.
Chapter 4: Tools of the Trade.
Part 2: Managing Users, Processes, and Files.
Chapter 5: Creating and Maintaining User Accounts.
Chapter 6: Filesystems and Disk Management.
Chapter 7: Linux Files and Processes.
Chapter 8: Software Administration.
Chapter 9: Backup and Restore.
Part 3: Communications and Networking.
Chapter 10: Printers and the Spooling Subsystem.
Chapter 11: Serial Communications, Terminals, and Modems.
Chapter 12: TCP/IP Linux Networking.
Chapter 13: The X Window System.
Chapter 14: Setting Up Your Mail Server.
Part 4: System Optimization and Improvement.
Chapter 15: Security.
Chapter 16: Performance Tuning.
Chapter 17: Making Your Job Easier with Scripts.
Chapter 18: Troubleshooting Your Linux System.
Sign up now »
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTFlash / ActionScript Developer - ContractNSW
- FTQuality ManagerSA
- FTOS Web Applications DeveloperNSW
- FTLead Software EngineerSA
- FTSenior Python DeveloperNSW
- FTTechnical Business AnalystNSW
- FTR&D EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
As the era of “Big Data” marches on unabated, data is coming from an ever wider range of sources, including transactional systems, mobile devices, sensors, streaming media, and social networks. ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Four dissenters to spur next year's security debates
- AusCERT 2013: Kill the password, says Mozilla
- AusCERT 2013: Unmanaged, unknown privileged logins opening the door for APTs: Cyber-Ark
- AusCERT 2013: Companies unaware of IPv6 security risk even if they’re not using it
- In pictures: AusCERT 2013 roundup
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia