Sicam / Baclit / Membrey | Foundations of CentOS Linux | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 528 Seiten

Sicam / Baclit / Membrey Foundations of CentOS Linux

Enterprise Linux On the Cheap
1. ed
ISBN: 978-1-4302-1965-1
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark

Enterprise Linux On the Cheap

E-Book, Englisch, 528 Seiten

ISBN: 978-1-4302-1965-1
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark



You need to maintain clients, servers and networks, while acquiring new skills. Foundations of Cent OS Linux: Enterprise Linux On the Cheap covers a free, unencumbered Linux operating system within the Red Hat lineage, but it does not assume you have a Red Hat Enterprise Linux license. Now you can learn CentOS Linux, the most powerful and popular of all Red Hat clones, keep maintaining your network at work, and become an Red Hat Certified Engineer, all just for the cost of this book. Introduces CentOS Linux and Fedora clients as equals to Red Hat Enterprise Linux Sets up CentOS as a secure, high-performance web services back end Prepares you for the RHCE examination, but does not assume an RHEL installation

Chivas Sicam occasionally works as an IT instructor and consultant. Prior to his hiatus from working full-time, he indulged himself as one of the system administrators in the engineering team of Defender Technologies Group. Chivas takes pride in being part of DOST-ASTI (Advanced Science and Technology Institute) on Bayanihan Linux. His team advocated the use of open source software for the computing needs of government agencies, schools, and small and medium-size enterprises in the Philippines. He enjoys technology, road trips, and keeping up to date on news of the Utah Jazz.

Sicam / Baclit / Membrey Foundations of CentOS Linux jetzt bestellen!

Weitere Infos & Material


1;Contents at a Glance;5
2;Contents;6
3;About the Authors;19
4;About the Technical Reviewer;21
5;Acknowledgments;22
6;Introduction;23
6.1;The Book;23
7;Installation;27
7.1;Preinstallation Steps;27
7.2;Installation;29
7.3;Troubleshooting;55
7.4;Summary;56
8;Bash;57
8.1;Working with the Command-Line Interface;57
8.2;Text Processing;71
8.3;Getting Help;74
8.4;Environment Variables;77
8.5;Creating and Running Your Own Script;78
8.6;Summary;80
9;Client/Host Configuration;81
9.1;The Boot Process;81
9.2;Keyboard Settings;89
9.3;Language Settings;90
9.4;Date and Time Settings;91
9.5;Network Settings;93
9.6;Graphics Settings;94
9.7;Printer Settings;95
9.8;Summary;96
10;Data Storage Management;97
10.1;Provisioning a New Hard Drive;97
10.2;Partitioning a Disk Using RAID;103
10.3;Partitioning with LVM;107
10.4;Summary;111
11;User Management;113
11.1;Managing Users and Groups with the Graphical Interface;113
11.2;User Management on the Command Line;119
11.3;Implementing Disk Quotas;124
11.4;Setting Resource Limits;128
11.5;Summary;129
12;X Window System;130
12.1;X.Org;131
12.2;The GNOME Desktop;136
12.3;XDMCP Remote Connections;147
12.4;Using XDMCP with GDM;150
12.5;X with SSH;155
12.6;Summary;156
13;Package Management;158
13.1;RPM;158
13.2;The RPM Filename Convention;159
13.3;The rpm Command;160
13.4;YUM;170
13.5;Summary;176
14;Basic Linux Security;177
14.1;System Logger;177
14.2;Automating Tasks with cron;184
14.3;Pluggable Authentication Modules;187
14.4;Summary;194
15;Advanced Security;195
15.1;Using Digital Certificates;195
15.2;Creating Certificates;196
15.3;Deploying Certificates;200
15.4;Intrusion Detection;205
15.5;Security Enhanced Linux;215
15.6;Summary;225
16;Network Security;226
16.1;The Firewall;226
16.2;tcp_wrappers;241
16.3;Centralized Logging;245
16.4;Summary;249
17;Network Services;250
17.1;OpenSSH;250
17.2;The OpenSSH Configuration File;250
17.3;The DHCP Server;254
17.4;The NTP Server;259
17.5;DNS;263
17.6;The Squid Web Caching Server;279
17.7;Summary;283
18;Open Source Databases;284
18.1;ACID;284
18.2;MySQL;285
18.3;PostgreSQL;295
18.4;CRUD and Databases;303
18.5;Summary;310
19;Linux Web Services;311
19.1;The Role of a Web Server;311
19.2;Apache Web Server;312
19.3;Setting Up Apache;312
19.4;Testing Apache;312
19.5;Apache Server Directories;313
19.6;The Apache Configuration File;315
19.7;Distributed Configuration Files;319
19.8;Virtual Hosts;324
19.9;Adding PHP to Apache;330
19.10;Secure Apache with SSL;331
19.11;Summary;334
20;File Sharing Services;335
20.1;Very Secure FTP Daemon;335
20.2;NFS;337
20.3;Setting Up a Samba Server;343
20.4;Summary;356
21;Linux Mail Servers;357
21.1;Basic Email Concepts;357
21.2;Sendmail;360
21.3;Postfix;371
21.4;Mail Servers and DNS;380
21.5;Dovecot;381
21.6;Summary;394
22;Directory Services;395
22.1;The Need for Unified Authentication;395
22.2;Network Information System;397
22.3;OpenLDAP;407
22.4;Summary;435
23;The Linux Kernel;436
23.1;History of the Linux Kernel;436
23.2;Types of Linux Kernels;436
23.3;Kernel Modules;438
23.4;Loading Kernel Modules;439
23.5;Unloading Kernel Modules;442
23.6;When to Recompile the Kernel;443
23.7;Getting a New Linux Kernel;444
23.8;Ways to Configure the Kernel Sources;445
23.9;Preparing for Kernel Compilation;451
23.10;Building the Kernel;452
23.11;Building the Kernel Modules;453
23.12;Making the Boot Loader Initialized RAM Disk;453
23.13;Adding the New Kernel into the GRUB Boot Loader;453
23.14;Your Turn;455
23.15;Summary;455
24;Linux Virtualization;456
24.1;Understanding Virtualization;456
24.2;The xend Daemon;462
24.3;The xend Network Configuration Scripts Directory;464
24.4;Checking Dom-0;464
24.5;Making a Guest with virt-install;465
24.6;Understanding the Guest Configuration File;469
24.7;Xen Guest Example Configuration Files;471
24.8;Connecting to a Guest;471
24.9;Shutting Down a Guest;474
24.10;Starting a Guest;474
24.11;Cloning a Guest;474
24.12;Cleaning Up;475
24.13;Summary;476
25;Linux Troubleshooting;477
25.1;The CentOS Rescue Environment;477
25.2;Exploring the Rescue Environment;480
25.3;Troubleshooting Checklist;481
25.4;Mounting Logical Volumes;484
25.5;Single-User Mode;486
25.6;My New Kernel Is Stuck!;487
25.7;Summary;489
26;Index;490



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.