Unix and Linux

Author: Deborah S. Ray,Eric J. Ray

Publisher: Pearson Education

ISBN: 0321997549

Category: Computers

Page: 396

View: 1878

Covers the basic concepts of the computer operating system and discusses such topics as using directories, working with a shell, controlling ownership, running scripts, and working with encoded files.

Python for Unix and Linux System Administration

Author: Noah Gift,Jeremy Jones

Publisher: O'Reilly Germany

ISBN: 0596515820

Category: Computers

Page: 433

View: 4983

A guide to using the Python computer language to handle a variety of tasks in both the Unix and Linux servers.

Oracle DBA on Unix and Linux

Author: Michael Wessler,Mike Wessler

Publisher: Sams Publishing

ISBN: 9780672321580

Category: Computers

Page: 583

View: 8602

Oracle DBA on Unix and Linux provides all the information needed to install, support, tune, and upgrade Oracle databases on the UNIX and Linux platforms. Maintain a robust, mission-critical Oracle8i database. This book provides administrative solutions for the day-to-day DBA. You'll learn how to install the database for maximum efficiency, upgrades, patches, migrations, tune, and maintain its security. The book also explains in detail how to build and support a fully functioning Oracle database. This authoritative text contains up-to-date information available on Oracle's latest release and shows you how to: configure database architecture; install and set up with UNIX requirements; create the actual database with scripts; GUI management products; use Backup and Recovery; tune, monitor, and troubleshoot servers; Web DB and the Oracle Portal, 8i, iFS, Java, and 9I coverage; and iAS--Internet Application Server.

UNIX System Administration Handbook

Author: Evi Nemeth,Garth Snyder,Scott Seebass,Trent Hein

Publisher: Pearson Education

ISBN: 0137002912

Category: Computers

Page: 896

View: 7712

Now covers Red Hat Linux! Written by Evi Nemeth, Garth Snyder, Scott Seebass, and Trent R. Hein with Adam Boggs, Rob Braun, Ned McClain, Dan Crawl, Lynda McGinley, and Todd Miller "This is not a nice, neat book for a nice, clean world. It's a nasty book for a nasty world. This is a book for the rest of us." –Eric Allman and Marshall Kirk McKusick "I am pleased to welcome Linux to the UNIX System Administration Handbook!" –Linus Torvalds, Transmeta "This book is most welcome!" –Dennis Ritchie, AT&T Bell Laboratories This new edition of the world's most comprehensive guide to UNIX system administration is an ideal tutorial for those new to administration and an invaluable reference for experienced professionals. The third edition has been expanded to include "direct from the frontlines" coverage of Red Hat Linux. UNIX System Administration Handbook describes every aspect of system administration–from basic topics to UNIX esoterica–and provides explicit coverage of four popular UNIX systems: This book stresses a practical approach to system administration. It's packed with war stories and pragmatic advice, not just theory and watered-down restatements of the manuals. Difficult subjects such as sendmail, kernel building, and DNS configuration are tackled head-on. Examples are provided for all four versions of UNIX and are drawn from real-life systems–warts and all. "This book is where I turn first when I have system administration questions. It is truly a wonderful resource and always within reach of my terminal." –W. Richard Stevens, author of numerous books on UNIX and TCP/IP "This is a comprehensive guide to the care and feeding of UNIX systems. The authors present the facts along with seasoned advice and numerous real-world examples. Their perspective on the variations among systems is valuable for anyone who runs a heterogeneous computing facility." –Pat Parseghian, Transmeta "We noticed your book on the staff recommendations shelf at our local bookstore: 'Very clear, a masterful interpretation of the subject.' We were most impressed, until we noticed that the same staff member had also recommended Aunt Bea's Mayberry Cookbook." –Shannon Bloomstran, history teacher

Introducing UNIX and Linux

Author: Mike Joy,Michael Luck,Stephen A. Jarvis

Publisher: Macmillan International Higher Education

ISBN: 0230802451

Category: Computer science

Page: 320

View: 6948

An introductory, tutorial style text covering the basics of UNIX and Linux for the complete beginner, this is a comprehensive and well written introduction to these operating systems. It assumes no prior knowledge of programming nor any experience of using computers. UNIX and Linux are two of the most commonly used operating systems within the educational and corporate worlds and are growing in popularity. This book covers all the basic constructs and commands of UNIX and follows the 1993 POSIX. 2 International Standard.

Harley Hahn's Guide to Unix and Linux

Author: Harley Hahn

Publisher: N.A

ISBN: 9780071283977

Category: Linux

Page: 926

View: 5309

"Harley Hahn's Guide to Unix and Linux" is a modern, comprehensive text for anyone who wants to learn how to use Unix or Linux. The book is suitable as a primary or secondary textbook for classroom use, as well as for readers who want to teach themselves. The text covers all the basic concepts and tools Unix/Linux users need to master: Unix vs Linux, GUIs, the command line interface, the online manual, syntax, the shell, standard I/O and redirection, pipes and filters, vi and Emacs, the Unix file system, and job control. Hahn offers a thoroughly readable approach to teaching Unix & Linux by emphasizing core ideas and carefully explaining unfamiliar terminology. The book walks readers through Unix & Linux systems from the very beginning, assuming no prior knowledge, and laying out material in a logical, straightforward manner.An experienced author, Hahn writes in a clear, engaging, and student-friendly style, resulting in a text that is both easy and entertaining to read. Motivating pedagogy, such as "What's in a Name?" boxes and highlighted Hints provide readers with interesting background and helpful tips. For additional resources, readers can visit the author's website at www.harley.com

Automating UNIX and Linux Administration

Author: Kirk Bauer

Publisher: Apress

ISBN: 1590592123

Category: Computers

Page: 600

View: 5731

Wouldnt you like to automate the tedious daily tasks of system administration? Automating UNIX and Linux Administration will show you how, by exploring existing tools and offering real-world examples. Although some of the book is Linux-specific, most of the information applies to any UNIX system, including material on automating tasks across multiple variants of UNIX. Author Kirk Bauer briefly overviews tools and technologiesand assumes preliminary knowledge about editing a configuration file or mounting a file system. The techniques, methods, and tools in this book will help you manage a single systembut will prove especially powerful across multiple systems. No matter if the systems are desktops, servers, or Beowulf clustersall of them will benefit from this automation. And managing five to five thousand systems will become a simpler task!

UNIX and Linux Forensic Analysis DVD Toolkit

Author: Chris Pogue,Cory Altheide,Todd Haverkos

Publisher: Syngress

ISBN: 9780080879123

Category: Computers

Page: 248

View: 389

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with $4.2 billion in 2Q07, representing 31.7% of corporate server spending. UNIX systems have not been analyzed to any significant depth largely due to a lack of understanding on the part of the investigator, an understanding and knowledge base that has been achieved by the attacker. The book begins with a chapter to describe why and how the book was written, and for whom, and then immediately begins addressing the issues of live response (volatile) data collection and analysis. The book continues by addressing issues of collecting and analyzing the contents of physical memory (i.e., RAM). The following chapters address /proc analysis, revealing the wealth of significant evidence, and analysis of files created by or on UNIX systems. Then the book addresses the underground world of UNIX hacking and reveals methods and techniques used by hackers, malware coders, and anti-forensic developers. The book then illustrates to the investigator how to analyze these files and extract the information they need to perform a comprehensive forensic analysis. The final chapter includes a detailed discussion of loadable kernel Modules and malware. Throughout the book the author provides a wealth of unique information, providing tools, techniques and information that won't be found anywhere else. This book contains information about UNIX forensic analysis that is not available anywhere else. Much of the information is a result of the author's own unique research and work. The authors have the combined experience of law enforcement, military, and corporate forensics. This unique perspective makes this book attractive to all forensic investigators.

Introduction to Unix and Linux

Author: John Muster

Publisher: McGraw Hill Professional

ISBN: 0071812016

Category: Computers

Page: 688

View: 5079

Ideal for students with little or no computer experience, this essential learning tool is filled with fundamental skill-building exercises, hands-on tutorials, and clear explanations. And, it’s written by a leading UNIX and Linux curriculum developer and instructor, making it perfect for both learning -- and teaching -- the basics.

The Korn Shell

Unix and Linux Programming Manual

Author: Anatole Olczak

Publisher: Addison-Wesley Professional

ISBN: 0201675234

Category: Computers

Page: 446

View: 4113

This manual seeks to provide hands-on advice and technical tips on how to use the Korn Shell features effectively, to customize the Unix/Linux environment, and write, test and debug Korn Shell scripts. It contains hundreds of examples plus complete ready to run sample scripts.

Minimal Perl

For UNIX and Linux People

Author: Tim Maher

Publisher: Manning Publications

ISBN: 9781932394504

Category: Computers

Page: 464

View: 9150

Presents guidelines on writing simple Perl commands, covering such topics as built-in functions, scripting techniques, looping facilities, CPAN, and list variables.

UNIX and Linux System Administration Handbook

Author: Evi Nemeth

Publisher: Pearson Education

ISBN: 0131480057

Category: Computers

Page: 1279

View: 693

Surveys the best practices for all aspects of system administration, covering such topics as storage management, email, Web hosting, performance analysis, virtualization, DNS, security, and configuration management.

Linux and the Unix Philosophy

Author: Mike Gancarz

Publisher: Digital Press

ISBN: 9781555582739

Category: Computers

Page: 220

View: 5143

Exploring the "way of thinking that is Unix" this guide explains why Linux is a superior implementation of this highly capable operating system. Every chapter in the book has been updated for the fast-growing Linux market and the text balances an simple approach with technical detail.

DB2 Universal Database V8 Handbook for Windows, Unix, and Linux

Author: Philip K. Gunning

Publisher: Prentice Hall Professional

ISBN: 9780130661111

Category: Computers

Page: 472

View: 8988

Offers availability, manageability, performance, and scalability. This is a start-to-finish guide to DB2 Universal Database V8 administration and development for UNIX, Linux, and Windows. It covers various aspects of deploying and managing DB2 Universal Database V8, including database design for performance, availability, and recoverability.

Linux and UNIX Shell Programming

Author: D. S. W. Tansley

Publisher: Addison-Wesley Professional

ISBN: 9780201674729

Category: Computers

Page: 504

View: 1153

Learn how to create and develop shell scripts in a step-by-step manner increasing your knowledge as you progress through the book. Learn how to work the shell commands so you can be more productive and save you time.

Network and System Security

Chapter 5. Unix and Linux Security

Author: Gerald Beuchelt

Publisher: Elsevier Inc. Chapters

ISBN: 0128074027

Category: Computers

Page: 432

View: 4550

There are many objectives and goals to be considered when securing a operating system. When configuring Unix operating system security, consider the critical principles of security known as the confidentiality, integrity, and availability (CIA) triad. In addition to incorporating security controls that relate to the CIA triad, three other security features directly affect CIA and aid the overall site security program: access control, auditing, and backups. Although this chapter covers general Unix considerations, it also addresses several Linux specific items. This chapter is for all Linux variants: file names, directory paths, variable names, and so on, may also have to be taken into consideration. There are numerous versions of Linux, and it would be beyond the scope of this chapter to try to detail them all. All requirements listed within this chapter will pertain to all versions of Linux unless explicitly noted otherwise.

The Linux Programming Interface

A Linux and UNIX System Programming Handbook

Author: Michael Kerrisk

Publisher: No Starch Press

ISBN: 159327291X

Category: Computers

Page: 1552

View: 1917

The Linux Programming Interface (TLPI) is the definitive guide to the Linux and UNIX programming interface—the interface employed by nearly every application that runs on a Linux or UNIX system. In this authoritative work, Linux programming expert Michael Kerrisk provides detailed descriptions of the system calls and library functions that you need in order to master the craft of system programming, and accompanies his explanations with clear, complete example programs. You'll find descriptions of over 500 system calls and library functions, and more than 200 example programs, 88 tables, and 115 diagrams. You'll learn how to: –Read and write files efficiently –Use signals, clocks, and timers –Create processes and execute programs –Write secure programs –Write multithreaded programs using POSIX threads –Build and use shared libraries –Perform interprocess communication using pipes, message queues, shared memory, and semaphores –Write network applications with the sockets API While The Linux Programming Interface covers a wealth of Linux-specific features, including epoll, inotify, and the /proc file system, its emphasis on UNIX standards (POSIX.1-2001/SUSv3 and POSIX.1-2008/SUSv4) makes it equally valuable to programmers working on other UNIX platforms. The Linux Programming Interface is the most comprehensive single-volume work on the Linux and UNIX programming interface, and a book that's destined to become a new classic.

Introduction to Unix and Linux Lab Manual, Student Edition

Author: Catherine Creary,Lee M. Cottrell

Publisher: McGraw-Hill College


Category: Computers

Page: 285

View: 1862

Offers lab exercises and post-lab quizzes to teach readers how to use UNIX and Linux, covering topics such as logging on, creating shell scripts, using the visual editor, setting file permissions, and managing files.

IT Auditing Using Controls to Protect Information Assets, 2nd Edition

Author: Chris Davis,Mike Schiller,Kevin Wheeler

Publisher: McGraw Hill Professional

ISBN: 0071742395

Category: Computers

Page: 512

View: 2690

Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cloud computing, outsourced operations, virtualization, and storage are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value Audit entity-level controls, data centers, and disaster recovery Examine switches, routers, and firewalls Evaluate Windows, UNIX, and Linux operating systems Audit Web servers and applications Analyze databases and storage solutions Assess WLAN and mobile devices Audit virtualized environments Evaluate risks associated with cloud computing and outsourced operations Drill down into applications to find potential control weaknesses Use standards and frameworks, such as COBIT, ITIL, and ISO Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI Implement proven risk management practices

Running Linux

Author: Matt Welsh

Publisher: "O'Reilly Media, Inc."

ISBN: 9780596002725

Category: Computers

Page: 672

View: 7324

Explains how to understand and use Linux, covering installation, system administration, configuring desktops, and networking, along with topics such as the GNOME desktop, security, package management, and sound configuration.