Author: Deborah S. Ray,Eric J. Ray
Publisher: Pearson Education
Covers the basic concepts of the computer operating system and discusses such topics as using directories, working with a shell, controlling ownership, running scripts, and working with encoded files.
Author: Noah Gift,Jeremy Jones
Publisher: O'Reilly Germany
A guide to using the Python computer language to handle a variety of tasks in both the Unix and Linux servers.
Author: Michael Wessler,Mike Wessler
Publisher: Sams Publishing
Oracle DBA on Unix and Linux provides all the information needed to install, support, tune, and upgrade Oracle databases on the UNIX and Linux platforms. Maintain a robust, mission-critical Oracle8i database. This book provides administrative solutions for the day-to-day DBA. You'll learn how to install the database for maximum efficiency, upgrades, patches, migrations, tune, and maintain its security. The book also explains in detail how to build and support a fully functioning Oracle database. This authoritative text contains up-to-date information available on Oracle's latest release and shows you how to: configure database architecture; install and set up with UNIX requirements; create the actual database with scripts; GUI management products; use Backup and Recovery; tune, monitor, and troubleshoot servers; Web DB and the Oracle Portal, 8i, iFS, Java, and 9I coverage; and iAS--Internet Application Server.
Author: Evi Nemeth,Garth Snyder,Scott Seebass,Trent Hein
Publisher: Pearson Education
Now covers Red Hat Linux! Written by Evi Nemeth, Garth Snyder, Scott Seebass, and Trent R. Hein with Adam Boggs, Rob Braun, Ned McClain, Dan Crawl, Lynda McGinley, and Todd Miller "This is not a nice, neat book for a nice, clean world. It's a nasty book for a nasty world. This is a book for the rest of us." –Eric Allman and Marshall Kirk McKusick "I am pleased to welcome Linux to the UNIX System Administration Handbook!" –Linus Torvalds, Transmeta "This book is most welcome!" –Dennis Ritchie, AT&T Bell Laboratories This new edition of the world's most comprehensive guide to UNIX system administration is an ideal tutorial for those new to administration and an invaluable reference for experienced professionals. The third edition has been expanded to include "direct from the frontlines" coverage of Red Hat Linux. UNIX System Administration Handbook describes every aspect of system administration–from basic topics to UNIX esoterica–and provides explicit coverage of four popular UNIX systems: This book stresses a practical approach to system administration. It's packed with war stories and pragmatic advice, not just theory and watered-down restatements of the manuals. Difficult subjects such as sendmail, kernel building, and DNS configuration are tackled head-on. Examples are provided for all four versions of UNIX and are drawn from real-life systems–warts and all. "This book is where I turn first when I have system administration questions. It is truly a wonderful resource and always within reach of my terminal." –W. Richard Stevens, author of numerous books on UNIX and TCP/IP "This is a comprehensive guide to the care and feeding of UNIX systems. The authors present the facts along with seasoned advice and numerous real-world examples. Their perspective on the variations among systems is valuable for anyone who runs a heterogeneous computing facility." –Pat Parseghian, Transmeta "We noticed your book on the staff recommendations shelf at our local bookstore: 'Very clear, a masterful interpretation of the subject.' We were most impressed, until we noticed that the same staff member had also recommended Aunt Bea's Mayberry Cookbook." –Shannon Bloomstran, history teacher
Author: Mike Joy,Michael Luck,Stephen A. Jarvis
Publisher: Macmillan International Higher Education
Category: Computer science
An introductory, tutorial style text covering the basics of UNIX and Linux for the complete beginner, this is a comprehensive and well written introduction to these operating systems. It assumes no prior knowledge of programming nor any experience of using computers. UNIX and Linux are two of the most commonly used operating systems within the educational and corporate worlds and are growing in popularity. This book covers all the basic constructs and commands of UNIX and follows the 1993 POSIX. 2 International Standard.
Author: Harley Hahn
"Harley Hahn's Guide to Unix and Linux" is a modern, comprehensive text for anyone who wants to learn how to use Unix or Linux. The book is suitable as a primary or secondary textbook for classroom use, as well as for readers who want to teach themselves. The text covers all the basic concepts and tools Unix/Linux users need to master: Unix vs Linux, GUIs, the command line interface, the online manual, syntax, the shell, standard I/O and redirection, pipes and filters, vi and Emacs, the Unix file system, and job control. Hahn offers a thoroughly readable approach to teaching Unix & Linux by emphasizing core ideas and carefully explaining unfamiliar terminology. The book walks readers through Unix & Linux systems from the very beginning, assuming no prior knowledge, and laying out material in a logical, straightforward manner.An experienced author, Hahn writes in a clear, engaging, and student-friendly style, resulting in a text that is both easy and entertaining to read. Motivating pedagogy, such as "What's in a Name?" boxes and highlighted Hints provide readers with interesting background and helpful tips. For additional resources, readers can visit the author's website at www.harley.com
Author: Kirk Bauer
Wouldnt you like to automate the tedious daily tasks of system administration? Automating UNIX and Linux Administration will show you how, by exploring existing tools and offering real-world examples. Although some of the book is Linux-specific, most of the information applies to any UNIX system, including material on automating tasks across multiple variants of UNIX. Author Kirk Bauer briefly overviews tools and technologiesand assumes preliminary knowledge about editing a configuration file or mounting a file system. The techniques, methods, and tools in this book will help you manage a single systembut will prove especially powerful across multiple systems. No matter if the systems are desktops, servers, or Beowulf clustersall of them will benefit from this automation. And managing five to five thousand systems will become a simpler task!
Author: Chris Pogue,Cory Altheide,Todd Haverkos
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with $4.2 billion in 2Q07, representing 31.7% of corporate server spending. UNIX systems have not been analyzed to any significant depth largely due to a lack of understanding on the part of the investigator, an understanding and knowledge base that has been achieved by the attacker. The book begins with a chapter to describe why and how the book was written, and for whom, and then immediately begins addressing the issues of live response (volatile) data collection and analysis. The book continues by addressing issues of collecting and analyzing the contents of physical memory (i.e., RAM). The following chapters address /proc analysis, revealing the wealth of significant evidence, and analysis of files created by or on UNIX systems. Then the book addresses the underground world of UNIX hacking and reveals methods and techniques used by hackers, malware coders, and anti-forensic developers. The book then illustrates to the investigator how to analyze these files and extract the information they need to perform a comprehensive forensic analysis. The final chapter includes a detailed discussion of loadable kernel Modules and malware. Throughout the book the author provides a wealth of unique information, providing tools, techniques and information that won't be found anywhere else. This book contains information about UNIX forensic analysis that is not available anywhere else. Much of the information is a result of the author's own unique research and work. The authors have the combined experience of law enforcement, military, and corporate forensics. This unique perspective makes this book attractive to all forensic investigators.
Author: John Muster
Publisher: McGraw Hill Professional
Ideal for students with little or no computer experience, this essential learning tool is filled with fundamental skill-building exercises, hands-on tutorials, and clear explanations. And, it’s written by a leading UNIX and Linux curriculum developer and instructor, making it perfect for both learning -- and teaching -- the basics.
Unix and Linux Programming Manual
Author: Anatole Olczak
Publisher: Addison-Wesley Professional
This manual seeks to provide hands-on advice and technical tips on how to use the Korn Shell features effectively, to customize the Unix/Linux environment, and write, test and debug Korn Shell scripts. It contains hundreds of examples plus complete ready to run sample scripts.
For UNIX and Linux People
Author: Tim Maher
Publisher: Manning Publications
Presents guidelines on writing simple Perl commands, covering such topics as built-in functions, scripting techniques, looping facilities, CPAN, and list variables.
Author: Evi Nemeth
Publisher: Pearson Education
Surveys the best practices for all aspects of system administration, covering such topics as storage management, email, Web hosting, performance analysis, virtualization, DNS, security, and configuration management.
Author: Mike Gancarz
Publisher: Digital Press
Exploring the "way of thinking that is Unix" this guide explains why Linux is a superior implementation of this highly capable operating system. Every chapter in the book has been updated for the fast-growing Linux market and the text balances an simple approach with technical detail.
Author: Philip K. Gunning
Publisher: Prentice Hall Professional
Offers availability, manageability, performance, and scalability. This is a start-to-finish guide to DB2 Universal Database V8 administration and development for UNIX, Linux, and Windows. It covers various aspects of deploying and managing DB2 Universal Database V8, including database design for performance, availability, and recoverability.
Author: D. S. W. Tansley
Publisher: Addison-Wesley Professional
Learn how to create and develop shell scripts in a step-by-step manner increasing your knowledge as you progress through the book. Learn how to work the shell commands so you can be more productive and save you time.
Chapter 5. Unix and Linux Security
Author: Gerald Beuchelt
Publisher: Elsevier Inc. Chapters
There are many objectives and goals to be considered when securing a operating system. When configuring Unix operating system security, consider the critical principles of security known as the confidentiality, integrity, and availability (CIA) triad. In addition to incorporating security controls that relate to the CIA triad, three other security features directly affect CIA and aid the overall site security program: access control, auditing, and backups. Although this chapter covers general Unix considerations, it also addresses several Linux specific items. This chapter is for all Linux variants: file names, directory paths, variable names, and so on, may also have to be taken into consideration. There are numerous versions of Linux, and it would be beyond the scope of this chapter to try to detail them all. All requirements listed within this chapter will pertain to all versions of Linux unless explicitly noted otherwise.
A Linux and UNIX System Programming Handbook
Author: Michael Kerrisk
Publisher: No Starch Press
The Linux Programming Interface (TLPI) is the definitive guide to the Linux and UNIX programming interface—the interface employed by nearly every application that runs on a Linux or UNIX system. In this authoritative work, Linux programming expert Michael Kerrisk provides detailed descriptions of the system calls and library functions that you need in order to master the craft of system programming, and accompanies his explanations with clear, complete example programs. You'll find descriptions of over 500 system calls and library functions, and more than 200 example programs, 88 tables, and 115 diagrams. You'll learn how to: –Read and write files efficiently –Use signals, clocks, and timers –Create processes and execute programs –Write secure programs –Write multithreaded programs using POSIX threads –Build and use shared libraries –Perform interprocess communication using pipes, message queues, shared memory, and semaphores –Write network applications with the sockets API While The Linux Programming Interface covers a wealth of Linux-specific features, including epoll, inotify, and the /proc file system, its emphasis on UNIX standards (POSIX.1-2001/SUSv3 and POSIX.1-2008/SUSv4) makes it equally valuable to programmers working on other UNIX platforms. The Linux Programming Interface is the most comprehensive single-volume work on the Linux and UNIX programming interface, and a book that's destined to become a new classic.
Author: Catherine Creary,Lee M. Cottrell
Publisher: McGraw-Hill College
Offers lab exercises and post-lab quizzes to teach readers how to use UNIX and Linux, covering topics such as logging on, creating shell scripts, using the visual editor, setting file permissions, and managing files.
Author: Chris Davis,Mike Schiller,Kevin Wheeler
Publisher: McGraw Hill Professional
Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cloud computing, outsourced operations, virtualization, and storage are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource. Build and maintain an internal IT audit function with maximum effectiveness and value Audit entity-level controls, data centers, and disaster recovery Examine switches, routers, and firewalls Evaluate Windows, UNIX, and Linux operating systems Audit Web servers and applications Analyze databases and storage solutions Assess WLAN and mobile devices Audit virtualized environments Evaluate risks associated with cloud computing and outsourced operations Drill down into applications to find potential control weaknesses Use standards and frameworks, such as COBIT, ITIL, and ISO Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI Implement proven risk management practices
Author: Matt Welsh
Publisher: "O'Reilly Media, Inc."
Explains how to understand and use Linux, covering installation, system administration, configuring desktops, and networking, along with topics such as the GNOME desktop, security, package management, and sound configuration.