Wouldnt you like to automate the tedious daily tasks of system administration? Automating UNIX and Linux Administration will show you how, by exploring existing tools and offering real-world examples. Although some of the book is Linux-specific, most of the information applies to any UNIX system, including material on automating tasks across multiple variants of UNIX. Author Kirk Bauer briefly overviews tools and technologiesand assumes preliminary knowledge about editing a configuration file or mounting a file system. The techniques, methods, and tools in this book will help you manage a single systembut will prove especially powerful across multiple systems. No matter if the systems are desktops, servers, or Beowulf clustersall of them will benefit from this automation. And managing five to five thousand systems will become a simpler task!
Surveys the best practices for all aspects of system administration, covering such topics as storage management, email, Web hosting, performance analysis, virtualization, DNS, security, and configuration management.
In this updated edition, authors Deborah and Eric Ray use crystal-clear instructions and friendly prose to introduce you to all of today's Unix essentials. You’ll find the information you need to get started with the operating system and learn the most common Unix commands and concepts so that Unix can do the hard work for you. After mastering the basics of Unix, you’ll move on to how to use directories and files, work with a shell, and create and edit files. You’ll then learn how to manipulate files, configure a Unix environment, and run–and even write–scripts. Throughout the book–from logging in to being root–the authors offer essential coverage of Unix.
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with $4.2 billion in 2Q07, representing 31.7% of corporate server spending. UNIX systems have not been analyzed to any significant depth largely due to a lack of understanding on the part of the investigator, an understanding and knowledge base that has been achieved by the attacker. The book begins with a chapter to describe why and how the book was written, and for whom, and then immediately begins addressing the issues of live response (volatile) data collection and analysis. The book continues by addressing issues of collecting and analyzing the contents of physical memory (i.e., RAM). The following chapters address /proc analysis, revealing the wealth of significant evidence, and analysis of files created by or on UNIX systems. Then the book addresses the underground world of UNIX hacking and reveals methods and techniques used by hackers, malware coders, and anti-forensic developers. The book then illustrates to the investigator how to analyze these files and extract the information they need to perform a comprehensive forensic analysis. The final chapter includes a detailed discussion of loadable kernel Modules and malware. Throughout the book the author provides a wealth of unique information, providing tools, techniques and information that won't be found anywhere else. This book contains information about UNIX forensic analysis that is not available anywhere else. Much of the information is a result of the author's own unique research and work. The authors have the combined experience of law enforcement, military, and corporate forensics. This unique perspective makes this book attractive to all forensic investigators.
Offers lab exercises and post-lab quizzes to teach readers how to use UNIX and Linux, covering topics such as logging on, creating shell scripts, using the visual editor, setting file permissions, and managing files.
Maintain a robust, mission-critical Oracle8i database. This book provides administrative solutions for the day-to-day DBA. You'll learn how to install the database for maximum efficiency, upgrades, patches, migrations, tune, and maintain its security. The book also explains in detail how to build and support a fully functioning Oracle database. This authoritative text contains up-to-date information available on Oracle's latest release and shows you how to: configure database architecture; install and set up with UNIX requirements; create the actual database with scripts; GUI management produc.
This manual seeks to provide hands-on advice and technical tips on how to use the Korn Shell features effectively, to customize the Unix/Linux environment, and write, test and debug Korn Shell scripts. It contains hundreds of examples plus complete ready to run sample scripts.
IBM DB2 Universal Database V8 offers breakthrough availability, manageability, performance, and scalability. Now, straight from IBM, there's a start-to-finish guide to DB2 Universal Database V8 administration and development for UNIX, Linux, and Windows. This definitive reference covers every aspect of deploying and managing DB2 Universal Database V8, including database design for optimal performance, availability, and recoverability; day-to-day administration and backup; comparing, selecting, and using appropriate DB2 programming techniques; deploying networked and Internet-centered database applications; migrating to DB2 UDB from other databases or earlier versions of DB2; and much more. Using real-world examples, this book shows how to take full advantage of DB2 V8's most powerful enhancements. Philip K. Gunning brings together IBM's best tips and techniques for saving time and money in every facet of database design, development, deployment, and administration. Coverage includes: bull; Leveraging DB2 V8's new Wizards, Advisors, and other automation/self-management features Using the enhanced DB2 XML Extender to build next-generation B2B applications Quickly creating Stored Procedures and UDFs with the new Development Center Exploiting multidimensional clustering, prefetching, materialized query tables, Java threading, and other performance improvements Using the DB2 improved monitoring and logging facilities Maximizing availability via online table and index reorganization and dynamic configuration Understanding the latest changes in the DB2 product family
Learn how to create and develop shell scripts in a step-by-step manner increasing your knowledge as you progress through the book. Learn how to work the shell commands so you can be more productive and save you time.
Written with a clear, straightforward writing style and packed with step-by-step projects for direct, hands-on learning, Guide to UNIX Using Linux, 4E is the perfect resource for learning UNIX and Linux from the ground up. Through the use of practical examples, end-of-chapter reviews, and interactive exercises, novice users are transformed into confident UNIX/Linux users who can employ utilities, master files, manage and query data, create scripts, access a network or the Internet, and navigate popular user interfaces and software. The updated 4th edition incorporates coverage of the latest versions of UNIX and Linux, including new versions of Red Hat, Fedora, SUSE, and Ubuntu Linux. A new chapter has also been added to cover basic networking utilities, and several other chapters have been expanded to include additional information on the KDE and GNOME desktops, as well as coverage of the popular OpenOffice.org office suite. With a strong focus on universal UNIX and Linux commands that are transferable to all versions of Linux, this book is a must-have for anyone seeking to develop their knowledge of these systems. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
"Harley Hahn's Guide to Unix and Linux" is a modern, comprehensive text for anyone who wants to learn how to use Unix or Linux. The book is suitable as a primary or secondary textbook for classroom use, as well as for readers who want to teach themselves. The text covers all the basic concepts and tools Unix/Linux users need to master: Unix vs Linux, GUIs, the command line interface, the online manual, syntax, the shell, standard I/O and redirection, pipes and filters, vi and Emacs, the Unix file system, and job control. Hahn offers a thoroughly readable approach to teaching Unix & Linux by emphasizing core ideas and carefully explaining unfamiliar terminology. The book walks readers through Unix & Linux systems from the very beginning, assuming no prior knowledge, and laying out material in a logical, straightforward manner.An experienced author, Hahn writes in a clear, engaging, and student-friendly style, resulting in a text that is both easy and entertaining to read. Motivating pedagogy, such as "What's in a Name?" boxes and highlighted Hints provide readers with interesting background and helpful tips. For additional resources, readers can visit the author's website at www.harley.com
Exploring the "way of thinking that is Unix" this guide explains why Linux is a superior implementation of this highly capable operating system. Every chapter in the book has been updated for the fast-growing Linux market and the text balances an simple approach with technical detail.
DB2 Universal Database v8 builds on the world's #1 enterprise database to simplify anytime/anywhere information integration, streamline management, automate resource tuning, enhance business intelligence, and maximize performance, scalability, and reliability. Now, IBM offers complete, start-to-finish coverage of DB2 Universal Database v8 administration and development for UNIX, Linux, and Windows platforms... "and authoritative preparation for IBM's newest DB2 certification exam." This definitive reference and self-study guide covers every aspect of deploying and managing DB2 Universal Database v8, including best practices for DB2 database design and development; day-to-day administration and backup; expert techniques for deploying networked, Internet-centered, and XML-based database applications; migrating to DB2 UDB v8; and much more.You'll also find an unparalleled collection of IBM tips and tricks for maximizing the performance, availability, and value of any database system. Coverage includes: Manageability and serviceability enhancements, including new tools for storagemanagement and monitoring database health Performance improvement withmultidimensional clustering, enhanced prefetching, threading of Java UDFs and storedprocedures, and materialized query tables New Setup wizards, configuration assistants, GUItools, and DB2 Administration Server (DAS) improvements Availability andscalability enhancements New DB2 v8 Replication and Data Warehouse Centers Major improvements for developers, including SQL, XML, JDBC, and CLIenhancements Whether you're a DBA, a developer, a DB2 certification candidate, or all three, "DB2Universal Database v8 for Linux, UNIX, and Windows Database AdministrationCertification Guide" is the one book you can't afford to be without. Straight from IBM, the ultimate guide to running DB2 v8 and preparing for IBM's latest DB2certification exam! In-depth coverage of DB2 v8 database administration and development Covers new DB2 v8 enhancements in manageability, serviceability, reliability, availability, and performance Contains in-depth coverage of new DB2 v8 tools, including the Replication, Data Warehouse, and Development Centers Presents expert tips and best practices from IBM's own DB2 customer support organization About the CDThe CD-ROM included with this book contains a complete trial version of DB2 UDB V8Personal Edition, plus the DB2DEMO program to help explore the many features of DB2.
Ideal for students with little or no computer experience, this essential learning tool is filled with fundamental skill-building exercises, hands-on tutorials, and clear explanations. And, it’s written by a leading UNIX and Linux curriculum developer and instructor, making it perfect for both learning -- and teaching -- the basics.
DB2 Workload Manager (WLM) introduces a significant evolution in the capabilities available to database administrators for controlling and monitoring executing work within DB2. This new WLM technology is directly incorporated into the DB2 engine infrastructure to allow handling higher volumes with minimal overhead. It is also enabled for tighter integration with external workload management products, such as those provided by AIX WLM. This IBM Redbooks publication discusses the features and functions of DB2 Workload Manager for Linux, UNIX, and Windows. It describes DB2 WLM architecture, components, and WLM-specific SQL statements. It demonstrates installation, WLM methodology for customizing the DB2 WLM environment, new workload monitoring table functions, event monitors, and stored procedures. It provides examples and scenarios using DB2 WLM to manage database activities in DSS and OLTP mixed database systems, so you learn about these advanced workload management capabilities and see how they can be used to explicitly allocate CPU priority, detect and prevent "runaway" queries, and closely monitor database activity in many different ways. Using Data Warehouse Edition Design Studio and DB2 Performance Expert with DB2 WLM is covered. Lastly, the primary differences between Workload Manager and Query Patroller are explained, along with how they interact in DB2 9.5.