UNIX Administration A Comprehensive Sourcebook for Effective Systems Network Management 1st Edition by Bozidar Levi – Ebook PDF Instant Download/Delivery: 0849313511, 9780849313516
Full download UNIX Administration A Comprehensive Sourcebook for Effective Systems Network Management 1st Edition after payment
Product details:
ISBN 10: 0849313511
ISBN 13: 9780849313516
Author: Bozidar Levi
To configure and maintain an operating system is serious business. With UNIX and its wide variety of “flavors,” it can be especially difficult and frustrating, and networking with UNIX adds still more challenges. UNIX Administration: A Comprehensive Sourcebook for Effective Systems & Network Management is a one-stop handbook
UNIX Administration A Comprehensive Sourcebook for Effective Systems Network Management 1st Table of contents:
Section I UNIX Administration
1 UNIX — I ntroductory Notes
1.1 Unix Operating System
1.2 User’s View of Unix
1.3 The History of Unix
1.3.1 Berkeley Standard Distribution — BSD UNIX
1.3.2 System V or ATT UNIX
1.4 Unix System and Network Administration
1.4.1 System Administrator’s Job
1.4.2 Computing Policies
1.4.3 Administration Guidelines
1.4.3.1 Legal Acts
1.4.3.2 Code of Ethics
1.4.3.3 Organiza tions
1.4.3.3.1 USENIX
1.4.3.3.2 System Administrators Guild — SAGE
1.4.3.3.3 Conferences
1.4.3.4 Standardization
1.4.3.4.1 POSIX
1.4.4 In This Book
2 The UNIX Model — Selected Topics
2.1 Introduction
2.2 Files
2.2.1 File Ownership
2.2.2 File Protection/File Access
2.2.2.1 Access Classes
2.2.2.2 Setting a File Protection
2.2.2.3 Default File Mode
2.2.2.4 Additional Access Modes
2.2.3 Access Control Lists (ACLs)
2.2.4 File Types
2.2.4.1 Plain (Regular) File
2.2.4.2 Directory
2.2.4.3 Special Device File
2.2.4.3.1 Block Device File
2.2.4.3.2 Character Device File
2.2.4.4 Link
2.2.4.4.1 Hard Link
2.2.4.4.2 Symbolic Link
2.2.4.5 Socket
2.2.4.6 Named Pipe
2.2.4.7 Conclusion
2.3 Devices and Special Device Files
2.3.1 Special File Names
2.3.2 Special File Creation
2.4 Processes
2.4.1 Process Parameters
2.4.1.1 Process Types
2.4.1.2 Process Attributes
2.4.1.3 File Descriptors
2.4.1.4 Process Sta tes
2.4.2 Process Life Cycles
2.4.2.1 Process Creation
2.4.2.2 Process Termination
2.4.3 Process Handling
2.4.3.1 Monitoring Process Activities
2.4.3.1.1 BSD Flavored ps Command
2.4.3.1.2 System V (AT&T) Flavored ps Command
2.4.3.2 Destroying Processes
2.4.3.3 Job Control
3 UNIX Adm inistration Starters
3.1 Superuser and Users
3.1.1 Becoming a Superuser
3.1.2 Communicating with Other Users
3.1.3 The su Command
3.2 Unix Online Documentation
3.2.1 The man Command
3.2.2 The whatis Database
3.3 System Information
3.3.1 System Status Information
3.3.1.1 The uname Command
3.3.1.2 The uptime Command
3.3.1.3 The dmesg Command
3.3.2 Hardware Information
3.3.2.1 The HP-UX ioscan Command
3.3.2.2 The Solaris prtconf Command
3.3.2.3 The Solaris sysdef Command
3.4 Personal Documentation
3.5 Shell Script Programming
3.5.1 UNIX User Shell
3.5.2 UNIX Shell Scripts
3.5.2.1 Shell Script Execution
3.5.2.2 Shell Variables
3.5.2.3 Double Command-Line Scanning
3.5.2.4 Here Document
3.5.2.5 Few Tips
4 System Star tup and Shutdown
4.1 Introductory Notes
4.2 System Startup
4.2.1 The Bootstrap Program
4.2.2 The Kernel Execution
4.2.3 The Overall System Initialization
4.2.3.1 rc Initialization Scripts
4.2.3.2 Terminal Line Initialization
4.2.4 System States
4.2.5 The Outlook of a Startup Procedure
4.2.6 Initialization Scripts
4.3 Bsd Initialization
4.3.1 The BSD rc Scripts
4.3.2 BSD Initialization Sequence
4.4 System V Initialization
4.4.1 The Configuration File /etc/inittab
4.4.2 System V rc Initialization Scripts
4.4.3 BSD-Like Initialization
4.5 Shutdown Procedures
4.5.1 The BSD shutdown Command
4.5.2 The System V shutdown Command
4.5.3 An Example
5 UNIX Files ystem Management
5.1 Introduction to the Unix Filesystem
5.2 Unix Filesystem Directory Organization
5.2.1 BSD Filesystem Directory Organization
5.2.2 System V Filesystem Directory Organization
5.3 Mounting and Dismounting Filesystems
5.3.1 Mounting a Filesystem
5.3.1.1 The mount Command
5.3.2 Dismounting a Filesystem
5.3.3 Automatic Filesystem Mounting
5.3.4 Removable Media Management
5.4 Filesystem Configuration
5.4.1 BSD Filesystem Configuration File
5.4.2 System V Filesystem Configuration File
5.4.3 AIX Filesystem Configuration File
5.4.4 The Filesystem Status File
5.5 A Few Other Filesystem Issues
5.5.1 Filesystem Types
5.5.2 Swap Space — Paging and Swapping
5.5.3 Loopback Virtual Filesystem
5.6 Managing Filesystem Usage
5.6.1 Display Filesystem Statistics: The df Command
5.6.2 Report on Disk Usage: The du Command
5.6.3 Report on Disk Usage by Users: The quot Command
5.6.4 Checking Filesystems: The fsck Command
6 UNIX Files ystem Layout
6.1 Introduction
6.2 Physical Filesystem Layout
6.2.1 Disk Partitions
6.2.2 Filesystem Structures
6.2.3 Filesystem Creation
6.2.3.1 The mkfs Command
6.2.3.2 The newfs Command
6.2.3.3 The tunefs Command
6.2.4 File Identification and Allocation
6.2.4.1 Index Node (inode)
6.2.4.2 File Allocation
6.2.5 Filesystem Performance Issues
6.2.5.1 File Storage vs. File Transfer
6.2.5.2 Reserved Free Space
6.3 Logical Filesystem Layout
6.3.1 Logical Volume Manager — AIX Flavor
6.3.2 Logical Volume Manager — HP-UX Flavor
6.3.3 Logical Volume Manager — Solaris Flavor
6.3.4 Redundant Array of Inexpensive Disks (RAID)
6.3.5 Snapshot
6.3.5.1 The Volume Snapshot
6.3.5.2 The Filesystem Snapshot
6.3.6 Virtual UNIX Filesystem
6.4 Disk Space Upgrade
7 User Accou nt Management
7.1 Users and Groups
7.1.1 Creation of User Accounts
7.1.2 User Database — File /etc/passwd
7.1.3 Group Database — File letclgroup
7.1.4 Creating User Home Directories
7.1.5 UNIX Login Initialization
7.1.5.1 Initialization Template Files
7.1.5.2 User Login Initialization Files
7.1.5.3 Systemwide Login Initialization Files
7.1.5.4 Shell Initialization Files
7.1.5.5 Setting the Proper Ownership
7.1.6 Utilities to Create User Accounts
7.2 Maintenance of User Accounts
7.2.1 Restricted User Accounts
7.2.2 Users and Secondary Groups
7.2.3 Assigning User Passwords
7.2.4 Standard UNIX Users and Groups
7.2.5 Removing User Accounts
7.3 Disk Quotas
7.3.1 Managing Disk Usage by Users
7.4 Accounting
7.4.1 BSD Accounting
7.4.2 System V Accounting
7.4.3 AIX-Flavored Accounting
8 UNIX Syst em Security
8.1 Unix Lines of Defense
8.1.1 Physical Security
8.1.2 Passwords
8.1.3 File Permissions
8.1.4 Encryption
8.1.5 Backups
8.2 Password Issues
8.2.1 Password Encryption
8.2.2 Choosing a Password
8.2.3 Setting Password Restrictions
8.2.4 A Shadowed Password
8.2.4.1 Usual Approach
8.2.4.2 Other Approaches
8.3 Secure Console and Terminals
8.3.1 Traditional BSD Approach
8.3.2 The Wheel Group
8.3.3 Secure Terminals — Other Approaches
8.4 Monitoring and Detecting Security Problems
8.4.1 Important Files for System Security
8.4.2 Monitoring System Activities
8.4.3 Monitoring Login Attempts
8.4.3.1 The su Log File
8.4.3.2 History of the Root Account
8.4.3.3 Tracking User Activities
9 UNIX Logg ing Subsystem
9.1 The Concept of System Logging
9.1.1 The syslogd Daemon
9.2 System Logging Configuration
9.2.1 The Configuration File /etc/syslog.conf
9.2.2 Linux Logging Enhancements
9.2.3 The logger Command
9.2.4 Testing System Logging
9.3 Accounting Log Files
9.3.1 The last Command
9.3.2 Limiting the Growth of Log Files
10 UNIX Prin ting
10.1 Unix Printing Subsystem
10.1.1 BSD Printing Subsystem
10.1.1.1 The lpr, Ipq, and Iprm Commands
10.1.1.2 The Ipd Daemon
10.1.1.3 Managing the BSD Printing Subsystem
10.1.2 System V Printing Subsystem
10.1.2.1 The lp, lpstat, and cancel Commands
10.1.2.2 The Ipsched Daemon
10.1.2.3 Managing the System V Printing Subsystem
10.2 Printing Subsystem Configuration
10.2.1 BSD Printer Configuration and the Printer Capability Database
10.2.1.1 The /etc/printcap File
10.2.1.2 Setting the BSD Default Printer
10.2.1.3 Spooling Directories
10.2.1.4 Filters
10.2.1.5 Linux Printing Subsystem
10.2.2 System V Printer Configuration and the Printer Capability Database
10.2.2.1 The Printer Database Directory Hierarchy on System V
10.2.2.2 Setting the System V Default Printer
10.2.3 AIX Printing Facilities
10.3 Adding New Printers
10.3.1 Adding a New Local Printer
10.3.1.1 Adding a Local BSD Printer
10.3.1.2 Adding a Local Linux Printer
10.3.1.3 Adding a Local System V Printer
10.3.2 Adding a New Remote Printer
10.3.2.1 Adding a Remote BSD Printer
10.3.2.2 Adding a Remote Linux Printer
10.3.2.3 Adding a Remote System V Printer
10.3.2.3.1 Setting a Remote Printer on Solaris 2.x
10.3.2.3.2 Setting a Remote Printer on HP-UX
10.4 Unix Cross-Platform Printer Spooling
10.4.1 BSD and AIX Cross-Printing
10.4.2 Solaris and BSD Cross-Printing
10.4.3 Third-Party Printer Spooling Systems
11 Terminals
11.1 Terminal Characteristics
11.1.1 BSD Terminal Subsystem
11.1.1.1 BSD Terminal Line Initialization
11.1.1.2 The BSD termcap Database
11.1.2 System V Terminal Subsystem
11.1.2.1 System V Terminal Line Initialization
11.1.2.2 The System V terminfo Database
11.1.3 Terminal-Related Special Device Files
11.1.4 Configuration Data Summary
11.2 The tset, tput, and stty Commands
11.2.1 The tset Command
11.2.2 The tput Command
11.2.3 The stty Command
11.3 Pseudo Terminals
11.4 Terminal Servers
12 UNIX Bac kup and Restore
12.1 Introduction
12.1.1 Media
12.2 Tape-Related Commands
12.2.1 The far Command
12.2.2 The cpio Command
12.2.3 The dd Command
12.2.4 The mt Command
12.2.5 Magnetic Tape Devices and Special Device Files
12.3 Backing Up a Unix Filesystem
12.3.1 Planning a Backup Schedule
12.4 Backup and Dump Commands
12.4.1 The SVR3 and SVR4 backup Commands
12.4.2 The fbackup Command
12.4.3 The dump/ufsdump Command
12.4.4 A Few Examples
12.5 Restoring Files from a Backup
12.5.1 The restore Commands
12.5.1.1 The SVR3 restore Command
12.5.1.2 The restore/ufsrestore Command
12.5.1.3 Interactive Restore
12.5.2 The frecover Command
12.5.3 Restoring Multiple Filesystems Archived on a Single Tape
12.6 Tape Control
13 Time-Rela ted UNIX Facilities
13.1 Network Time Distribution
13.1.1 The NTP Daemon
13.1.2 The NTP Configuration File
13.2 Periodic Program Execution
13.2.1 The UNIX cron Daemon
13.2.2 The crontab Files
13.2.3 The crontab Command
13.2.4 Linux Approach
13.3 Programs Scheduled for a Specific Time
13.3.1 The UNIX at Utility
13.4 Batch Processing
13.4.1 The UNIX batch Utility
Section II Network Administration
14 Network Fu ndamentals
14.1 Unix and Networking
14.2 Computer Networks
14.2.1 Local Area Network (LAN)
14.2.1.1 CSMA/CD Networks
14.2.1.2 Token Passing Networks
14.2.2 Wide Area Network (WAN)
14.3 A Tcp/Ip Overview
14.3.1 TCP/IP and the Internet
14.3.2 ISO OSI Reference Model
14.3.3 TCP/IP Protocol Architecture
14.4 Tcp/Ip Layers and Protocols
14.4.1 Network Access Layer
14.4.2 Internet Layer and IP Protocol
14.4.2.1 Internet Protocol (IP)
14.4.2.2 Internet Control Message Protocol (ICMP)
14.4.3 Transport Layer and TCP and UDP Protocols
14.4.3.1 User Datagram Protocol (UDP)
14.4.3.2 Transmission Control Protocol (TCP)
14.4.4 Application Layer
15 TCP/IP N etwork
15.1 Data Delivery
15.1.1 IP Address Classes
15.1.2 Internet Routing
15.1.2.1 The route Command
15.1.2.2 Dynamic Routing
15.1.2.3 The gated Daemon
15.1.3 Multiplexing
15.1.3.1 Protocols, Ports, and Sockets
15.1.3.2 UNIX Database Files
15.2 Address Resolution (Arp)
15.2.1 The arp Command
15.3 Remote Procedure Call (Rpc)
15.3.1 The portmapper Daemon
15.3.2 The /etc/rpc File
15.4 Configuring the Network Interface
15.4.1 The ifconfìg Command
15.4.2 The netstat Command
15.5 Super Internet Server
15.5.1 The inetd Daemon
15.5.1.1 The inetd Configuration
15.5.2 Further Improvements and Development
15.5.2.1 Extended Super Server xinetd
16 Domain Na me System
16.1 Naming Concepts
16.1.1 Host Names and Addresses
16.1.2 Domain Name Service (DNS)
16.1.2.1 Domains and Subdomains
16.1.3 Host Database Files
16.1.3.1 The Local Host Table — /etc/hosts
16.1.3.2 Aliases
16.1.3.3 Maintaining the /etc/hosts File
16.1.3.3.1 Handling the NIC Host Table — A Journey into the Past
16.2 Unix Name Service — Bind
16.2.1 BIND Configuration
16.2.2 Resolvers
16.2.2.1 Configuring a Resolver
16.2.2.2 Other Resolver Parameters
16.2.3 Name Servers
16.2.3.1 The named Daemon
16.3 Configuring named
16.3.1 BIND Version 4.X.X
16.3.1.1 The Configuration File /etc/named.boot
16.3.1.2 Standard Resource Records
16.3.1.3 The Resource Record Files
16.3.1.3.1 The named.hosts File
16.3.1.3.2 The named.local File
16.3.1.3.3 The named.cache file
16.3.1.3.4 The Reverse Domain File: named.in-addr
16.3.2 BIND Version 8.X.X
16.3.2.1 Subdomains and Parenting
16.4 Using nslookup
16.4.1 The nslookup Interactive Mode
16.4.2 A Few Examples of nslookup Usage
17 Network In formation Service (NIS)
17.1 Purpose and Concepts
17.2 Nis Paradigm
17.2.1 yp Processes
17.2.2 To Create an NIS Server
17.2.2.1 Set the NIS domain
17.2.2.2 Set the Master Server
17.2.2.3 Set the Slave Server
17.2.2.4 Start NIS Service
17.2.3 To Create an NIS Client
17.2.4 NIS Domain Name
17.2.5 Databases/NIS Maps
17.2.5.1 The /etc/netgroup File
17.3 Nis Management
17.3.1 yp Commands
17.3.2 Updating NIS Maps
17.3.2.1 The make Utility and NIS
17.3.3 Troubleshooting
17.3.4 Security Issues
17.3.5 A Few NIS Stories
17.3.5.1 Too Large an NIS Group
17.3.5.2 Invalid Slave Server
17.3.5.3 Change of the NIS Domain Name
17.4 Nis vs. Dns
17.4.1 The /etc/nsswitch.conf File
17.4.2 Once upon a Time
18 Network Fi le System (NFS)
18.1 Nfs Overview
18.1.1 NFS Daemons
18.2 Exporting and Mounting Remote Filesystems
18.2.1 Exporting a Filesystem
18.2.1.1 The exportfs and share Commands
18.2.1.2 The Export Configuration File
18.2.1.3 The Export Status File
18.2.2 Mounting Remote Filesystems
18.2.2.1 The showmount Command
18.2.2.2 The mount Command and the Filesystem Configuration File
18.3 Automounter
18.3.1 The Automount Maps
18.3.1.1 An Example
18.4 Nfs — Security Issues
19 UNIX Rem ote Commands
19.1 Unix r Commands
19.1.1 The rlogin Command
19.1.2 The rep Command
19.1.3 The remsh (rsh) Command
19.2 Securing the Unix r Commands
19.2.1 The /etc/hosts.equiv File
19.2.2 The $HOME/.rhosts File
19.2.3 Using UNIX r-Commands — An Example
19.3 Secure Shell (Ssh)
19.3.1 SSH Concept
19.3.1.1 RSA Authentication
19.3.1.2 The ssh Client
19.3.1.3 The sshd Daemon
19.3.2 SSH Configuration
19.3.3 SSH Installation and User Access Setup
19.3.3.1 Setup of the ssh Client
19.3.3.2 Root Access
19.3.3.3 Individual User Access
19.3.4 SSH — Version 2
20 Electroni c Mail
20.1 E-mail Fundamentals
20.1.1 Simple Mail Transport Protocol (SMTP)
20.1.2 The MTA Program sendmail
20.1.2.1 The sendmail Daemon
20.1.2.2 The sendmail Command
20.1.2.3 Other sendmail Constituents
20.1.2.3.1 Global Mail Aliases
20.1.2.3.2 Personal Mail Forwarding Files
20.1.2.3.3 Mail Delivery Programs — Mailers
20.1.2.3.4 The sendmail Configuration File
20.1.2.3.5 The Frozen sendmail Configuration File
20.2 Sendmail Configuration
20.2.1 The sendmail.cf File
20.2.1.1 Macro and Class Definitions
20.2.1.1.1 The Define Macro Command
20.2.1.1.2 The Define Class Command
20.2.2 Rulesets and Rewrite Rules
20.2.2.1 The Ruleset Sequence
20.2.2.2 The Ruleset 0
20.2.3 Creating the sendmail.cf File
20.3 The Parsing of E-mail Addresses
20.3.1 Rewriting an E-mail Address
20.3.2 Pattern Matching
20.3.3 Address Transformation
20.4 Testing sendmail Configuration
20.4.1 Testing Rewrite Rules
20.4.2 The sendmail -bt Command
20.4.3 The Debugging Level
20.4.4 Checking the Mail Queue
20.5 Mail User Agents
20.5.1 The Mail Program and .mailrc File
20.5.1.1 Starting mail
20.5.1.2 Sending E-mail Messages
20.5.1.3 Reading E-mail Messages
20.5.1.4 Mail Subcommands
20.5.1.5 Forwarding E-mail Messages
20.5.1.6 Variables
20.5.2 POP and IMAP
20.5.2.1 Post Office Protocol (POP)
20.5.2.1.1 The popper Daemon
20.5.2.1.2 POP Transactions
20.5.2.2 Internet Message Access Protocol (IMAP)
20.5.2.3 Comparing POP vs. IMAP
21 UNIX Netw ork Support
21.1 Common Unix Network Applications
21.1.1 Telnet
21.1.1.1 Telnet Commands
21.1.2 FTP
21.1.2.1 FTP Commands
21.1.2.2 FTP Auto-Login
21.1.2.3 Anonymous FTP
21.1.3 Finger
21.2 Host Connectivity
21.2.1 The ping Command
21.2.2 The traceroute Command
Section III Supplemental UNIX Topics
22 X Window System
22.1 An Introduction to the X Window System
22.1.1 The Design of X11
22.1.2 The X Administration Philosophy
22.1.3 Window Managers
22.2 The X Display Managers
22.2.1 xdm/dtlogin Concepts
22.2.2 xdm Configuration Files
22.2.2.1 Customizing xdm
22.2.2.1.1 The xdm-config File
22.2.2.1.2 The Xservers File
22.2.2.1.3 The Xresources File
22.2.2.1.4 The Xsession File
22.2.2.1.5 The Xreset File
22.2.3 CDE Configuration Files
22.2.4 Vendor-Specific X Flavors — a Configuration Example
22.3 Access Control and Security of X11
22.3.1 XDMCP Queries
22.3.2 The Xaccess File
22.3.3 Other Access Control Mechanisms
22.4 The User X Environment
22.4.1 Components of the xdm-Based User X Environment
22.4.2 Components of the CDE User X Environment
22.4.3 Window Manager Customizations
22.4.3.1 Motif Window Manager (mwm)
22.4.3.2 CDE Window Manager (dtwm)
22.4.4 The Shell Environment
22.5 Miscellaneous
22.5.1 Other Startup Methods
22.5.2 A Permanent X11 Installation
22.5.3 A Few X-Related Commands
23 Kernel Reco nfiguration
23.1 Introduction to Kernel Reconfiguration
23.2 Kernel Configuration Database
23.3 Bsd-Like Kernel Configuration Approach
23.3.1 Basic Configuration Entries
23.3.2 The BSD-Like Kernel Configuration Procedure
23.3.3 The config Command
23.4 Other Flavored Kernel Reconfigurations
23.4.1 HP-UX 10.x Kernel Configuration
23.4.2 Solaris 2.x Kernel Configuration
23.4.3 Linux Kernel Configuration
24 Modems an d UUCP
24.1 Introduction to Modems
24.1.1 UNIX and Modems
24.2 Unix Modem Control
24.2.1 Terminal Lines and Modem Control
24.2.2 Modem-Related UNIX Commands
24.2.2.1 The cu Command
24.2.2.2 The tip Command
24.3 Third-Party Communication Software
24.3.1 C-Kermit
24.4 Introduction to Uucp
24.4.1 How Does UUCP Work?
24.4.2 UUCP Versions
24.4.3 UUCP Chat-Transfer Session
24.5 Uucp Commands, Daemons, and Related Issues
24.5.1 The Major UUCP Commands
24.5.1.1 The uucp Command
24.5.1.2 The uux Command
24.5.2 The UUCP Daemons
24.5.2.1 The uucico Daemon
24.5.2.2 The uuxqt Daemon
24.5.2.3 The uusched Daemon
24.5.2.4 The uucpd Daemon
24.5.3 The UUCP Spool Directories and Files
24.6 Configuring a Uucp Link
24.6.1 Serial Line-Related Issues
24.6.2 UUCP Configuration Files
24.6.2.1 The UUCP Systems Data
24.6.2.2 The UUCP Devices Data
24.6.2.3 Otder Configuration Data
24.7 Uucp Access and Security Consideration
24.7.1 Additional Security in BNU UUCP
24.7.2 Additional Security in Version 2 UUCP
25 Intranet
25.1 Introduction to Intranet
25.1.1 Intranet vs. Internet
25.1.2 Intranet Design Approach
25.2 Intranet Front-End Services
25.2.1 Firewalls
25.2.1.1 Firewall Techniques
25.2.1.2 Firewall Types
25.2.1.3 Firewall Implementation
25.2.1.4 Problems and Benefits
25.2.2 Viruswalls
25.2.2.1 Computer Viruses and Other Malicious Codes
25.2.2.1.1 Life Cycle of a Virus
25.2.2.1.2 Virus Types
25.2.2.1.3 Some Other Malicious Codes
25.2.2.2 The Viruswall Implementation
25.2.3 Proxy Servers
25.2.3.1 Application Proxies
25.2.3.2 SOCKS Proxies
25.2.4 Web Services
25.2.5 Other External Services
25.3 Inside the Intranet
25.3.1 Network Infrastructure and Desktops
25.3.2 Internal Services
25.3.2.1 Dynamic Host Configuration Protocol (DHCP)
25.3.3 Virtual Private Network (VPN)
25.3.4 UNIX and Not-UNIX Platform Integration
Section IV Case Studies
26 UNIX Insta llation
26.1 Introductory Notes
26.2 Unix Installation Procedures
26.2.1 HP-UX Installation
26.2.2 Solaris Installation
26.2.3 Linux Installation
26.3 Supplemental Installations
26.3.1 Supplemental System Software
26.3.1.1 Installation of Sun Enterprise (Veritas) Volume Manager 2.5
26.3.1.2 Installation of Veritas Filesystem 3.X
26.3.1.3 Two Pseudo-Installation Scripts
26.3.1.4 Installation of Optional HP-UX Software
HP-UX OnLine Journaled Filesystem
HP Jet Admin for UNIX Utility Software
26.3.2 Patches
26.3.2.1 Solaris Patch Installation
26.3.2.2 HP-UX Patch Installation
HP-UX Individual Patches
27 Upgrade D isk Space
27.1 Adding a Disk
27.1.1 New Disk on the Solaris Platform
27.1.2 New Disk on the SunOS Platform
27.1.3 New Disk on the HP-UX Platform
27.2 Logical Volume Manager Case Study
27.2.1 LVM on the HP-UX Platform
27.2.2 LVM on the Solaris Platform
28 UNIX Emerg ency Situations
28.1 Introductory Notes
28.2 Lost Root Password
28.2.1 Solaris and Lost Root Password
28.2.2 HP-UX and Lost Root Password
28.3 Some Special Administrative Situations
28.3.1 Solaris Procedure to Create an Alternate Boot Partition
28.3.2 Solaris Recovery of the Failed Mirrored Boot Disk
The System Recovery
28.3.3 HP-UX Support Disk Usage
28.3.4 HP-UX Procedure to Synchronize a Mirrored Logical Volume
Manual Synchronization
Disk Replacement
28.3.5 HP-UX Support Tape and Recovery of Root Disk
Recommended Reading
UNIX — General, Shells, Programming
UNIX — Basic Administration
UNIX — Networking
UNIX — Kernel, Performances, Internals, Advanced
People also search for UNIX Administration A Comprehensive Sourcebook for Effective Systems Network Management 1st:
unix system administration book
unix and linux system administration handbook 5th edition
unix and linux system administration handbook 5th edition pdf
unix system administration handbook
Tags:
Bozidar Levi,Administration,Comprehensive,Sourcebook