Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Administration Handbook (2nd Edition)

Buy
As the deployment of Linux systems in production environments has accelerated, Linux administrators have longed for a book that addresses the challenges of this complex and exciting frontier. Linux Administration Handbook was written with this audience in mind. This book serves both as a valuable tutorial for the novice administrator and as a trustworthy reference for the seasoned professional. Using the practical approach of their highly regarded UNIX System Administration Handbook, the authors describe every aspect of Linux system administration and cover the following major Linux distributions: Red Hat Linux, SuSE Linux, Debian GNU/Linux.

Replete with war stories and hard-won insights, this book examines how Linux systems behave in real-world ecosystems, not how they might behave in ideal environments. Difficult tasks are described in all their complexity, including DNS configuration, networking, sendmail configuration, security management, kernel building, performance analysis, and routing. The book's many true-life examples will help administrators implement solutions that continue to work effectively as their operations grow.

"As this book shows, Linux systems are just as functional, secure, and reliable as their proprietary counterparts. Thanks to the ongoing efforts of its thousands of developers, Linux is more ready than ever for deployment at the frontlines of the real world. The authors of this book know that terrain well, and I am happy to leave you in their most capable hands." —Linus Torvalds

"I'm absolutely amazed to see a computing book that focuses on concepts and how to implement them instead of explaining man pages for dummies. I also find the historical remarks very interesting. Your book is the very best of its kind I have ever read."—Hanspeter Schmid, Bernafon, Switzerland

"I just wanted to tell you guys that I have learned more about system administration from your book than from $10,000 worth of training classes. This book has been an invaluable part of my day-to-day life as a system and network administrator."—Chris Bourne, Xapnet, Emeryville, CA

"The seminal work in the field. If you can have only one system administration book, this should be it."—Brad Knowles, Brussels, Belgium

About the Author

Evi Nemeth is retired from the computer science faculty at the University of Colorado and is a senior staff member in network research at CAIDA, the Cooperative Association for Internet Data Analysis at the San Diego Supercomputer Center.


Garth Snyder has worked at NeXT and Sun and holds a degree in electrical engineering from Swarthmore College. He recently received an M.D./M.B.A. from the University of Rochester.


Trent R. Hein is the cofounder of Applied Trust Engineering, a company that provides network infrastructure security and performance consulting services. Trent holds a B.S. in computer science from the University of Colorado.

(HTML tags aren't allowed.)

Adventures in Bookbinding: Handcrafting Mixed-Media Books
Adventures in Bookbinding: Handcrafting Mixed-Media Books

Explore intriguing methods of combining bookbinding with specific crafts such as quilting, jewelry making, or polymer clay with Adventures in Bookbinding! With different levels of expertise including basic, novice, and expert, this book is filled with illustrated step-by-step instructions and photographs that demonstrate how...

Co-verification of Hardware and Software for ARM SoC Design (Embedded Technology)
Co-verification of Hardware and Software for ARM SoC Design (Embedded Technology)
This book is the first to document and teach important information about the verification technique known as hardware/software co-verification. Traditional embedded system design has evolved into single chip designs that are pushing past 1M logic gates and headed toward 10M gates. In this era of SoC design, chips now include microprocessors and...
Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...

21 Leaders for The 21st Century
21 Leaders for The 21st Century

With a client list that includes Motorola, Daewoo, AT&T, and Volvo, Fons Trompenaars and Charles Hampden-Turner are considered today’s most knowledgeable, innovative management consultants. In 21 Leaders for the 21st Century, they tap into the wisdom of high-performing leaders from around the globe—from Michael Dell to...

System Theory of Continuous Time Finite Dimensional Dynamical Systems: The Memories of Tsuyoshi Matsuo and R. E. Kalman (Studies in Systems, Decision and Control)
System Theory of Continuous Time Finite Dimensional Dynamical Systems: The Memories of Tsuyoshi Matsuo and R. E. Kalman (Studies in Systems, Decision and Control)
This book discusses the realization and control problems of finite-dimensional dynamical systems which contain linear and nonlinear systems. The author focuses on algebraic methods for the discussion of control problems of linear and non-linear dynamical systems. The book contains detailed examples to showcase the effectiveness of the presented...
Nutrient-Gene Interactions in Cancer
Nutrient-Gene Interactions in Cancer

The complete mapping of the human genome, along with the development of sophisticated molecular technologies, has accelerated research on the relationship between nutrients and genes. This has led to compelling evidence garnered from epidemiological and experimental observations supporting the idea that the interaction between nutrients and...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy