skip to content
Red Hat Enterprise Linux 5 administration unleashed Preview this item
ClosePreview this item

Red Hat Enterprise Linux 5 administration unleashed

Author: Tammy Fox
Publisher: Indianapolis, Ind. : Sams, ©2007.
Edition/Format:   Print book : EnglishView all editions and formats
A guide to Red Hat Enterprise Linux 5 administration covers such topics as streamlining deployment with Kickstart, managing storage, administering users and groups, scripting and scheduling tasks, and setting up firewalls.

(not yet rated) 0 with reviews - Be the first.

More like this


Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Tammy Fox
ISBN: 0672328925 9780672328923
OCLC Number: 137291425
Notes: Includes index.
Description: xv, 597 pages : illustrations ; 24 cm
Contents: Part I Installation and Configuration Chapter 1 Installing Red Hat Enterprise Linux Choosing an Installation Method Creating the Installation Source Starting the Installation Performing the Installation Installing with Kickstart Installing with PXE Performing an Upgrade Red Hat Network Provisioning Summary Chapter 2 Post-Installation Configuration Red Hat Setup Agent Logging In for the First Time Network Configuration Printer Configuration Adding Boot Parameters Summary Chapter 3 Operating System Updates Navigating Through the RHN Website Assigning Users for the RHN Website Subscribing to RHN Channels Performing Actions on Individual Systems from the RHN Website Using System Groups on the RHN Website Retrieving Software from RHN with YUM Summary Part II Operating System Core Concepts Chapter 4 Understanding Linux Concepts Learning the Desktop Filesystem Hierarchy System Shell Basics Becoming the Root User Manual Pages Editing Text Files File Permissions Initialization Scripts Runlevels Summary Chapter 5 Working with RPM Software Understanding How RPM Works Finding the Software Installing Software Updating Software Removing Software Verifying Software Files Querying Package Files Building RPM Packages Summary Chapter 6 Analyzing Hardware Listing Devices Detecting Hardware Gathering Information from the BIOS Listing and Configuring Kernel Modules HAL Summary Chapter 7 Managing Storage Understanding Partitioning Understanding LVM Understanding RAID Understanding Clustering and GFS Using Access Control Lists Using Disk Quotas Summary Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors 64-Bit Processors Multi-Core Processors Processors with Hyper-Threading Technology Summary Part III System Administration Chapter 9 Managing Users and Groups What Are Users and Groups? Managing Users Managing Groups How It All Works Best Practices Summary Chapter 10 Techniques for Backup and Recovery Writing a Backup Plan Using Amanda for Backups Other Linux Backup Utilities Recovery and Repair Summary Chapter 11 Automating Tasks with Scripts Writing Scripts with Bash Additional Scripting Languages Scheduling Tasks with Cron Summary Part IV Network Services 12 Identity Management Understanding PAM Enabling NIS Enabling LDAP Enabling Kerberos Enabling SMB or Winbind Authentication Enabling with the Authentication Tool Summary Chapter 13 Network File Sharing Network File System Samba File Sharing Summary Chapter 14 Granting Network Connectivity with DHCP Allowing Connections Configuring the Server Logging Connections Summary Chapter 15 Creating a Web Server with the Apache HTTP Server Apache HTTP Server and SELinux Allowing Connections Configuring the Server Logging Connections Starting and Stopping the Server Summary Chapter 16 Hostname Resolution with BIND Understanding DNS Concepts Allowing Connections Configuring BIND Configuring BIND Graphically Logging Connections Summary Chapter 17 Securing Remote Logins with OpenSSH Allowing Connections Configuring the Server Connecting from the Client Logging Connections Summary Chapter 18 Setting Up an Email Server with Sendmail Understanding Email Concepts Configuring Sendmail Using POP and IMAP Logging Sendmail Connections Allowing Email Connections Summary Chapter 19 Explaining Other Common Network Services The xinetd Super Server Keeping Accurate Time with NTP Creating a Network Printer with CUPS Summary Part V Monitoring and Tuning Chapter 20 Monitoring System Resources Reporting Filesystem Usage Reporting Disk Performance Reporting System Processes Reporting on the System Processors Reporting Memory Usage Reporting on the Network Subsystem Generating a System Report Locating Log Files Viewing Log Files with Logwatch Summary Chapter 21 Monitoring and Tuning the Kernel Using the /proc Directory . Optimizing Virtual Memory Managing Memory with NUMA Using AltSysRq to Execute System Requests Saving Kernel Dumps for Analysis Setting SMP IRQ Affinity Enabling NMI Watchdog for Locked Systems Summary Chapter 22 Monitoring and Tuning Applications OProfile Valgrind Additional Programs to Consider Summary Chapter 23 Protecting Against Intruders with Security-Enhanced Linux Selecting an SELinux Mode Selecting and Customizing the SELinux Policy Utilizing the SELinux Troubleshooting Tool Working with Security Contexts Summary Chapter 24 Configuring a Firewall Selecting a Table and Command for IPTables Selecting IPTables Options Using IPTables Match Extensions Using IPTables Target Extensions Starting and Stopping the IPTables Service Saving the IPTables Rules IPTables Examples Enabling the Default Firewall Summary Chapter 25 Linux Auditing System Configuring the Audit Daemon Writing Audit Rules and Watches Starting and Stopping the Daemon Analyzing the Records Tracing a Process with Audit Summary Appendixes Appendix A Installing Proprietary Kernel Modules Installing Proprietary Modules Installing the nVidia Display Driver Recognizing a Tainted Kernel Appendix B Creating Virtual Machines Virtualization System Requirements Installing Virtualization Setting Up the VM and Installing the Guest OS Introducing the virsh Command Starting and Stopping the Virtual Machine Modifying Dedicated Resources Performing Additional Actions Managing VMs with the xm Utility Appendix C Preventing Security Breaches with ExecShield 547 How ExecShield Works Determining Status of ExecShield Disabling ExecShield Appendix D Troubleshooting Installation and Configuration Troubleshooting OS Core Concepts Troubleshooting System Administration Troubleshooting Network Troubleshooting Monitoring and Tuning Troubleshooting Security Troubleshooting
Responsibility: Tammy Fox ; [foreword by Paul Gampe].
More information:


Helps you administer Red Hat Enterprise Linux 5 in any production environment. This book aims to bring together best practices for the entire system lifecycle, from planning and deployment through  Read more...


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Red Hat Enterprise Linux 5 administration unleashed
    a schema:Book, schema:CreativeWork ;
    library:oclcnum "137291425" ;
    library:placeOfPublication <> ;
    library:placeOfPublication <> ; # Indianapolis, Ind.
    schema:about <> ; # Sistemas operativos (Computadoras)
    schema:about <> ; # Operating systems (Computers)
    schema:about <> ; # Linux.
    schema:about <> ;
    schema:about <> ; # Systèmes d'exploitation
    schema:about <> ; # Computer operating systems
    schema:about <> ; # Linux, Pilotes de périphérique pour (Logiciels)
    schema:about <> ; # Linux (Computer software)
    schema:about <> ; # Systèmes d'exploitation (Ordinateurs)
    schema:about <> ;
    schema:about <> ; # Logiciels
    schema:about <> ; # Linux (Système d'exploitation)
    schema:about <> ; # Linux.
    schema:bookFormat bgn:PrintBook ;
    schema:copyrightYear "2007" ;
    schema:creator <> ; # Tammy Fox
    schema:datePublished "2007" ;
    schema:description "A guide to Red Hat Enterprise Linux 5 administration covers such topics as streamlining deployment with Kickstart, managing storage, administering users and groups, scripting and scheduling tasks, and setting up firewalls."@en ;
    schema:exampleOfWork <> ;
    schema:inLanguage "en" ;
    schema:name "Red Hat Enterprise Linux 5 administration unleashed"@en ;
    schema:productID "137291425" ;
    schema:publication <> ;
    schema:publisher <> ; # Sams
    schema:url <> ;
    schema:workExample <> ;
    wdrs:describedby <> ;

Related Entities

<> # Linux (Computer software)
    a schema:CreativeWork ;
    schema:name "Linux (Computer software)" ;

<> # Linux (Système d'exploitation)
    a schema:CreativeWork ;
    schema:name "Linux (Système d'exploitation)" ;

<> # Indianapolis, Ind.
    a schema:Place ;
    schema:name "Indianapolis, Ind." ;

<> # Computer operating systems
    a schema:Intangible ;
    schema:name "Computer operating systems"@en ;

<> # Linux, Pilotes de périphérique pour (Logiciels)
    a schema:Intangible ;
    schema:name "Linux, Pilotes de périphérique pour (Logiciels)"@fr ;

<> # Sistemas operativos (Computadoras)
    a schema:Intangible ;
    schema:name "Sistemas operativos (Computadoras)"@en ;

<> # Systèmes d'exploitation
    a schema:Intangible ;
    schema:name "Systèmes d'exploitation"@en ;

<> # Systèmes d'exploitation (Ordinateurs)
    a schema:Intangible ;
    schema:name "Systèmes d'exploitation (Ordinateurs)"@fr ;

<> # Operating systems (Computers)
    a schema:Intangible ;
    schema:name "Operating systems (Computers)"@en ;

<> # Linux.
    a schema:CreativeWork ;
    schema:name "Linux." ;

<> # Tammy Fox
    a schema:Person ;
    schema:birthDate "1964" ;
    schema:familyName "Fox" ;
    schema:givenName "Tammy" ;
    schema:name "Tammy Fox" ;

    a schema:ProductModel ;
    schema:isbn "0672328925" ;
    schema:isbn "9780672328923" ;

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.