skip to content
Red Hat Enterprise Linux 5 administration unleashed Preview this item
ClosePreview this item

Red Hat Enterprise Linux 5 administration unleashed

Author: Tammy Fox
Publisher: Indianapolis, Ind. : Sams, ©2007.
Edition/Format:   Print book : EnglishView all editions and formats
A guide to Red Hat Enterprise Linux 5 administration covers such topics as streamlining deployment with Kickstart, managing storage, administering users and groups, scripting and scheduling tasks, and setting up firewalls.

(not yet rated) 0 with reviews - Be the first.

More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Tammy Fox
ISBN: 0672328925 9780672328923
OCLC Number: 137291425
Notes: Includes index.
Description: xv, 597 pages : illustrations ; 24 cm
Contents: Part I Installation and Configuration Chapter 1 Installing Red Hat Enterprise Linux Choosing an Installation Method Creating the Installation SourceStarting the InstallationPerforming the InstallationInstalling with KickstartInstalling with PXEPerforming an Upgrade Red Hat Network Provisioning Summary Chapter 2 Post-Installation Configuration Red Hat Setup AgentLogging In for the First TimeNetwork ConfigurationPrinter ConfigurationAdding Boot Parameters Summary Chapter 3 Operating System UpdatesNavigating Through the RHN WebsiteAssigning Users for the RHN WebsiteSubscribing to RHN Channels Performing Actions on Individual Systems from the RHN WebsiteUsing System Groups on the RHN Website Retrieving Software from RHN with YUMSummary Part II Operating System Core Concepts Chapter 4 Understanding Linux ConceptsLearning the DesktopFilesystem Hierarchy SystemShell BasicsBecoming the Root User Manual PagesEditing Text Files File PermissionsInitialization ScriptsRunlevelsSummary Chapter 5 Working with RPM Software Understanding How RPM Works Finding the SoftwareInstalling SoftwareUpdating SoftwareRemoving SoftwareVerifying Software Files Querying Package FilesBuilding RPM PackagesSummary Chapter 6 Analyzing Hardware Listing DevicesDetecting Hardware Gathering Information from the BIOSListing and Configuring Kernel Modules HALSummary Chapter 7 Managing Storage Understanding PartitioningUnderstanding LVMUnderstanding RAIDUnderstanding Clustering and GFSUsing Access Control ListsUsing Disk Quotas Summary Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors 64-Bit Processors Multi-Core ProcessorsProcessors with Hyper-Threading TechnologySummary Part III System Administration Chapter 9 Managing Users and Groups What Are Users and Groups?Managing UsersManaging GroupsHow It All WorksBest PracticesSummary Chapter 10 Techniques for Backup and Recovery Writing a Backup PlanUsing Amanda for BackupsOther Linux Backup UtilitiesRecovery and Repair Summary Chapter 11 Automating Tasks with Scripts Writing Scripts with BashAdditional Scripting LanguagesScheduling Tasks with CronSummary Part IV Network Services 12 Identity Management Understanding PAMEnabling NISEnabling LDAPEnabling KerberosEnabling SMB or Winbind Authentication Enabling with the Authentication Tool Summary Chapter 13 Network File SharingNetwork File System Samba File Sharing Summary Chapter 14 Granting Network Connectivity with DHCP Allowing ConnectionsConfiguring the Server Logging Connections Summary Chapter 15 Creating a Web Server with the Apache HTTP Server Apache HTTP Server and SELinuxAllowing ConnectionsConfiguring the Server Logging Connections Starting and Stopping the ServerSummary Chapter 16 Hostname Resolution with BIND Understanding DNS ConceptsAllowing ConnectionsConfiguring BIND Configuring BIND GraphicallyLogging Connections Summary Chapter 17 Securing Remote Logins with OpenSSH Allowing ConnectionsConfiguring the Server Connecting from the Client Logging ConnectionsSummary Chapter 18 Setting Up an Email Server with Sendmail Understanding Email ConceptsConfiguring SendmailUsing POP and IMAPLogging Sendmail ConnectionsAllowing Email Connections Summary Chapter 19 Explaining Other Common Network Services The xinetd Super ServerKeeping Accurate Time with NTPCreating a Network Printer with CUPSSummary Part V Monitoring and Tuning Chapter 20 Monitoring System Resources Reporting Filesystem UsageReporting Disk PerformanceReporting System Processes Reporting on the System ProcessorsReporting Memory UsageReporting on the Network SubsystemGenerating a System Report Locating Log FilesViewing Log Files with LogwatchSummary Chapter 21 Monitoring and Tuning the Kernel Using the /proc Directory .Optimizing Virtual MemoryManaging Memory with NUMAUsing AltSysRq to Execute System Requests Saving Kernel Dumps for Analysis Setting SMP IRQ AffinityEnabling NMI Watchdog for Locked SystemsSummary Chapter 22 Monitoring and Tuning Applications OProfile ValgrindAdditional Programs to Consider Summary Chapter 23 Protecting Against Intruders with Security-Enhanced Linux Selecting an SELinux ModeSelecting and Customizing the SELinux PolicyUtilizing the SELinux Troubleshooting ToolWorking with Security ContextsSummary Chapter 24 Configuring a Firewall Selecting a Table and Command for IPTablesSelecting IPTables OptionsUsing IPTables Match ExtensionsUsing IPTables Target ExtensionsStarting and Stopping the IPTables ServiceSaving the IPTables RulesIPTables ExamplesEnabling the Default FirewallSummary Chapter 25 Linux Auditing System Configuring the Audit DaemonWriting Audit Rules and WatchesStarting and Stopping the DaemonAnalyzing the RecordsTracing a Process with AuditSummary Appendixes Appendix A Installing Proprietary Kernel ModulesInstalling Proprietary ModulesInstalling the nVidia Display DriverRecognizing a Tainted Kernel Appendix B Creating Virtual Machines Virtualization System RequirementsInstalling VirtualizationSetting Up the VM and Installing the Guest OS Introducing the virsh CommandStarting and Stopping the Virtual MachineModifying Dedicated ResourcesPerforming Additional ActionsManaging VMs with the xm Utility Appendix C Preventing Security Breaches with ExecShield 547How ExecShield WorksDetermining Status of ExecShieldDisabling ExecShield Appendix D TroubleshootingInstallation and Configuration TroubleshootingOS Core Concepts TroubleshootingSystem Administration TroubleshootingNetwork TroubleshootingMonitoring and Tuning TroubleshootingSecurity Troubleshooting
Responsibility: Tammy Fox ; [foreword by Paul Gampe].
More information:


Helps you administer Red Hat Enterprise Linux 5 in any production environment. This book aims to bring together best practices for the entire system lifecycle, from planning and deployment through  Read more...


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Red Hat Enterprise Linux 5 administration unleashed
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "137291425" ;
   library:placeOfPublication <> ;
   library:placeOfPublication <> ; # Indianapolis, Ind.
   schema:about <> ; # Operating systems (Computers)
   schema:about <> ; # Linux.
   schema:about <> ;
   schema:about <> ; # Systèmes d'exploitation
   schema:about <> ; # Computer operating systems
   schema:about <> ; # Linux, Pilotes de périphérique pour (Logiciels)
   schema:about <> ; # Linux (Computer software)
   schema:about <> ; # Systèmes d'exploitation (Ordinateurs)
   schema:about <> ;
   schema:about <> ; # Logiciels
   schema:about <> ; # Linux (Système d'exploitation)
   schema:about <> ; # Linux.
   schema:bookFormat bgn:PrintBook ;
   schema:copyrightYear "2007" ;
   schema:creator <> ; # Tammy Fox
   schema:datePublished "2007" ;
   schema:description "A guide to Red Hat Enterprise Linux 5 administration covers such topics as streamlining deployment with Kickstart, managing storage, administering users and groups, scripting and scheduling tasks, and setting up firewalls."@en ;
   schema:exampleOfWork <> ;
   schema:inLanguage "en" ;
   schema:name "Red Hat Enterprise Linux 5 administration unleashed"@en ;
   schema:productID "137291425" ;
   schema:publication <> ;
   schema:publisher <> ; # Sams
   schema:url <> ;
   schema:workExample <> ;
   wdrs:describedby <> ;

Related Entities

<> # Linux (Computer software)
    a schema:CreativeWork ;
   schema:name "Linux (Computer software)" ;

<> # Linux (Système d'exploitation)
    a schema:CreativeWork ;
   schema:name "Linux (Système d'exploitation)" ;

<> # Indianapolis, Ind.
    a schema:Place ;
   schema:name "Indianapolis, Ind." ;

<> # Computer operating systems
    a schema:Intangible ;
   schema:name "Computer operating systems"@en ;

<> # Linux, Pilotes de périphérique pour (Logiciels)
    a schema:Intangible ;
   schema:name "Linux, Pilotes de périphérique pour (Logiciels)"@fr ;

<> # Systèmes d'exploitation
    a schema:Intangible ;
   schema:name "Systèmes d'exploitation"@en ;

<> # Systèmes d'exploitation (Ordinateurs)
    a schema:Intangible ;
   schema:name "Systèmes d'exploitation (Ordinateurs)"@fr ;

<> # Operating systems (Computers)
    a schema:Intangible ;
   schema:name "Operating systems (Computers)"@en ;

<> # Linux.
    a schema:CreativeWork ;
   schema:name "Linux." ;

<> # Tammy Fox
    a schema:Person ;
   schema:birthDate "1964" ;
   schema:familyName "Fox" ;
   schema:givenName "Tammy" ;
   schema:name "Tammy Fox" ;

    a schema:ProductModel ;
   schema:isbn "0672328925" ;
   schema:isbn "9780672328923" ;

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.