Average Reviews:
(More customer reviews)I have read about 3/4th of this book so far,most of it is mainly just review for me since the RHEL 5 release. I have noticed so far a few issues mainly with grammar, spelling, and multiple misguided instructions such as the PXE installation method, LDAP setup, and a few other minor things. Overall the book is my favorite linux related book since it gets right to the point and doesnt have all the boring history lessons about 15 years ago when service such and such was developed and how it is completely different etc etc. Any one who's read a linux related book knows what im talking about.
In regards to the misguided instructions, for instance the PXE setup. I have gone through the chapter about 5 times now and slowly stepped through the documentation as it explains but still have yet to be able to get the correct outcome.(a working PXE installation). I have previous experience with PXE so I was able to figure this out on my own with no issue but worry that some new admins to RHEL will have a hard time getting this particular method of installation setup. I'm unfortunetly human so I still may have gotten the steps down wrong and other may find that the instructions are infact correct. If so ... cool. :)
- runlevel -
Click Here to see more reviews about: Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help youadminister Red Hat Enterprise Linux 5 effectively in any productionenvironment, no matter how complex or challenging.
Long-timeRed Hat insider Tammy Fox brings together today's best practices forthe entire system lifecycle, from planning and deployment throughmaintenance and troubleshooting. Fox shows how to maximize yourefficiency and effectiveness by automating day-to-day maintenancethrough scripting, deploying security updates via Red Hat Network,implementing central identity management services, and providing shareddata with NFS and Samba.
RedHat Enterprise Linux 5 Administration Unleashed contains extensivecoverage of network and web services, from the Apache HTTP server andSendmail email services to remote login with OpenSSH. Fox alsodescribes Red Hat's most valuable tools for monitoring and optimizationand presents thorough coverage of security—including a detailedintroduction to Security-Enhanced Linux (SELinux).
Streamline deployment with Kickstart
Find, install, update, remove, and verify software
Detect, analyze, and manage hardware
Manage storage with LVM, RAID, ACLs, and quotas
Use Red Hat Enterprise Linux 5 on 64-bit and multi-core systems
Administer users and groups more efficiently and securely
Ensure trustworthy backup and rapid recovery
Script and schedule tasks to run automatically
Provide unified identity management services
Configure Apache, BIND, Samba, and Sendmail
Monitor and tune the kernel and individual applications
Protect against intruders with SELinux and ExecShield
Set up firewalls with iptables
Enable the Linux Auditing System
Use virtualization to run multiple operating systems concurrently
Part I Installation and Configuration
Chapter 1 Installing Red Hat Enterprise Linux
Chapter 2 Post-Installation Configuration
Chapter 3 Operating System Updates
Part II Operating System Core Concepts
Chapter 4 Understanding Linux Concepts
Chapter 5 Working with RPM Software
Chapter 6 Analyzing Hardware
Chapter 7 Managing Storage
Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors
Part III System Administration
Chapter 9 Managing Users and Groups
Chapter 10 Techniques for Backup and Recovery
Chapter 11 Automating Tasks with Scripts
Part IV Network Services
Chapter 12 Identity Management
Chapter 13 Network File Sharing
Chapter 14 Granting Network Connectivity with DHCP
Chapter 15 Creating a Web Server with the Apache HTTP Server
Chapter 16 Hostname Resolution with BIND
Chapter 17 Securing Remote Logins with OpenSSH
Chapter 18 Setting Up an Email Server with Sendmail
Chapter 19 Explaining Other Common Network Services
Part V Monitoring and Tuning
Chapter 20 Monitoring System Resources
Chapter 21 Monitoring and Tuning the Kernel
Chapter 22 Monitoring and Tuning Applications
Chapter 23 Protecting Against Intruders with Security-Enhanced Linux
Chapter 24 Configuring a Firewall
Chapter 25 Linux Auditing System
Appendixes
Appendix A Installing Proprietary Kernel Modules
Appendix B Creating Virtual Machines
Appendix C Preventing Security Breaches with ExecShield
Appendix D Troubleshooting
TammyFox served as technical leader of Red Hat's documentation group, whereshe wrote and revised The Red Hat Enterprise Linux SystemAdministration Guide. She was founding editor of Red Hat Magazine, nowan online publication reaching more than 800,000 system administratorsand others interested in Linux and open source. She wrote Red Hat'sLogViewer tool and has written and contributed to several Red Hatconfiguration tools. Fox is also the founding leader of the Fedora DocsProject.
Registeryour book at www.samspublishing.com/register for convenient access toupdates and to download example scripts presented in this book.
Category:Linux/Networking
Covers:Red Hat Enterprise Linux 5
User Level:Intermediate–Advanced
Click here for more information about Red Hat Enterprise Linux 5 Administration Unleashed
No comments:
Post a Comment