This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.
Long-time Red Hat insider Tammy Fox brings together today's best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how to maximize your efficiency and effectiveness by automating day-to-day maintenance through scripting, deploying security updates via Red Hat Network, implementing central identity management services, and providing shared data with NFS and Samba.
Red Hat Enterprise Linux 5 Administration Unleashed contains extensive coverage of network and web services, from the Apache HTTP server and Sendmail email services to remote login with OpenSSH. Fox also describes Red Hat's most valuable tools for monitoring and optimization and presents thorough coverage of security-including a detailed introduction to Security-Enhanced Linux (SELinux).
Streamline deployment with Kickstart
Find, install, update, remove, and verify software
Detect, analyze, and manage hardware
Manage storage with LVM, RAID, ACLs, and quotas
Use Red Hat Enterprise Linux 5 on 64-bit and multi-core systems
Administer users and groups more efficiently and securely
Ensure trustworthy backup and rapid recovery
Script and schedule tasks to run automatically
Provide unified identity management services
Configure Apache, BIND, Samba, and Sendmail
Monitor and tune the kernel and individual applications
Protect against intruders with SELinux and ExecShield
Set up firewalls with iptables
Enable the Linux Auditing System
Use virtualization to run multiple operating systems concurrently
Part I Installation and Configuration
Chapter 1 Installing Red Hat Enterprise Linux
Chapter 2 Post-Installation Configuration
Chapter 3 Operating System Updates
Part II Operating System Core Concepts
Chapter 4 Understanding Linux Concepts
Chapter 5 Working with RPM Software
Chapter 6 Analyzing Hardware
Chapter 7 Managing Storage
Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors
Part III System Administration
Chapter 9 Managing Users and Groups
Chapter 10 Techniques for Backup and Recovery
Chapter 11 Automating Tasks with Scripts
Part IV Network Services
Chapter 12 Identity Management
Chapter 13 Network File Sharing
Chapter 14 Granting Network Connectivity with DHCP
Chapter 15 Creating a Web Server with the Apache HTTP Server
Chapter 16 Hostname Resolution with BIND
Chapter 17 Securing Remote Logins with OpenSSH
Chapter 18 Setting Up an Email Server with Sendmail
Chapter 19 Explaining Other Common Network Services
Part V Monitoring and Tuning
Chapter 20 Monitoring System Resources
Chapter 21 Monitoring and Tuning the Kernel
Chapter 22 Monitoring and Tuning Applications
Chapter 23 Protecting Against Intruders with Security-Enhanced Linux
Chapter 24 Configuring a Firewall
Chapter 25 Linux Auditing System
Appendixes
Appendix A Installing Proprietary Kernel Modules
Appendix B Creating Virtual Machines
Appendix C Preventing Security Breaches with ExecShield
Appendix D Troubleshooting
Tammy Fox served as technical leader of Red Hat's documentation group, where she wrote and revised The Red Hat Enterprise Linux System Administration Guide. She was founding editor of Red Hat Magazine, now an online publication reaching more than 800,000 system administrators and others interested in Linux and open source. She wrote Red Hat's LogViewer tool and has written and contributed to several Red Hat configuration tools. Fox is also the founding leader of the Fedora Docs Project.
Register your book at www.samspublishing.com/register for convenient access to updates and to download example scripts presented in this book.
Category: Linux/Networking
Covers: Red Hat Enterprise Linux 5
User Level: Intermediate-Advanced