Author Kyle Dent covers a wide range of Postfix tasks, from virtual hosting to controls for unsolicited commercial email. While basic configuration of Postfix is easy, every site has unique needs that call for a certain amount of study.
This book, with careful background explanations and generous examples, eases readers from the basic configuration to the full power of Postfix. It discusses the Postfix interfaces to various tools that round out a fully scalable and highly secure email system. A reference section for Postfix configuration parameters and an installation guide are included.
How Linux Works describes the inside of the Linux system for systems administrators, whether you maintain an extensive network in the office or one Linux box at home.
Some books try to give you copy- and-paste instructions for how to deal with every single system issue that may arise, but How Linux Works actually shows you how the Linux system functions so that you can come up with your own solutions. After a guided tour of filesystems, the boot sequence, system management basics, and networking, author Brian Ward delves into open-ended topics such as development tools, custom kernels, and buying hardware, all from an administrator's point of view.
With a mixture of background theory and real-world examples, this book shows both "how" to administer Linux, and "why" each particular technique works, so that you will know how to make Linux work for you. It is specific for Linux-based systems, where new malware is developed every day. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Linux system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Linux systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Linux system; and analysis of a suspect program.
This book will appeal to computer forensic investigators, analysts, and specialists. A compendium of on-the-job tasks and checklists Specific for Linux-based systems in which new malware is developed every day Authors are world-renowned leaders in investigating and analyzing malicious code. This understanding of how to extract the most from the Linux command line can help you become a better SysAdmin.
Understand why many things in the Linux and Unix worlds are done as they are, and how to apply the Linux Philosophy to working as a SysAdmin. However, it was intended for the developers of those operating systems. Although System Administrators could apply many of the tenets to their daily work, many important tenets were missing. Over the years that David Both has been working with Linux and Unix, he has formulated his own philosophy — one which applies more directly to the everyday life of the System Administrator.
This book defines a philosophy, and then illuminates the practical aspects of that philosophy with real-world experiments you can perform. Author : David Both Publisher: Apress ISBN: Category: Computers Page: View: Read Now » Experience an in-depth exploration of logical volume management and the use of file managers to manipulate files and directories and the critical concept that, in Linux, everything is a file and some fun and interesting uses of the fact that everything is a file.
This book builds upon the skills you learned in Volume 1 of this course and it depends upon the virtual network and virtual machine created there. More experienced Linux users can begin with this volume and download the assigned script that will set up the VM for the start of Volume 2.
Instructions with the script will provide specifications for configuration of the virtual network and the virtual machine. Refer to the volume overviews in the book's introduction to select the volume of this course most appropriate for your current skill level. Experiment with command line programming and how to automate various administrative tasks, networking, and the many services that are required in a Linux system. Use the logs and journals to look for clues to problems and confirmation that things are working correctly, and learn to enhance the security of your Linux systems and how to perform easy local and remote backups.
What You Will Learn Understand Logical Volume Management, using file managers, and special filesystems Exploit everything in a file Perform command line programming and basic automation Configure printers and manage other hardware Manage system services with systemd, user management, security, and local and remote backups using simple and freely available tools Who This Book Is For Anyone who wants to continue to learn Linux in depth as an advanced user and system administrator at the command line while using the GUI desktop to leverage productivity.
The book covers computer organization and hardware, Windows and Linux operating systems, system administration duties, scripting, computer networks, regular expressions, binary numbers, the Bash shell in Linux, DOS, managing processes and services, and computer security.
It also gives students insight on IT-related careers, such as network and web administration, computer forensics, web development, and software engineering. It offers a far more detailed examination of the computer than current computer literacy texts, focusing on concepts essential to all IT professionals—from operating systems and hardware to information security and computer ethics. It also provides details on hardware, programming, and computer networks.
Start your free trial. Show and hide more. Table of contents Product information. My server just got really slow!
0コメント