Linux Administration Handbook [NOOK Book]

Overview


“As this book shows, Linux systems are just as functional, secure, and reliable as their proprietary counterparts. Thanks to the ongoing efforts of thousands of Linux developers, Linux is more ready than ever for deployment at the frontlines of the real world. The authors of this book know that terrain well, and I am happy to leave you in their most capable hands.”
–Linus Torvalds
“The most successful sysadmin book of all time–because it works!”
–Rik Farrow, editor of ;login:
...
See more details below
Linux Administration Handbook

Available on NOOK devices and apps  
  • NOOK Devices
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK Study
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$25.49
BN.com price
(Save 42%)$43.99 List Price

Overview


“As this book shows, Linux systems are just as functional, secure, and reliable as their proprietary counterparts. Thanks to the ongoing efforts of thousands of Linux developers, Linux is more ready than ever for deployment at the frontlines of the real world. The authors of this book know that terrain well, and I am happy to leave you in their most capable hands.”
–Linus Torvalds
“The most successful sysadmin book of all time–because it works!”
–Rik Farrow, editor of ;login:
“This book clearly explains current technology with the perspective of decades of experience in large-scale system administration. Unique and highly recommended.”
–Jonathan Corbet, cofounder, LWN.net
“Nemeth et al. is the overall winner for Linux administration: it’s intelligent, full of insights, and looks at the implementation of concepts.”
–Peter Salus, editorial director, Matrix.net

Since 2001, Linux Administration Handbook has been the definitive resource for every Linux® system administrator who must efficiently solve technical problems and maximize the reliability and performance of a production environment. Now, the authors have systematically updated this classic guide to address today’s most important Linux distributions and most powerful new administrative tools.

The authors spell out detailed best practices for every facet of system administration, including storage management, network design and administration, web hosting, software configuration management, performance analysis, Windows interoperability, and much more. Sysadmins will especially appreciate the thorough and up-to-date discussions of such difficult topics such as DNS, LDAP, security, and the management of IT service organizations.

Linux® Administration Handbook, Second Edition, reflects the current versions of these leading distributions:

  • Red Hat® Enterprise Linux®
  • FedoraTM Core
  • SUSE® Linux Enterprise
  • Debian® GNU/Linux
  • Ubuntu® Linux

Sharing their war stories and hard-won insights, the authors capture the behavior of Linux systems in the real world, not just in ideal environments. They explain complex tasks in detail and illustrate these tasks with examples drawn from their extensive hands-on experience.

Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
There are plenty of Linux administration books. Several things make this one stand out. Here's the most important: Linux Administration Handbook is designed for administrators working in industrial-strength production environments.

It never glosses over the "subtleties" that can get you in big trouble. It doesn't stint on technical detail. It's never satisfied with restating the man pages. And it's full of war stories from folks who've been there. Evi Nemeth and her coauthors: Boy, have they ever been there. (Just ask any gray-bearded Unix sysadmin about their earlier, legendary Unix System Administration Handbook.)

There's only been one downside to Linux Administration Handbook: It's been nearly five years since it was written. Well, that flaw's just been remedied. The new Second Edition has been systematically revised for the latest administration tools (think Nagios and LVM). It's carefully targeted at today's five most widely used distributions: Red Hat Enterprise Linux 4.3, Fedora Core 5, SUSE Linux 10.2, Debian 3.2 "Etch," and Ubuntu 6.06. The result: a book you can rely on for the next five years.

Rely on to do what? Just about everything. You'll find chapters on booting and shutting down; "rootly" powers; controlling processes; the Linux filesystem; on adding new users. You'll learn the most efficient ways to perform backups. How to make sense of syslogs and log files. Everything you need to know about drivers, the kernel, networking, NFS -- and Internet services, from web hosting to email. Nemeth & Company bring their experience to bear on troubleshooting, performance optimization, print management, security, Windows interoperability, even "policies and politics."

Whatever Linux books you already own, if you depend on Linux to run efficiently and reliably, you need this one, too. Bill Camarda, from the December 2006 Read Only

From The Critics
Provides techniques and advice for running three representative versions of the Linux operating system: Red Hat 7.2, SuSE 7.3, and Debian 3.0. The guide identifies the different pieces that comprise the major administrative systems and how they work together, and summarizes how to perform common procedures, such as adding and removing users, performing backups, and auditing security. Large sections are devoted to the domain name system configuration and the sendmail configuration. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9780137002757
  • Publisher: Pearson Education
  • Publication date: 11/13/2006
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 2
  • Pages: 1040
  • Sales rank: 387,716
  • File size: 4 MB

Meet the Author

Evi Nemeth is retired from the computer science faculty at the University of Colorado and is a senior staff member in network research at CAIDA, the Cooperative Association for Internet Data Analysis at the San Diego Supercomputer Center.

Garth Snyder has worked at NeXT and Sun and holds a degree in electrical engineering from Swarthmore College. He recently received an M.D./M.B.A. from the University of Rochester.

Trent R. Hein is the cofounder of Applied Trust Engineering, a company that provides network infrastructure security and performance consulting services. Trent holds a B.S. in computer science from the University of Colorado.

Read More Show Less

Read an Excerpt

When we wrote the first edition of this book (about five years ago), Linux was just beginning to prove itself in the corporate world. We hoped that Linux Administration Handbook would help spread the news that Linux was a first-tier operating system capable of matching off against offerings from Sun, HP, and IBM.

Now Linux is IBM. For anyone awaiting an unambiguous signal that the Linux waters were safe for corporate swimmers, IBM’s 2004 announcement of Linux support across its entire server line must have been quite comforting. No one was ever fired for buying IBM; these days, Linux in general is an equally safe proposition.1

We set out to write a book that would be the professional Linux system administrator’s best friend. Where appropriate, we’ve adapted the proven concepts and materials from our popular book, UNIX System Administration Handbook. We’ve added a truckload of Linux-specific material and updated the rest, but much of the coverage remains similar. We hope you agree that the result is a high-quality guide to Linux administration that benefits from its experience in a past life.

None of the other books on Linux system administration supply the breadth and depth of material necessary to effectively use Linux in real-world business environments. Here are the features that distinguish our book:

  • We take a practical approach. Our purpose is not to restate the contents of your manuals but rather to summarize our collective experience in system administration. This book contains numerous war stories and a wealth of pragmatic advice.
  • This is not a book about how to run Linux at home, in your garage, oron your PDA. We describe the use of Linux in production environments such as businesses, government offices, and universities.
  • We cover Linux networking in detail. It is the most difficult aspect of system administration and the area in which we think we can be of most help.
  • We do not oversimplify the material. Our examples reflect true-life situations with all their warts and unsightly complications. In most cases, the examples have been taken directly from production systems.
  • We cover five major Linux distributions.
Our Example DistributionsLike so many operating systems, Linux has grown and branched in several different directions. Although development of the kernel has remained surprisingly centralized, packaging and distribution of complete Linux operating systems is overseen by a variety of groups, each with its own agenda.We cover five Linux distributions in detail:
  • Red Hat® Enterprise Linux® 4.3 ES
  • FedoraTM Core 5
  • SUSE® Linux Enterprise 10.2
  • Debian® GNU/Linux 3.2 “Etch” (testing release of 9/06)
  • Ubuntu® 6.06 “Dapper Drake”

We chose these distributions because they are among the most popular and because they represent the Linux community as a whole. However, much of the material in this book applies to other mainstream distributions as well.

We provide detailed information about each of these example distributions for every topic that we discuss. Comments specific to a particular operating system are marked with the distribution’s logo.The Organization of This Book

This book is divided into three large chunks: Basic Administration, Networking, and Bunch o’ Stuff.

Basic Administration presents a broad overview of Linux from a system administrator’s perspective. The chapters in this section cover most of the facts and techniques needed to run a stand-alone Linux system.

The Networking section describes the protocols used on Linux systems and the techniques used to set up, extend, and maintain networks. High-level network software is also covered here. Among the featured topics are the Domain Name System, the Network File System, routing, sendmail, and network management.

Bunch o’ Stuff includes a variety of supplemental information. Some chapters discuss optional software packages such as the Linux printing system. Others give advice on topics ranging from hardware maintenance to the politics of running a Linux installation.

Each chapter is followed by a set of practice exercises. Items are marked with our estimate of the effort required to complete them, where “effort” is an indicator of both the difficulty of the task and the time required.There are four levels:

  • no stars—Easy, should be straightforward
  • one star—Harder or longer, may require lab work
  • two stars—Hardest or longest, requires lab work and digging
  • three stars—Semester-long projects (only in a few chapters)

Some of the exercises require root or sudo access to the system; others require the permission of the local sysadmin group. Both requirements are mentioned in the text of the exercise.Our Contributors

We’re delighted that Adam Boggs, Bryan Buus, and Ned McClain were able to join us once again as contributing authors. With this edition, we also welcome Ben Whaley, Tobi Oetiker, Fritz Zaucker, Jeffrey S. Haemer, David Schweikert, and Scott Seidel as contributors and friends. Their deep knowledge of a variety of areas has greatly enriched the content of this book. Above all, we thank and acknowledge Lynda McGinley, who in addition to taking ownership of a substantial amount of text also worked tirelessly to organize and facilitate our contributors’ work.Contact Information

Please send suggestions, comments, and bug reports to linux@book.admin.com. We answer most mail, but please be patient; it is sometimes a few days before one of us is able to respond. Because of the volume of email that this alias receives, we regret that we are unable to answer technical questions. To get a copy of our current bug list and other late-breaking information, visit our web site, www.admin.com.

We hope you enjoy this book, and we wish you the best of luck with your adventures in system administration!

Evi Nemeth
Garth Snyder
Trent R. Hein

October 2006
Note

1. At least on servers. Today’s battleground is the desktop, a domain over which Microsoft Windows still maintains a near-lock. The outcome of that struggle remains difficult to predict. As of this writing, Windows still provides a more polished user interface. But it’s hard to argue with “free.”

Read More Show Less

Table of Contents


Foreword to the First Edition xxxiii Preface xxxiv Acknowledgments xxxvii Section One: Basic Administration 1 Chapter 1: Where to Start 3

Suggested background 4

Linux’s relationship to UNIX 4

Linux in historical context 5

Linux distributions 6

Notation and typographical conventions 9

Where to go for information 11

How to find and install software 14

Essential tasks of the system administrator 16

System administration under duress 18

Recommended reading 19

Exercises 20

Chapter 2: Booting and Shutting Down 21

Bootstrapping 21

Booting PCs 25

Using boot loaders: LILO and GRUB 26

Booting single-user mode 31

Working with startup scripts 32

Rebooting and shutting down 40

Exercises 43

Chapter 3: Rootly Powers 44

Ownership of files and processes 44

The superuser 46

Choosing a root password 47

Becoming root 48

Other pseudo-users 51

Exercises 52

Chapter 4: Controlling Processes 53

Components of a process 53

The life cycle of a process 56

Signals 57

kill and killall: send signals 60

Process states 60

nice and renice: influence scheduling priority 61

ps: monitor processes 62

top: monitor processes even better 65

The /proc filesystem 65

strace: trace signals and system calls 66

Runaway processes 67

Recommended reading 69

Exercises 69

Chapter 5: The Filesystem 70

Pathnames 72

Filesystem mounting and unmounting 73

The organization of the file tree 75

File types 76

File attributes 81

Access control lists 88

Exercises 92

Chapter 6: Adding New Users 93

The /etc/passwd file 93

The /etc/shadow file 99

The /etc/group file 101

Adding users 102

Removing users 107

Disabling logins 108

Managing accounts 108

Exercises 110

Chapter 7: Adding a Disk 111

Disk interfaces 111

Disk geometry 119

Linux filesystems 120

An overview of the disk installation procedure 122

hdparm: set IDE interface parameters 129

fsck: check and repair filesystems 131

Adding a disk: a step-by-step guide 133

Advanced disk management: RAID and LVM 138

Mounting USB drives 147

Exercises 148

Chapter 8: Periodic Processes 150

cron: schedule commands 150

The format of crontab files 151

Crontab management 153

Some common uses for cron 154

Other schedulers: anacron and fcron 156

Exercises 157

Chapter 9: Backups 158

Motherhood and apple pie 159

Backup devices and media 163

Setting up an incremental backup regime with dump 169

Restoring from dumps with restore 173

Dumping and restoring for upgrades 176

Using other archiving programs 177

Using multiple files on a single tape 178

Bacula 179

Commercial backup products 197

Recommended reading 198

Exercises 198

Chapter 10: Syslog and Log Files 201

Logging policies 201

Linux log files 204

logrotate: manage log files 208

Syslog: the system event logger 209

Condensing log files to useful information 220

Exercises 222

Chapter 11: Software and Configuration Management 223

Basic Linux installation 223

Diskless clients 232

Package management 234

High-level package management systems 237

Revision control 247

Localization and configuration 255

Configuration management tools 260

Sharing software over NFS 263

Recommended software 266

Recommended reading 268

Exercises 268

Section Two: Networking 269 Chapter 12: TCP/IP Networking 271

TCP/IP and the Internet 272

Networking road map 275

Packets and encapsulation 276

IP addresses: the gory details 282

Routing 293

ARP: the address resolution protocol 296

Addition of a machine to a network 297

Distribution-specific network configuration 307

DHCP: the Dynamic Host Configuration Protocol 311

Dynamic reconfiguration and tuning 314

Security issues 316

Linux NAT 319

PPP: the Point-to-Point Protocol 320

Linux networking quirks 330

Recommended reading 331

Exercises 332

Chapter 13: Routing 334

Packet forwarding: a closer look 335

Routing daemons and routing protocols 337

Protocols on parade 341

routed: RIP yourself a new hole 343

gated: gone to the dark side 344

Routing strategy selection criteria 344

Cisco routers 346

Recommended reading 348

Exercises 349

Chapter 14: Network Hardware 350

LAN, WAN, or MAN? 351

Ethernet: the common LAN 351

Wireless: nomad’s LAN 359

FDDI: the disappointing, expensive, and outdated LAN 361

ATM: the promised (but sorely defeated) LAN 362

Frame relay: the sacrificial WAN 363

ISDN: the indigenous WAN 364

DSL and cable modems: the people’s WAN 364

Where is the network going? 365

Network testing and debugging 366

Building wiring 366

Network design issues 368

Management issues 370

Recommended vendors 371

Recommended reading 372

Exercises 372

Chapter 15: DNS: The Domain Name System 373

DNS for the impatient: adding a new machine 374

The history of DNS 375

Who needs DNS? 377

The DNS namespace 378

How DNS works 383

What’s new in DNS 386

The DNS database 389

The BIND software 409

Designing your DNS environment 415

BIND client issues 418

BIND server configuration 420

BIND configuration examples 439

Starting named 446

Updating zone files 447

Security issues 451

Testing and debugging 466

Distribution specifics 478

Recommended reading 481

Exercises 482

Chapter 16: The Network File System 484

General information about NFS 484

Server-side NFS 489

Client-side NFS 492

nfsstat: dump NFS statistics 495

Dedicated NFS file servers 496

Automatic mounting 497

Recommended reading 500

Exercises 501

Chapter 17: Sharing System Files 502

What to share 503

nscd: cache the results of lookups 504

Copying files around 505

NIS: the Network Information Service 511

LDAP: the Lightweight Directory Access Protocol 520

Recommended reading 526

Exercises 527

Chapter 18: Electronic Mail 528

Mail systems 530

The anatomy of a mail message 534

Mail philosophy 539

Mail aliases 544

Mailing lists and list wrangling software 551

sendmail: ringmaster of the electronic mail circus 557

sendmail configuration 565

Basic sendmail configuration primitives 570

Fancier sendmail configuration primitives 574

Spam-related features in sendmail 588

Configuration file case study 599

Security and sendmail 603

sendmail performance 611

sendmail statistics, testing, and debugging 615

The Exim Mail System 621

Postfix 623

Recommended reading 639

Exercises 640

Chapter 19: Network Management and Debugging 643

Network troubleshooting 644

ping: check to see if a host is alive 645

traceroute: trace IP packets 647

netstat: get network statistics 649

sar: inspect live interface activity 654

Packet sniffers 655

Network management protocols 657

SNMP: the Simple Network Management Protocol 659

The NET-SMNP agent 661

Network management applications 662

Recommended reading 667

Exercises 668

Chapter 20: Security 669

Is Linux secure? 670

How security is compromised 671

Certifications and standards 673

Security tips and philosophy 676

Security problems in /etc/passwd and /etc/shadow 678

POSIX capabilities 683

Setuid programs 683

Important file permissions 684

Miscellaneous security issues 685

Security power tools 688

Cryptographic security tools 694

Firewalls 701

Linux firewall features: IP tables 704

Virtual private networks (VPNs) 708

Hardened Linux distributions 710

What to do when your site has been attacked 710

Sources of security information 712

Recommended reading 715

Exercises 716

Chapter 21: Web Hosting and Internet Servers 719

Web hosting basics 720

HTTP server installation 724

Virtual interfaces 727

The Secure Sockets Layer (SSL) 730

Caching and proxy servers 733

Anonymous FTP server setup 734

Exercises 736

Section Three: Bunch O’ Stuff 739

Chapter 22: The X Window System 741

The X display manager 743

Running an X application 744

X server configuration 748

Troubleshooting and debugging 754

A brief note on desktop environments 757

Recommended Reading 759

Exercises 759

Chapter 23: Printing 761

Printers are complicated 762

Printer languages 763

CUPS architecture 767

CUPS server administration 772

Troubleshooting tips 780

Printer practicalities 782

Other printer advice 784

Printing under KDE 788

Recommended reading 790

Exercises 790

Chapter 24: Maintenance and Environment 791

Hardware maintenance basics 791

Maintenance contracts 792

Electronics-handling lore 793

Monitors 794

Memory modules 794

Preventive maintenance 795

Environment 796

Power 798

Racks 799

Data center standards 800

Tools 800

Recommended reading 800

Exercises 802

Chapter 25: Performance Analysis 803

What you can do to improve performance 804

Factors that affect performance 806

System performance checkup 807

Help! My system just got really slow! 817

Recommended reading 819

Exercises 819

Chapter 26: Cooperating with Windows 821

Logging in to a Linux system from Windows 821

Accessing remote desktops 822

Running Windows and Windows-like applications 825

Using command-line tools with Windows 826

Windows compliance with email and web standards 827

Sharing files with Samba and CIFS 828

Sharing printers with Samba 836

Debugging Samba 840

Recommended reading 841

Exercises 842

Chapter 27: Serial Devices 843

The RS-232C standard 844

Alternative connectors 847

Hard and soft carrier 852

Hardware flow control 852

Cable length 853

Serial device files 853

setserial: set serial port parameters 854

Software configuration for serial devices 855

Configuration of hardwired terminals 855

Special characters and the terminal driver 859

stty: set terminal options 860

tset: set options automatically 861

Terminal unwedging 862

Modems 862

Debugging a serial line 864

Other common I/O ports 865

Exercises 866

Chapter 28: Drivers and the Kernel 868

Kernel adaptation 869

Drivers and device files 870

Why and how to configure the kernel 873

Tuning Linux kernel parameters 874

Building a Linux kernel 876

Adding a Linux device driver 878

Loadable kernel modules 880

Hot-plugging 882

Setting bootstrap options 883

Recommended reading 884

Exercises 884

Chapter 29: Daemons 885

init: the primordial process 886

cron and atd: schedule commands 887

xinetd and inetd: manage daemons 887

Kernel daemons 893

Printing daemons 894

File service daemons 895

Administrative database daemons 896

Electronic mail daemons 897

Remote login and command execution daemons 898

Booting and configuration daemons 898

Other network daemons 900

ntpd: time synchronization daemon 902

Exercises 903

Chapter 30: Management, Policy, and Politics 904

Make everyone happy 904

Components of a functional IT organization 906

The role of management 907

The role of administration 915

The role of development 919

The role of operations 924

The work of support 927

Documentation 930

Request-tracking and trouble-reporting systems 934

Disaster recovery 938

Written policy 943

Legal Issues 949

Software patents 957

Standards 958

Linux culture 961

Mainstream Linux 962

Organizations, conferences, and other resources 964

Recommended Reading 968

Exercises 970

Index 973 About the Contributors 999 About the Authors 1001

Read More Show Less

Preface

Preface

Linux is a relatively new operating system in the world of computing. Born in the early 1990s, it has enjoyed tremendous publicity and support from the open source community. In many ways, Linux has come to represent the antimatter of an otherwise Microsoft-centric universe.

Despite Linux's many achievements, it has yet to gain full acceptance in the world of "production computing." Once synonymous with big-iron mainframes, this environment is a world in which a few minutes of downtime can cost millions of dollars, dozens of jobs, or in extreme cases, lives.

We think it's about time that Linux was accepted as a fully ordained member of this community. However, such acceptance can only develop with the help of a cavalry of professional Linux system administrators.

We set out to write a book that would be the professional Linux system administrator's best friend. Where appropriate, we've adapted the proven concepts and materials from our popular book, UNIX System Administration Handbook. We've added a truckload of Linux-specific material and updated the rest, but much of the coverage remains similar. We hope you agree that the result is a high-quality guide to Linux administration that benefits from its experience in a past life.

There are other books on Linux system administration, but none that provide the breadth and depth of material necessary to effectively use Linux in real-world business environments. Here are the features that distinguish our book:

  • We take a practical approach. Our purpose is not to restate the contents of your manuals but rather to summarize our collective experience in system administration. This bookcontains numerous war stories and a wealth of pragmatic advice.
  • This is not a book about how to run Linux at home, in your garage, or on your PDA. We describe the use of Linux in production environments such as businesses, government offices, and universities.
  • We cover Linux networking in detail. It is the most difficult aspect of system administration and the area in which we think we can be of most help.
  • We do not oversimplify the material. Our examples reflect true-life situations with all their warts and unsightly complications. In most cases, the examples have been taken directly from production systems.
  • We cover three major Linux distributions.

Our example distributions

Like so many operating systems, Linux has grown and branched in several different directions. Although development of the kernel has remained surprisingly centralized, packaging and distribution of complete Linux operating systems is overseen by a variety of groups, each with its own agenda.

We cover three Linux distributions in detail:

  • Red Hat 7.2
  • SuSE 7.3
  • Debian 3.0

We chose these distributions because they are among the most popular and because they are representative of the Linux community as a whole. However, much of the material in this book applies to other mainstream distributions as well.

We provide detailed information about each of these example distributions for every topic that we discuss. Comments specific to a particular operating system are marked with the distribution's logo.

The organization of this book

This book is divided into three large chunks: Basic Administrat Stuff.

Basic Administration provides a broad overview of Linux from a system administrator's perspective. The chapters in this section cover most of the facts and techniques needed to run a stand-alone Linux system.

The Networking section describes the protocols used on Linux systems and the techniques used to set up, extend, and maintain networks. High-level network software is also covered here. Among the featured topics are the Domain Name System, the Network File System, routing, sendmail, and network management.

Bunch o' Stuff includes a variety of supplemental information. Some chapters discuss optional software packages such as the Linux printing system. Others give advice on topics ranging from hardware maintenance to the politics of running a Linux installation.

Each chapter is followed by set of practice exercises. Items are marked with our estimate of the effort required to complete them, where "effort" is an indicator of both the difficulty of the task and the time required.

There are four levels:

no stars Easy, should be straightforward
* Harder or longer, may require lab work
** Hardest or longest, requires lab work and digging
***** Semester-long projects (only in a few chapters)

Some of the exercises require root or sudo access to the system; others require the permission of the local sysadmin group. Both requirements are mentioned in the text of the exercise.

Our contributors

We're deligh contributing authors. Their deep knowledge of a variety of areas has greatly enriched the content of this book. We owe them special thanks for making this book possible. Adam did a wonderful job delivering more than he promised, Matt was a master of pulling a high-quality rabbit out of a hat, and Ned was our much needed (and always enthusiastic) jack-of-all-trades.

Read More Show Less

Customer Reviews

Average Rating 5
( 5 )
Rating Distribution

5 Star

(5)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 – 6 of 5 Customer Reviews
  • Anonymous

    Posted April 21, 2007

    Invaluable, and should be in all linux system admin's toolbox

    As a Linux system admin myself there are a lot of commands that you know of but you can never remember all of them. I forget commands often and this book is also great as a memory refresher. It goes into the general aspects of daily tasks that any sys admin is expected to perform. Great tool for any linux user. Yes I know the color of the book is pink and the drawing is tacky 'looks like a 3rd grader drew it'. But don't judge this book by its cover, It includes a wide range of scenarios and how to perform them optimally. Also great as a student textbook since it has exercises at the end of each chapter. Its an invaluable tool in any system admin's toolbox.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted November 24, 2006

    comprehensive explanations

    [A review of the 2nd EDITION, published in 2006.] Ok, the back cover has an endorsement, 'The most successful sysadmin book of all time'. This is hyperventilating that you might not want to take literally. But having said that, the text is a very comprehensive distillation of what a linux sysadmin could be expected to perform. Crucial tasks like backup, adding users and disks, and understanding the makeup of the linux filesystem are explained in detail. Not quite to the depth that you can modify the actual source code of a linux implementation but that is far more specialised knowledge for other texts. Another interesting aspect is the analysis of various network protocols. It dumps on FDDI, ATM, Frame Relay and [to a lesser extent] ISDN. The authors have quite strong opinions on the failings of those protocols. Quite a contrast to networking books that might give these protocols much technical explanations, but not divulge the drawbacks that emerged when the protocols were deployed. Unlike many sysadmin books, this one also has exercises in each chapter, that expand on the chapter's themes.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Posted February 20, 2010

    Great book for sysadmins and power users alike!

    As a reader of the original Unix admin book by the same authors, I can truly affirm that they have continued to author a highly detailed sysadmin guide that will come in handy to admins of all levels (with comedic asides to boot...forgive the pun :-)). Admins will most likely look for this book before any others to answer questions or look for examples to get through many situations.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 15, 2009

    No text was provided for this review.

  • Anonymous

    Posted November 21, 2009

    No text was provided for this review.

  • Anonymous

    Posted January 21, 2010

    No text was provided for this review.

Sort by: Showing 1 – 6 of 5 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)