BN.com Gift Guide

Principles of Network and System Administration / Edition 2

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $7.99
Usually ships in 1-2 business days
(Save 89%)
Other sellers (Paperback)
  • All (16) from $7.99   
  • New (6) from $60.15   
  • Used (10) from $7.99   
Close
Sort by
Page 1 of 2
Showing 1 – 10 of 16 (2 pages)
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$7.99
Seller since 2014

Feedback rating:

(7)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

Good
2004 Paperback Good Connecting readers with great books since 1972. Used books may not include companion materials, some shelf wear, may contain highlighting/notes, and may not ... include cd-rom or access codes. Customer service is our top priority! Read more Show Less

Ships from: Watauga, TX

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$11.00
Seller since 2009

Feedback rating:

(1837)

Condition: Acceptable
2004 Paperback Fair CONTAINS WATER DAMAGE / STAIN, STILL VERY READABLE, SAVE! This item may not include any CDs, Infotracs, Access cards or other supplementary material.

Ships from: Lincoln, NE

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$11.00
Seller since 2009

Feedback rating:

(3466)

Condition: Good
Ships same day or next business day! UPS expedited shipping available (Priority Mail for AK/HI/APO/PO Boxes). Used sticker & some writing and/or highlighting. Used books may not ... include working access code or dust jacket Read more Show Less

Ships from: Columbia, MO

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$24.94
Seller since 2008

Feedback rating:

(17785)

Condition: Acceptable
Used, Acceptable Condition, may show signs of wear and previous use. Please allow 4-14 business days for delivery. 100% Money Back Guarantee, Over 1,000,000 customers served.

Ships from: Westminster, MD

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$25.78
Seller since 2009

Feedback rating:

(10551)

Condition: Good
Used - Very Good Book. Shipped from US within 4 to 14 business days. Established seller since 2000

Ships from: Secaucus, NJ

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$32.95
Seller since 2014

Feedback rating:

(19)

Condition: Good
Hoboken, NJ 2004 Trade paperback 2nd Revised ed. Good. Trade paperback (US). Glued binding. 646 p. Contains: Illustrations, black & white.

Ships from: Pueblo West, CO

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$36.68
Seller since 2005

Feedback rating:

(49494)

Condition: Very Good
Ships same day or next business day via UPS (Priority Mail for AK/HI/APO/PO Boxes)! Used sticker and some writing and/or highlighting. Used books may not include working access ... code or dust jacket. Read more Show Less

Ships from: Columbia, MO

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$51.53
Seller since 2008

Feedback rating:

(196)

Condition: Good
"Wear, markings, labels from previous ownership. "

Ships from: Naperville, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$60.15
Seller since 2008

Feedback rating:

(4518)

Condition: New
New Book. Shipped from UK within 4 to 14 business days. Established seller since 2000.

Ships from: Horcott Rd, Fairford, United Kingdom

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$60.64
Seller since 2010

Feedback rating:

(6)

Condition: Very Good
Very good 1 volume, please be aware of language, air mail shipment from Germany within 2-6 weeks, we deliver to any country-please ask us to enable delivery to your country! ... *****PLEASE NOTE: This item is shipping from an authorized seller in Europe. In the event that a return is necessary, you will be able to return your item within the US. To learn more about our European sellers and policies see the BookQuest FAQ section***** Read more Show Less

Ships from: Berlin, Germany

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 2
Showing 1 – 10 of 16 (2 pages)
Close
Sort by

Overview

  • A single, comprehensive resource that responds to the high demand for specialists who can provide advice to users and handle day-to-day administration, maintenance, and support of computer systems and networks
  • Author approaches both network and system administration from the perspective of the principles that do not change on a day-to-day basis
  • Shows how to discover customer needs and then use that information to identify, interpret, and evaluate system and network requirements
  • New coverage includes Java services and Ipv6
Read More Show Less

Editorial Reviews

From the Publisher
A well-written and important book, "one of the best in the genre", says our reviewer.

Textbooks are not always just for the classroom. Sometimes, they're for holding up bookcases, large pots with plants in them and for keeping doors/windows open. Occasionally, they are the treasure chests of information a soul requires to do something for the betterment of self, system and/or network.

This little book will improve all three. Principles of Network and System Administration is neither big nor flashy, but it is probably one of the best works in the genre. It builds on an extensive body of work by others in the field and pulls the information together in such a way that the material is easily comprehended and absorbed. Burgess' writing is clear and engaging, something few textbooks achieve.

Burgess approaches both network and system administration from the perspective of "those principles and ideas of system administration which do not change on a day-to-day basis..." (from the Preface). The first principle Burgess sets out has to do with permissions:

Restriction of unnecessary privilege protects a system from accidental and malicious damage, and infection by viruses, and prevents users from concealing their actions with false identities. It is desirable to restrict users' privileges for the greater good of everyone on the network.

Burgess pays particular attention to the effects of given actions on the networked community, whether that network is a LAN or the Internet. We live in an age of networks, where what one user does most certainly and directly affects others on-line. This theme runs throughout the book, particularly in discussions of security, access to resources, data separation and permissions. The balance between individual users' rights and the needs of the community must be carefully weighed and balanced by the system/network administrator.

Highlights

Security is thoroughly discussed in two consecutive chapters. "Chapter 9: Principles of Security" covers a gamut of topics ranging from the physical security of a system to an overview of some common network attacks. Burgess nicely sums up the four basic elements of security (privacy, authentication, trust and integrity) and binds them to the underlying principle of security: "The fundamental requirement for security is the ability to restrict access and privilege to data."

By access, the author means those events that can corrupt/remove data, i.e., electrical storms, accidents and the like. If these events don't have access to data (because the data and/or backups are stored separately from where the effects of these events are likely to be felt) the data is partially secure; if users' privileges are guarded and enforced, the data is more secure still.

Burgess pays perhaps more attention than many of his author colleagues to the human factor in system and network administration, the sociology of computer users. He raises the question of security vs. user convenience, pointing out that inconvenient security measures will be more likely to be circumvented by users than be effective.

The same principle applies to overly conspicuous security measures in the face of an accomplished cracker. Security measures must be taken, but to make them obvious frequently serves as a temptation for the malicious user to get around a barrier to what (being so well-protected) may just be very valuable information. Then again, the pay-off for such a user may merely be bragging rights. The system's administrator is advised to verify such claims first, deal with the situation methodically and avoid panic altogether.

Chapter 10 deals thoroughly with security implementation, from analysis of network security, to WWW security, to intrusion detection and forensics. Again, the specifics of methodology are not the issue, but the reasoning used in setting up protected systems appropriately is. A Word of Caution

If you don't come to systems administration from a scientific/mathematical background, you'll want to have a good math reference or two while going through "Chapter 11: Analytical System Administration". There are several references to statistical and calculus formulae that are better understood, and even implemented, if the reader has a faint idea of what Burgess is doing with the numbers.This is not to disparage the chapter at all. Evidence collection is a requirement of systems administrators if policies are to have any relationship to (or bearing on) user behavior or that of hardware and software performance over a period of time.

Little Extras

In addition to his focus on Linux/FreeBSD, Burgess also shows a strong appreciation for, and understanding of, the value of cfengine as the system administrator's "best friend". While its entries in the index are inaccurate, cfengine is well-delineated on pages 144-145, and again on pages 158-159. Especially nice is his description of how cfengine can be used simply by setting up its time classes to work as a user interface for cron, as a sort of front end with a variety of scripts as required. Pages 385-392 cover the use of cfengine in programming/automating tasks.

As an educator at Oslo College, Norway, Burgess demonstrates an alternate application of Principle 50, which states: "Every change or effect happens in response to a cause, which provokes it." Exercises at the end of each chapter are geared to grounding the reader in both theory and practice of network/system administration.

Appendix C contains introductions to, and brief code snippets of, several common scripting languages (PHP, HTML, Perl and CGI), as well as make. Useful if you're system administrator for a server!

Conclusion

Burgess has presented a work that pays great attention to the heuristics of system and network administration; technical and sociological issues are taken into account equally and are presented thoughtfully with an eye to teaching not what to do as a system or network administrator, but how to think about problems that arise in the practice. As a result, the author keeps the reader looking forward to what comes next and to actually implementing what he or she has learned.

(Stephanie Black,LinuxJournal.com, December 4, 2001)

Read More Show Less

Product Details

  • ISBN-13: 9780470868072
  • Publisher: Wiley
  • Publication date: 3/1/2004
  • Edition description: New Edition
  • Edition number: 2
  • Pages: 646
  • Product dimensions: 7.50 (w) x 9.25 (h) x 1.30 (d)

Meet the Author

MARK BURGESS is associate professor at Oslo University College, Norway, and a member of SAGE, USENIX and the IEEE. He is an internationally respected scientist both in Computer Science and the Theoretical Physics and has won various prizes for his work on Computer Immunology and GNU cfengine. He was recently awarded The SAGE 2003 Professional Contribution Award, "For groundbreaking work in systems administration theory and individual contributions to the field".

Read More Show Less

Table of Contents

Preface to Second Edition.

1. Introduction.

2. System Components.

3. Networked Communities.

4. Host Management.

5. User Management

6. Models of Network and System Administration.

7. Configuration and Maintenance.

8. Diagnostics, Fault and Change Management.

9. Application Level Services.

10. Network Level Services.

11. Principles of Security.

12. Security Implications.

13. Analytical System Administration.

14. Summary and Outlook.

A. Some Useful Unix Commands.

B. Programming and Compiling.

C. Example Telnet Session.

D. Glossary.

E. Recommended Reading.

Bibliography.

Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)