Red Hat Enterprise Linux 5 Administration

( 4 )


This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging. Long-time Red Hat insider Tammy Fox brings together todays best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how to maximize your efficiency and effectiveness by automating day-to-day maintenance through scripting, deploying security updates via Red Hat Network, implementing central...

See more details below
$43.25 price
(Save 21%)$54.99 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (24) from $1.99   
  • New (6) from $32.18   
  • Used (18) from $1.99   
Red Hat Enterprise Linux Administration Unleashed

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac

Want a NOOK? Explore Now

NOOK Book (eBook)
$25.49 price
(Save 42%)$43.99 List Price


This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging. Long-time Red Hat insider Tammy Fox brings together todays best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how to maximize your efficiency and effectiveness by automating day-to-day maintenance through scripting, deploying security updates via Red Hat Network, implementing central identity management services, and providing shared data with NFS and Samba. Red Hat Enterprise Linux 5 Administration Unleashed contains extensive coverage of network and web services, from the Apache HTTP server and Sendmail email services to remote login with OpenSSH. Fox also describes Red Hats most valuable tools for monitoring and optimization and presents thorough coverage of security—including a detailed introduction to Security-Enhanced Linux (SELinux).
• Streamline deployment with Kickstart
• Find, install, update, remove, and verify software
• Detect, analyze, and manage hardwareManage storage with LVM, RAID, ACLs, and quotas
• Use Red Hat Enterprise Linux 5 on 64-bit and multi-core systemsAdminister users and groups more efficiently and securely
• Ensure trustworthy backup and rapid recovery
• Script and schedule tasks to run automatically
• Provide unified identity management services
• Configure Apache, BIND, Samba, and Sendmail
• Monitor and tune the kernel and individual applications
• Protect against intruders with SELinux and ExecShield
• Set up firewalls with iptablesEnable the Linux Auditing System
• Use virtualization to run multiple operating systems concurrently

Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
Red Hat "Enterprise" Linux is just that: Linux that's perfectly at home in organizations of any size, including the largest. But to administer RHEL in enterprise environments, you need to master techniques that'll scale to the enterprise. Those are the skills Tammy Fox presents in Red Hat Enterprise Linux Administration Unleashed.

So, Fox's installation and configuration section focuses heavily on deploying multiple systems via kickstart scripts. Her coverage of system administration offers best practices for building enterprise-class user databases, and writing automated scripts to streamline large-scale administration and backup.

She offers deep coverage of both monitoring and security, too, including a thorough introduction to using Security-Enhanced Linux, and a useful appendix on preventing breaches with ExecShield. She even gets you started with RHEL5's new virtualization features -- and if there's anything hotter in the enterprise than virtualization, we'd like to know what it is. Bill Camarda, from the June 2007 Read Only

Read More Show Less

Product Details

  • ISBN-13: 9780672328923
  • Publisher: Sams
  • Publication date: 5/4/2007
  • Series: Unleashed Series
  • Pages: 597
  • Sales rank: 1,516,255
  • Product dimensions: 7.00 (w) x 9.12 (h) x 1.30 (d)

Meet the Author

Tammy Fox has been using Linux for programming, writing, system administration, and all day-to-day computer tasks for more than 10 years. From 2000 until 2005, she worked for Red Hat as a technical writer, team lead, programmer, build script maintainer, magazine editor, and marketing project manager. During her time in documentation, she created a new manual, the Red Hat Linux Customization Guide, which eventually became the Red Hat Enterprise Linux System Administration Guide. She also wrote and contributed to the Red Hat configuration tools, including writing Red Hat Logviewer. Before joining Red Hat, Tammy co-wrote and taught Linux integration and performance classes for a leading computer manufacturer. She has also been a computer consultant for leading computer communication companies.

Tammy has founded three efforts to continue the education of Linux users. She is the founding editor of Red Hat Magazine, which continues to be an online publication. She is also the founding leader of the Fedora Docs Project, acting as the organizer, a writer, and an editor. And she continues to provide free online content for new Linux users with her website, which was established with her husband in 2000.

Read More Show Less

Table of Contents

Part I Installation and Configuration

Chapter 1 Installing Red Hat Enterprise Linux

Choosing an Installation Method

Creating the Installation Source

Starting the Installation

Performing the Installation

Installing with Kickstart

Installing with PXE

Performing an Upgrade

Red Hat Network Provisioning


Chapter 2 Post-Installation Configuration

Red Hat Setup Agent

Logging In for the First Time

Network Configuration

Printer Configuration

Adding Boot Parameters


Chapter 3 Operating System Updates

Navigating Through the RHN Website

Assigning Users for the RHN Website

Subscribing to RHN Channels

Performing Actions on Individual Systems from the RHN Website

Using System Groups on the RHN Website

Retrieving Software from RHN with YUM


Part II Operating System Core Concepts

Chapter 4 Understanding Linux Concepts

Learning the Desktop

Filesystem Hierarchy System

Shell Basics

Becoming the Root User

Manual Pages

Editing Text Files

File Permissions

Initialization Scripts



Chapter 5 Working with RPM Software

Understanding How RPM Works

Finding the Software

Installing Software

Updating Software

Removing Software

Verifying Software Files

Querying Package Files

Building RPM Packages


Chapter 6 Analyzing Hardware

Listing Devices

Detecting Hardware

Gathering Information from the BIOS

Listing and Configuring Kernel Modules



Chapter 7 Managing Storage

Understanding Partitioning

Understanding LVM

Understanding RAID

Understanding Clustering and GFS

Using Access Control Lists

Using Disk Quotas


Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors

64-Bit Processors

Multi-Core Processors

Processors with Hyper-Threading Technology


Part III System Administration

Chapter 9 Managing Users and Groups

What Are Users and Groups?

Managing Users

Managing Groups

How It All Works

Best Practices


Chapter 10 Techniques for Backup and Recovery

Writing a Backup Plan

Using Amanda for Backups

Other Linux Backup Utilities

Recovery and Repair


Chapter 11 Automating Tasks with Scripts

Writing Scripts with Bash

Additional Scripting Languages

Scheduling Tasks with Cron


Part IV Network Services

12 Identity Management

Understanding PAM

Enabling NIS

Enabling LDAP

Enabling Kerberos

Enabling SMB or Winbind Authentication

Enabling with the Authentication Tool


Chapter 13 Network File Sharing

Network File System

Samba File Sharing


Chapter 14 Granting Network Connectivity with DHCP

Allowing Connections

Configuring the Server

Logging Connections


Chapter 15 Creating a Web Server with the Apache HTTP Server

Apache HTTP Server and SELinux

Allowing Connections

Configuring the Server

Logging Connections

Starting and Stopping the Server


Chapter 16 Hostname Resolution with BIND

Understanding DNS Concepts

Allowing Connections

Configuring BIND

Configuring BIND Graphically

Logging Connections


Chapter 17 Securing Remote Logins with OpenSSH

Allowing Connections

Configuring the Server

Connecting from the Client

Logging Connections


Chapter 18 Setting Up an Email Server with Sendmail

Understanding Email Concepts

Configuring Sendmail

Using POP and IMAP

Logging Sendmail Connections

Allowing Email Connections


Chapter 19 Explaining Other Common Network Services

The xinetd Super Server

Keeping Accurate Time with NTP

Creating a Network Printer with CUPS


Part V Monitoring and Tuning

Chapter 20 Monitoring System Resources

Reporting Filesystem Usage

Reporting Disk Performance

Reporting System Processes

Reporting on the System Processors

Reporting Memory Usage

Reporting on the Network Subsystem

Generating a System Report

Locating Log Files

Viewing Log Files with Logwatch


Chapter 21 Monitoring and Tuning the Kernel

Using the /proc Directory .

Optimizing Virtual Memory

Managing Memory with NUMA

Using AltSysRq to Execute System Requests

Saving Kernel Dumps for Analysis

Setting SMP IRQ Affinity

Enabling NMI Watchdog for Locked Systems


Chapter 22 Monitoring and Tuning Applications



Additional Programs to Consider


Chapter 23 Protecting Against Intruders with Security-Enhanced Linux

Selecting an SELinux Mode

Selecting and Customizing the SELinux Policy

Utilizing the SELinux Troubleshooting Tool

Working with Security Contexts


Chapter 24 Configuring a Firewall

Selecting a Table and Command for IPTables

Selecting IPTables Options

Using IPTables Match Extensions

Using IPTables Target Extensions

Starting and Stopping the IPTables Service

Saving the IPTables Rules

IPTables Examples

Enabling the Default Firewall


Chapter 25 Linux Auditing System

Configuring the Audit Daemon

Writing Audit Rules and Watches

Starting and Stopping the Daemon

Analyzing the Records

Tracing a Process with Audit



Appendix A Installing Proprietary Kernel Modules

Installing Proprietary Modules

Installing the nVidia Display Driver

Recognizing a Tainted Kernel

Appendix B Creating Virtual Machines

Virtualization System Requirements

Installing Virtualization

Setting Up the VM and Installing the Guest OS

Introducing the virsh Command

Starting and Stopping the Virtual Machine

Modifying Dedicated Resources

Performing Additional Actions

Managing VMs with the xm Utility

Appendix C Preventing Security Breaches with ExecShield 547

How ExecShield Works

Determining Status of ExecShield

Disabling ExecShield

Appendix D Troubleshooting

Installation and Configuration Troubleshooting

OS Core Concepts Troubleshooting

System Administration Troubleshooting

Network Troubleshooting

Monitoring and Tuning Troubleshooting

Security Troubleshooting

Read More Show Less

Customer Reviews

Average Rating 4
( 4 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 4 Customer Reviews
  • Anonymous

    Posted May 9, 2007

    A reviewer

    Fox's book is perhaps best suited for a sysadmin with some earlier background in any flavour of unix or linux. If you are coming in totally raw to linux, the style of managing this Red Hat version may take some getting used to. Unlike Microsoft's operating systems, the user interfaces available under Red Hat might seem a little sparse. Though to be fair to Red Hat, they've been assiduously building out the UI. A lot of the sysadmin tasks covered in the text are at the command line. The main linux concepts are well covered. Including that of run level, to which a system will boot into. A nice feature that unixes of 10 years ago often lacked. Another powerful feature is the making of partitions on a hard disk. A fundamental utility that, frankly, you should not often need. But sometimes you do, when installing a new disk. Or when trying to recover from a crashed disk. Poring over the text, it was nice to see respectful mention given to vi and emacs. These long predate the fancy text editors that Microsoft [and others] came up with. But you can run these under a vanilla text terminal, and they are very lightweight. Without getting into a long running debate as to which of vi or emacs is more useful, you should try to learn one. It doesn't really matter which. If you are going to be maintaining a linux box, there will be times when you have no graphics available, and you need to edit some text file. Readers who are familiar with Macs might notice that the book has little coverage of video and audio. The Mac runs a version of unix that has applications specially built for those. Whereas Red Hat is for generic linux uses.

    1 out of 2 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted September 26, 2008

    Not Enough Practice Information

    There are too much stuff, to comprehend in short period of time. Not enough of practice examples. It was not useful in helping me prepare for my Red Hat Enterprise Certification Exam.

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted March 15, 2009

    No text was provided for this review.

  • Anonymous

    Posted May 3, 2010

    No text was provided for this review.

Sort by: Showing all of 4 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)