Red Hat Linux System Administration Unleashed


Red Hat Linux System Administration Unleashed shows you how to configure and manage a Linux system to keep it running optimally in a 24x7 environment. The book covers advanced topics such as RAID, customizing the kernel, and hacker security. You will also learn the issues and skills related to running Red Hat Linux with other operating systems, internetworking Linux in a network setting with a large user base. Topics include file system and disk management, backups and disaster recovery, networking in NT, NetWare...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (11) from $2.05   
  • New (1) from $60.81   
  • Used (10) from $2.05   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any coupons and promotions
Seller since 2008

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.


Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Sort by
Sending request ...


Red Hat Linux System Administration Unleashed shows you how to configure and manage a Linux system to keep it running optimally in a 24x7 environment. The book covers advanced topics such as RAID, customizing the kernel, and hacker security. You will also learn the issues and skills related to running Red Hat Linux with other operating systems, internetworking Linux in a network setting with a large user base. Topics include file system and disk management, backups and disaster recovery, networking in NT, NetWare and Unix environments, shells and scripting, Internet services, and more.
  • Provides the core information you need to know to administer any system that includes Red Hat Linux
  • Provides the Unix administrator a quick path to become a Linux administrator by comparing Linux with commercial Unix flavors throughout the book
  • CD-ROM contains Linux Power Tools and administration software
Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
With the explosion of Red Hat Linux usage in production environments, there's a need for a soup-to-nuts, real-world guide to Red Hat administration. This book delivers. In 1,110 pages, Thomas Schenk and his colleagues cover all your day-to-day sysadmin tasks — and the ones we hope you'll rarely encounter.

Need to make backups? Schenk walks you through choosing backup strategies and media, and comparing Linux backup software; he even offers specific tar and dd commands. Need to interoperate with NetWare? You'll learn how to make your Linux server provide NetWare file and print services transparently. (Of course, there's detailed Samba coverage, too, for integrating with Windows networks.) Want to keep pirate "warez d00dz" out of your FTP directories? You'll find practical techniques for server traffic baselining and analyzing your server content.

Need to troubleshoot system failures, or NIC card problems? Made the mistake of upgrading Windows on a dual boot system, and now LILO is gone? Need to construct a software-based RAID array? The answers are here when you need them. You'll also find in-depth coverage of security and firewalls, performance tuning, kernel customization, and Internet services — even topics like Internet telephony and multimedia conferencing, which most Linux sysadmin books omit.

We've only scratched the surface: for the Linux system administrator, this book is a goldmine of solutions.
Bill Camarda, editor

Provides the core information a system administrator needs to know to administer any system that includes Caldera OpenLinux. Schenk (systems engineer at VA Linux) tells how to understand the ins and outs of system administration; implement the correct Red Hat Linux tools at the right time; create installation templates, diagnose and fix system and hardware component failures; find effective ways to manage space usage and quotas; incorporate RAID technology; back-up; choose the best media selection and storage; create a disaster recovery plan; integrate Linux with other network operating systems; evaluate and implement effective security procedures; and how to cope with hacking. The included CD-ROM contains Thomas Oehser's Root Boot Rescue Disk, the nmap network mapping utility, and Radiusd-cistron dial-in authentication daemon. Annotation c. Book News, Inc., Portland, OR (
From The Critics
Exceptionally informative, well presented and very highly recommended, Red Hat Linux System Administration Unleashed shows readers how to configure and manage a Linux system to keep it running optimally in a 24x7 environment. The book covers advanced topics such as RAID, customizing the kernel, and hacker security. Readers will also learn the issues and skills related to running Red Hat Linux with other operating systems, internetworking Linux in a network setting with a large user base. Intermediate - Advanced, 1100 pages.
Read More Show Less

Product Details

  • ISBN-13: 9780672317552
  • Publisher: Sams
  • Publication date: 6/27/2000
  • Series: Unleashed Series
  • Edition description: Book & CD-ROM
  • Pages: 1272
  • Product dimensions: 7.40 (w) x 9.00 (h) x 2.60 (d)

Meet the Author

Thomas Schenk is a Systems Engineer at VA Linux in its professional services division, where he serves as a consultant to VA Linux customers in the areas of system administration, tools programming, and managing large Linux installations. Prior to that he was a Senior System Administrator at, where he oversaw the administration of one of the largest Linux-based Web sites on the Internet. His primary responsibilities at included keeping track of new developments in the Linux community, maintaining the operating system template used on servers, and helping to build relationships with Linux developers and vendors.

Read More Show Less

Table of Contents

Part I Introduction to Linux System Administration 5
1 What Is a Systems Administrator? 7
The Linux Systems Administrator 8
Required Background and Skills 11
Systems Administrator Duties and Responsibilities 13
2 Essential Tools for System Administrators 17
Power Tools for Super Users 18
Web Resources for Administrators 36
Other Sources of Information 41
Part II Linux Essentials 47
3 Installation Strategies 49
Default Installation Versus Customized Approaches 50
Cloning Installations 56
A Template-Based Approach 69
4 Where Do I Find...? 81
Hand Me That Map Please 82
Examining Processes 90
Device Naming Scheme 107
5 Starting Up and Shutting Down 111
Linux Boot Loaders 112
The Linux Boot Process and System Initialization Scripts 128
Shutting Down 137
6 System Failure Diagnosis and Recovery 141
Kernel Oops 142
Hardware Errors 144
Diagnostic Tools 147
Building and Using Rescue Disks 152
Analysis of System Logs 160
Locating the Source of Kernel Errors 163
Seeking Assistance 169
Part III Filesystem and Disk Management 171
7 Filesystems 173
The Physical Realm of Disks and Partitions 174
Filesystem Creation and Management 187
Filesystem Types 197
Space Management and Quotas 198
8 Adding or Replacing Disks 211
IDE Device Naming 212
Managing the /etc/fstab File 214
SCSI Concerns 217
Other Devices 225
9 Linux and RAID 227
The History of Linux RAID Support 228
RAID Overview 228
Linux Software RAID 234
Hardware RAID and Linux 266
Other Sources of Information 269
10 Removable Media Devices 271
Removable Media Devices 272
Parallel Port Storage Devices 285
Granting Access to Users 289
Part IV Backup and Recovery 297
11 What to Back Up and How 299
Filesystem Contents 301
Finding New Files 303
Backup Strategies 305
Partial Backups 309
Bringing a New Red Hat Linux Box Online 310
Types of Backups 313
Developing a Rotation Schedule 315
Developing Backup Scripts 323
12 Media Selection and Storage 333
Backup Media 334
Tape Driver Interfaces 339
Storage Issues 341
13 Recovery from Data Loss 345
Some Data Loss Scenarios 346
The Cost Of Data Recovery 362
Disaster Recovery Planning 364
Part V Networking 369
14 TCP/IP and Ethernet 371
Network Layers 372
IP Addresses 375
Running TCP/IP over Ethernet 377
Adding an Ethernet Interface 382
Routing 383
Name Services 397
15 Sharing Resources (Print and File Services) 409
Networking Is About Sharing 410
Setting Up Print Queues 411
Network File Services 418
The Automount Daemon and Autofs 427
16 Network Monitoring 435
Why Monitor? 436
Monitoring Systems 437
Sniffers 444
Traffic Analyzers 451
17 Integrating with Windows NT Networks 461
Networking the Windows Way 462
Linux and Samba in an NT Environment 464
18 Integrating with Other Network Operating Systems 493
Getting Along with Your Neighbors 494
Linux in a NetWare Environment 495
Linux in an AppleTalk Environment 513
Part VI Internet Services 527
19 Setting Up Internet Services 529
Choosing Services to Offer 530
The Internet Server inetd 531
Using TCP-Wrappers 534
xinetd as an Alternative to inetd 538
Standard Services: Remote Login, Execution, and File-Copy 541
20 Electronic Mail 553
MTAs, MUAs, and MDAs 554
SMTP Services 555
POP and IMAP Services 556
Configuring Mail Collection 556
Dealing with Spam 557
Choosing an MTA 558
sendmail 559
Clever Bits 563
Smail 566
Qmail 575
Exim 577
Ancillary Programs for Mail Handling 579
Fetchmail 579
Supporting Multiple Email Clients 581
Popular Linux Email Clients 583
Aliases 585
Mailing Lists with majordomo 588
To Archive or Not to Archive 590
Configuring a Digest-Only List 591
References 605
Choosing and Installing an MTA 606
Particular MTAs 606
Anti-spam Measures 607
21 FTP and Anonymous FTP 609
Allowing FTP to Your Servers 611
Security and Legal Issues 621
22 Web Serving 637
Introduction to Web Serving 638
Apache 638
Squid 665
Other Web Servers 667
23 News Services 671
So You Want to Run a News Server? 672
INN and Friends 676
News Clients 705
Places to Ask Questions and Find Answers 711
24 Internet Telephony and Conferencing 713
An Introduction to Internet Telephony 714
Internet Relay Chat (IRC) 721
ICQ and Clones 728
Multimedia Conferencing Tools 733
25 Security Principles 739
Determining Your Security Needs 740
Securing Your Red Hat Server 743
Security Monitoring 772
Developing Security Policies 775
Part VII Security and Firewalls 783
26 Firewall Strategies 785
Types of Firewalls 787
Firewall Options 789
Linux Proxy Services 790
Linux Kernel Configuration 792
SOCKS Proxy Server 795
Squid 2 798
TIS FireWall ToolKit 800
Setting Up a Firewall 805
Setting Up a Firewall with ipchains 810
Debugging Firewalls 817
27 The Security Administrator's Toolbox 819
Building Your Security Administrator's Toolbox 820
Security Resources on the Web 834
Sources of Information Other than the Web 836
28 I've Been Hacked: What Now? 841
Intruder Alert! 842
Determining the Extent of Intrusion 844
Reinstalling the Operating System from Scratch 855
Part VIII User Management and Interaction 859
29 Users and Groups 861
Adding Users to the System 862
Granting Permissions to Users 862
Establishing Groups 862
System Files 864
Adding and Deleting User Accounts 869
When to Delete a User Account 882
Effective Use of Groups 884
Using Groups to Grant Permissions 887
The newgrp Command 888
Other System Commands Related to Users and Groups 888
30 Helping Users 895
Users Are Not Lusers 896
Developing a Help Desk 903
Learning How to Say No 918
Part IX Shells, Scripting, and Automation 923
31 Shells 925
Getting Started with Shells 926
bash, the Bourne Again Shell 928
tesh, the Enhanced C Shell 945
Other Shells 964
32 Shell Scripting 967
Introduction to Shell Scripting 968
Shell Scripting Using bash 972
perl Scripting 1007
Other Languages 1010
Programming Tools 1014
33 Automation 1017
Managing Chaos 1018
Using at for One-Time Tasks 1021
Using cron 1031
Debugging cron Jobs 1040
Part X System Tuning and Kernel Building 1045
34 Tuning Your Linux System 1047
General Areas of Tuning 1049
Weighing Costs and Benefits 1052
Understanding Performance Measurement Techniques 1055
Understanding Network Performance 1067
Memory and Swap Space 1068
Swap Space Priorities 1071
Swap Partitions Versus Swap Files 1074
Tunable Kernel Parameters in /proc 1075
Using echo to Alter System Behavior 1078
35 Customizing the Linux Kernel 1081
Use the Source 1082
Patching the Kernel Source 1091
Kernel Loadable Modules 1094
Kernel Building 1100
36 Centennial School District, Portland, Oregon 1135
Background on Centennial 1136
How Bynari Got Involved 1137
From Dallas to Portland 1137
Written Requirements from Connie 1138
Concerns of the Project Team 1138
Summarizing Centennial's Resources 1140
Organizational Initiatives 1141
Centennial Chooses Red Hat 1141
The Challenge 1142
Enter Linux and Red Hat's 6.0 1142
The Internet for Curriculum 1143
Red Hat 6.0 Helps Centennial Meet Requirements 1143
Red Hat 6.0 and the Internet 1144
Defining Other Requirements 1144
Constraints 1145
Technical Expertise and Knowledgeable Management 1145
Project Specifications 1145
Short- and Long-Term Objectives 1146
The Project Plan 1146
Web Server 1147
Securing Access to the Applications 1147
Network Authentication, Access, and User Administration with Samba 1148
Samba in Centennial's Heterogeneous Environment 1149
Training the Centennial Team 1149
Back to Samba 1150
Networking Macintosh Computers in the Linux Environment 1152
Limited Administrative Control and Access to the Network 1153
Progress for Centennial 1154
Internet Access 1155
Using IP Masquerading 1155
Linux 2.2.x Kernels 1155
Distributing the Productivity Application 1156
Electronic Mail 1156
Example: File 1157
System Administration 1158
Managing Users and Groups 1159
Different User Account Management Scenarios 1159
Content Management Using TCP Wrappers 1161
Using an FTP Server to Download Files 1162
Index 1165
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)