Linux bible
著者
書誌事項
Linux bible
Wiley, c2020
10th ed
- : pbk
- タイトル別名
-
Linux bible : the comprehensive tutorial resource
大学図書館所蔵 件 / 全3件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
Includes index
内容説明・目次
内容説明
The industry favorite Linux guide Linux Bible, 10th Edition is the ultimate hands-on Linux user guide, whether you're a true beginner or a more advanced user navigating recent changes. this updated tenth edition covers the latest versions of Red Hat Enterprise Linux (RHEL 8), Fedora 30, and Ubuntu 18.04 LTS. It includes information on cloud computing, with new guidance on containerization, Ansible automation, and Kubernetes and OpenShift. With a focus on RHEL 8, this new edition teaches techniques for managing storage, users, and security, while emphasizing simplified administrative techniques with Cockpit. Written by a Red Hat expert, this book provides the clear explanations and step-by-step instructions that demystify Linux and bring the new features seamlessly into your workflow.
This useful guide assumes a base of little or no Linux knowledge, and takes you step by step through what you need to know to get the job done.
Get Linux up and running quickly
Master basic operations and tackle more advanced tasks
Get up to date on the recent changes to Linux server system management
Bring Linux to the cloud using Openstack and Cloudforms
Simplified Linux administration through the Cockpit Web Interface
Automated Linux Deployment with Ansible
Learn to navigate Linux with Amazon (AWS), Google (GCE), and Microsofr Azure Cloud services
Linux Bible, 10th Edition is the one resource you need, and provides the hands-on training that gets you on track in a flash.
目次
Acknowledgments xi
Introduction xxxv
Part I: Getting Started 1
Chapter 1: Starting with Linux 3
Understanding What Linux Is 4
Understanding How Linux Differs from Other Operating Systems 6
Exploring Linux History 7
Free-flowing UNIX culture at Bell Labs 7
Commercial UNIX 9
GNU transitions UNIX to freedom 11
BSD loses some steam 12
Linus builds the missing piece 13
OSI open source definition 14
Understanding How Linux Distributions Emerged 16
Choosing a Red Hat distribution 16
Choosing Ubuntu or another Debian distribution 19
Finding Professional Opportunities with Linux Today 19
Understanding how companies make money with Linux 20
Becoming Red Hat certified 21
Summary 25
Chapter 2: Creating the Perfect Linux Desktop 27
Understanding Linux Desktop Technology 28
Starting with the Fedora GNOME Desktop Live image 30
Using the GNOME 3 Desktop 31
After the computer boots up 31
Setting up the GNOME 3 desktop 38
Extending the GNOME 3 desktop 39
Starting with desktop applications 41
Stopping the GNOME 3 desktop 46
Using the GNOME 2 Desktop 46
Using the Metacity window manager 48
Changing GNOME's appearance 49
Using the GNOME panels 50
Adding 3D effects with AIGLX 54
Summary 57
Exercises 57
Part II: Becoming a Linux Power User 59
Chapter 3: Using the Shell 61
About Shells and Terminal Windows 62
Using the shell prompt 63
Using a Terminal window 63
Using virtual consoles 65
Choosing Your Shell 65
Running Commands 66
Understanding command syntax 67
Locating commands 70
Recalling Commands Using Command History 72
Command-line editing 73
Command-line completion 75
Command-line recall 76
Connecting and Expanding Commands 78
Piping between commands 78
Sequential commands 79
Background commands 79
Expanding commands 80
Expanding arithmetic expressions 80
Expanding variables 80
Using Shell Variables 81
Creating and using aliases 81
Exiting the shell 83
Creating Your Shell Environment 84
Configuring your shell 84
Setting your prompt 85
Adding environment variables 87
Getting Information about Commands 88
Summary 90
Exercises 90
Chapter 4: Moving Around the Filesystem 93
Using Basic Filesystem Commands 96
Using Metacharacters and Operators 98
Using file-matching metacharacters 98
Using file-redirection metacharacters 99
Using brace expansion characters 101
Listing Files and Directories 101
Understanding File Permissions and Ownership 105
Changing permissions with chmod (numbers) 106
Changing permissions with chmod (letters) 107
Setting default file permission with umask 108
Changing file ownership 109
Moving, Copying, and Removing Files 109
Summary 111
Exercises 111
Chapter 5: Working with Text Files 113
Editing Files with vim and vi 113
Starting with vi 115
Skipping around in the file 119
Searching for text 119
Using ex mode 120
Learning more about vi and vim 120
Finding Files 120
Using locate to find files by name 121
Searching for files with find 122
Searching in files with grep 128
Summary 129
Exercises 129
Chapter 6: Managing Running Processes 131
Understanding Processes 131
Listing Processes 132
Listing processes with ps 132
Listing and changing processes with top 134
Listing processes with System Monitor 136
Managing Background and Foreground Processes 137
Starting background processes 138
Using foreground and background commands 139
Killing and Renicing Processes140
Killing processes with kill and killall 140
Setting processor priority with nice and renice 142
Limiting Processes with cgroups 143
Summary 144
Exercises 145
Chapter 7: Writing Simple Shell Scripts 147
Understanding Shell Scripts 147
Executing and debugging shell scripts 148
Understanding shell variables 149
Performing arithmetic in shell scripts 152
Using programming constructs in shell scripts 153
Trying some useful text manipulation programs 159
Using simple shell scripts 161
Summary 163
Exercises 163
Part III: Becoming a Linux System Administrator 165
Chapter 8: Learning System Administration 167
Understanding System Administration 167
Using Graphical Administration Tools 169
Using the root User Account 174
Exploring Administrative Commands, Configuration Files, and Log Files 178
Administrative commands 178
Administrative configuration files 179
Using Other Administrative Accounts 185
Checking and Configuring Hardware 186
Checking your hardware 187
Managing removable hardware 189
Working with loadable modules 191
Summary 193
Exercises 193
Chapter 9: Installing Linux 195
Choosing a Computer 196
Installing Fedora from Live Media 198
Installing Red Hat Enterprise Linux from Installation Media 201
Understanding Cloud-Based Installations 204
Installing Linux in the Enterprise 205
Exploring Common Installation Topics 207
Upgrading or installing from scratch 207
Dual booting 208
Installing Linux to run virtually 209
Using installation boot options 210
Using specialized storage 213
Partitioning hard drives 214
Using the GRUB boot loader 217
Summary 219
Exercises 219
Chapter 10: Getting and Managing Software 221
Managing Software on the Desktop 221
Going Beyond the Software Window 223
Understanding Linux RPM and DEB Software Packaging 224
Understanding DEB packaging 225
Understanding RPM packaging 226
Managing RPM Packages with YUM 229
Transitioning from yum to dnf 229
Understanding how yum works 229
Using YUM with third-party software repositories 233
Managing software with the yum command 233
Installing, Querying, and Verifying Software with the rpm Command 241
Installing and removing packages with rpm 241
Querying rpm information 242
Verifying RPM packages 244
Managing Software in the Enterprise 245
Summary 246
Exercises 247
Chapter 11: Managing User Accounts 249
Creating User Accounts 249
Adding users with useradd 252
Setting user defaults 255
Modifying users with usermod 257
Deleting users with userdel 258
Understanding Group Accounts 259
Using group accounts 259
Creating group accounts 260
Managing Users in the Enterprise 261
Setting permissions with Access Control Lists 262
Centralizing User Accounts 269
Summary 270
Exercises 270
Chapter 12: Managing Disks and Filesystems 273
Understanding Disk Storage 273
Partitioning Hard Disks 275
Understanding partition tables 275
Viewing disk partitions 276
Creating a single-partition disk 277
Creating a multiple-partition disk 281
Using Logical Volume Manager Partitions 285
Checking an existing LVM 286
Creating LVM logical volumes 289
Growing LVM logical volumes 290
Mounting Filesystems 291
Supported filesystems 291
Enabling swap areas 293
Disabling swap area 294
Using the fstab file to define mountable file systems 295
Using the mount command to mount file systems 297
Mounting a disk image in loopback 298
Using the umount command 299
Using the mkfs Command to Create a Filesystem 300
Managing Storage with Cockpit 301
Summary 303
Exercises 303
Part IV: Becoming a Linux Server Administrator 305
Chapter 13: Understanding Server Administration 307
Starting with Server Administration 308
Step 1: Install the server 308
Step 2: Configure the server 310
Step 3: Start the server 311
Step 4: Secure the server 312
Step 5: Monitor the server 314
Checking and Setting Servers 316
Managing Remote Access with the Secure Shell Service 316
Starting the openssh-server service 317
Using SSH client tools 318
Using key-based (passwordless) authentication 324
Configuring System Logging 326
Enabling system logging with rsyslog 326
Watching logs with logwatch 331
Checking System Resources with sar 332
Checking System Space 334
Displaying system space with df 334
Checking disk usage with du 334
Finding disk consumption with find 335
Managing Servers in the Enterprise 336
Summary 336
Exercises 337
Chapter 14: Administering Networking 339
Configuring Networking for Desktops 340
Checking your network interfaces 342
Configuring network interfaces 349
Configuring a network proxy connection 352
Configuring Networking from the Command Line 353
Configure networking with nmtui 354
Editing a NetworkManager TUI connection 354
Understanding networking configuration files 355
Setting alias network interfaces 360
Setting up Ethernet channel bonding 361
Setting custom routes 363
Configuring Networking in the Enterprise 364
Configuring Linux as a router 364
Configuring Linux as a DHCP server 365
Configuring Linux as a DNS server 365
Configuring Linux as a proxy server 366
Summary 366
Exercises 367
Chapter 15: Starting and Stopping Services 369
Understanding the Initialization Daemon (init or systemd) 370
Understanding the classic init daemons 371
Understanding systemd initialization 377
Checking the Status of Services 384
Checking services for SysVinit systems 385
Stopping and Starting Services 387
Stopping and starting SysVinit services 387
Enabling Persistent Services 391
Configuring persistent services for SysVinit 391
Configuring a Default Runlevel or Target Unit 394
Configuring the SysVinit default runlevel 394
Adding New or Customized Services 396
Adding new services to SysVinit 396
Adding new services to systemd 399
Summary 401
Exercises 401
Chapter 16: Configuring a Print Server 403
Common UNIX Printing System 403
Setting Up Printers 405
Adding a printer automatically 405
Using web-based CUPS administration 406
Using the Print Settings window 409
Working with CUPS Printing 415
Configuring the CUPS server (cupsdconf) 415
Starting the CUPS server 417
Configuring CUPS printer options manually 417
Using Printing Commands 418
Printing with lp 419
Listing status with lpstat -t 419
Removing print jobs with lprm 419
Configuring Print Servers 420
Configuring a shared CUPS printer 420
Configuring a shared Samba printer 422
Summary 424
Exercises 424
Chapter 17: Configuring a Web Server 427
Understanding the Apache Web Server 427
Getting and Installing Your Web Server 428
Understanding the httpd package 428
Installing Apache 431
Starting Apache 432
Securing Apache 433
Understanding the Apache configuration files 435
Adding a virtual host to Apache 440
Allowing users to publish their own web content 442
Securing your web traffic with SSL/TLS 443
Troubleshooting Your Web Server 449
Checking for configuration errors 449
Accessing forbidden and server internal errors 451
Summary 453
Exercises 453
Chapter 18: Configuring an FTP Server 455
Understanding FTP 455
Installing the vsftpd FTP Server 457
Starting the vsftpd Service 458
Securing Your FTP Server 461
Opening up your firewall for FTP 461
Configuring SELinux for your FTP server 463
Relating Linux file permissions to vsftpd 465
Configuring Your FTP Server 465
Setting up user access 465
Allowing uploading 467
Setting up vsftpd for the Internet 468
Using FTP Clients to Connect to Your Server 469
Accessing an FTP server from Firefox 470
Accessing an FTP server with the lftp command 470
Using the gFTP client 472
Summary 473
Exercises 473
Chapter 19: Configuring a Windows File Sharing (Samba) Server 475
Understanding Samba 475
Installing Samba 476
Starting and Stopping Samba 478
Starting the Samba (smb) service 478
Starting the NetBIOS (nmbd) name server 480
Stopping the Samba (smb) and NetBIOS (nmb) services 481
Securing Samba 482
Configuring firewalls for Samba 482
Configuring SELinux for Samba 484
Configuring Samba host/user permissions 486
Configuring Samba 486
Configuring the [global] section 486
Configuring the [homes] section487
Configuring the [printers] section 489
Accessing Samba Shares 493
Accessing Samba shares in Linux 493
Accessing Samba shares in Windows 496
Using Samba in the Enterprise 497
Summary 497
Exercises 498
Chapter 20: Configuring an NFS File Server 499
Installing an NFS Server 502
Starting the NFS service 502
Sharing NFS Filesystems 503
Configuring the /etc/exports file 504
Exporting the shared filesystems 507
Securing Your NFS Server 508
Opening up your firewall for NFS 508
Allowing NFS access in TCP wrappers 510
Configuring SELinux for your NFS server 511
Using NFS Filesystems 512
Viewing NFS shares 512
Manually mounting an NFS filesystem 512
Mounting an NFS filesystem at boot time 513
Using autofs to mount NFS filesystems on demand 517
Unmounting NFS filesystems 520
Summary 521
Exercises 521
Chapter 21: Troubleshooting Linux 523
Boot-Up Troubleshooting 523
Understanding Startup Methods 524
Starting from the firmware (BIOS or UEFI) 526
Troubleshooting the GRUB boot loader 528
GRUB 2 Boot loader 530
Starting the kernel 532
Troubleshooting Software Packages 542
Fixing RPM databases and cache 545
Troubleshooting Networking 547
Troubleshooting outgoing connections 547
Troubleshooting incoming connections 550
Troubleshooting Memory 553
Uncovering memory issues 554
Troubleshooting in Rescue Mode 559
Summary 561
Exercises 561
Part V: Learning Linux Security Techniques 563
Chapter 22: Understanding Basic Linux Security 565
Implementing Physical Security 565
Implementing disaster recovery 566
Securing user accounts 566
Securing passwords 570
Securing the filesystem 576
Managing software and services 579
Advanced implementation 580
Monitoring Your Systems 580
Monitoring log files 581
Monitoring user accounts 584
Monitoring the filesystem 587
Auditing and Reviewing Linux 595
Conducting compliance reviews 595
Conducting security reviews 596
Summary 596
Exercises 597
Chapter 23: Understanding Advanced Linux Security 599
Implementing Linux Security with Cryptography 599
Understanding hashing 600
Understanding encryption/decryption 602
Implementing Linux cryptography 610
Implementing Linux Security with PAM 618
Understanding the PAM authentication process 619
Administering PAM on your Linux system 622
Obtaining more information on PAM 633
Summary 633
Exercises 633
Chapter 24: Enhancing Linux Security with SELinux 635
Understanding SELinux Benefits 635
Understanding How SELinux Works 637
Understanding Type Enforcement 637
Understanding Multi-Level Security 638
Implementing SELinux security models 639
Configuring SELinux 645
Setting the SELinux mode 645
Setting the SELinux policy type 647
Managing SELinux security contexts 648
Managing SELinux policy rule packages 651
Managing SELinux via Booleans 653
Monitoring and Troubleshooting SELinux 654
Understanding SELinux logging 654
Troubleshooting SELinux logging 656
Troubleshooting common SELinux problems 657
Putting It All Together 659
Obtaining More Information on SELinux 659
Summary 660
Exercises 660
Chapter 25: Securing Linux on a Network 663
Auditing Network Services 663
Evaluating access to network services with nmap 665
Using nmap to audit your network services advertisements 668
Working with Firewalls 672
Understanding firewalls 673
Implementing firewalls 674
Summary 688
Exercises 688
Part VI: Engaging with Cloud Computing 691
Chapter 26: Shifting to Clouds and Containers 693
Understanding Linux Containers 694
Namespaces 695
Container registries 695
Base images and layers 696
Starting with Linux Containers 697
Pulling and running containers 697
Starting and stopping containers 701
Building a container image 702
Tagging and pushing an image to a registry 705
Using containers in the enterprise 706
Summary 706
Exercises 707
Chapter 27: Using Linux for Cloud Computing 709
Overview of Linux and Cloud Computing 710
Trying Basic Cloud Technology 713
Setting Up a Small Cloud 714
Configuring hypervisors 715
Configuring storage 718
Creating virtual machines 720
Managing virtual machines 724
Migrating virtual machines 725
Summary 727
Exercises 727
Chapter 28: Deploying Linux to the Cloud 729
Getting Linux to Run in a Cloud 729
Creating Linux Images for Clouds 731
Configuring and running a cloud-init cloud instance 731
Investigating the cloud instance 733
Cloning the cloud instance 734
Using cloud-init in enterprise computing 738
Using OpenStack to Deploy Cloud Images 739
Starting from the OpenStack Dashboard 739
Using Amazon EC2 to Deploy Cloud Images 744
Summary 746
Exercises 746
Chapter 29: Automating Apps and Infrastructure with Ansible 749
Understanding Ansible 750
Exploring Ansible Components 751
Inventories 751
Playbooks 752
Stepping Through an Ansible Deployment 753
Installing Ansible 756
Running Ad-Hoc Ansible Commands 760
Automating Tasks with Ansible Tower Automation Framework 762
Summary 763
Exercises 763
Chapter 30: Deploying Applications as Containers with Kubernetes 765
Understanding Kubernetes 766
Kubernetes masters 766
Kubernetes workers 767
Kubernetes applications 767
Kubernetes interfaces 768
Trying Kubernetes 768
Getting Kubernetes 769
Running the Kubernetes Basics tutorial 771
Enterprise-Quality Kubernetes with OpenShift 782
Summary 783
Exercises 783
Part VII: Appendixes 785
Appendix A: Media 787
Appendix B: Exercise Answers 797
Index 863
「Nielsen BookData」 より