search for books and compare prices
Tables of Contents for Principles of Network and System Administration
Chapter/Section Title
Page #
Page Count
Preface
ix
 
Introduction
1
7
The Scope of System Administration
1
1
Is System Administration a Discipline?
2
1
A Jigsaw Puzzle
2
1
The Goals of System Administration
3
1
A Philosophy
3
1
The Challenges of System Administration
4
1
Common Practice and Good Practice
5
1
Bugs
6
1
Information Sources for Sysadms
6
2
Exercises
7
1
The System Components
8
32
What is `The System'?
8
1
Operating Systems
9
7
File Systems
16
16
Processes and Job control
32
2
Logs and Audits
34
1
Privileged Accounts
35
1
Hardware Awareness
36
2
System Uniformity
38
2
Networked Communities
40
38
Communities
40
1
User Sociology
41
1
Client-Server Cooperation
42
1
Host Identities and Name Services
43
3
Common Network Sharing Models
46
3
Physical Network
49
6
TCP/IP Networks
55
7
Network Analysis
62
8
Planning Network Resources
70
8
Host Management
78
33
Choices
78
2
Start-up and Shutdown
80
1
Configuring and Personalizing Workstations
81
7
Installation of the Operating System
88
7
Software Installation
95
9
Installing a Unix Disk
104
2
Kernel Customization
106
5
User Management
111
23
User Registration
111
5
Account Policy
116
1
Login Environment
117
7
User Support Services
124
1
Controlling User Resources
124
5
User Well-being
129
5
Models of Network Administration
134
17
Administration Models
134
2
Immunity and Convergence
136
1
Network Organization
137
2
Bootstrapping Infrastructure
139
5
Cfengine: Policy Automation
144
1
SNMP Network Management
145
1
Integrating Multiple OSes
146
3
A Model Checklist
149
2
Configuration and Maintenance
151
30
System Policy
151
2
Synchronizing Clocks
153
1
Executing Jobs at Regular Times
153
2
Automation
155
6
Preventative Maintenance
161
3
Fault Report and Diagnosis
164
7
System Performance Tuning
171
10
Services
181
54
High Level Services
181
1
Proxies and Agents
182
1
Installing a New Service
183
1
Summoning Daemons
183
4
Setting up the DNS Name Service
187
16
Setting up a WWW Server
203
12
E-mail Configuration
215
11
Mounting NFS Disks
226
3
The Printer Service
229
6
Principles of Security
235
30
Physical Security
236
1
Four Independent Issues
236
1
Trust Relationships
237
1
Security Policy
237
2
Protecting from Loss
239
2
System and Network Security
241
2
Social Engineering
243
1
TCP/IP Security
244
15
Attacks
259
6
Security Implementation
265
27
The Recovery Plan
265
1
Data Integrity
265
9
Analysing Network Security
274
8
VPNs: Secure Shell and FreeS/WAN
282
1
WWW Security
282
2
Firewalls
284
6
Intrusion Detection and Forensics
290
2
Analytical System Administration
292
45
Science vs Technology
292
1
Studying Complex Systems
293
2
The Purpose of Observation
295
1
Evaluation Methods and Problems
295
2
Evaluating a Hierarchical System
297
1
Faults
298
17
Deterministic and Stochastic Behaviour
315
11
Observational Errors
326
8
Strategic Analyses
334
1
Summary
335
2
Summary and Outlook
337
5
The Next Generation Internet Protocol (IPv6)
338
1
Never-dos in System Administration
338
1
Information Management in the Future
339
1
Collaboration with Software Engineering
340
1
The Future of System Administration
340
2
A Summary
342
7
A.1 Summary of Principles
342
4
A.2 Summary of Suggestions
346
3
B Some Useful Unix Commands
349
6
C Programming and Compiling
355
38
C.1 Make
355
4
C.2 Perl
359
18
C.3 WWW and CGI Programming
377
6
C.4 PHP and the Web
383
2
C.5 Cfengine
385
8
D Glossary
393
4
E Recommended Reading
397
1
Bibliography
398
12
Index
410