Download E-books Linux: The Complete Reference, Sixth Edition PDF

Your one-stop advisor to Linux--fully revised and expanded

Get in-depth assurance of all Linux positive aspects, instruments, and utilities from this completely up to date and entire source, designed for all Linux distributions. Written by means of Linux specialist Richard Petersen, this e-book explains how one can get up-and-running on Linux, use the computers and shells, deal with functions, install servers, enforce safety features, and deal with process and community management projects.

With complete insurance of the most recent platform, Linux: the full Reference, 6th Edition contains info at the very diversified and renowned Debian (Ubuntu) and pink Hat/Fedora software program install and repair administration instruments utilized by so much distributions. this can be a must-have advisor for all Linux clients.

  • Install, configure, and administer any Linux distribution
  • Work with records and folders from the BASH, TCSH, and Z shells
  • Use the GNOME and KDE computers, X home windows, and demonstrate managers
  • Set up place of work, database, net, and multimedia applications
  • Secure info utilizing SELinux, netfilter, SSH, and Kerberos
  • Encrypt community transmissions with GPG, LUKS, and IPsec
  • Deploy FTP, internet, mail, proxy, print, information, and database servers
  • Administer procedure assets utilizing HAL, udev, and virtualization (KVM and Xen)
  • Configure and preserve IPv6, DHCPv6, NIS, networking, and distant access
  • Access distant documents and units utilizing NFSv4, GFS, PVFS, NIS, and SAMBA

Show description

Read Online or Download Linux: The Complete Reference, Sixth Edition PDF

Similar Linux books

RHCSA/RHCE Red Hat Linux Certification Study Guide, Seventh Edition (Exams EX200 & EX300)

In response to pink Hat firm Linux 7, the recent variation of this bestselling examine consultant covers the up-to-date crimson Hat qualified process Administrator (RHCSA) and pink Hat qualified Engineer (RHCE) assessments. RHCSA/RHCE purple Hat Linux Certification examine advisor, seventh variation is totally revised to hide the lately published pink Hat firm Linux 7 and the corresponding RHCSA and RHCE certification assessments.

Linux (Hacking Exposed)

Tighten holes and hold safety in your Linux procedure! From one of many authors of the overseas best-seller, Hacking uncovered: community safeguard secrets and techniques & recommendations, comes essential safeguard instruction manual for a person working Linux. This state of the art volu

Advanced Linux Networking

With increasingly more networks and mission-critical purposes operating on Linux, approach, and community directors has to be capable of do greater than arrange a server and depend on its default configuration. this article is designed that will help you in achieving a better point of competence. It specializes in robust strategies and lines of Linux networking and offers you with the knowledge you must enhance server potency, increase defense, and adapt to new standards.

Guide to Assembly Language Programming in Linux

Introduces Linux suggestions to programmers who're conversant in different working platforms comparable to home windows XP presents complete insurance of the Pentium meeting language

Additional resources for Linux: The Complete Reference, Sixth Edition

Show sample text content

ICQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . speedy Messenger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RSH, Kerberos, and SSH distant entry instructions . . . . . . . . . . . . . . . . . . . distant entry details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . distant entry Permission: . k5login . . . . . . . . . . . . . . . . . . . . . . . . . . . rlogin, slogin, rcp, scp, rsh, and ssh . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 301 301 302 303 303 303 304 304 305 305 306 307 308 308 309 half V safeguard sixteen Encryption, Integrity tests, and Signatures . . . . . . . . . . . . . . . . . . . . . . . . Public Key Encryption, Integrity assessments, and electronic Signatures . . . . . . . . Public-Key Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . electronic Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Integrity assessments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Combining Encryption and Signatures . . . . . . . . . . . . . . . . . . . . . . . . . GNU privateness protect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . GnuPG Setup: gpg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . utilizing GnuPG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Checking software program package deal electronic Signatures . . . . . . . . . . . . . . . . . . . . . . . . uploading Public Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Validating Public Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Checking RPM programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intrusion Detection: Tripwire and AIDE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Encrypted dossier structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 313 314 314 314 315 316 318 321 323 323 324 324 325 326 17 Security-Enhanced Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Flask structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . procedure management entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . domain names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . forms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . defense Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Transition: Labeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Multi-Level safety (MLS) and Multi-Category safety (MCS) . . . . . . . . . administration Operations for SELinux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 327 328 329 329 330 330 330 331 331 331 331 332 Contents 18 Turning Off SELinux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Checking prestige and records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Checking protection Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SELinux administration instruments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . semanage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . the protection coverage research software: apol . . . . . . . . . . . . . . . . . . . . . . . . Checking SELinux Messages: seaudit . . . . . . . . . . . . . . . . . . . . . . . . . . permitting entry: chcon and audit2allow . . . . . . . . . . . . . . . . . . . . . . . The SELinux Reference coverage . . . . . . . . . . . . . .

Rated 4.65 of 5 – based on 5 votes