Automating System Administration with Perl 2e
Paperback Engels 2009 9780596006396Samenvatting
If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System Administration with Perl, Second Edition, not only offers you the right tools for your job, but also suggests the best way to approach specific problems and to securely automate recurring tasks.
Updated and expanded to cover the latest operating systems, technologies, and Perl modules, this edition of the "Otter Book" will help you:
Manage user accountsMonitor filesystems and processesWork with configuration files in important formats such as XML and YAMLAdminister databases, including MySQL, MS-SQL, and Oracle with DBIWork with directory services like LDAP and Active DirectoryScript email protocols and spam controlEffectively create, handle, and analyze log filesAdminister network name and configuration services, including NIS, DNS and DHCPMaintain, monitor, and map network services, using technologies and tools such as SNMP, nmap, libpcap, GraphViz and RRDtoolImprove filesystem, process, and network security
This edition includes additional appendixes to get you up to speed on technologies such as XML/XPath, LDAP, SNMP, and SQL. With this book in hand and Perl in your toolbox, you can do more with less -- fewer resources, less effort, and far less hassle.
Specificaties
Lezersrecensies
Inhoudsopgave
<li>
<span>Dedication</span>
</li>
<li>
<span>Preface</span>
</li>
<li>
<span>Chapter 1: Introduction</span>
</li>
<li>
<span>Chapter 2: Filesystems</span>
</li>
<li>
<span>Chapter 3: User Accounts</span>
</li>
<li>
<span>Chapter 4: User Activity</span>
</li>
<li>
<span>Chapter 5: TCP/IP Name and Configuration Services</span>
</li>
<li>
<span>Chapter 6: Working with Configuration Files</span>
</li>
<li>
<span>Chapter 7: SQL Database Administration</span>
</li>
<li>
<span>Chapter 8: Email</span>
</li>
<li>
<span>Chapter 9: Directory Services</span>
</li>
<li>
<span>Chapter 10: Log Files</span>
</li>
<li>
<span>Chapter 11: Security</span>
</li>
<li>
<span>Chapter 12: SNMP</span>
</li>
<li>
<span>Chapter 13: Network Mapping and Monitoring</span>
</li>
<li>
<span>Chapter 14: Experiential Learning</span>
</li>
<li>
<span>The Eight-Minute XML Tutorial</span>
</li>
<li>
<span>The 10-Minute XPath Tutorial</span>
</li>
<li>
<span>The 10-Minute LDAP Tutorial</span>
</li>
<li>
<span>The 15-Minute SQL Tutorial</span>
</li>
<li>
<span>The Five-Minute RCS Tutorial</span>
</li>
<li>
<span>The Two-Minute VBScript-to-Perl Tutorial</span>
</li>
<li>
<span>The 20-Minute SNMP Tutorial</span>
</li>
<li>
<span>Colophon</span>
</li>
</ul>
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan