Details

Ubuntu Linux Bible


Ubuntu Linux Bible


Bible 10. Aufl.

von: David Clinton, Christopher Negus

32,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 22.10.2020
ISBN/EAN: 9781119722359
Sprache: englisch
Anzahl Seiten: 752

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Quickly learn how to use Ubuntu, the fastest growing Linux distribution, in a personal or enterprise environment</b></p> <p>Whether you're a newcomer to Linux or an experienced system administrator, the Ubuntu Linux Bible provides what you need to get the most out of one the world's top Linux distributions. Clear, step-by-step instructions cover everything from installing Ubuntu and creating your desktop, to writing shell scripts and setting up file sharing on your network. This up-to-date guide covers the latest Ubuntu release with long-term support (version 20.04) as well as the previous version. Throughout the book, numerous examples, figures, and review questions with answers ensure that you will fully understand each key topic.</p> <p>Organized into four parts, the book offers you the flexibility to master the basics in the "Getting Started with Ubuntu Linux" section, or to skip directly to more advanced tasks. "Ubuntu for Desktop Users" shows you how to setup email, surf the web, play games, and create and publish documents, spreadsheets, and presentations. "Ubuntu for System Administrators" covers user administration, system backup, device management, network configuration, and other fundamentals of Linux administration. The book's final section, "Configuring Servers on Ubuntu," teaches you to use Ubuntu to support network servers for the web, e-mail, print services, networked file sharing, DHCP (network address management), and DNS (network name/address resolution). This comprehensive, easy-to-use guide will help you:</p> <ul> <li>Install Ubuntu and create the perfect Linux desktop</li> <li>Use the wide variety of software included with Ubuntu Linux</li> <li>Stay up to date on recent changes and new versions of Ubuntu</li> <li>Create and edit graphics, and work with consumer IoT electronic devices</li> <li>Add printers, disks, and other devices to your system</li> <li>Configure core network services and administer Ubuntu systems</li> </ul> <p><i>Ubuntu Linux Bible</i> is a must-have for anyone looking for an accessible, step-by-step tutorial on this hugely popular Linux operating system.</p>
<p>Acknowledgments ix</p> <p>Introduction xxix</p> <p><b>Part I: Getting Started 1</b></p> <p><b>Chapter 1: Starting with Linux 3</b></p> <p>Understanding What Linux is 4</p> <p>Understanding How Linux Differs from Other Operating Systems 6</p> <p>Exploring Linux History 7</p> <p>Free-flowing UNIX culture at Bell Labs 7</p> <p>Commercial UNIX 9</p> <p>Berkeley Software Distribution arrives 9</p> <p>UNIX Laboratory and commercialization 10</p> <p>GNU transitions UNIX to freedom 11</p> <p>BSD loses some steam 13</p> <p>Linus builds the missing piece 13</p> <p>OSI open source definition 14</p> <p>Understanding How Linux Distributions Emerged 16</p> <p>Understanding Red Hat 17</p> <p>Understanding Ubuntu and other Debian distributions 17</p> <p>Finding Professional Opportunities with Linux Today 18</p> <p>Understanding how companies make money with Linux 19</p> <p>Summary 20</p> <p><b>Chapter 2: Creating the Perfect Linux Desktop 21</b></p> <p>Understanding Linux Desktop Technology 22</p> <p>Starting with the GNOME 3 Desktop Live Image 24</p> <p>Using the GNOME 3 Desktop 25</p> <p>After the computer boots up 25</p> <p>Navigating with the mouse 25</p> <p>Navigating with the keyboard 30</p> <p>Setting up the GNOME 3 desktop 31</p> <p>Extending the GNOME 3 desktop 31</p> <p>Using GNOME shell extensions 32</p> <p>Using the GNOME Tweak Tool 33</p> <p>Starting with desktop applications 33</p> <p>Managing files and folders with Nautilus 33</p> <p>Installing and managing additional software 35</p> <p>Playing music with Rhythmbox 37</p> <p>Stopping the GNOME 3 desktop 37</p> <p>Using the Unity Graphical Shell with the GNOME Desktop 37</p> <p>Using the Metacity window manager 38</p> <p>Changing GNOME’s appearance 40</p> <p>Using the panels 40</p> <p>Adding a drawer 41</p> <p>Changing panel properties 41</p> <p>Summary 42</p> <p>Exercises 42</p> <p><b>Part II: Becoming a Linux Power User 43</b></p> <p><b>Chapter 3: Using the Shell 45</b></p> <p>About Shells and Terminal Windows 46</p> <p>Using the shell prompt 47</p> <p>Using a Terminal window 48</p> <p>Using virtual consoles 49</p> <p>Choosing Your Shell 49</p> <p>Running Commands 50</p> <p>Understanding command syntax 51</p> <p>Locating commands 53</p> <p>Recalling Commands Using Command History 56</p> <p>Command-line editing 56</p> <p>Command-line completion 58</p> <p>Command-line recall 59</p> <p>Connecting and Expanding Commands 61</p> <p>Piping between commands 62</p> <p>Sequential commands 62</p> <p>Background commands 63</p> <p>Expanding commands 63</p> <p>Expanding arithmetic expressions 63</p> <p>Expanding variables 64</p> <p>Using Shell Variables 64</p> <p>Creating and using aliases 66</p> <p>Exiting the shell 67</p> <p>Creating Your Shell Environment 67</p> <p>Configuring your shell 67</p> <p>Setting your prompt 68</p> <p>Adding environment variables 70</p> <p>Getting Information about Commands 71</p> <p>Summary 74</p> <p>Exercises 74</p> <p><b>Chapter 4: Moving Around the Filesystem 77</b></p> <p>Using Basic Filesystem Commands 80</p> <p>Using Metacharacters and Operators 82</p> <p>Using fi le-matching metacharacters 82</p> <p>Using fi le-redirection metacharacters 84</p> <p>Using brace expansion characters 85</p> <p>Listing Files and Directories 86</p> <p>Understanding File Permissions and Ownership 90</p> <p>Changing permissions with chmod (numbers) 91</p> <p>Changing permissions with chmod (letters) 92</p> <p>Setting default file permission with umask 93</p> <p>Changing file ownership 93</p> <p>Moving, Copying, and Removing Files 94</p> <p>Summary 95</p> <p>Exercises 96</p> <p><b>Chapter 5: Working with Text Files 97</b></p> <p>Editing Files with vim and vi 97</p> <p>Starting with vi 99</p> <p>Adding text 99</p> <p>Moving around in the text 100</p> <p>Deleting, copying, and changing text 101</p> <p>Pasting (putting) text 102</p> <p>Repeating commands 102</p> <p>Exiting vi 102</p> <p>Skipping around in the file 103</p> <p>Searching for text 103</p> <p>Using ex mode 104</p> <p>Learning more about vi and vim 104</p> <p>Finding Files 105</p> <p>Using locate to find files by name 105</p> <p>Searching for files with find 107</p> <p>Finding files by name 108</p> <p>Finding files by size 108</p> <p>Finding files by user 109</p> <p>Finding files by permission 109</p> <p>Finding files by date and time 110</p> <p>Using “not” and “or” when finding files 111</p> <p>Finding files and executing commands 112</p> <p>Searching in files with grep 113</p> <p>Summary 115</p> <p>Exercises 115</p> <p><b>Chapter 6: Managing Running Processes 117</b></p> <p>Understanding Processes 117</p> <p>Listing Processes 118</p> <p>Listing processes with ps 118</p> <p>Listing and changing processes with top 120</p> <p>Listing processes with System Monitor 122</p> <p>Managing Background and Foreground Processes 124</p> <p>Starting background processes 124</p> <p>Using foreground and background commands 125</p> <p>Killing and Renicing Processes 126</p> <p>Killing processes with kill and killall 126</p> <p>Using kill to signal processes by PID 127</p> <p>Using killall to signal processes by name 128</p> <p>Setting processor priority with nice and renice 128</p> <p>Limiting Processes with cgroups 129</p> <p>Summary 131</p> <p>Exercises 131</p> <p><b>Chapter 7: Writing Simple Shell Scripts 133</b></p> <p>Understanding Shell Scripts 133</p> <p>Executing and debugging shell scripts 134</p> <p>Understanding shell variables 135</p> <p>Special shell positional parameters 136</p> <p>Reading in parameters 137</p> <p>Parameter expansion in bash 137</p> <p>Performing arithmetic in shell scripts 138</p> <p>Using programming constructs in shell scripts 139</p> <p>The “if then” statements 139</p> <p>The case command 142</p> <p>The “for do” loop 143</p> <p>The “while do” and “until do” loops 144</p> <p>Trying some useful text manipulation programs 145</p> <p>The global regular expression print 145</p> <p>Remove sections of lines of text (cut) 145</p> <p>Translate or delete characters (tr) 146</p> <p>The stream editor (sed) 146</p> <p>Using simple shell scripts 147</p> <p>Telephone list 147</p> <p>Backup script 148</p> <p>Summary 149</p> <p>Exercises 149</p> <p><b>Part III: Becoming a Linux System Administrator 151</b></p> <p><b>Chapter 8: Learning System Administration 153</b></p> <p>Understanding System Administration 153</p> <p>Using Graphical Administration Tools 155</p> <p>Using Cockpit browser-based administration 155</p> <p>Using other browser-based admin tools 157</p> <p>Invoking Administration Privileges 158</p> <p>Becoming root from the shell 158</p> <p>Gaining temporary admin access with sudo 159</p> <p>Exploring Administrative Commands, Configuration Files, and Log Files 161</p> <p>Administrative commands 161</p> <p>Administrative configuration files 162</p> <p>Administrative log files and systemd journal 165</p> <p>Using journalctl to view the systemd journal 165</p> <p>Managing log messages with rsyslogd 166</p> <p>Using Other Administrative Accounts 167</p> <p>Checking and Configuring Hardware 167</p> <p>Checking your hardware 168</p> <p>Managing removable hardware 171</p> <p>Working with loadable modules 172</p> <p>Listing loaded modules 172</p> <p>Loading modules 173</p> <p>Removing modules 174</p> <p>Summary 174</p> <p>Exercises 175</p> <p><b>Chapter 9: Installing Linux 177</b></p> <p>Choosing a Computer 178</p> <p>Installing Ubuntu Desktop 180</p> <p>Installing Ubuntu Server 185</p> <p>Understanding Cloud-Based Installations 188</p> <p>Installing Linux in the Enterprise 189</p> <p>Exploring Common Installation Topics 189</p> <p>Upgrading or installing from scratch 189</p> <p>Dual booting 190</p> <p>Installing Linux to run virtually 191</p> <p>Using installation boot options 192</p> <p>Boot options for disabling features 192</p> <p>Boot options for video problems 193</p> <p>Boot options for special installation types 193</p> <p>Using specialized storage 194</p> <p>Partitioning hard drives 195</p> <p>Understanding different partition types 196</p> <p>Tips for creating partitions 196</p> <p>Using the GRUB 2 boot loader 198</p> <p>Summary 199</p> <p>Exercises 199</p> <p><b>Chapter 10: Getting and Managing Software 201</b></p> <p>Managing Software on the Desktop 201</p> <p>Going Beyond the Software Window 203</p> <p>Understanding Linux Software Packaging 204</p> <p>Working with Debian Packaging 205</p> <p>APT basics 205</p> <p>Working with APT repositories 209</p> <p>Working with dpkg 211</p> <p>Summary 214</p> <p>Exercises 214</p> <p><b>Chapter 11: Managing User Accounts 215</b></p> <p>Creating User Accounts 215</p> <p>Adding users with adduser 218</p> <p>Setting user defaults 220</p> <p>Modifying users with usermod 222</p> <p>Deleting users with deluser 223</p> <p>Understanding Group Accounts 223</p> <p>Using group accounts 224</p> <p>Creating group accounts 225</p> <p>Managing Users in the Enterprise 225</p> <p>Setting permissions with Access Control Lists 226</p> <p>Setting ACLs with setfacl 227</p> <p>Setting default ACLs 228</p> <p>Enabling ACLs 229</p> <p>Adding directories for users to collaborate 231</p> <p>Creating group collaboration directories (set GID bit) 231</p> <p>Creating restricted deletion directories (sticky bit) 233</p> <p>Centralizing User Accounts 233</p> <p>Summary 234</p> <p>Exercises 234</p> <p><b>Chapter 12: Managing Disks and Filesystems 237</b></p> <p>Understanding Disk Storage 237</p> <p>Partitioning Hard Disks 239</p> <p>Understanding partition tables 239</p> <p>Viewing disk partitions 240</p> <p>Creating a single-partition disk 241</p> <p>Creating a multiple-partition disk 245</p> <p>Using Logical Volume Manager Partitions 249</p> <p>Checking an existing LVM 249</p> <p>Creating LVM logical volumes 252</p> <p>Growing LVM logical volumes 254</p> <p>Mounting Filesystems 254</p> <p>Supported filesystems 255</p> <p>Enabling swap areas 257</p> <p>Disabling swap area 258</p> <p>Using the fstab file to define mountable filesystems 258</p> <p>Using the mount command to mount filesystems 261</p> <p>Mounting a disk image in loopback 262</p> <p>Using the umount command 262</p> <p>Using the mkfs Command to Create a Filesystem 263</p> <p>Managing Storage with Cockpit 264</p> <p>Summary 265</p> <p>Exercises 266</p> <p><b>Part IV: Becoming a Linux Server Administrator 267</b></p> <p><b>Chapter 13: Understanding Server Administration 269</b></p> <p>Getting Started with Server Administration 270</p> <p>Step 1: Install the server 270</p> <p>Step 2: Configure the server 272</p> <p>Using configuration files 272</p> <p>Checking the default configuration 272</p> <p>Step 3: Start the server 272</p> <p>Step 4: Secure the server 274</p> <p>Password protection 274</p> <p>Firewalls 274</p> <p>TCP Wrappers 274</p> <p>AppArmor 275</p> <p>Security settings in configuration files 275</p> <p>Step 5: Monitor the server 275</p> <p>Configure logging 275</p> <p>Run system activity reports 276</p> <p>Watch activity live with Cockpit 276</p> <p>Keep system software up to date 277</p> <p>Check the filesystem for signs of crackers 277</p> <p>Checking and Setting Servers 277</p> <p>Managing Remote Access with the Secure Shell Service 277</p> <p>Starting the openssh-server service 278</p> <p>Using SSH client tools 278</p> <p>Using ssh for remote login 279</p> <p>Using SSH for remote execution 280</p> <p>Copying files between systems with scp and rsync 281</p> <p>Interactive copying with sftp 284</p> <p>Using key-based (passwordless) authentication 285</p> <p>Configuring System Logging 286</p> <p>Enabling system logging with rsyslog 287</p> <p>Understanding the rsyslog.conf file 287</p> <p>Understanding log messages 289</p> <p>Setting up and using a loghost with rsyslogd 289</p> <p>Watching logs with logwatch 290</p> <p>Checking System Resources with sar 291</p> <p>Checking System Space 293</p> <p>Displaying system space with df 293</p> <p>Checking disk usage with du 294</p> <p>Finding disk consumption with find 294</p> <p>Managing Servers in the Enterprise 295</p> <p>Summary 296</p> <p>Exercises 296</p> <p><b>Chapter 14: Administering Networking 299</b></p> <p>Configuring Networking for Desktops 300</p> <p>Checking your network interfaces 302</p> <p>Checking your network from NetworkManager 302</p> <p>Checking your network from Cockpit 303</p> <p>Checking your network from the command line 304</p> <p>Configuring network interfaces 308</p> <p>Setting IP addresses manually 308</p> <p>Setting IP address aliases 309</p> <p>Setting routes 310</p> <p>Configuring a network proxy connection 311</p> <p>Configuring Networking from the Command Line 312</p> <p>Configure networking with nmtui 312</p> <p>Editing a NetworkManager TUI connection 313</p> <p>Understanding networking configuration files 314</p> <p>Other networking files 315</p> <p>Setting alias network interfaces 318</p> <p>Setting up Ethernet channel bonding 319</p> <p>Setting custom routes 320</p> <p>Configuring Networking in the Enterprise 321</p> <p>Configuring Linux as a router 321</p> <p>Configuring Linux as a DHCP server 322</p> <p>Configuring Linux as a DNS server 322</p> <p>Configuring Linux as a proxy server 323</p> <p>Summary 323</p> <p>Exercises 324</p> <p><b>Chapter 15: Starting and Stopping Services 327</b></p> <p>Understanding the Initialization Daemon (init or systemd) 328</p> <p>Understanding the classic init daemons 329</p> <p>Understanding systemd initialization 335</p> <p>Learning systemd basics 335</p> <p>Learning systemd’s backward compatibility to SysVinit 341</p> <p>Checking the Status of Services 343</p> <p>Checking services for SysVinit systems 343</p> <p>Stopping and Starting Services 346</p> <p>Stopping and starting SysVinit services 346</p> <p>Stopping a service with systemd 347</p> <p>Starting a service with systemd 348</p> <p>Restarting a service with systemd 348</p> <p>Reloading a service with systemd 349</p> <p>Enabling Persistent Services 350</p> <p>Configuring persistent services for SysVinit 350</p> <p>Enabling a service with systemd 351</p> <p>Disabling a service with systemd 352</p> <p>Configuring a Default Runlevel or Target Unit 353</p> <p>Configuring the SysVinit default runlevel 353</p> <p>Adding New or Customized Services 354</p> <p>Adding new services to SysVinit 355</p> <p>Step 1: Create a new or customized service script file 355</p> <p>Step 2: Add the service script to /etc/rc.d/init.d 356</p> <p>Step 3: Set appropriate permission on the script 357</p> <p>Step 4: Add the service to runlevel directories 357</p> <p>Adding new services to systemd 357</p> <p>Step 1: Create a new or customized service configuration unit file 358</p> <p>Step 2: Move the service configuration unit file 358</p> <p>Step 3: Add the service to the Wants directory 359</p> <p>Summary 360</p> <p>Exercises 360</p> <p><b>Chapter 16: Configuring a Print Server 363</b></p> <p>Common UNIX Printing System 363</p> <p>Setting Up Printers 365</p> <p>Adding a printer automatically 365</p> <p>Using web-based CUPS administration 366</p> <p>Allow remote printing administration 367</p> <p>Add a printer not automatically detected 367</p> <p>Using the Print Settings window 368</p> <p>Configuring local printers with the Print Settings window 369</p> <p>Configuring remote printers 372</p> <p>Adding a remote CUPS printer 373</p> <p>Adding a remote UNIX (LDP/LPR) printer 373</p> <p>Adding a Windows (SMB) printer 374</p> <p>Working with CUPS Printing 375</p> <p>Configuring the CUPS server (cupsd.conf) 375</p> <p>Starting the CUPS server 376</p> <p>Configuring CUPS printer options manually 377</p> <p>Using Printing Commands 378</p> <p>Printing with lp 378</p> <p>Listing status with lpstat -t 379</p> <p>Removing print jobs with cancel 379</p> <p>Configuring Print Servers 380</p> <p>Configuring a shared CUPS printer 380</p> <p>Configuring a shared Samba printer 381</p> <p>Understanding smb.conf for printing 382</p> <p>Setting up SMB clients 382</p> <p>Summary 383</p> <p>Exercises 383</p> <p><b>Chapter 17: Configuring a Web Server r 385</b></p> <p>Understanding the Apache Web Server 385</p> <p>Getting and Installing Your Apache Web Server 386</p> <p>Controlling Apache 389</p> <p>Securing Apache 389</p> <p>Apache file permissions and ownership 389</p> <p>Apache and firewalls 390</p> <p>Apache and AppArmor 390</p> <p>Understanding the Apache configuration files 393</p> <p>Using directives 393</p> <p>Understanding default settings 395</p> <p>Adding a virtual host to Apache 398</p> <p>Allowing users to publish their own web content 400</p> <p>Securing your web traffic with TLS 401</p> <p>Understanding how SSL is configured 402</p> <p>Generating an SSL key and self-signed certificate 403</p> <p>Generating a certificate signing request 405</p> <p>Troubleshooting Your Web Server 406</p> <p>Checking for configuration errors 406</p> <p>Access forbidden and server internal errors 408</p> <p>Summary 410</p> <p>Exercises 410</p> <p><b>Chapter 18: Configuring an FTP Server 413</b></p> <p>Understanding FTP 413</p> <p>Installing the vsftpd FTP Server 415</p> <p>Controlling the vsftpd Service 416</p> <p>Securing your FTP server 417</p> <p>Integrating Linux file permissions with vsftpd 418</p> <p>Configuring Your FTP Server 418</p> <p>Setting up user access 418</p> <p>Allowing uploading 419</p> <p>Setting up vsftpd for the Internet 420</p> <p>Using FTP Clients to Connect to Your Server 422</p> <p>Accessing an FTP server from a browser 422</p> <p>Accessing an FTP server with the lftp command 423</p> <p>Using the gFTP client 425</p> <p>Summary 426</p> <p>Exercises 426</p> <p><b>Chapter 19: Configuring a Windows File Sharing (Samba) Server r 429</b></p> <p>Understanding Samba 429</p> <p>Installing Samba 430</p> <p>Controlling Samba 431</p> <p>Viewing Samba processes 431</p> <p>Configuring Samba 435</p> <p>Configuring the [global] section 435</p> <p>Configuring the [homes] section 437</p> <p>Configuring the [printers] section 437</p> <p>Creating a Samba shared folder 438</p> <p>Checking the Samba share 438</p> <p>Accessing Samba Shares 441</p> <p>Accessing Samba shares in Linux 442</p> <p>Accessing Samba shares from a Linux file manager 442</p> <p>Mounting a Samba share from a Linux command line 442</p> <p>Accessing Samba shares in Windows 444</p> <p>Using Samba in the Enterprise 444</p> <p>Summary 444</p> <p>Exercises 445</p> <p><b>Chapter 20: Configuring an NFS File Server 447</b></p> <p>Installing an NFS Server 448</p> <p>Starting the NFS Service 449</p> <p>Sharing NFS Filesystems 450</p> <p>Configuring the /etc/exports file 450</p> <p>Hostnames in /etc/exports 451</p> <p>Access options in /etc/exports 452</p> <p>User mapping options in /etc/exports 453</p> <p>Exporting the shared filesystems 454</p> <p>Securing Your NFS Server 454</p> <p>Using NFS Filesystems 455</p> <p>Viewing NFS shares 456</p> <p>Manually mounting an NFS filesystem 456</p> <p>Mounting an NFS filesystem at boot time 457</p> <p>Mounting noauto filesystems 458</p> <p>Using mount options 458</p> <p>Using autofs to mount NFS filesystems on demand 460</p> <p>Automounting to the /net directory 460</p> <p>Automounting home directories 461</p> <p>Unmounting NFS Filesystems 463</p> <p>Summary 464</p> <p>Exercises 464</p> <p><b>Chapter 21: Troubleshooting Linux 467</b></p> <p>Boot-Up Troubleshooting 467</p> <p>Understanding startup 468</p> <p>Starting from the firmware (BIOS or UEFI) 469</p> <p>Troubleshooting BIOS setup 470</p> <p>Troubleshooting boot order 471</p> <p>GRUB 2 boot loader 471</p> <p>Starting the kernel 472</p> <p>Troubleshooting the initialization system 474</p> <p>Troubleshooting Software Packages 476</p> <p>Troubleshooting Networking 479</p> <p>Troubleshooting outgoing connections 479</p> <p>View network interfaces 480</p> <p>Check physical connections 480</p> <p>Check routes 481</p> <p>Check hostname resolution 482</p> <p>Troubleshooting incoming connections 483</p> <p>Check if the client can reach your system at all 483</p> <p>Check if the service is available to the client 484</p> <p>Check the service on the server 485</p> <p>Troubleshooting Memory 485</p> <p>Uncovering memory issues 486</p> <p>Checking for memory problems 488</p> <p>Dealing with memory problems 489</p> <p>Summary 490</p> <p>Exercises 490</p> <p><b>Part V: Learning Linux Security Techniques 493</b></p> <p><b>Chapter 22: Understanding Basic Linux Security y 495</b></p> <p>Implementing Physical Security 495</p> <p>Implementing disaster recovery 496</p> <p>Securing user accounts 496</p> <p>One user per user account 497</p> <p>Limiting access to the root user account 497</p> <p>Setting expiration dates on temporary accounts 497</p> <p>Removing unused user accounts 498</p> <p>Securing passwords 500</p> <p>Choosing good passwords 500</p> <p>Setting and changing passwords 501</p> <p>Enforcing best password practices 502</p> <p>Understanding the password files and password hashes 504</p> <p>Securing the filesystem 506</p> <p>Managing dangerous filesystem permissions 506</p> <p>Securing the password files 507</p> <p>Locking down the filesystem 508</p> <p>Managing software and services 509</p> <p>Updating software packages 509</p> <p>Keeping up with security advisories 509</p> <p>Advanced implementation 510</p> <p>Monitoring Your Systems 510</p> <p>Monitoring log files 510</p> <p>Monitoring user accounts 512</p> <p>Detecting counterfeit accounts and privileges 512</p> <p>Detecting bad account passwords 514</p> <p>Monitoring the filesystem 516</p> <p>Verifying software packages 516</p> <p>Scanning the filesystem 516</p> <p>Detecting viruses and rootkits 518</p> <p>Auditing and Reviewing Linux 521</p> <p>Conducting compliance reviews 521</p> <p>Conducting security reviews 522</p> <p>Summary 522</p> <p>Exercises 523</p> <p><b>Chapter 23: Understanding Advanced Linux Security y 525</b></p> <p>Implementing Linux Security with Cryptography 525</p> <p>Understanding hashing 526</p> <p>Understanding encryption/decryption 527</p> <p>Understanding cryptographic ciphers 527</p> <p>Understanding cryptographic cipher keys 527</p> <p>Understanding digital signatures 533</p> <p>Implementing Linux cryptography 535</p> <p>Ensuring file integrity 535</p> <p>Encrypting a Linux filesystem at installation 536</p> <p>Encrypting a Linux directory 537</p> <p>Encrypting a Linux file 540</p> <p>Encrypting Linux with miscellaneous tools 540</p> <p>Using Encryption from the Desktop 541</p> <p>Implementing Linux Security with PAM 541</p> <p>Understanding the PAM authentication process 542</p> <p>Understanding PAM contexts 543</p> <p>Understanding PAM control flags 544</p> <p>Understanding PAM modules 545</p> <p>Understanding PAM system event configuration files 545</p> <p>Administering PAM on your Linux system 546</p> <p>Managing PAM-aware application configuration files 546</p> <p>Implementing resources limits with PAM 547</p> <p>Implementing time restrictions with PAM 549</p> <p>Enforcing good passwords with PAM 550</p> <p>Encouraging sudo use with PAM 551</p> <p>Obtaining more information on PAM 551</p> <p>Summary 552</p> <p>Exercises 552</p> <p><b>Chapter 24: Enhancing Linux Security with AppArmor 553</b></p> <p>Understanding AppArmor 553</p> <p>Working with AppArmor 556</p> <p>Summary 559</p> <p>Exercises 560</p> <p><b>Chapter 25: Securing Linux on a Network 561</b></p> <p>Auditing Network Services 561</p> <p>Evaluating access to network services with nmap 563</p> <p>Using nmap to audit your network services’ advertisements 566</p> <p>Working with Firewalls 570</p> <p>Understanding firewalls 571</p> <p>Implementing firewalls 572</p> <p>Starting with UFW 572</p> <p>Understanding the iptables utility 574</p> <p>Using the iptables utility 576</p> <p>Summary 583</p> <p>Exercises 583</p> <p><b>Part VI: Engaging with Cloud Computing 585</b></p> <p><b>Chapter 26: Shifting to Clouds and Containers 587</b></p> <p>Understanding Linux Containers 588</p> <p>Namespaces 589</p> <p>Container registries 589</p> <p>Base images and layers 590</p> <p>Working with Linux Containers 590</p> <p>Deploying LXD containers 590</p> <p>Deploying Docker containers 593</p> <p>Using containers in the enterprise 600</p> <p>Summary 600</p> <p>Exercises 600</p> <p><b>Chapter 27: Deploying Linux to the Public Cloud 601</b></p> <p>Running Linux in the Cloud Using cloud-init 601</p> <p>Creating LXD Linux Images for Cloud Deployments 604</p> <p>Working with LXD profiles 604</p> <p>Working with LXD images 607</p> <p>Using OpenStack to deploy cloud images 608</p> <p>Using Amazon EC2 to Deploy Cloud Images 610</p> <p>Installing the AWS CLI 611</p> <p>Provisioning and launching an EC2 instance 613</p> <p>Summary 618</p> <p>Exercises 618</p> <p><b>Chapter 28: Automating Apps and Infrastructure with Ansible 619</b></p> <p>Understanding Ansible 620</p> <p>Exploring Ansible Components 621</p> <p>Inventories 621</p> <p>Playbooks 622</p> <p>Plays 622</p> <p>Tasks 622</p> <p>Modules 622</p> <p>Roles, imports, and includes 623</p> <p>Stepping Through an Ansible Deployment 623</p> <p>Prerequisites 624</p> <p>Setting up SSH keys to each node 624</p> <p>Installing Ansible 626</p> <p>Creating an inventory 626</p> <p>Authenticating to the hosts 626</p> <p>Creating a playbook 627</p> <p>Run the playbook 628</p> <p>Running Ad-Hoc Ansible Commands 629</p> <p>Trying ad-hoc commands 629</p> <p>Summary 631</p> <p>Exercises 631</p> <p><b>Chapter 29 Deploying Applications as Containers with Kubernetes 633</b></p> <p>Understanding Kubernetes 634</p> <p>Kubernetes masters 634</p> <p>Kubernetes workers 635</p> <p>Kubernetes applications 635</p> <p>Kubernetes interfaces 636</p> <p>Trying Kubernetes 636</p> <p>Getting Kubernetes up and running 637</p> <p>Deploying a Kubernetes application 638</p> <p>Getting information on the deployment’s pods 639</p> <p>Exposing applications with services 643</p> <p>Scaling up an application 644</p> <p>Checking the load balancer 645</p> <p>Scaling down an application 646</p> <p>Deleting a service 646</p> <p>Summary 647</p> <p>Exercises 647</p> <p>Appendix: Exercise Answers 649</p> <p>Index 701</p>
<p><b>David Clinton</b> is a Linux server administrator who has worked with IT infrastructure in academic and enterprise environments. He has taught video courses for Amazon Web Services, as well as other technologies. He is a co-author of <i>AWS Certified Solutions Architect Study Guide: Associate (SAA-C01) Exam</i> and <i>AWS Certified Cloud Practitioner Study Guide: Foundational (CLF-C01) Exam</i>. <p><b>Christopher Negus</b> is a senior open source technical writer at Amazon Web Services. He has written dozens of books on Linux, including <i>Red Hat Linux Bible, Linux Troubleshooting Bible</i> and <i>Linux Toys</i>.
<p><b>The best reference for Ubuntu Linux</b> <p>Ubuntu Linux is a popular, powerful, and versatile operating system. Now you can get the most out of everything Ubuntu Linux has to offer with the <i>Ubuntu Linux Bible</i>. This complete and comprehensive guide introduces you to Ubuntu and shows you how to use it to its fullest, whether you're a typical desktop user or a system administrator. You'll learn to do everything from reading email to configuring wireless networks. You'll reap huge rewards from this book, regardless of how much prior experience you have with Ubuntu. <ul> <li>Get started with Ubuntu Linux and see what's in the newest version (20.04)</li> <li>Learn how to read emails, surf the web, and create and publish documents</li> <li>Take on system administration tasks, like creating and managing users and adding new disks to the system</li> <li>Discover how to use Ubuntu Linux in an enterprise or personal environment</li> <li>Figure out how to set up Ubuntu Linux servers for the web, email, shared printing, and more</li> <li>Find out why Ubuntu Linux is the most popular Linux operating system in the world</li> </ul>

Diese Produkte könnten Sie auch interessieren:

Ambient Intelligence
Ambient Intelligence
von: Gian Luca Foresti, Tim Ellis
PDF ebook
96,29 €
Access Control Systems
Access Control Systems
von: Messaoud Benantar
PDF ebook
96,29 €