توضیحاتی در مورد کتاب Linux Bible
نام کتاب : Linux Bible
ویرایش : 10th ed
عنوان ترجمه شده به فارسی : کتاب مقدس لینوکس
سری : Bible
نویسندگان : Negus, Chris
ناشر : Wiley
سال نشر : 2020
تعداد صفحات : 922
ISBN (شابک) : 9781119578888 , 1119578892
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 20 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Contents......Page 11
Acknowledgments......Page 8
Introduction......Page 30
Part I: Getting Started......Page 36
Chapter 1: Starting with Linux......Page 38
Understanding What Linux Is......Page 39
Understanding How Linux Differs from Other Operating Systems......Page 41
Free-flowing UNIX culture at Bell Labs......Page 42
Berkeley Software Distribution arrives......Page 44
UNIX Laboratory and commercialization......Page 45
GNU transitions UNIX to freedom......Page 46
BSD loses some steam......Page 47
Linus builds the missing piece......Page 48
OSI open source definition......Page 49
Choosing a Red Hat distribution......Page 51
Using Red Hat Enterprise Linux......Page 52
Using Fedora......Page 53
Finding Professional Opportunities with Linux Today......Page 54
Understanding how companies make money with Linux......Page 55
Becoming Red Hat certified......Page 56
RHCSA topics......Page 57
RHCE topics......Page 58
Summary......Page 60
Chapter 2: Creating the Perfect Linux Desktop......Page 62
Understanding Linux Desktop Technology......Page 63
Starting with the Fedora GNOME Desktop Live image......Page 65
After the computer boots up......Page 66
Navigating with the mouse......Page 67
Navigating with the keyboard......Page 71
Setting up the GNOME 3 desktop......Page 73
Using GNOME shell extensions......Page 74
Using the GNOME Tweak Tool......Page 75
Starting with desktop applications......Page 76
Managing files and folders with Nautilus......Page 77
Installing and managing additional software......Page 78
Playing music with Rhythmbox......Page 80
Using the GNOME 2 Desktop......Page 81
Using the Metacity window manager......Page 83
Changing GNOME’s appearance......Page 84
Using the GNOME panels......Page 85
Adding an applet......Page 86
Adding an application launcher......Page 87
Adding a drawer......Page 88
Adding 3D effects with AIGLX......Page 89
Exercises......Page 92
Part II: Becoming a Linux Power User......Page 94
Chapter 3: Using the Shell......Page 96
About Shells and Terminal Windows......Page 97
Using a Terminal window......Page 98
Choosing Your Shell......Page 100
Running Commands......Page 101
Understanding command syntax......Page 102
Locating commands......Page 105
Recalling Commands Using Command History......Page 107
Command-line editing......Page 108
Command-line completion......Page 110
Command-line recall......Page 111
Piping between commands......Page 113
Background commands......Page 114
Expanding variables......Page 115
Creating and using aliases......Page 116
Exiting the shell......Page 118
Configuring your shell......Page 119
Setting your prompt......Page 120
Adding environment variables......Page 122
Getting Information about Commands......Page 123
Exercises......Page 125
Chapter 4: Moving Around the Filesystem......Page 128
Using Basic Filesystem Commands......Page 131
Using file-matching metacharacters......Page 133
Using file-redirection metacharacters......Page 134
Listing Files and Directories......Page 136
Understanding File Permissions and Ownership......Page 140
Changing permissions with chmod (numbers)......Page 141
Changing permissions with chmod (letters)......Page 142
Setting default file permission with umask......Page 143
Moving, Copying, and Removing Files......Page 144
Exercises......Page 146
Editing Files with vim and vi......Page 148
Adding text......Page 150
Moving around in the text......Page 151
Deleting, copying, and changing text......Page 152
Exiting vi......Page 153
Searching for text......Page 154
Finding Files......Page 155
Using locate to find files by name......Page 156
Searching for files with find......Page 157
Finding files by name......Page 158
Finding files by user......Page 159
Finding files by date and time......Page 160
Using ‘not’ and ‘or’ when finding files......Page 161
Finding files and executing commands......Page 162
Searching in files with grep......Page 163
Exercises......Page 164
Understanding Processes......Page 166
Listing processes with ps......Page 167
Listing and changing processes with top......Page 169
Listing processes with System Monitor......Page 171
Managing Background and Foreground Processes......Page 172
Starting background processes......Page 173
Using foreground and background commands......Page 174
Using kill to signal processes by PID......Page 175
Using killall to signal processes by name......Page 176
Setting processor priority with nice and renice......Page 177
Limiting Processes with cgroups......Page 178
Summary......Page 179
Exercises......Page 180
Understanding Shell Scripts......Page 182
Executing and debugging shell scripts......Page 183
Understanding shell variables......Page 184
Special shell positional parameters......Page 185
Parameter expansion in bash......Page 186
Performing arithmetic in shell scripts......Page 187
The ″if. . .then″ statements......Page 188
The case command......Page 191
The ″for. . .do″ loop......Page 192
The ″while. . .do″ and ″until. . .do″ loops......Page 193
Remove sections of lines of text (cut)......Page 194
The stream editor (sed)......Page 195
Telephone list......Page 196
Backup script......Page 197
Exercises......Page 198
Part III: Becoming a Linux System Administrator......Page 200
Understanding System Administration......Page 202
Using Cockpit browser-based administration......Page 204
Using system-config-* tools......Page 206
Using other browser-based admin tools......Page 208
Using the root User Account......Page 209
Becoming root from the shell (su command)......Page 210
Gaining administrative access with sudo......Page 211
Administrative commands......Page 213
Administrative configuration files......Page 214
Administrative log files and systemd journal......Page 218
Managing log messages with rsyslogd......Page 219
Using Other Administrative Accounts......Page 220
Checking and Configuring Hardware......Page 221
Checking your hardware......Page 222
Managing removable hardware......Page 224
Listing loaded modules......Page 226
Removing modules......Page 227
Exercises......Page 228
Chapter 9: Installing Linux......Page 230
Choosing a Computer......Page 231
Installing Fedora from Live Media......Page 233
Installing Red Hat Enterprise Linux from Installation Media......Page 236
Understanding Cloud-Based Installations......Page 239
Installing Linux in the Enterprise......Page 240
Upgrading or installing from scratch......Page 242
Dual booting......Page 243
Installing Linux to run virtually......Page 244
Boot options for special installation types......Page 245
Boot options for kickstarts and remote repositories......Page 246
Miscellaneous boot options......Page 247
Using specialized storage......Page 248
Partitioning hard drives......Page 249
Tips for creating partitions......Page 250
Using the GRUB boot loader......Page 252
Exercises......Page 254
Managing Software on the Desktop......Page 256
Going Beyond the Software Window......Page 258
Understanding Linux RPM and DEB Software Packaging......Page 259
Understanding DEB packaging......Page 260
What is in an RPM?......Page 261
Where do RPMs come from?......Page 262
Installing RPMs......Page 263
Understanding how yum works......Page 264
Managing software with the yum command......Page 268
Searching for packages......Page 269
Installing and removing packages......Page 271
Updating packages......Page 273
Updating groups of packages......Page 274
Maintaining your RPM package database and cache......Page 275
Installing and removing packages with rpm......Page 276
Querying rpm information......Page 277
Verifying RPM packages......Page 279
Managing Software in the Enterprise......Page 280
Summary......Page 281
Exercises......Page 282
Creating User Accounts......Page 284
Adding users with useradd......Page 287
Setting user defaults......Page 290
Modifying users with usermod......Page 292
Deleting users with userdel......Page 293
Using group accounts......Page 294
Creating group accounts......Page 295
Managing Users in the Enterprise......Page 296
Setting ACLs with setfacl......Page 297
Setting default ACLs......Page 299
Enabling ACLs......Page 300
Creating group collaboration directories (set GID bit)......Page 302
Creating restricted deletion directories (sticky bit)......Page 303
Centralizing User Accounts......Page 304
Exercises......Page 305
Understanding Disk Storage......Page 308
Understanding partition tables......Page 310
Viewing disk partitions......Page 311
Creating a single-partition disk......Page 312
Creating a multiple-partition disk......Page 316
Using Logical Volume Manager Partitions......Page 320
Checking an existing LVM......Page 321
Creating LVM logical volumes......Page 324
Growing LVM logical volumes......Page 325
Supported filesystems......Page 326
Enabling swap areas......Page 328
Disabling swap area......Page 329
Using the fstab file to define mountable file systems......Page 330
Using the mount command to mount file systems......Page 332
Mounting a disk image in loopback......Page 333
Using the umount command......Page 334
Using the mkfs Command to Create a Filesystem......Page 335
Managing Storage with Cockpit......Page 336
Exercises......Page 338
Part IV: Becoming a Linux Server Administrator......Page 340
Chapter 13: Understanding Server Administration......Page 342
Step 1: Install the server......Page 343
Checking the default configuration......Page 345
Step 3: Start the server......Page 346
Password protection......Page 347
SELinux......Page 348
Watch activity live with Cockpit......Page 349
Check the filesystem for signs of crackers......Page 350
Managing Remote Access with the Secure Shell Service......Page 351
Starting the openssh-server service......Page 352
Using ssh for remote login......Page 353
Using ssh for remote execution......Page 355
Copying files between systems with scp and rsync......Page 356
Using key-based (passwordless) authentication......Page 359
Enabling system logging with rsyslog......Page 361
Understanding the rsyslog.conf file......Page 362
Understanding the messages log file......Page 364
Setting up and using a loghost with rsyslogd......Page 365
Watching logs with logwatch......Page 366
Checking System Resources with sar......Page 367
Checking disk usage with du......Page 369
Finding disk consumption with find......Page 370
Summary......Page 371
Exercises......Page 372
Chapter 14: Administering Networking......Page 374
Configuring Networking for Desktops......Page 375
Checking your network from NetworkManager......Page 377
Checking your network from Cockpit......Page 378
Checking your network from the command line......Page 380
Setting IP addresses manually......Page 384
Setting IP address aliases......Page 385
Setting routes......Page 386
Configuring a network proxy connection......Page 387
Configuring Networking from the Command Line......Page 388
Editing a NetworkManager TUI connection......Page 389
Understanding networking configuration files......Page 390
Network interface files......Page 391
Other networking files......Page 393
Setting alias network interfaces......Page 395
Setting up Ethernet channel bonding......Page 396
Setting custom routes......Page 398
Configuring Linux as a router......Page 399
Configuring Linux as a DNS server......Page 400
Summary......Page 401
Exercises......Page 402
Chapter 15: Starting and Stopping Services......Page 404
Understanding the Initialization Daemon (init or systemd)......Page 405
Understanding the classic init daemons......Page 406
Learning systemd basics......Page 412
Learning systemd’s backward compatibility to SysVinit......Page 417
Checking the Status of Services......Page 419
Checking services for SysVinit systems......Page 420
Stopping and starting SysVinit services......Page 422
Restarting a service with systemd......Page 424
Reloading a service with systemd......Page 425
Configuring persistent services for SysVinit......Page 426
Enabling a service with systemd......Page 427
Disabling a service with systemd......Page 428
Configuring the SysVinit default runlevel......Page 429
Step 1: Create a new or customized service script file......Page 431
Step 4: Add the service to runlevel directories......Page 433
Step 2: Move the service configuration unit file......Page 434
Step 3: Add the service to the Wants directory......Page 435
Exercises......Page 436
Common UNIX Printing System......Page 438
Adding a printer automatically......Page 440
Allow remote printing administration......Page 441
Add a printer not automatically detected......Page 442
Configuring local printers with the Print Settings window......Page 444
Configuring remote printers......Page 447
Adding a remote UNIX (LDP/LPR) printer......Page 448
Adding a Windows (SMB) printer......Page 449
Configuring the CUPS server (cupsd.conf)......Page 450
Configuring CUPS printer options manually......Page 452
Using Printing Commands......Page 453
Removing print jobs with lprm......Page 454
Configuring a shared CUPS printer......Page 455
Understanding smb.conf for printing......Page 457
Setting up SMB clients......Page 458
Exercises......Page 459
Understanding the Apache Web Server......Page 462
Understanding the httpd package......Page 463
Installing Apache......Page 466
Starting Apache......Page 467
Apache and firewalls......Page 468
Apache and SELinux......Page 469
Using directives......Page 470
Understanding default settings......Page 473
Adding a virtual host to Apache......Page 475
Allowing users to publish their own web content......Page 477
Securing your web traffic with SSL/TLS......Page 478
Understanding how SSL is configured......Page 480
Generating an SSL key and self-signed certificate......Page 482
Generating a certificate signing request......Page 483
Checking for configuration errors......Page 484
Accessing forbidden and server internal errors......Page 486
Exercises......Page 488
Understanding FTP......Page 490
Installing the vsftpd FTP Server......Page 492
Starting the vsftpd Service......Page 493
Opening up your firewall for FTP......Page 496
Configuring SELinux for your FTP server......Page 498
Setting up user access......Page 500
Allowing uploading......Page 502
Setting up vsftpd for the Internet......Page 503
Using FTP Clients to Connect to Your Server......Page 504
Accessing an FTP server with the lftp command......Page 505
Using the gFTP client......Page 507
Exercises......Page 508
Understanding Samba......Page 510
Installing Samba......Page 511
Starting the Samba (smb) service......Page 513
Starting the NetBIOS (nmbd) name server......Page 515
Stopping the Samba (smb) and NetBIOS (nmb) services......Page 516
Configuring firewalls for Samba......Page 517
Setting SELinux Booleans for Samba......Page 519
Setting SELinux file contexts for Samba......Page 520
Configuring the [global] section......Page 521
Configuring the [homes] section......Page 522
Creating a Samba shared folder......Page 524
Checking the Samba share......Page 525
Accessing Samba shares from a Linux file manager......Page 528
Mounting a Samba share from a Linux command line......Page 530
Accessing Samba shares in Windows......Page 531
Summary......Page 532
Exercises......Page 533
Chapter 20: Configuring an NFS File Server......Page 534
Starting the NFS service......Page 537
Sharing NFS Filesystems......Page 538
Configuring the /etc/exports file......Page 539
Hostnames in /etc/exports......Page 540
User mapping options in /etc/exports......Page 541
Exporting the shared filesystems......Page 542
Opening up your firewall for NFS......Page 543
Allowing NFS access in TCP wrappers......Page 545
Configuring SELinux for your NFS server......Page 546
Manually mounting an NFS filesystem......Page 547
Mounting an NFS filesystem at boot time......Page 548
Mounting noauto filesystems......Page 549
Using mount options......Page 550
Automounting to the /net directory......Page 552
Automounting home directories......Page 553
Unmounting NFS filesystems......Page 555
Exercises......Page 556
Boot-Up Troubleshooting......Page 558
Starting with System V init scripts......Page 559
Starting with systemd......Page 560
Troubleshooting BIOS setup......Page 561
Troubleshooting boot order......Page 562
The GRUB Legacy boot loader......Page 563
GRUB 2 Boot loader......Page 565
Starting the kernel......Page 567
Troubleshooting rc.sysinit......Page 568
Troubleshooting runlevel processes......Page 569
Troubleshooting systemd initialization......Page 573
Troubleshooting Software Packages......Page 577
Fixing RPM databases and cache......Page 580
View network interfaces......Page 582
Check routes......Page 583
Check hostname resolution......Page 584
Troubleshooting incoming connections......Page 585
Check if the service is available to the client......Page 586
Check the firewall on the server......Page 587
Troubleshooting Memory......Page 588
Uncovering memory issues......Page 589
Checking for memory problems......Page 591
Dealing with memory problems......Page 593
Troubleshooting in Rescue Mode......Page 594
Exercises......Page 596
Part V: Learning Linux Security Techniques......Page 598
Implementing Physical Security......Page 600
Securing user accounts......Page 601
Setting expiration dates on temporary accounts......Page 602
Removing unused user accounts......Page 603
Choosing good passwords......Page 605
Setting and changing passwords......Page 606
Enforcing best password practices......Page 607
Understanding the password files and password hashes......Page 609
Managing dangerous filesystem permissions......Page 611
Securing the password files......Page 612
Locking down the filesystem......Page 613
Updating software packages......Page 614
Monitoring Your Systems......Page 615
Monitoring log files......Page 616
Detecting counterfeit new accounts and privileges......Page 619
Detecting bad account passwords......Page 621
Monitoring the filesystem......Page 622
Verifying software packages......Page 623
Scanning the filesystem......Page 624
Detecting viruses and rootkits......Page 625
Conducting compliance reviews......Page 630
Summary......Page 631
Exercises......Page 632
Implementing Linux Security with Cryptography......Page 634
Understanding hashing......Page 635
Understanding cryptographic ciphers......Page 637
Understanding cryptographic cipher keys......Page 638
Understanding digital signatures......Page 643
Ensuring file integrity......Page 645
Encrypting a Linux filesystem at installation......Page 646
Encrypting a Linux directory......Page 648
Encrypting Linux with miscellaneous tools......Page 651
Using Encryption from the Desktop......Page 652
Implementing Linux Security with PAM......Page 653
Understanding PAM contexts......Page 654
Understanding PAM control flags......Page 655
Understanding PAM modules......Page 656
Managing PAM-aware application configuration files......Page 657
Managing PAM system event configuration files......Page 658
Implementing time restrictions with PAM......Page 661
Enforcing good passwords with PAM......Page 663
Encouraging sudo use with PAM......Page 667
Exercises......Page 668
Understanding SELinux Benefits......Page 670
Understanding Type Enforcement......Page 672
Understanding Multi-Level Security......Page 673
Understanding SELinux operational modes......Page 674
Understanding SELinux security contexts......Page 675
Understanding SELinux Policy types......Page 678
Understanding SELinux policy rule packages......Page 679
Setting the SELinux mode......Page 680
Setting the SELinux policy type......Page 682
Managing SELinux security contexts......Page 683
Managing the user security context......Page 684
Managing the file security context......Page 685
Managing SELinux policy rule packages......Page 686
Managing SELinux via Booleans......Page 688
Understanding SELinux logging......Page 689
Reviewing SELinux messages in the messages log......Page 690
Troubleshooting SELinux logging......Page 691
Using a nonstandard directory for a service......Page 692
Booleans set incorrectly......Page 693
Obtaining More Information on SELinux......Page 694
Exercises......Page 695
Auditing Network Services......Page 698
Evaluating access to network services with nmap......Page 700
Using nmap to audit your network services advertisements......Page 703
Working with Firewalls......Page 707
Understanding firewalls......Page 708
Implementing firewalls......Page 709
Starting with firewalld......Page 710
Changing firewall rules with Cockpit......Page 712
Understanding the iptables utility......Page 713
Using the iptables utility......Page 715
Exercises......Page 723
Part VI: Engaging with Cloud Computing......Page 726
Chapter 26: Shifting to Clouds and Containers......Page 728
Understanding Linux Containers......Page 729
Container registries......Page 730
Base images and layers......Page 731
Pulling a container......Page 732
Running a shell from a container......Page 733
Running an FTP server from a container......Page 734
Starting and stopping containers......Page 736
Build a simple container image......Page 737
Build an FTP container from GitHub......Page 738
Tagging and pushing an image to a registry......Page 740
Summary......Page 741
Exercises......Page 742
Chapter 27: Using Linux for Cloud Computing......Page 744
Cloud hypervisors (aka compute nodes)......Page 745
Cloud storage......Page 746
Cloud platforms......Page 747
Trying Basic Cloud Technology......Page 748
Setting Up a Small Cloud......Page 749
Step 2: Check your computers......Page 750
Step 3: Install Linux on hypervisors......Page 751
Step 4: Start services on the hypervisors......Page 752
Step 1: Install Linux software......Page 753
Step 3: Start the NFS service......Page 754
Creating virtual machines......Page 755
Step 2: Check the network bridge......Page 756
Step 5: Create a new virtual machine......Page 757
Managing virtual machines......Page 759
Migrating virtual machines......Page 760
Step 2: Migrate running VM to Other hypervisor......Page 761
Exercises......Page 762
Getting Linux to Run in a Cloud......Page 764
Configuring and running a cloud-init cloud instance......Page 766
Investigating the cloud instance......Page 768
Cloning the cloud instance......Page 769
Expanding your cloud-init configuration......Page 770
Adding ssh keys with cloud-init......Page 771
Adding software with cloud-init......Page 772
Using cloud-init in enterprise computing......Page 773
Configuring your OpenStack virtual network......Page 774
Configuring keys for remote access......Page 776
Launching a virtual machine in OpenStack......Page 777
Accessing the virtual machine via ssh......Page 778
Using Amazon EC2 to Deploy Cloud Images......Page 779
Exercises......Page 781
Chapter 29: Automating Apps and Infrastructure with Ansible......Page 784
Understanding Ansible......Page 785
Inventories......Page 786
Modules......Page 787
Stepping Through an Ansible Deployment......Page 788
Setting up SSH keys to each node......Page 789
Creating an inventory......Page 791
Creating a playbook......Page 792
Run the playbook......Page 793
Running Ad-Hoc Ansible Commands......Page 795
Trying ad-hoc commands......Page 796
Automating Tasks with Ansible Tower Automation Framework......Page 797
Exercises......Page 798
Chapter 30: Deploying Applications as Containers with Kubernetes......Page 800
Kubernetes masters......Page 801
Kubernetes applications......Page 802
Trying Kubernetes......Page 803
Starting the Kubernetes Basics Tutorial......Page 804
Starting Minikube......Page 805
Get information about your cluster......Page 806
Deploy a Kubernetes application......Page 807
Get information on the deployment’s pods......Page 808
Expose applications with services......Page 811
Label a service......Page 812
Delete a service......Page 813
Scale up an application......Page 814
Check the load balancer......Page 815
Scale down an application......Page 816
Enterprise-Quality Kubernetes with OpenShift......Page 817
Exercises......Page 818
Part VII: Appendixes......Page 820
Appendix A: Media......Page 822
Appendix B: Exercise Answers......Page 832
Index......Page 898