Red Hat Enterprise Linux 5 Administration Unleashed blends step-by-step instructions with just enough conceptual knowledge to help RHEL 5 administrators on a daily basis. Why another Linux book you might ask? I have been writing about Linux for years and reading Linux books for longer. When I first started learning Linux, I was frustrated with the lack of detail in most books. I would look up a topic, read all the theory and conceptual sections, and then turn the page expecting to see the actual instructions for implementing what I had read about.

Topics covered include:

* Installing on a single system or on multiple systems simultaneously with Kickstart
* Installing, updating, and removing software with YUM and Red Hat Network
* Navigating the Filesystem from the command line
* Managing storage with partitions, LVM, and RAID
* Using access control lists and disk quotas
* Managing users and groups efficiently
* Performing backups and rapid recovery
* Automating tasks with scripts and scheduling them with cron
* Setting up unified identity management services
* Administering network services for file sharing, network connectivity, an secure
remote login
* Monitoring and tuning system resources, the kernel, and applications
* Protecting against security vulnerabilities with SELinux and ExecShield
* Setting up a firewall with IPTables
* Customing the Linux Auditing System
* Running multiple operating systems concurrently with Virtualization

Contents:-

Introduction

Part I: Installation and Configuration
Installing Red Hat Enterprise Linux
Post-Installation Configuration
Operating System Updates

Part II: Operating System Core Concepts
Understanding Linux Concepts
Working with RPM Software
Analyzing Hardware
Managing Storage
64-Bit, Multi-Core, and Hyper-Threading Technology Processors

Part III: System Administration
Managing Users and Groups
Techniques for Backup and Recovery
Automating Tasks with Scripts

Part IV: Network Services
Identity Management
Network File Sharing
Granting Network Connectivity with DHCP
Creating a Web Server with the Apache HTTP Server
Hostname Resolution with BIND
Securing Remote Logins with OpenSSH
Setting Up an Email Server with Sendmail
Explaining Other Common Network Services

Part V: Monitoring and Tuning
Monitoring System Resources
Monitoring and Tuning the Kernel
Monitoring and Tuning Application

Part VI: Security
Protecting Against Intruders with Security-Enhanced Linux
Configuring a Firewall
Linux Auditing System

Appendixes
A Installing Proprietary Kernel Modules
B Creating Virtual Machines
C Preventing Security Breaches with ExecShield
D Troubleshooting


Download link

Non Camera SmartPhones