Slutsåld
Toward a Gameic World bridges the gap between Japanese popular culture studies and game studies by encouraging a dialogue centered around Japanese-designed video games and social issues. It examines four contemporary Japanese video games in terms ...
Evi Nemeth is a retired computer science faculty member at the University of Colorado and Senior Staff Member in Network Research at the San Diego Supercomputer Center's Cooperative Association for Internet Data Analysis. Garth Snyder has worked at NeXT and Sun and holds a BS in Engineering from Swarthmore College and an MD and an MBA from the University of Rochester. Trent R. Hein is the co-founder of Applied Trust, a company that provides IT infrastructure consulting services. Trent holds a BS in Computer Science from the University of Colorado. Ben Whaley is the Director of Enterprise Architecture at Applied Trust. Ben earned a BS in Computer Science from the University of Colorado. He is an expert in storage management, virtualization, and web infrastructure.
Foreword xlii
Preface xliv
Acknowledgments xlvi
Section One: Basic Administration
Chapter 1: Where to Start 3
Essential duties of the system administrator 4
Suggested background 6
Friction between UNIX and Linux 7
Linux distributions 9
Example systems used in this book 10
System-specific administration tools 13
Notation and typographical conventions 13
Units 14
Man pages and other on-line documentation 16
Other authoritative documentation 18
Other sources of information 20
Ways to find and install software 21
System administration under duress 26
Recommended reading 27
Exercises 28
Chapter 2: Scripting and the Shell 29
Shell basics 30
bash scripting 37
Regular expressions 48
Perl programming 54
Python scripting 66
Scripting best practices 73
Recommended reading 74
Exercises 76
Chapter 3: Booting and Shutting Down 77
Bootstrapping 78
Booting PCs 82
GRUB: The GRand Unified Boot loader 83
Booting to single-user mode 86
Working with startup scripts 87
Booting Solaris 97
Rebooting and shutting down 100
Exercises 102
Chapter 4: Access Control and Rootly Powers 103
Traditional UNIX access control 104
Modern access control 106
Real-world access control 110
Pseudo-users other than root 118
Exercises 119
Chapter 5: Controlling Processes 120
Components of a process 120
The life cycle of a process 123
Signals 124
kill: send signals 127
Process states 128
nice and renice: influence scheduling priority 129
ps: monitor processes 130
Dynamic monitoring with top, prstat, and topas 133
The /proc filesystem 135
strace, truss, and tusc: trace signals and system calls 136
Runaway processes 138
Recommended reading 139
Exercises 139
Chapter 6: The Filesystem 140
Pathnames 142
Filesystem mounting and unmounting 143
The organization of the file tree 145
File types 147
File attributes 152
Access control lists 159
Exercises 173
Chapter 7: Adding New Users 174
The /etc/passwd file 176
The /etc/shadow and /etc/security/passwd files 183
The /etc/group file 186
Adding users: the basic steps 187
Adding users with useradd 191
Adding users in bulk with newusers (Linux) 197
Removing users 198
Disabling logins 200
Managing users with system-specific tools 201
Reducing risk with PAM 201
Centralizing account management 201
Recommended r...