Logo

Unix System Administration by Frank G. Fiamingo

Small book cover: Unix System Administration

Unix System Administration
by

Publisher: The Ohio State University
Number of pages: 424

Description:
Systems administration is the installation and maintenance of the UNIX computer system. The system administrator will need to maintain the software and hardware for the system. This includes hardware configuration, software installation, reconfiguration of the kernel, networking, and anything else that's required to make the system work and keep it running in a satisfactory manner.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: UNIX Text ProcessingUNIX Text Processing
by - Hayden Books
The book shows how to use UNIX to prepare written documents. An introduction to the ex, vi, and sed editors and troff and nroff text processing tools. At the end, these tools are brought together by the make utility to do any text processing job.
(13951 views)
Book cover: Secure Programming for Linux and Unix HOWTOSecure Programming for Linux and Unix HOWTO
by
The book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. This document includes specific guidance for a number of languages, including C, C++, Java, Perl, Python, and Ada95.
(14454 views)
Book cover: Writing GNOME ApplicationsWriting GNOME Applications
by - Addison-Wesley Professional
This book will help Linux programmers learn the basics of GNOME and understand how to write applications using this environment. Focusing on the essentials, the book guides you through GNOME's elements and explains how these elements function.
(12277 views)
Book cover: UNIX System Security: A Guide for Users and System AdministratorsUNIX System Security: A Guide for Users and System Administrators
by - Addison-Wesley
The first up-to-date source to provide the UNIX system user or administrator with the information needed to protect data and system from unauthorized use. By following the procedures described, you can protect your UNIX system from most attackers.
(4596 views)