Unix System Administration
by Frank G. Fiamingo
Publisher: The Ohio State University 1996
Number of pages: 424
Description:
Systems administration is the installation and maintenance of the UNIX computer system. The system administrator will need to maintain the software and hardware for the system. This includes hardware configuration, software installation, reconfiguration of the kernel, networking, and anything else that's required to make the system work and keep it running in a satisfactory manner.
Download or read it online for free here:
Read online
(online html)
Similar books
The Art of UNIX Programming
by Eric S. Raymond - Addison-Wesley Professional
The first part of the book is philosophy and history of UNIX, the second part unfolds the Unix principles into more specific advice about design, the third part focuses on tools for solving problems, and the fourth part is about community.
(13626 views)
by Eric S. Raymond - Addison-Wesley Professional
The first part of the book is philosophy and history of UNIX, the second part unfolds the Unix principles into more specific advice about design, the third part focuses on tools for solving problems, and the fourth part is about community.
(13626 views)
Bourne Shell Scripting
- Wikibooks
This book covers the practical aspects of using and interacting with the Bourne Shell, the root of all shells in Unix world. That includes interacting with the shell on a day-to-day basis for the purposes of operating the computer in normal tasks.
(11637 views)
- Wikibooks
This book covers the practical aspects of using and interacting with the Bourne Shell, the root of all shells in Unix world. That includes interacting with the shell on a day-to-day basis for the purposes of operating the computer in normal tasks.
(11637 views)
UNIX System Security: A Guide for Users and System Administrators
by David A. Curry - Addison-Wesley
The first up-to-date source to provide the UNIX system user or administrator with the information needed to protect data and system from unauthorized use. By following the procedures described, you can protect your UNIX system from most attackers.
(6561 views)
by David A. Curry - Addison-Wesley
The first up-to-date source to provide the UNIX system user or administrator with the information needed to protect data and system from unauthorized use. By following the procedures described, you can protect your UNIX system from most attackers.
(6561 views)
The UNIX-HATERS Handbook
by Simson Garfinkel, Daniel Weise, Steven Strassmann - John Wiley & Sons Inc
Self-help guide for people affected by the world's most esoteric operating system. Turn here for answers to all-important questions, such as... Why does the online documentation lie to us? Why does the user's guide bear no relationship to reality?
(13714 views)
by Simson Garfinkel, Daniel Weise, Steven Strassmann - John Wiley & Sons Inc
Self-help guide for people affected by the world's most esoteric operating system. Turn here for answers to all-important questions, such as... Why does the online documentation lie to us? Why does the user's guide bear no relationship to reality?
(13714 views)