Linux Advanced for SysAdmin
English

About The Book

<p><span style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>Building upon fundamental Linux skills </span><strong style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>this book is designed to elevate your expertise to handle intricate tasks crucial for senior system administrators</strong><span style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>. To begin with we will revisit key administrative tasks providing a solid foundation for the advanced topics to come. This includes </span><strong style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>managing files directories packages system services and user permissions to ensure you're up to speed. We then dive into the critical aspects of network management wherein we learn to configure network interfaces manage IP addresses and routing set up and secure network services like DHCP and DNS and monitor network performance using tools such as Wireshark</strong><span style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>.</span></p><p><br></p><p><span style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>We then move to </span><strong style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>explore iptables and firewalld configure firewalls implement AppArmor and perform security audits with Lynis</strong><span style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>. The chapter also covers </span><strong style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>monitoring system logs for security breaches and using intrusion detection systems like Snort</strong><span style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>. Then the chapter on Database Management demonstrates to </span><strong style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>work with databases in Linux including installing and configuring PostgreSQL designing databases performing migrations and securing database systems</strong><span style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>. The next chapter teaches you to </span><strong style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>monitor CPU and memory usage track network performance and analyze system logs using tools like Nagios and Zabbix</strong><span style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>.</span></p><p><br></p><p><span style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>Later we focus on </span><strong style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>automating routine tasks using shell scripting cron anacron awk and sed. You will learn to write scripts for system audits resource management and backup and recovery</strong><span style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>. Finally the book covers </span><strong style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>large-scale deployments Kubernetes cluster management load balancing and kernel customization</strong><span style=background-color: rgba(255 255 255 1); color: rgba(15 17 17 1)>.</span></p>
Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
downArrow

Details


LOOKING TO PLACE A BULK ORDER?CLICK HERE