We strive to deliver the best value to our customers and ensure complete satisfaction for all our textbook rentals.
You can return your online books for any reason within our refund period – no questions asked.
Every order is available for express shipping, and return shipping is always free.
You'll be happy with the quality of your books (or we'll ship you another one on our dime).
You can extend your rental at any time – at the same cheap daily rental rate.
If you decide to keep the book it will never cost more than the purchase price.
As always, you have access to over 5 million titles. Plus, you can choose from 5 rental periods, so you only pay for what you’ll use. And if you ever run into trouble, our top-notch U.S. based Customer Service team is ready to help by email, chat or phone.
* Free shipping excludes HI, AK and PR.
Supplemental materials are not guaranteed for used textbooks or rentals (access codes, DVDs, workbooks).
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging. Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how...
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging. Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how to maximize your efficiency and effectiveness by automating day-to-day maintenance through scripting, deploying security updates via Red Hat Network, implementing central identity management services, and providing shared data with NFS and Samba. Red Hat Enterprise Linux 5 Administration Unleashed contains extensive coverage of network and web services, from the Apache HTTP server and Sendmail email services to remote login with OpenSSH. Fox also describes Red Hat’s most valuable tools for monitoring and optimization and presents thorough coverage of security—including a detailed introduction to Security-Enhanced Linux (SELinux). Streamline deployment with Kickstart Find, install, update, remove, and verify software Detect, analyze, and manage hardware Manage storage with LVM, RAID, ACLs, and quotas Use Red Hat Enterprise Linux 5 on 64-bit and multi-core systems Administer users and groups more efficiently and securely Ensure trustworthy backup and rapid recovery Script and schedule tasks to run automatically Provide unified identity management services Configure Apache, BIND, Samba, and Sendmail Monitor and tune the kernel and individual applications Protect against intruders with SELinux and ExecShield Set up firewalls with iptables Enable the Linux Auditing System Use virtualization to run multiple operating systems concurrently Part I Installation and Configuration Chapter 1 Installing Red Hat Enterprise Linux Chapter 2 Post-Installation Configuration Chapter 3 Operating System Updates Part II Operating System Core Concepts Chapter 4 Understanding Linux Concepts Chapter 5 Working with RPM Software Chapter 6 Analyzing Hardware Chapter 7 Managing Storage Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors Part III System Administration Chapter 9 Managing Users and Groups Chapter 10 Techniques for Backup and Recovery Chapter 11 Automating Tasks with Scripts Part IV Network Services Chapter 12 Identity Management Chapter 13 Network File Sharing Chapter 14 Granting Network Connectivity with DHCP Chapter 15 Creating a Web Server with the Apache HTTP Server Chapter 16 Hostname Resolution with BIND Chapter 17 Securing Remote Logins with OpenSSH Chapter 18 Setting Up an Email Server with Sendmail Chapter 19 Explaining Other Common Network Services Part V Monitoring and Tuning Chapter 20 Monitoring System Resources Chapter 21 Monitoring and Tuning the Kernel Chapter 22 Monitoring and Tuning Applications Chapter 23 Protecting Against Intruders with Security-Enhanced Linux Chapter 24 Configuring a Firewall Chapter 25 Linux Auditing System Appendixes Appendix A Installing Proprietary Kernel Modules Appendix B Creating Virtual Machines Appendix C Preventing Security Breaches with ExecShield Appendix D Troubleshooting Tammy Fox served as technical leader of Red Hat’s documentation group, where she wrote and revised The Red Hat Enterprise Linux System Administration Guide. She was founding editor of Red Hat Magazine, now an online publication reaching more than 800,000 system administrators and others interested in Linux and open source. She wrote Red Hat’s LogViewer tool and has written and contributed to several Red Hat configuration tools. Fox is also the founding leader of the Fedora Docs Project. Register your book at www.samspublishing.com/register for convenient access to updates and to download example scripts presented in this book. Category:Linux/Networking Covers:Red Hat Enterprise Linux 5 User Level:IntermediateAdvanced
Since launching the first textbook rental site in 2006, BookRenter has never wavered from our mission to make education more affordable for all students. Every day, we focus on delivering students the best prices, the most flexible options, and the best service on earth. On March 13, 2012 BookRenter.com, Inc. formally changed its name to Rafter, Inc. We are still the same company and the same people, only our corporate name has changed.