Atjaunināt sīkdatņu piekrišanu

Linux with Operating System Concepts 2nd edition [Mīkstie vāki]

(Northern Kentucky University, Highland Heights, USA)
  • Formāts: Paperback / softback, 598 pages, height x width: 254x178 mm, weight: 1075 g, 163 Tables, black and white; 284 Line drawings, black and white; 284 Illustrations, black and white
  • Izdošanas datums: 29-Dec-2021
  • Izdevniecība: Chapman & Hall/CRC
  • ISBN-10: 1032063459
  • ISBN-13: 9781032063454
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 117,13 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Bibliotēkām
  • Formāts: Paperback / softback, 598 pages, height x width: 254x178 mm, weight: 1075 g, 163 Tables, black and white; 284 Line drawings, black and white; 284 Illustrations, black and white
  • Izdošanas datums: 29-Dec-2021
  • Izdevniecība: Chapman & Hall/CRC
  • ISBN-10: 1032063459
  • ISBN-13: 9781032063454
Citas grāmatas par šo tēmu:
"A True Textbook for an Introductory Course, System Administration Course, or a Combination Course Linux with Operating System Concepts merges conceptual operating system (OS) and Unix/Linux topics into one cohesive textbook for undergraduate students. The book can be used for a one- or two-semester course on Linux or Unix. It is complete with review sections, problems, definitions, and concepts. Details for Introductory and Advanced Users The book covers Linux from both the user and system administratorpositions. From a user perspective, it emphasizes command line interaction. From a system administrator perspective, the text reinforces shell scripting with examples of administration scripts that support the automation of administrator tasks. Thorough Coverage of Concepts and Linux Commands The author incorporates OS concepts not found in most Linux/Unix textbooks, including kernels, file systems, storage devices, virtual memory, and process management. He also introduces computer science topics, such as computer networks and TCP/IP, encryption, file compression and the GNUs C compiler. New in this Edition The book has been updated to systemd Linux and the newer services like Cockpit, NetworkManager, firewalld and journald. This edition explores Linux beyond CentOS/Red Hat by adding detail on Debian distributions. Content across most topics has been updated and improved"--

Linux with Operating System Concepts, 2nd Edition, merges conceptual operating system (OS) and Unix/Linux topics into one cohesive textbook for undergraduate students. The book can be used for a one- or two-semester course on Linux or Unix. It is complete with review sections, problems, definitions, and concepts. 

Preface xv
Acknowledgments and Contributions xix
Author xxi
Chapter 1 Linux: What, Why, Who and When, and How 1(38)
1.1 Introduction
1(3)
1.2 What Is Linux?
4(7)
1.2.1 Early Operating Systems
4(1)
1.2.2 The Operating System Kernel
5(4)
1.2.3 Other Operating System Components
9(1)
1.2.4 So, What Is Linux?
10(1)
1.3 Why Use Linux?
11(1)
1.4 Who Developed Linux and When?
12(9)
1.4.1 The Birth and Development of Unix
12(2)
1.4.2 GNU
14(1)
1.4.3 Enter Linus Torvalds
15(3)
1.4.4 The Open-Source Community
18(3)
1.5 How Do You Use Linux?
21(13)
1.5.1 Installing Debian Linux
21(2)
1.5.2 Installing CentOS Linux
23(6)
1.5.3 Installing Ubuntu Linux
29(1)
1.5.4 Installing Linux Mint
30(2)
1.5.5 An Introduction to the Shell and Command Line
32(2)
1.6
Chapter Review
34(3)
Review Questions
37(2)
Chapter 2 Bash 39(46)
2.1 Introduction
39(2)
2.2 Entering Linux Commands
41(5)
2.2.1 Simple Linux Commands
41(2)
2.2.2 Commands with Options and Parameters
43(3)
2.3 Forms of Linux Help
46(6)
2.3.1 man Pages
46(1)
2.3.2 Other Forms of Command-Line Help
47(5)
2.4 Bash Features
52(15)
2.4.1 Recalling Commands through the History List
52(1)
2.4.2 Shell Variables
53(6)
2.4.3 Aliases
59(1)
2.4.4 Command-Line Editing
60(2)
2.4.5 Redirection
62(2)
2.4.6 Other Useful Bash Features
64(3)
2.5 Tailoring Our Environment
67(3)
2.6 vi
70(4)
2.6.1 vi Commands
70(3)
2.6.2 An Example to Illustrate How to Use vi
73(1)
2.7 Interpreters
74(4)
2.7.1 Interpreters in Programming Languages
75(1)
2.7.2 Interpreters in Shells
76(1)
2.7.3 The Bash Interpreter
77(1)
2.8
Chapter Review
78(2)
Review Questions
80(5)
Chapter 3 Linux File Commands 85(50)
3.1 Introduction
85(1)
3.2 Storage Terminology
86(3)
3.3 Filename Specification
89(6)
3.3.1 The Path
89(2)
3.3.2 Filename Arguments with Paths
91(1)
3.3.3 The PATH Variable
92(1)
3.3.4 Specifying Filenames with Wildcards
92(3)
3.4 File Commands
95(11)
3.4.1 Directory Commands
96(1)
3.4.2 File Movement and Copy Commands
97(2)
3.4.3 File Deletion Commands
99(1)
3.4.4 Creating and Deleting Directories
100(1)
3.4.5 Textfile Viewing Commands
100(1)
3.4.6 File Comparison Commands
101(2)
3.4.7 File Manipulation Commands
103(1)
3.4.8 Miscellaneous but Useful File Commands
104(2)
3.5 Permissions
106(6)
3.5.1 What Are Permissions?
106(1)
3.5.2 Altering Permissions from the Command Line
107(2)
3.5.3 Altering Permissions from the GUI
109(1)
3.5.4 Advanced Permissions
110(2)
3.6 Hard and Symbolic Links
112(2)
3.7 Locating Files
114(5)
3.7.1 Search Using the File Browser
114(1)
3.7.2 The find Command
115(3)
3.7.3 Other Means of Locating Files
118(1)
3.8 Secondary Storage Devices
119(5)
3.8.1 The Hard Disk Drive
119(3)
3.8.2 Magnetic Tape
122(1)
3.8.3 Optical Discs
122(1)
3.8.4 Flash Memory Drives
123(1)
3.8.5 Device Drivers
124(1)
3.9 File Compression
124(3)
3.9.1 Types of File Compression
124(1)
3.9.2 The Lempel-Ziv Algorithms for Lossless Compression
125(1)
3.9.3 Other Lossless Compression Algorithms
126(1)
3.9.4 Compression and Decompression Programs in Linux
127(1)
3.10
Chapter Review
127(3)
Review Questions
130(5)
Chapter 4 Managing Processes 135(44)
4.1 Introduction
135(2)
4.2 Forms of Process Management
137(6)
4.2.1 Single-Process Execution
138(1)
4.2.2 Concurrent Processing
139(3)
4.2.3 Interrupt Handling
142(1)
4.3 Starting, Pausing and Resuming Processes
143(6)
4.3.1 Ownership of Running Processes
144(1)
4.3.2 Launching Processes from the Command Line
145(2)
4.3.3 Suspending and Resuming Processes from the Command Line
147(2)
4.4 Monitoring Processes
149(8)
4.4.1 GUI Monitoring Tools
150(2)
4.4.2 Command-Line Monitoring Tools
152(5)
4.5 Managing Process Priority
157(5)
4.6 Process Termination
162(4)
4.6.1 Orphans and Zombies
162(1)
4.6.2 Killing Processes
162(2)
4.6.3 Shutting Down Linux
164(2)
4.7 A Look at System Resources
166(6)
4.7.1 Memory and Virtual Memory
166(3)
4.7.2 Linux Commands to Inspect System Resources
169(3)
4.8
Chapter Review
172(3)
Review Questions
175(4)
Chapter 5 Regular Expressions 179(50)
5.1 Introduction
179(1)
5.2 Metacharacters
180(13)
5.2.1 Controlling Repeated Characters through *, + and ?
182(1)
5.2.2 Using and Modifying the . Metacharacter
183(1)
5.2.3 Controlling Where a Pattern Matches
184(1)
5.2.4 Matching from a List of Options
185(2)
5.2.5 Matching Characters That Must Not Appear
187(1)
5.2.6 Matching Metacharacters Literally
188(1)
5.2.7 More Precisely Controlling Repetition
189(1)
5.2.8 Selecting between Sequences
190(3)
5.3 Examples
193(4)
5.4 grep
197(9)
5.4.1 Using egrep
198(2)
5.4.2 Useful egrep Options
200(2)
5.4.3 Examples: Searching the Linux Dictionary
202(2)
5.4.4 Using egrep to Control the Output of Other Linux Commands
204(2)
5.5 sed
206(6)
5.5.1 Basic sed Syntax
206(2)
5.5.2 Placeholders
208(3)
5.5.3 Other sed Capabilities
211(1)
5.6 awk
212(9)
5.6.1 awk Condition-Action Pairs
212(4)
5.6.2 BEGIN and END Sections
216(1)
5.6.3 Other Forms of Control
217(2)
5.6.4 awk Command Line Options and Arguments
219(1)
5.6.5 Non-File Input to awk
220(1)
5.7
Chapter Review
221(1)
Review Questions
222(7)
Chapter 6 Shell Scripting 229(54)
6.1 Introduction
229(1)
6.2 Simple Scripting
230(3)
6.2.1 Scripts of Linux Instructions
230(1)
6.2.2 Running Scripts
230(1)
6.2.3 Scripting Errors
231(2)
6.3 Variables, Assignments and Parameters
233(7)
6.3.1 Bash Variables
233(1)
6.3.2 Assignment Statements
233(1)
6.3.3 Executing Linux Commands from within Assignment Statements
234(2)
6.3.4 Arithmetic Operations in Assignment Statements
236(2)
6.3.5 String Operations Using expr
238(1)
6.3.6 Command-Line Parameters
239(1)
6.4 Input and Output
240(5)
6.4.1 Output with echo
240(3)
6.4.2 Input with read
243(2)
6.5 Selection Statements
245(11)
6.5.1 Conditions for Strings and Integers
246(1)
6.5.2 File Conditions
247(2)
6.5.3 The if-then and if-then-else Statements
249(1)
6.5.4 Nested Statements
250(3)
6.5.5 Case Statement
253(3)
6.5.6 Conditions Outside of Selection Statements
256(1)
6.6 Loops
256(8)
6.6.1 Conditional Loops
257(2)
6.6.2 Counter-Controlled Loops
259(1)
6.6.3 Iterator Loops
259(3)
6.6.4 Using the seq Command to Generate a List
262(1)
6.6.5 The while read Statement
263(1)
6.7 Arrays
264(4)
6.7.1 Declaring and Initializing Arrays
265(1)
6.7.2 Accessing Array Elements and Entire Arrays
265(1)
6.7.3 Example Scripts Using Arrays
266(2)
6.8 String Manipulation
268(3)
6.8.1 Substrings Revisited
268(1)
6.8.2 String Regular Expression Matching
269(2)
6.9 Functions
271(4)
6.9.1 Defining Bash Functions
271(1)
6.9.2 Using Functions
271(2)
6.9.3 Functions and Variables
273(1)
6.9.4 exit and return Statements
274(1)
6.10
Chapter Review
275(3)
Review Questions
278(5)
Chapter 7 User Accounts 283(44)
7.1 Introduction
283(1)
7.2 Creating Accounts and Groups
284(12)
7.2.1 Creating User and Group Accounts through the GUI
285(4)
7.2.2 Creating User and Group Accounts from the Command Line
289(4)
7.2.3 Creating a Large Number of User Accounts
293(3)
7.3 Managing Users and Groups
296(2)
7.4 Password Management
298(4)
7.4.1 Automatically Generating Passwords
298
7.4.2 Managing Passwords
100(202)
7.5 PAM and Enforcing Strong Passwords
302(5)
7.6 Establishing Common User Resources
307(3)
7.6.1 Populating User Home Directories with Initial Files
307(1)
7.6.2 Initial User Settings and Defaults
308(2)
7.7 The sudo Command
310
7.8 SELinux
112(204)
7.8.1 SELinux Components
113(201)
7.8.2 A Closer Look at Contexts
314
7.8.3 Rules
115(201)
7.9 Establishing User and Group Policies
316(3)
7.10
Chapter Review
319(2)
Review Questions
321(6)
Chapter 8 Administering Linux File Systems 327(56)
8.1 Introduction
327(1)
8.2 Storage Access
328(5)
8.2.1 Disk Storage and Blocks
328(1)
8.2.2 Block Indexing Using a File Allocation Table
329(1)
8.2.3 Other Disk Storage Details
330(1)
8.2.4 File Storage and Object Storage
331(2)
8.3 Linux Files
333(4)
8.3.1 Files versus Directories
333(1)
8.3.2 Non-File File Types
333(2)
8.3.3 Links as File Types
335(1)
8.3.4 Reviewing the File Types
336(1)
8.4 The inode
337(7)
8.4.1 inode Metadata
317(21)
8.4.2 inode Pointers
338(2)
8.4.3 Linux Commands to Inspect inodes and Files
340(4)
8.5 Partitions and File Systems
344(11)
8.5.1 Why Partition?
344(1)
8.5.2 Viewing the Available Partitions
345(2)
8.5.3 Creating Partitions
347(2)
8.5.4 Repartitioni ng
349(2)
8.5.5 Using a Logical Volume Manager to Partition
351(2)
8.5.6 Adding a Disk Drive
353(2)
8.6 Administrative File System Tasks
355(12)
8.6.1 Mounting and Unmounting File Systems
356(2)
8.6.2 Remote File Systems
358(1)
8.6.3 Establishing Quotas on a File System
359(2)
8.6.4 Miscellaneous Administrative File System Commands
361(6)
8.7 Linux Top-Level Directories
367(8)
8.7.1 Root (/) Partition Directories
368(1)
8.7.2 The /etc Directory
369(1)
8.7.3 The /boot, /home and /var Directories
369(3)
8.7.4 Virtual File System Directories
372(3)
8.8
Chapter Review
375(4)
Review Problems
379(4)
Chapter 9 System Initialization and Services 383(50)
9.1 Introduction
383(1)
9.2 Booting the Computer
384(6)
9.2.1 Volatile and Non-Volatile Memory
384(1)
9.2.2 The Boot Process
385(1)
9.2.3 The Linux Boot Process
385(4)
9.2.4 Loading and Running the Linux Kernel
389(1)
9.3 Initialization of the Linux Operating System
390(15)
9.3.1 Target Unit Files
391(5)
9.3.2 Service Unit Files
396(3)
9.3.3 Other Unit File Types
399(3)
9.3.4 Modifying System Initialization
402(3)
9.4 Linux Services
405(6)
9.4.1 What Are Services?
405(1)
9.4.2 An Examination of Significant Linux Services
406(5)
9.5 Using systemctl
411(3)
9.6 Configuration Files
414(12)
9.6.1 Non-Service Configuration Files
415(2)
9.6.2 Configuring rsyslog
417(2)
9.6.3 Configuring nfs
419(2)
9.6.4 Configuring logrotate
421(3)
9.6.5 Configuring auditd
424(2)
9.7
Chapter Review
426(2)
Review Problems
428(5)
Chapter 10 Network Configuration 433(56)
10.1 Introduction
433(1)
10.2 Computer Networks and TCP/IP
434(11)
10.2.1 Network Connection Devices
434(1)
10.2.2 The TCP/IP Protocol Stack
435(5)
10.2.3 Ports
440(1)
10.2.4 IPv6
440(2)
10.2.5 Domains, the Domain Name System and Host Names
442(3)
10.3 Linux NetworkManager Service and Related Services and Files
445(8)
10.3.1 NetworkManager
446(3)
10.3.2 Other Network Services of Note
449(3)
10.3.3 Establishing DNS Access
452(1)
10.4 Obtaining IP Addresses
453(4)
10.4.1 Configuring Our Interface Device(s)
454(1)
10.4.2 Setting Up a DHCP Server
454(3)
10.5 Network Programs
457(14)
10.5.1 The ip Program
457(2)
10.5.2 Remote Access and File Transfer Programs
459(4)
10.5.3 Network Inspection Programs
463(2)
10.5.4 Address Resolution Programs
465(6)
10.6 The Linux Firewall
471(9)
10.6.1 The firewalld Service
472(1)
10.6.2 The Firewall Configuration GUI Tool
473(3)
10.6.3 firewall-cmd
476(1)
10.6.4 ufw
476(4)
10.7
Chapter Review
480(5)
Review Questions
485(4)
Chapter 11 Software Installation and Maintenance 489(42)
11.1 Introduction
489(2)
11.2 Software Maintenance Terminology
491(5)
11.2.1 Types of Programming Languages
491(1)
11.2.2 Types of Software
492(1)
11.2.3 Types of Software Licenses
493(1)
11.2.4 Types of Software Management
493(3)
11.3 Installation and Maintenance from a Software Store
496(6)
11.3.1 Red Hat Software GUI
496(2)
11.3.2 Debian Mint Software GUI
498(3)
11.3.3 Ubuntu Software Center
501(1)
11.4 rpm and dpkg
502(5)
11.4.1 rpm
503(2)
11.4.2 dpkg
505(2)
11.5 dnf/yum and apt
507(4)
11.6 Installation of Source Code
511(6)
11.6.1 Obtaining Installation Packages
512(1)
11.6.2 Extracting from the Archive
513(1)
11.6.3 Running the configure Script
514(1)
11.6.4 The make Step and the makefile
514(2)
11.6.5 The make install Step
516(1)
11.7 The gcc Compiler
517(6)
11.7.1 Preprocessing
518(1)
11.7.2 Lexical Analysis and Syntactic Parsing
518(2)
11.7.3 Semantic Analysis, Compilation and Optimization
520(1)
11.7.4 Linking
520(2)
11.7.5 Using gcc
522(1)
11.8 Software Documentation
523(2)
11.9
Chapter Review
525(3)
Review Questions
528(3)
Chapter 12 Maintaining and Troubleshooting Linux 531(50)
12.1 Introduction
531(1)
12.2 File System Integrity: Backups, RAID and Encryption
532(15)
12.2.1 Backups: Why, How and When
532(5)
12.2.2 RAID for File System Integrity
537(6)
12.2.3 Encryption and Encryption Programs
543(4)
12.3 Task Scheduling
547(4)
12.3.1 at and atd
547(2)
12.3.2 crontab and crond
549(2)
12.4 System Monitoring
551(9)
12.4.1 Operating System Issues That Degrade Performance
551(3)
12.4.2 Processor and Process System Monitoring Tools
554(1)
12.4.3 Memory System Monitoring Tools
555(2)
12.4.4 I/O System Monitoring Tools
557(3)
12.5 Log Files
560(9)
12.5.1 rsyslogd-Created Log Files
560(1)
12.5.2 auditd Logs
561(4)
12.5.3 Examining the Log Files
565(1)
12.5.4 journald
566(3)
12.6 Troubleshooting
569(5)
12.7
Chapter Review
574(3)
Review Questions
577(4)
Bibliography 581(8)
Index 589
Richard Fox is a professor of computer science at Northern Kentucky University (NKU). He regularly teaches courses in both computer science (Artificial Intelligence, Computer Systems, Computer Architecture, Concepts of Programming Languages, Object-Oriented Programming I and II) and computer information technology (IT Fundamentals, Unix/Linux). Dr. Fox, who has been at NKU since 2001, is the current chair of NKUs University Curriculum Committee. Prior to NKU, Dr. Fox taught for 9 years at the University of Texas Pan American (now known as University of Texas Rio Grande Valley). Richard has received teaching awards from UTPA and from NKU, and a service award from NKU. Dr. Fox received a Ph.D. in Computer and Information Sciences from The Ohio State University in 1992. He also has an M.S. in Computer and Information Sciences from Ohio State (1988) and a B.S. in Computer Science from the University of Missouri Rolla (now Missouri University of Science and Technology) in 1986. Dr. Fox has written two other textbooks published by Taylor & Francis/CSC Press in the IT field (Linux and Operating System Concepts, 2015, and Internet Infrastructure: Networking, Web Services and Cloud Computing, with Dr. Wei Hao, 2018). Dr. Fox has also authored or co-authored of over 50 peer reviewed research articles primarily in the area of Artificial Intelligence. Richard Fox grew up in St. Louis, Missouri and now lives in Cincinnati, Ohio. He is a big science fiction fan and progressive rock fan. As you will see in reading this text, his favorite composer is Frank Zappa.