Introduction and Font Conventions | p. 1 |
The root Account | p. 2 |
Granting Limited root Powers | p. 3 |
Essential Administrative Tools | p. 8 |
Devices and Device Files | p. 15 |
Special File Formats | p. 15 |
File Ownership and Protection | p. 19 |
Access Control Lists (ACLs) | p. 20 |
System Messages and Log Files | p. 23 |
Startup and Shutdown | p. 29 |
User Accounts | p. 34 |
Solaris Projects | p. 38 |
User Account Management Commands | p. 39 |
User Account Attributes | p. 42 |
User Authentication and Login Controls | p. 43 |
Password Selection and Aging | p. 48 |
Process and Resource Management | p. 51 |
The cron Facility | p. 55 |
Managing Paging Space | p. 58 |
Filesystems and Disks | p. 59 |
Filesystem Configuration File | p. 59 |
Filesystem-Related Commands | p. 63 |
Adding a New Disk | p. 68 |
Logical Volume Managers | p. 70 |
Sharing Local Filesystems with NFS | p. 74 |
Backups | p. 75 |
Printing | p. 79 |
The BSD and LPRng Spooling Subsystems | p. 79 |
The System V Spooling Subsystem | p. 85 |
AIX Spooling Subsystem | p. 89 |
Serial Lines | p. 91 |
Serial Line Configuration Files | p. 92 |
Networking | p. 93 |
Network Client Configuration | p. 95 |
Network Servers | p. 98 |
Networking Administrative Commands | p. 108 |
Electronic Mail | p. 110 |
sendmail | p. 110 |
procmail and fetchmail | p. 117 |
Security | p. 121 |
System Hardening Checklist | p. 121 |
Security Monitoring Commands | p. 125 |
Kernel Configuration | p. 126 |
Configuring Boot Loaders | p. 127 |
Index | p. 131 |
Table of Contents provided by Syndetics. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.