Inhoudsopgave:
\u003cp\u003e\u003cb\u003eDeploy and manage today's essential services on an enterprise-class, open operating system\u003c/b\u003e\u003c/p\u003e\u003ch2\u003eAbout This Book\u003c/h2\u003e\u003cul\u003e\u003cli\u003eConfigure and manage Linux servers in varying scenarios and for a range of business requirements\u003c/li\u003e\u003cli\u003eExplore the up-to-date features of CentOS using real-world scenarios\u003c/li\u003e\u003cli\u003eSee practical and extensive recipes to deploy and manage CentOS\u003c/li\u003e\u003c/ul\u003e\u003ch2\u003eWho This Book Is For\u003c/h2\u003e\u003cp\u003eThis book is for Linux professionals with basic Unix/Linux functionality experience, perhaps even having set up a server before, who want to advance their knowledge in administering various services.\u003c/p\u003e\u003ch2\u003eWhat You Will Learn\u003c/h2\u003e\u003cul\u003e\u003cli\u003eSee how to deploy CentOS easily and painlessly, even in multi-server environments\u003c/li\u003e\u003cli\u003eConfigure various methods of remote access to the server so you donât always have to be in the data center\u003c/li\u003e\u003cli\u003eMake changes to the default configuration of many services to harden them and increase the security of the system\u003c/li\u003e\u003cli\u003eLearn to manage DNS, emails and web servers\u003c/li\u003e\u003cli\u003eProtect yourself from threats by monitoring and logging network intrusion and system intrusion attempts, rootkits, and viruses\u003c/li\u003e\u003cli\u003eTake advantage of todayâs powerful hardware by running multiple systems using virtualization\u003c/li\u003e\u003c/ul\u003e\u003ch2\u003eIn Detail\u003c/h2\u003e\u003cp\u003eCentOS is derived from Red Hat Enterprise Linux (RHEL) sources and is widely used as a Linux server. This book will help you to better configure and manage Linux servers in varying scenarios and business requirements.\u003c/p\u003e\u003cp\u003eStarting with installing CentOS, this book will walk you through the networking aspects of CentOS. You will then learn how to manage users and their permissions, software installs, disks, filesystems, and so on. Youâll then see how to secure connection to remotely access a desktop and work with databases. Toward the end, you will find out how to manage DNS, e-mails, web servers, and more. You will also learn to detect threats by monitoring network intrusion. Finally, the book will cover virtualization techniques that will help you make the most of CentOS.\u003c/p\u003e\u003ch2\u003eStyle and approach\u003c/h2\u003e\u003cp\u003eThis easy-to-read cookbook is filled with practical recipes. Hands-on, task-based exercises will present you with real-world solutions to deploy and manage CentOS in varying business scenarios.\u003c/p\u003e |