-
Book Overview & Buying
-
Table Of Contents
Linux Administration Best Practices
By :
Linux Administration Best Practices
By:
Overview of this book
Linux is a well-known, open source Unix-family operating system that is the most widely used OS today. Linux looks set for a bright future for decades to come, but system administration is rarely studied beyond learning rote tasks or following vendor guidelines. To truly excel at Linux administration, you need to understand how these systems work and learn to make strategic decisions regarding them.
Linux Administration Best Practices helps you to explore best practices for efficiently administering Linux systems and servers. This Linux book covers a wide variety of topics from installation and deployment through to managing permissions, with each topic beginning with an overview of the key concepts followed by practical examples of best practices and solutions. You'll find out how to approach system administration, Linux, and IT in general, put technology into proper business context, and rethink your approach to technical decision making. Finally, the book concludes by helping you to understand best practices for troubleshooting Linux systems and servers that'll enable you to grow in your career as well as in any aspect of IT and business.
By the end of this Linux administration book, you'll have gained the knowledge needed to take your Linux administration skills to the next level.
Table of Contents (16 chapters)
Preface
Section 1: Understanding the Role of Linux System Administrator
Chapter 1: What Is the Role of a System Administrator?
Chapter 2: Choosing Your Distribution and Release Model
Section 2: Best Practices for Linux Technologies
Chapter 3: System Storage Best Practices
Chapter 4: Designing System Deployment Architectures
Chapter 5: Patch Management Strategies
Chapter 6: Databases
Section 3: Approaches to Effective System Administration
Chapter 7: Documentation, Monitoring, and Logging Techniques
Chapter 8: Improving Administration Maturation with Automation through Scripting and DevOps
Chapter 9: Backup and Disaster Recovery Approaches
Chapter 10: User and Access Management Strategies
Chapter 11: Troubleshooting
Other Books You May Enjoy