日韩偷拍一区二区,国产香蕉久久精品综合网,亚洲激情五月婷婷,欧美日韩国产不卡

在線客服
使用Perl實現系統管理自動化 第二版(影印版)圖書
人氣:38

使用Perl實現系統管理自動化 第二版(影印版)

使用 Perl實現系統管理自動化(第2版)(影印版)》內容簡介:如果你從事任何系統管理方面的工作,就必須應對日益復雜的工作環境以及對你的時間不斷增加的需求。《使用Perl實現系統管理自動化 第二版》不僅提供了可用...

內容簡介

使用 Perl實現系統管理自動化(第2版)(影印版)》內容簡介:如果你從事任何系統管理方面的工作,就必須應對日益復雜的工作環境以及對你的時間不斷增加的需求。《使用Perl實現系統管理自動化 第二版》不僅提供了可用于工作的恰當工具,還給出了許多建議,幫助你解決特定問題以及安全地自動處理重復事務。這一版的"書"經過更新和擴充,涵蓋了的操作系統、技術和Perl模塊,將會幫助你:

管理用戶賬戶

監測文件系統和進程

處理XML和YAML等格式的配置文件

使用DBI管理數據庫,包括MySQL、MS SQL和Oracle

處理LDAP和Active Directory等目錄服務

編寫腳本管理電子郵件協議和垃圾郵件

高效地創建、處理和分析日志文件

管理網絡名稱和配置服務,包括NIS、DNS和DHCP

維護、監測和映射網絡服務

提高文件系統、進程和網絡的安全性

這一版的附錄中還包含了額外內容,幫助你快速掌握XML/XPath、LDAP、SNMP和SQL等技術。《使用 Perl實現系統管理自動化(第2版)(影印版)》在手并結合Perl,你將花費更少的資源,付出更少的勞動,大大減少煩惱,讓你事半功倍。

作者簡介

David N.Blank-Edelman是美國東北大學計算機與信息科學學院的技術主任,擁有25年在多種平臺上的系統/網絡管理員經驗。

目錄

Preface

1. Introduction

Automation Is a Must

How Perl Can Help You

This Book Will Show You How

What You Need

Some Notes About the Perl Versions Used for This Book

What About Perl 5.10?

What About Strawberry Perl?

What About Perl 6?

Some Notes About Using Vista with the Code in This Book

Locating and Installing Modules

Installing Modules on Unix

Installing Modules on Win32

It`s Not Easy Being Omnipotent

Don`t Do It

Drop Your Privileges As Soon As Possible

Be Careful When Reading Data

Be Careful When Writing Data

Avoid Race Conditions

.Enjoy

References for More Information

2. Filesystems

Perl to the Rescue

Filesystem Differences

Unix

Windows-Based Operating Systems

Mac OS X

Filesystem Differences Summary

Dealing with Filesystem Differences from Perl

Walking or Traversing the Filesystem by Hand

Walking the Filesystem Using the File::Find Module

Walking the Filesystem Using the File::Find::Rule Module

Manipulating Disk Quotas

Editing Quotas with edquota Trickery

Editing Quotas Using the Quota Module

Editing NTFS Quotas Under Windows

Querying Filesystem Usage

Module Information for This Chapter

References for More Information

3. User Accounts

Unix User Identities

The Classic Unix Password File

Changes to the Password File in BSD 4.4 Systems

Shadow Passwords

Windows-Based Operating System User Identities

Windows User Identity Storage and Access

Windows User ID Numbers

Windows Passwords Don`t Play Nice with Unix Passwords

Windows Groups

Windows User Rights

Building an Account System to Manage Users

The Backend Database

The Low-Level Component Library

The Process Scripts

Account System Wrap-Up

Module Information for This Chapter

References for More Information

Unix Password Files

Windows User Administration

4. User Activity

Process Management

Windows-Based Operating System Process Control

Unix Process Control

File and Network Operations

Tracking File Operations on Windows

Tracking Network Operations on Windows

Tracking File and Network Operations in Unix

Module Information for This Chapter

Installing Win32::Setupsup

References for More Information

5. TCP/IP Name and Configuration Services

Host Files

Generating Host Files

Error-Checking the Host File Generation Process

Improving the Host File Output

Incorporating a Source Code Control System

NIS, NIS+, and WINS

NIS+

Windows Internet Name Server (WINS

Domain Name Service (DNS

Generating DNS (BIND) Configuration Files

DNS Checking: An Iterative Approach

DHCP

Active Probing for Rogue DHCP Servers

Monitoring Legitimate DHCP Servers

Module Information for This Chapter

References for More Information

6. Working with Configuration Files

Configuration File Formats

Binary

Naked Delimited Data

Key/Value Pairs

Markup Languages

All-in-One Modules

Advanced Configuration Storage Mechanisms

Module Information for This Chapter

References for More Information

XML and YAML

7. SQL Database Administration

Interacting with a SQL Server from Perl

Using the DBI Framework

Using ODBC from Within DBI

Server Documentation

MySQL Server via DBI

Oracle Server via DBI

Microsoft SQL Server via ODBC

Database Logins

Monitoring Space Usage on a Database Server

Module Information for This Chapter

References for More Information

DBI

Microsoft SQL Server

ODBC

Oracle

8. Email

Sending Mail

Getting sendmail (or a Similar Mail Transport Agent

Using the OS-Specific IPC Framework to Drive a Mail Client

Speaking the Mail Protocols Directly

Common Mistakes in Sending Email

Overzealous Message Sending

Subject Line Waste

Insufficient Information in the Message Body

Fetching Mail

Talking POP3 to Fetch Mail

Talking IMAP4rev1 to Fetch Mail

Processing Mail

Dissecting a Single Message

Dissecting a Whole Mailbox

Dealing with Spam

Support Mail Augmentation

Module Information for This Chapter

References for More Information

9. Directory Services

What`s a Directory?

Finger: A Simple Directory Service

The WHOIS Directory Service

LDAP: A Sophisticated Directory Service

LDAP Programming with Perl

The Initial LDAP Connection

Performing LDAP Searches

Entry Representation in Perl

Adding Entries with LDIF

Adding Entries with Standard LDAP Operations

Deleting Entries

Modifying Entry Names

Modifying Entry Attributes

Deeper LDAP Topics

Putting It All Together

Active Directory Service Interfaces

ADSI Basics

Using ADSI from Perl

Dealing with Container/Collection Objects

Identifying a Container Object

So How Do You Know Anything About an Object?

Searching

Performing Common Tasks Using the WinNT and LDAP Namespaces

Working with Users via ADSI

Working with Groups via ADSI

Working with File Shares via ADSI

Working with Print Queues and Print Jobs via ADSI

Working with Windows-Based Operating System Services via ADSI

Module Information for This Chapter

References for More Information

LDAP

ADSI

10. Log Files

Reading Text Logs

Reading Binary Log Files

Using unpack

Calling an OS (or Someone Else`s) Binary

Using the OS`s Logging API

Structure of Log File Data

Dealing with Log File Information

Space Management of Logging Information

Log Parsing and Analysis

Writing Your Own Log Files

Logging Shortcuts and Formatting Help

Basic/Intermediate Logging Frameworks

Advanced Logging Framework

Module Information for This Chapter

References for More Information

11. Security

Noticing Unexpected or Unauthorized Changes

Local Filesystem Changes

Changes in Data Served Over the Network

Noticing Suspicious Activities

Local Signs of Peril

Finding Problematic Patterns

Danger on the Wire, or "Perl Saves the Day"

Preventing Suspicious Activities

Suggest Better Passwords

Reject Bad Passwords

Module Information for This Chapter

References for More Information

12. SNMP

Using SNMP from Perl

Sending and Receiving SNMP Traps, Notifications, and Informs

Alternative SNMP Programming Interfaces

Module Information for This Chapter

References for More Information

13. Network Mapping and Monitoring

Network Mapping

Discovering Hosts

Discovering Network Services

Physical Location

Presenting the Information

Textual Presentation Tools

Graphical Presentation Tools

Monitoring Frameworks

Extending Existing Monitoring Packages

What`s Left?

Module Information for This Chapter

References for More Information

14. Experiential Learning

Playing with Timelines

Task One: Parsing crontab Files

Task Two: Displaying the Timeline

Task Three: Writing Out the Correct XML File

Putting It All Together

Summary: What Can We Learn from This?

Playing with Geocoding

Geocoding from Postal Addresses

Geocoding from IP Addresses

Summary: What Can We Learn from This?

Playing with an MP3 Collection

Summary: What Can We Learn from This?

One Final Exploration

Part One: Retrieving the Wiki Page with WWW::Mechanize

Part Two: Extracting the Data

Part Three: Geocoding and Mapping the Data

Summary: What Can We Learn from This?

Remember to Play

Module Information for This Chapter

Source Material for This Chapter

A. The Eight-Minute XML Tutorial

B. The 10-Minute XPath Tutorial

C. The 10-Minute LDAP Tutorial

D. The 15-Minute SQL Tutorial

E. The Five-Minute RCS Tutorial

F. The Two-Minute VBScript-to-Perl Tutorial

G. The 20-Minute SNMP Tutorial

Index

在線預覽

FAT filesystems are case-insensitive. In Unix, an attempt to open a file using thewrong case (i.e., MYFAVORITEFILE versus myfavoritefile) will fail, but with FATor VFAT, this will succeed with no problem.

Instead of a forward slash, FAT uses the backward slash () as its path separator.This has a direct ramification for the Perl programmer, because the backslash is aquoting character in Perl. Paths written in single quotes with only single separators(e.g, Spathe' dirdirfilename') are just fine. However, situations in which youneed to place multiple backslashes next to each other (e.g, serverdirfile) arepotential trouble. In those cases, you have to be vigilant in doubling any multiplebackslashes. Some Perl functions and some Perl modules will accept paths withforward slashes, but you shouldn't count on this convention when programming.

It is better to bite the bullet and write winnttemp than to learn that yourcode breaks because the conversion hasn't been done for you.

FAT files and directories have special flags associated with them that are calledattributes. Example attributes include "Read-only" and "System."

The root of a FAT filesystem is specified starting with the drive letter on which thefilesystem resides. For instance, the absolute path for a file might be specified asc : homecindydocsresumecurrent.doc.

FAT32 and NTFS filesystems have the same semantics as VFAT filesystems. They sharethe same support for long filenames and use the same root designator. NTFS is moresophisticated in its name support, however, because it allows these names to be specified using Unicode. Unicode is a multibyte character encoding scheme that can be usedto represent all of the characters of all of the written languages on the planet.NTFS also has some functional differences that distinguish it from the other Windowsand basic Unix filesystems. Later in this chapter, we will write some code to take advantage of some of these differences, such as filesystem quotas. NTFS supports ACLs,which provide a fine-grained permission mechanism for file and directory access.

媒體評論

"直到系統管理員閱讀本書前,存在太多的任務本可以(并且應該)自動化完成但卻沒有。Peri是一種強大的工具,David向我們展示了如何讓系統管理員付出更少勞動就能將系統掌控得更好。" ——Peter Baer Galvin,Corporate Technologies 公司首席技術官、IT架構師

網友評論(不代表本站觀點)

來自hssir**的評論:

還不錯,英文版的,慢慢看

2011-11-27 21:42:13
來自李有才**的評論:

書很好,對系統管理員來說非常合適。

2012-05-29 08:32:03
來自無昵稱**的評論:

這個商品不錯~

2013-11-19 11:02:56
來自無昵稱**的評論:

"這種計算機一類的書,本人覺得經常是挑花眼了,一搜索,就出來一大堆,看看都差不多,也不知道哪個好,哪個不行?看得急了煩了,就隨便選一本。結果有時快遞到了,一翻,發現要不看不懂,要不不是我想學的。挺愁人的。那天又在網上到處查,碰巧 看到一個“獵豹網校”,嘿,全是計算機課程,還每門課都有本書,比如我想學網頁設計、想學點C語言了,不知道該挑什么書才合適,在獵豹網校上一搜,出來好多,老師列得挺清楚。試聽了一下,就跟坐教室機房里,看著老師在自己面前操作一樣,一步一步,可清楚了。這樣子學一下,可比自己光買本書,回來學得一個頭三個大要…

2011-10-19 19:13:29
來自無昵稱**的評論:

"這種計算機一類的書,本人覺得經常是挑花眼了,一搜索,就出來一大堆,看看都差不多,也不知道哪個好,哪個不行?看得急了煩了,就隨便選一本。結果有時快遞到了,一翻,發現要不看不懂,要不不是我想學的。挺愁人的。那天又在網上到處查,碰巧 看到一個“獵豹網校”,嘿,全是計算機課程,還每門課都有本書,比如我想學網頁設計、想學點C語言了,不知道該挑什么書才合適,在獵豹網校上一搜,出來好多,老師列得挺清楚。試聽了一下,就跟坐教室機房里,看著老師在自己面前操作一樣,一步一步,可清楚了。這樣子學一下,可比自己光買本書,回來學得一個頭三個大要…

2011-10-14 16:31:04

免責聲明

更多出版社
主站蜘蛛池模板: 凉山| 铁力市| 镇江市| 那曲县| 宁都县| 林口县| 鹤壁市| 峡江县| 大化| 康乐县| 景宁| 保亭| 娄烦县| 逊克县| 琼中| 东兰县| 九江市| 茂名市| 崇仁县| 延安市| 阿拉善左旗| 齐河县| 安庆市| 郁南县| 宁强县| 文水县| 大竹县| 沙洋县| 绥芬河市| 祁东县| 镇赉县| 华亭县| 新龙县| 洛扎县| 游戏| 临邑县| 巴马| 宕昌县| 永川市| 瓦房店市| 沛县|