注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當前位置: 首頁出版圖書科學(xué)技術(shù)計算機/網(wǎng)絡(luò)信息系統(tǒng)使用Perl實現(xiàn)系統(tǒng)管理自動化(第二版 影印版)

使用Perl實現(xiàn)系統(tǒng)管理自動化(第二版 影印版)

使用Perl實現(xiàn)系統(tǒng)管理自動化(第二版 影印版)

定 價:¥88.00

作 者: 艾德爾曼(David N.Blank-Edelman) 著
出版社: 東南大學(xué)出版社
叢編項:
標 簽: 管理信息系統(tǒng)(MIS)

ISBN: 9787564119287 出版時間: 2010-01-01 包裝: 平裝
開本: 16開 頁數(shù): 639 字數(shù):  

內(nèi)容簡介

  《使用 Perl實現(xiàn)系統(tǒng)管理自動化(第2版)(影印版)》內(nèi)容簡介:如果你從事任何系統(tǒng)管理方面的工作,就必須應(yīng)對日益復(fù)雜的工作環(huán)境以及對你的時間不斷增加的需求?!妒褂肞erl實現(xiàn)系統(tǒng)管理自動化 第二版》不僅提供了可用于工作的恰當工具,還給出了許多建議,幫助你解決特定問題以及安全地自動處理重復(fù)事務(wù)。這一版的“水獺書”經(jīng)過更新和擴充,涵蓋了最新的操作系統(tǒng)、技術(shù)和Perl模塊,將會幫助你:* 管理用戶賬戶* 監(jiān)測文件系統(tǒng)和進程* 處理XML和YAML等格式的配置文件* 使用DBI管理數(shù)據(jù)庫,包括MySQL、MS SQL和Oracle* 處理LDAP和Active Directory等目錄服務(wù)* 編寫腳本管理電子郵件協(xié)議和垃圾郵件* 高效地創(chuàng)建、處理和分析日志文件* 管理網(wǎng)絡(luò)名稱和配置服務(wù),包括NIS、DNS和DHCP* 維護、監(jiān)測和映射網(wǎng)絡(luò)服務(wù)* 提高文件系統(tǒng)、進程和網(wǎng)絡(luò)的安全性這一版的附錄中還包含了額外內(nèi)容,幫助你快速掌握XML/XPath、LDAP、SNMP和SQL等技術(shù)?!妒褂?Perl實現(xiàn)系統(tǒng)管理自動化(第2版)(影印版)》在手并結(jié)合Perl,你將花費更少的資源,付出更少的勞動,大大減少煩惱,讓你事半功倍。

作者簡介

  David N.Blank-Edelman是美國東北大學(xué)計算機與信息科學(xué)學(xué)院的技術(shù)主任,擁有25年在多種平臺上的系統(tǒng)/網(wǎng)絡(luò)管理員經(jīng)驗。

圖書目錄

Preface
1. Introduction
Automation Is a Must
How Perl Can Help You
This Book Will Show You How
What You Need
Some Notes About the Perl Versions Used for This Book
What About Perl 5.10?
What About Strawberry Perl?
What About Perl 6?
Some Notes About Using Vista with the Code in This Book
Locating and Installing Modules
Installing Modules on Unix
Installing Modules on Win32
It’s Not Easy Being Omnipotent
Don’t Do It
Drop Your Privileges As Soon As Possible
Be Careful When Reading Data
Be Careful When Writing Data
Avoid Race Conditions
.Enjoy
References for More Information
2. Filesystems
Perl to the Rescue
Filesystem Differences
Unix
Windows-Based Operating Systems
Mac OS X
Filesystem Differences Summary
Dealing with Filesystem Differences from Perl
Walking or Traversing the Filesystem by Hand
Walking the Filesystem Using the File::Find Module
Walking the Filesystem Using the File::Find::Rule Module
Manipulating Disk Quotas
Editing Quotas with edquota Trickery
Editing Quotas Using the Quota Module
Editing NTFS Quotas Under Windows
Querying Filesystem Usage
Module Information for This Chapter
References for More Information
3. User Accounts
Unix User Identities
The Classic Unix Password File
Changes to the Password File in BSD 4.4 Systems
Shadow Passwords
Windows-Based Operating System User Identities
Windows User Identity Storage and Access
Windows User ID Numbers
Windows Passwords Don’t Play Nice with Unix Passwords
Windows Groups
Windows User Rights
Building an Account System to Manage Users
The Backend Database
The Low-Level Component Library
The Process Scripts
Account System Wrap-Up
Module Information for This Chapter
References for More Information
Unix Password Files
Windows User Administration
4. User Activity
Process Management
Windows-Based Operating System Process Control
Unix Process Control
File and Network Operations
Tracking File Operations on Windows
Tracking Network Operations on Windows
Tracking File and Network Operations in Unix
Module Information for This Chapter
Installing Win32::Setupsup
References for More Information
5. TCP/IP Name and Configuration Services
Host Files
Generating Host Files
Error-Checking the Host File Generation Process
Improving the Host File Output
Incorporating a Source Code Control System
NIS, NIS+, and WINS
NIS+
Windows Internet Name Server (WINS)
Domain Name Service (DNS)
Generating DNS (BIND) Configuration Files
DNS Checking: An Iterative Approach
DHCP
Active Probing for Rogue DHCP Servers
Monitoring Legitimate DHCP Servers
Module Information for This Chapter
References for More Information
6. Working with Configuration Files
Configuration File Formats
Binary
Naked Delimited Data
Key/Value Pairs
Markup Languages
All-in-One Modules
Advanced Configuration Storage Mechanisms
Module Information for This Chapter
References for More Information
XML and YAML
7. SQL Database Administration
Interacting with a SQL Server from Perl
Using the DBI Framework
Using ODBC from Within DBI
Server Documentation
MySQL Server via DBI
Oracle Server via DBI
Microsoft SQL Server via ODBC
Database Logins
Monitoring Space Usage on a Database Server
Module Information for This Chapter
References for More Information
DBI
Microsoft SQL Server
ODBC
Oracle
8. Email
Sending Mail
Getting sendmail (or a Similar Mail Transport Agent)
Using the OS-Specific IPC Framework to Drive a Mail Client
Speaking the Mail Protocols Directly
Common Mistakes in Sending Email
Overzealous Message Sending
Subject Line Waste
Insufficient Information in the Message Body
Fetching Mail
Talking POP3 to Fetch Mail
Talking IMAP4rev1 to Fetch Mail
Processing Mail
Dissecting a Single Message
Dissecting a Whole Mailbox
Dealing with Spam
Support Mail Augmentation
Module Information for This Chapter
References for More Information
9. Directory Services
What’s a Directory?
Finger: A Simple Directory Service
The WHOIS Directory Service
LDAP: A Sophisticated Directory Service
LDAP Programming with Perl
The Initial LDAP Connection
Performing LDAP Searches
Entry Representation in Perl
Adding Entries with LDIF
Adding Entries with Standard LDAP Operations
Deleting Entries
Modifying Entry Names
Modifying Entry Attributes
Deeper LDAP Topics
Putting It All Together
Active Directory Service Interfaces
ADSI Basics
Using ADSI from Perl
Dealing with Container/Collection Objects
Identifying a Container Object
So How Do You Know Anything About an Object?
Searching
Performing Common Tasks Using the WinNT and LDAP Namespaces
Working with Users via ADSI
Working with Groups via ADSI
Working with File Shares via ADSI
Working with Print Queues and Print Jobs via ADSI
Working with Windows-Based Operating System Services via ADSI
Module Information for This Chapter
References for More Information
LDAP
ADSI
10. Log Files
Reading Text Logs
Reading Binary Log Files
Using unpack()
Calling an OS (or Someone Else’s) Binary
Using the OS’s Logging API
Structure of Log File Data
Dealing with Log File Information
Space Management of Logging Information
Log Parsing and Analysis
Writing Your Own Log Files
Logging Shortcuts and Formatting Help
Basic/Intermediate Logging Frameworks
Advanced Logging Framework
Module Information for This Chapter
References for More Information
11. Security
Noticing Unexpected or Unauthorized Changes
Local Filesystem Changes
Changes in Data Served Over the Network
Noticing Suspicious Activities
Local Signs of Peril
Finding Problematic Patterns
Danger on the Wire, or “Perl Saves the Day”
Preventing Suspicious Activities
Suggest Better Passwords
Reject Bad Passwords
Module Information for This Chapter
References for More Information
12. SNMP
Using SNMP from Perl
Sending and Receiving SNMP Traps, Notifications, and Informs
Alternative SNMP Programming Interfaces
Module Information for This Chapter
References for More Information
13. Network Mapping and Monitoring
Network Mapping
Discovering Hosts
Discovering Network Services
Physical Location
Presenting the Information
Textual Presentation Tools
Graphical Presentation Tools
Monitoring Frameworks
Extending Existing Monitoring Packages
What’s Left?
Module Information for This Chapter
References for More Information
14. Experiential Learning
Playing with Timelines
Task One: Parsing crontab Files
Task Two: Displaying the Timeline
Task Three: Writing Out the Correct XML File
Putting It All Together
Summary: What Can We Learn from This?
Playing with Geocoding
Geocoding from Postal Addresses
Geocoding from IP Addresses
Summary: What Can We Learn from This?
Playing with an MP3 Collection
Summary: What Can We Learn from This?
One Final Exploration
Part One: Retrieving the Wiki Page with WWW::Mechanize
Part Two: Extracting the Data
Part Three: Geocoding and Mapping the Data
Summary: What Can We Learn from This?
Remember to Play
Module Information for This Chapter
Source Material for This Chapter
A. The Eight-Minute XML Tutorial
B. The 10-Minute XPath Tutorial
C. The 10-Minute LDAP Tutorial
D. The 15-Minute SQL Tutorial
E. The Five-Minute RCS Tutorial
F. The Two-Minute VBScript-to-Perl Tutorial
G. The 20-Minute SNMP Tutorial
Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號