BSD新书介绍:BSD Hacks , O'Reilly出版社
时间:2004-04-24
来源:互联网
BSD Hacks
100 Industrial-Strength tips for BSD users and administrators
May 2004 (est.)
Series: Hacks
ISBN: 0-596-00679-9
300 pages, $24.95 US, $36.95 CA, £17.50 UK
100 Industrial-Strength tips for BSD users and administrators
May 2004 (est.)
Series: Hacks
ISBN: 0-596-00679-9
300 pages, $24.95 US, $36.95 CA, £17.50 UK
PHP 代码:
Table of Contents
Credits
Preface
Chapter 1. Customizing the User Environment
1. Get the Most Out of the Default Shell
2. Useful tcsh Shell Configuration File Options
3. Create Shell Bindings
4. Use Terminal and X Bindings
5. Use the Mouse at a Terminal
6. Get Your Daily Dose of Trivia
7. Lock the Screen
8. Create a Trash Directory
9. Customize User Configurations
10. Maintain Your Environment on Multiple Systems
11. Use an Interactive Shell
12. Use Multiple Screens on One Terminal
Chapter 2. Dealing with Files and Filesystems
13. Find Things
14. Get the Most Out of grep
15. Manipulate Files with sed
16. Format Text at the Command Line
17. Delimiter Dilemma
18. DOS Floppy Manipulation
19. Access Windows Shares Without a Server
20. Deal with Disk Hogs
21. Manage Temporary Files and Swap Space
22. Recreate a Directory Structure Using mtree
23. Ghosting Systems
Chapter 3. The Boot and Login Environments
24. Customize the Default Boot Menu
25. Protect the Boot Process
26. Run a Headless System
27. Log a Headless Server Remotely
28. Remove the Terminal Login Banner
29. Protecting Passwords With Blowfish Hashes
30. Monitor Password Policy Compliance
31. Create an Effective, Reusable Password Policy
32. Automate Memorable Password Generation
33. Use One Time Passwords
34. Restrict Logins
Chapter 4. Backing Up
35. Back Up FreeBSD with SMBFS
36. Create Portable POSIX Archives
37. Interactive Copy
38. Secure Backups Over a Network
39. Automate Remote Backups
40. Automate Data Dumps for PostgreSQL Databases
41. Perform Client-Server Cross-Platform Backups with Bacula
Chapter 5. Networking Hacks
42. See Console Messages Over a Remote Login
43. Spoof a MAC Address
44. Use Multiple Wireless NIC Configurations
45. Survive Catastrophic Internet Loss
46. Humanize tcpdump Output
47. Understand DNS Records and Tools
48. Send and Receive Email Without a Mail Client
49. Why Do I Need sendmail?
50. Hold Email for Later Delivery
51. Get the Most Out of FTP
52. Distributed Command Execution
53. Interactive Remote Administration
Chapter 6. Securing the System
54. Strip the Kernel
55. FreeBSD Access Control Lists
56. Protect Files with Flags
57. Tighten Security with Mandatory Access Control
58. Use mtree as a Built-in Tripwire
59. Intrusion Detection with Snort, ACID, MySQL, and FreeBSD
60. Encrypt Your Hard Disk
61. Sudo Gotchas
62. sudoscript
63. Restrict an SSH server
64. Script IP Filter Rulesets
65. Secure a Wireless Network Using PF
66. Automatically Generate Firewall Rules
67. Automate Security Patches
68. Scan a Network of Windows Computers for Viruses
Chapter 7. Going Beyond the Basics
69. Tune FreeBSD for Different Applications
70. Traffic Shaping on FreeBSD
71. Create an Emergency Repair Kit
72. Use the FreeBSD Recovery Process
73. Use the GNU Debugger to Analyze a Buffer Overflow
74. Consolidate Web Server Logs
75. Script User Interaction
76. Create a Trade Show Demo
Chapter 8. Keeping Up-to-Date
77. Automated Install
78. FreeBSD From Scratch
79. Safely Merge Changes to /etc
80. Automate Updates
81. Create a Package Repository
82. Build a Port Without the Ports Tree
83. Keep Ports Up-to-Date with CTM
84. Navigate the Ports System
85. Downgrade a Port
86. Create Your Own Startup Scripts
87. Automate NetBSD Package Builds
88. Easily Install Unix Applications on Mac OS X
Chapter 9. Grokking BSD
89. Howd He Know That?
90. Create Your Own Manpages
91. Get the Most Out of Manpages
92. Apply, Understand, and Create Patches
93. Display Hardware Information
94. Determine Who Is on the System
95. Spelling Bee
96. Leave on Time
97. Run Native Java Applications
98. Rotate your Signature
99. Useful One-liners
100. Fun with X
Index
Credits
Preface
Chapter 1. Customizing the User Environment
1. Get the Most Out of the Default Shell
2. Useful tcsh Shell Configuration File Options
3. Create Shell Bindings
4. Use Terminal and X Bindings
5. Use the Mouse at a Terminal
6. Get Your Daily Dose of Trivia
7. Lock the Screen
8. Create a Trash Directory
9. Customize User Configurations
10. Maintain Your Environment on Multiple Systems
11. Use an Interactive Shell
12. Use Multiple Screens on One Terminal
Chapter 2. Dealing with Files and Filesystems
13. Find Things
14. Get the Most Out of grep
15. Manipulate Files with sed
16. Format Text at the Command Line
17. Delimiter Dilemma
18. DOS Floppy Manipulation
19. Access Windows Shares Without a Server
20. Deal with Disk Hogs
21. Manage Temporary Files and Swap Space
22. Recreate a Directory Structure Using mtree
23. Ghosting Systems
Chapter 3. The Boot and Login Environments
24. Customize the Default Boot Menu
25. Protect the Boot Process
26. Run a Headless System
27. Log a Headless Server Remotely
28. Remove the Terminal Login Banner
29. Protecting Passwords With Blowfish Hashes
30. Monitor Password Policy Compliance
31. Create an Effective, Reusable Password Policy
32. Automate Memorable Password Generation
33. Use One Time Passwords
34. Restrict Logins
Chapter 4. Backing Up
35. Back Up FreeBSD with SMBFS
36. Create Portable POSIX Archives
37. Interactive Copy
38. Secure Backups Over a Network
39. Automate Remote Backups
40. Automate Data Dumps for PostgreSQL Databases
41. Perform Client-Server Cross-Platform Backups with Bacula
Chapter 5. Networking Hacks
42. See Console Messages Over a Remote Login
43. Spoof a MAC Address
44. Use Multiple Wireless NIC Configurations
45. Survive Catastrophic Internet Loss
46. Humanize tcpdump Output
47. Understand DNS Records and Tools
48. Send and Receive Email Without a Mail Client
49. Why Do I Need sendmail?
50. Hold Email for Later Delivery
51. Get the Most Out of FTP
52. Distributed Command Execution
53. Interactive Remote Administration
Chapter 6. Securing the System
54. Strip the Kernel
55. FreeBSD Access Control Lists
56. Protect Files with Flags
57. Tighten Security with Mandatory Access Control
58. Use mtree as a Built-in Tripwire
59. Intrusion Detection with Snort, ACID, MySQL, and FreeBSD
60. Encrypt Your Hard Disk
61. Sudo Gotchas
62. sudoscript
63. Restrict an SSH server
64. Script IP Filter Rulesets
65. Secure a Wireless Network Using PF
66. Automatically Generate Firewall Rules
67. Automate Security Patches
68. Scan a Network of Windows Computers for Viruses
Chapter 7. Going Beyond the Basics
69. Tune FreeBSD for Different Applications
70. Traffic Shaping on FreeBSD
71. Create an Emergency Repair Kit
72. Use the FreeBSD Recovery Process
73. Use the GNU Debugger to Analyze a Buffer Overflow
74. Consolidate Web Server Logs
75. Script User Interaction
76. Create a Trade Show Demo
Chapter 8. Keeping Up-to-Date
77. Automated Install
78. FreeBSD From Scratch
79. Safely Merge Changes to /etc
80. Automate Updates
81. Create a Package Repository
82. Build a Port Without the Ports Tree
83. Keep Ports Up-to-Date with CTM
84. Navigate the Ports System
85. Downgrade a Port
86. Create Your Own Startup Scripts
87. Automate NetBSD Package Builds
88. Easily Install Unix Applications on Mac OS X
Chapter 9. Grokking BSD
89. Howd He Know That?
90. Create Your Own Manpages
91. Get the Most Out of Manpages
92. Apply, Understand, and Create Patches
93. Display Hardware Information
94. Determine Who Is on the System
95. Spelling Bee
96. Leave on Time
97. Run Native Java Applications
98. Rotate your Signature
99. Useful One-liners
100. Fun with X
Index
作者: rainren 发布时间: 2004-04-24
http://www.oreilly.com/catalog/bsdhks/toc.html
不知网上有没电子版的! 看了目录感觉还有些用处!
不知网上有没电子版的! 看了目录感觉还有些用处!
作者: rainren 发布时间: 2004-04-24
相关阅读 更多
热门阅读
-
office 2019专业增强版最新2021版激活秘钥/序列号/激活码推荐 附激活工具
阅读:74
-
如何安装mysql8.0
阅读:31
-
Word快速设置标题样式步骤详解
阅读:28
-
20+道必知必会的Vue面试题(附答案解析)
阅读:37
-
HTML如何制作表单
阅读:22
-
百词斩可以改天数吗?当然可以,4个步骤轻松修改天数!
阅读:31
-
ET文件格式和XLS格式文件之间如何转化?
阅读:24
-
react和vue的区别及优缺点是什么
阅读:121
-
支付宝人脸识别如何关闭?
阅读:21
-
腾讯微云怎么修改照片或视频备份路径?
阅读:28