eBooks-it.org Logo
eBooks-IT.org Inner Image

Managing NFS and NIS

2nd Edition
Managing NFS and NIS Image

Book Details:

Publisher:O'Reilly Media
Series: OReilly
Author:Hal Stern
Edition:2
ISBN-10:1565925106
ISBN-13:9781565925106
Pages:512
Published:Jul 08 2001
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:1.94 MB

Book Description:

A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem. Managing NFS and NIS, in a new edition based on Solaris 8, is a guide to two tools that are absolutely essential to distributed computing environments: the Network Filesystem (NFS) and the Network Information System (formerly called the "yellow pages" or YP).The Network Filesystem, developed by Sun Microsystems, is fundamental to most Unix networks. It lets systems ranging from PCs and Unix workstations to large mainframes access each other's files transparently, and is the standard method for sharing files between different computer systems.As popular as NFS is, it's a "black box" for most users and administrators. Updated for NFS Version 3, Managing NFS and NIS offers detailed access to what's inside, including: How to plan, set up, and debug an NFS network Using the NFS automounter Diskless workstations PC/NFS A new transport protocol for NFS (TCP/IP) New security options (IPSec and Kerberos V5) Diagnostic tools and utilities NFS client and server tuning NFS isn't really complete without its companion, NIS, a distributed database service for managing the most important administrative files, such as the passwd file and the hosts file. NIS centralizes administration of commonly replicated files, allowing a single change to the database rather than requiring changes on every system on the network.If you are managing a network of Unix systems, or are thinking of setting up a Unix network, you can't afford to overlook this book.

Download Link:

Related Books:

Managing Multimedia and Unstructured Data in the Oracle Database

Managing Multimedia and Unstructured Data in the Oracle Database Image
A revolutionary approach to understanding, managing, and delivering digital objects, assets, and all types of data Overview Full of illustrations, diagrams, and tips with clear step-by-step instructions and real time examples Get up to speed on all the aspects of this new technology Learn how to work with rich multimedia and control it In Detail Multimedia is the new digital frontier. Managers, software architects, administrators and developers need to fully comprehend this exciting new technology as its widespread use and acceptance cannot be ignored any longer. "Managing Multimedia and Unstructured Data in the Oracle Database" will give you a complete understanding of how to manage all data, especially multimedia. You will learn all the...

Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c

Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c Image
Implement comprehensive cloud computing solutions efficiently using Oracle Enterprise Manager Overview Perform and set up your cloud environment one step at a time using this lucid guide Understand how to build a solid foundation for your cloud infrastructure Comprehend and create new chargeback models In Detail Cloud computing has transformed the way that we write and deploy enterprise software. Oracle Enterprise Manager Cloud Control 12c has been designed to work with the cloud platform and reduce downtime, while improving performance and productivity. You can quickly set up, manage, and support enterprise clouds. This practical, example-oriented guide untangles many of the complexities involved in setting up a complete cloud computing platform. ...

Security Risk Assessment

Managing Physical and Operational Security
Security Risk Assessment Image
Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. A good security assessment is a fact-finding process that determines an organizations state of security protection. It exposes vulnerabilities, determines the potential for losses, and devises a plan to address these security concerns. While most security professionals have heard of a security assessment, many do not know how to conduct one, how its used, or how to evaluate what they have found. Security Risk Assessment offers security professionals step-by-step guidance for conducting a complete risk assessment. It provides a template draw from, giving security professionals the tools needed to ...



2007 - 2021 © eBooks-IT.org