• O'Reilly:使用Perl实现系统管理自动化(第2版)(影印版)
  • O'Reilly:使用Perl实现系统管理自动化(第2版)(影印版)
  • O'Reilly:使用Perl实现系统管理自动化(第2版)(影印版)
  • O'Reilly:使用Perl实现系统管理自动化(第2版)(影印版)
  • O'Reilly:使用Perl实现系统管理自动化(第2版)(影印版)
  • O'Reilly:使用Perl实现系统管理自动化(第2版)(影印版)
  • O'Reilly:使用Perl实现系统管理自动化(第2版)(影印版)
21年品牌 40万+商家 超1.5亿件商品

O'Reilly:使用Perl实现系统管理自动化(第2版)(影印版)

7 九五品

仅1件

北京海淀
认证卖家担保交易快速发货售后保障

作者艾德尔曼(David N.Blank-Edelman) 著

出版社东南大学出版社

出版时间2010-01

版次1

装帧平装

货号大车中一架三成

上书时间2022-06-30

学海书屋

七年老店
已实名 进店 收藏店铺

   商品详情   

品相描述:九五品
图书标准信息
  • 作者 艾德尔曼(David N.Blank-Edelman) 著
  • 出版社 东南大学出版社
  • 出版时间 2010-01
  • 版次 1
  • ISBN 9787564119287
  • 定价 88.00元
  • 装帧 平装
  • 开本 16开
  • 纸张 胶版纸
  • 页数 639页
  • 正文语种 英语
【内容简介】
  如果你从事任何系统管理方面的工作,就必须应对日益复杂的工作环境以及对你的时间不断增加的需求。《使用Perl实现系统管理自动化第二版》不仅提供了可用于工作的恰当工具,还给出了许多建议,帮助你解决特定问题以及安全地自动处理重复事务。这一版的“水獭书”经过更新和扩充,涵盖了最新的操作系统、技术和Perl模块,将会帮助你:
  *管理用户账户
  *监测文件系统和进程
  *处理XML和YAML等格式的配置文件
  *使用DBI管理数据库,包括MySQL、MSSQL和Oracle
  *处理LDAP和ActiveDirectory等目录服务
  *编写脚本管理电子邮件协议和垃圾邮件
  *高效地创建、处理和分析日志文件
  *管理网络名称和配置服务,包括NIS、DNS和DHCP
  *维护、监测和映射网络服务
  *提高文件系统、进程和网络的安全性
  这一版的附录中还包含了额外内容,帮助你快速掌握XML/XPath、LDAP、SNMP和SQL等技术。《使用Perl实现系统管理自动化(第2版)(影印版)》在手并结合Perl,你将花费更少的资源,付出更少的劳动,大大减少烦恼,让你事半功倍。
【作者简介】
  DavidN.Blank-Edelman是美国东北大学计算机与信息科学学院的技术主任,拥有25年在多种平台上的系统/网络管理员经验。
【目录】
Preface
1.Introduction
AutomationIsaMust
HowPerlCanHelpYou
ThisBookWillShowYouHow
WhatYouNeed
SomeNotesAboutthePerlVersionsUsedforThisBook
WhatAboutPerl5.10?
WhatAboutStrawberryPerl?
WhatAboutPerl6?
SomeNotesAboutUsingVistawiththeCodeinThisBook
LocatingandInstallingModules
InstallingModulesonUnix
InstallingModulesonWin32
It’sNotEasyBeingOmnipotent
Don’tDoIt
DropYourPrivilegesAsSoonAsPossible
BeCarefulWhenReadingData
BeCarefulWhenWritingData
AvoidRaceConditions
.Enjoy
ReferencesforMoreInformation
2.Filesystems
PerltotheRescue
FilesystemDifferences
Unix
Windows-BasedOperatingSystems
MacOSX
FilesystemDifferencesSummary
DealingwithFilesystemDifferencesfromPerl
WalkingorTraversingtheFilesystembyHand
WalkingtheFilesystemUsingtheFile::FindModule
WalkingtheFilesystemUsingtheFile::Find::RuleModule
ManipulatingDiskQuotas
EditingQuotaswithedquotaTrickery
EditingQuotasUsingtheQuotaModule
EditingNTFSQuotasUnderWindows
QueryingFilesystemUsage
ModuleInformationforThisChapter
ReferencesforMoreInformation
3.UserAccounts
UnixUserIdentities
TheClassicUnixPasswordFile
ChangestothePasswordFileinBSD4.4Systems
ShadowPasswords
Windows-BasedOperatingSystemUserIdentities
WindowsUserIdentityStorageandAccess
WindowsUserIDNumbers
WindowsPasswordsDon’tPlayNicewithUnixPasswords
WindowsGroups
WindowsUserRights
BuildinganAccountSystemtoManageUsers
TheBackendDatabase
TheLow-LevelComponentLibrary
TheProcessScripts
AccountSystemWrap-Up
ModuleInformationforThisChapter
ReferencesforMoreInformation
UnixPasswordFiles
WindowsUserAdministration
4.UserActivity
ProcessManagement
Windows-BasedOperatingSystemProcessControl
UnixProcessControl
FileandNetworkOperations
TrackingFileOperationsonWindows
TrackingNetworkOperationsonWindows
TrackingFileandNetworkOperationsinUnix
ModuleInformationforThisChapter
InstallingWin32::Setupsup
ReferencesforMoreInformation
5.TCP/IPNameandConfigurationServices
HostFiles
GeneratingHostFiles
Error-CheckingtheHostFileGenerationProcess
ImprovingtheHostFileOutput
IncorporatingaSourceCodeControlSystem
NIS,NIS+,andWINS
NIS+
WindowsInternetNameServer(WINS)
DomainNameService(DNS)
GeneratingDNS(BIND)ConfigurationFiles
DNSChecking:AnIterativeApproach
DHCP
ActiveProbingforRogueDHCPServers
MonitoringLegitimateDHCPServers
ModuleInformationforThisChapter
ReferencesforMoreInformation
6.WorkingwithConfigurationFiles
ConfigurationFileFormats
Binary
NakedDelimitedData
Key/ValuePairs
MarkupLanguages
All-in-OneModules
AdvancedConfigurationStorageMechanisms
ModuleInformationforThisChapter
ReferencesforMoreInformation
XMLandYAML
7.SQLDatabaseAdministration
InteractingwithaSQLServerfromPerl
UsingtheDBIFramework
UsingODBCfromWithinDBI
ServerDocumentation
MySQLServerviaDBI
OracleServerviaDBI
MicrosoftSQLServerviaODBC
DatabaseLogins
MonitoringSpaceUsageonaDatabaseServer
ModuleInformationforThisChapter
ReferencesforMoreInformation
DBI
MicrosoftSQLServer
ODBC
Oracle
8.Email
SendingMail
Gettingsendmail(oraSimilarMailTransportAgent)
UsingtheOS-SpecificIPCFrameworktoDriveaMailClient
SpeakingtheMailProtocolsDirectly
CommonMistakesinSendingEmail
OverzealousMessageSending
SubjectLineWaste
InsufficientInformationintheMessageBody
FetchingMail
TalkingPOP3toFetchMail
TalkingIMAP4rev1toFetchMail
ProcessingMail
DissectingaSingleMessage
DissectingaWholeMailbox
DealingwithSpam
SupportMailAugmentation
ModuleInformationforThisChapter
ReferencesforMoreInformation
9.DirectoryServices
What’saDirectory?
Finger:ASimpleDirectoryService
TheWHOISDirectoryService
LDAP:ASophisticatedDirectoryService
LDAPProgrammingwithPerl
TheInitialLDAPConnection
PerformingLDAPSearches
EntryRepresentationinPerl
AddingEntrieswithLDIF
AddingEntrieswithStandardLDAPOperations
DeletingEntries
ModifyingEntryNames
ModifyingEntryAttributes
DeeperLDAPTopics
PuttingItAllTogether
ActiveDirectoryServiceInterfaces
ADSIBasics
UsingADSIfromPerl
DealingwithContainer/CollectionObjects
IdentifyingaContainerObject
SoHowDoYouKnowAnythingAboutanObject?
Searching
PerformingCommonTasksUsingtheWinNTandLDAPNamespaces
WorkingwithUsersviaADSI
WorkingwithGroupsviaADSI
WorkingwithFileSharesviaADSI
WorkingwithPrintQueuesandPrintJobsviaADSI
WorkingwithWindows-BasedOperatingSystemServicesviaADSI
ModuleInformationforThisChapter
ReferencesforMoreInformation
LDAP
ADSI
10.LogFiles
ReadingTextLogs
ReadingBinaryLogFiles
Usingunpack()
CallinganOS(orSomeoneElse’s)Binary
UsingtheOS’sLoggingAPI
StructureofLogFileData
DealingwithLogFileInformation
SpaceManagementofLoggingInformation
LogParsingandAnalysis
WritingYourOwnLogFiles
LoggingShortcutsandFormattingHelp
Basic/IntermediateLoggingFrameworks
AdvancedLoggingFramework
ModuleInformationforThisChapter
ReferencesforMoreInformation
11.Security
NoticingUnexpectedorUnauthorizedChanges
LocalFilesystemChanges
ChangesinDataServedOvertheNetwork
NoticingSuspiciousActivities
LocalSignsofPeril
FindingProblematicPatterns
DangerontheWire,or“PerlSavestheDay”
PreventingSuspiciousActivities
SuggestBetterPasswords
RejectBadPasswords
ModuleInformationforThisChapter
ReferencesforMoreInformation
12.SNMP
UsingSNMPfromPerl
SendingandReceivingSNMPTraps,Notifications,andInforms
AlternativeSNMPProgrammingInterfaces
ModuleInformationforThisChapter
ReferencesforMoreInformation
13.NetworkMappingandMonitoring
NetworkMapping
DiscoveringHosts
DiscoveringNetworkServices
PhysicalLocation
PresentingtheInformation
TextualPresentationTools
GraphicalPresentationTools
MonitoringFrameworks
ExtendingExistingMonitoringPackages
What’sLeft?
ModuleInformationforThisChapter
ReferencesforMoreInformation
14.ExperientialLearning
PlayingwithTimelines
TaskOne:ParsingcrontabFiles
TaskTwo:DisplayingtheTimeline
TaskThree:WritingOuttheCorrectXMLFile
PuttingItAllTogether
Summary:WhatCanWeLearnfromThis?
PlayingwithGeocoding
GeocodingfromPostalAddresses
GeocodingfromIPAddresses
Summary:WhatCanWeLearnfromThis?
PlayingwithanMP3Collection
Summary:WhatCanWeLearnfromThis?
OneFinalExploration
PartOne:RetrievingtheWikiPagewithWWW::Mechanize
PartTwo:ExtractingtheData
PartThree:GeocodingandMappingtheData
Summary:WhatCanWeLearnfromThis?
RemembertoPlay
ModuleInformationforThisChapter
SourceMaterialforThisChapter
A.TheEight-MinuteXMLTutorial
B.The10-MinuteXPathTutorial
C.The10-MinuteLDAPTutorial
D.The15-MinuteSQLTutorial
E.TheFive-MinuteRCSTutorial
F.TheTwo-MinuteVBScript-to-PerlTutorial
G.The20-MinuteSNMPTutorial
Index
点击展开 点击收起

   相关推荐   

—  没有更多了  —

以下为对购买帮助不大的评价

此功能需要访问孔网APP才能使用
暂时不用
打开孔网APP