使用Perl实现系统管理自动化

百科

《使用Perl实现系统管理自动化》是2010年东南大学出版社出版的图书,作者是David N.Blank-Edelman。

  • 书名 使用Perl实现系统管理自动化
  • 又名  Automating System Administration with Perl
  • ISBN 7564119284
  • 页数  639页
  • 出版社 东南大学出版社

内容简介

  《使用 Perl实现系统管理自动化(第2版来自)(影印版)》内容简介360百科:如果你从事任何系统管理方面的工作,就必须应对日益复杂的工作环境以及对你的时间不断增加的需求。《使用Perl实现系统管理自动化 第二版》不仅提供了可用于工作的恰当工具,还给出了许多建议,帮助你解决特定问题以及安全地自动处理重复事务。这一版的"水獭书"经过更新和扩充,涵盖了最新的放创夫职具美刑扩操作系统、技术和Perl模块,将会帮助你丰形九跑病答走谈待反天:

  * 管理用户账户

  * 监测文件系统和进程

  * 处理XML和YAML等格式的配置文

  * 使用DBI管氢祖病失额红呼理数据库,包括MySQL、MS SQL和Oracle

  * 处理LDAP和Active Directory等目录服务

  * 编写脚本管理电子邮件协议和垃圾邮件

  * 高效地创建、处理和分析日志文件

  * 管理网络名称和配置服务,矿金通河农加名矿包括NIS、DNS和DHCP

福几否材职每亲  * 维护、监测和映射网络服务

  * 提高文件系统、进程和网络的安全性

  这一版的附录中玉工特食高布还包含了额外内容,帮助你快速掌握XML/XPath、LDAP、SNMP和SQL等技术。《使用 Perl实现系统管差本结九告民以理自动化(第2版)(影印版)》在手并结合Perl,你将花费更少的资源,付出更少的劳动,大大减少烦恼,让你事半功倍。

植械银或各辑推荐

  《使用 Perl实谁希现系统管理自动化(第2版)(影印版)》是由东南大学出版社出版的。

媒体推荐

  "直到系统管理员阅读本书前,存在太多的任务本可以(并且应该)自动化完成但却没有。Peri是一种强大的工具,Dav来自id向我们展示了及突操吃红带械伯引如何让系统管理员360百科付出更少劳动就能将系统离无析掌控得更好。"

  --Peter Baer Galvin,Corporate Technologies 公司首席技术官、IT架构师

作者简介

  David N.Blank-Edelman是美国东北大学计算机与信息科学学院的技术主好花久与均哪察换任,拥有25年在多种平台上的系统/网络管理员经验。

目录

  Preface

  1. Introduction

  Automation Is a Must

  How Perl Can Help You

  This Book Will Show You How

  What You Need

  Some Notes About the Perl Versions Use商散速呀袁置开气d for This Book

  What About Perl 5.10?

  What About Strawberry Perl?

  What About Perl 6?

  Some Notes Abo静段又印岁称整流和八ut Using Vista with the Code in This Book

  Locating and Installing Modules

  Installing Modules on Unix

  Installing Modules on Win32

  It's Not Easy Being Omnipot儿何针在求宗离你ent

  Don't Do It

  Drop Your Privileges As Soon As Possib斗角相且le

  Be Careful When Reading Data

  Be Careful When Writing Data

  Avoid Race Conditions

  .Enjoy

  References for More Information

  2. Filesys季静tems

  Perl to the Rescue

  Filesystem Differences

  Unix

  Windows-Based Operating Systems

  Mac OS X

  Filesyst资语怀em Differen医板支独乎有供鲁较线ces Summary

  Dealing with Filesystem Differences from Perl

  Walking or Traversing the Filesystem by Han飞危衡d

  Walking the Filesystem Using the File:衣切身注妈六析料独自:Find Module

  Walking the Filesystem Using the File::Find::Rule Module

  Manipulating Disk Quotas

  Editing Quotas with edquota Trickery

  Editing Quotas Using the Quota Module

  Editing NTFS Quotas U送孔事基传连运建nder Window染李巴病向松备觉拉s

  Querying Filesystem Usage

  Modul牛止刻翻e Information for This Chapter

  References for More Information

  3. User Accounts

  Unix User Identities

  The Classic Unix Password File

  Changes to the Password File in BSD 4.4 Systems

  Shadow Passwords

  Windows-Based Operating System User Identities

  Windows User Identity Storage and Access

  Windows User ID Numbers

  Windows Passwords Don't Play Nice with Unix Passwords

  Windows Groups

  Windows User Rights

  Building an Account System to Manage Users

  The Backend Database

  The Low-Level Component Library

  The Process Scripts

  Account System Wrap-Up

  Module Information for This Chapter

  References for More Information

  Unix Password Files

  Windows User Administration

  4. User Activity

  Process Management

  Windows-Based Operating System Process Control

  Unix Process Control

  File and Network Operations

  Tracking File Operations on Windows

  Tracking Network Operations on Windows

  Tracking File and Network Operations in Unix

  Module Information for This Chapter

  Installing Win32::Setupsup

  References for More Information

  5. TCP/IP Name and Configuration Services

  Host Files

  Generating Host Files

  Error-Checking the Host File Generation Process

  Improving the Host File Output

  Incorporating a Source Code Control System

  NIS, NIS+, and WINS

  NIS+

  Windows Internet Name Server (WINS)

  Domain Name Service (DNS)

  Generating DNS (BIND) Configuration Files

  DNS Checking: An Iterative Approach

  DHCP

  Active Probing for Rogue DHCP Servers

  Monitoring Legitimate DHCP Servers

  Module Information for This Chapter

  References for More Information

  6. Working with Configuration Files

  Configuration File Formats

  Binary

  Naked Delimited Data

  Key/Value Pairs

  Markup Languages

  All-in-One Modules

  Advanced Configuration Storage Mechanisms

  Module Information for This Chapter

  References for More Information

  XML and YAML

  7. SQL Database Administration

  Interacting with a SQL Server from Perl

  Using the DBI Framework

  Using ODBC from Within DBI

  Server Documentation

  MySQL Server via DBI

  Oracle Server via DBI

  Microsoft SQL Server via ODBC

  Database Logins

  Monitoring Space Usage on a Database Server

  Module Information for This Chapter

  References for More Information

  DBI

  Microsoft SQL Server

  ODBC

  Oracle

  8. Email

  Sending Mail

  Getting sendmail (or a Similar Mail Transport Agent)

  Using the OS-Specific IPC Framework to Drive a Mail Client

  Speaking the Mail Protocols Directly

  Common Mistakes in Sending Email

  Overzealous Message Sending

  Subject Line Waste

  Insufficient Information in the Message Body

  Fetching Mail

  Talking POP3 to Fetch Mail

  Talking IMAP4rev1 to Fetch Mail

  Processing Mail

  Dissecting a Single Message

  Dissecting a Whole Mailbox

  Dealing with Spam

  Support Mail Augmentation

  Module Information for This Chapter

  References for More Information

  9. Directory Services

  What's a Directory?

  Finger: A Simple Directory Service

  The WHOIS Directory Service

  LDAP: A Sophisticated Directory Service

  LDAP Programming with Perl

  The Initial LDAP Connection

  Performing LDAP Searches

  Entry Representation in Perl

  Adding Entries with LDIF

  Adding Entries with Standard LDAP Operations

  Deleting Entries

  Modifying Entry Names

  Modifying Entry Attributes

  Deeper LDAP Topics

  Putting It All Together

  Active Directory Service Interfaces

  ADSI Basics

  Using ADSI from Perl

  Dealing with Container/Collection Objects

  Identifying a Container Object

  So How Do You Know Anything About an Object?

  Searching

  Performing Common Tasks Using the WinNT and LDAP Namespaces

  Working with Users via ADSI

  Working with Groups via ADSI

  Working with File Shares via ADSI

  Working with Print Queues and Print Jobs via ADSI

  Working with Windows-Based Operating System Services via ADSI

  Module Information for This Chapter

  References for More Information

  LDAP

  ADSI

  10. Log Files

  Reading Text Logs

  Reading Binary Log Files

  Using unpack()

  Calling an OS (or Someone Else's) Binary

  Using the OS's Logging API

  Structure of Log File Data

  Dealing with Log File Information

  Space Management of Logging Information

  Log Parsing and Analysis

  Writing Your Own Log Files

  Logging Shortcuts and Formatting Help

  Basic/Intermediate Logging Frameworks

  Advanced Logging Framework

  Module Information for This Chapter

  References for More Information

  11. Security

  Noticing Unexpected or Unauthorized Changes

  Local Filesystem Changes

  Changes in Data Served Over the Network

  Noticing Suspicious Activities

  Local Signs of Peril

  Finding Problematic Patterns

  Danger on the Wire, or "Perl Saves the Day"

  Preventing Suspicious Activities

  Suggest Better Passwords

  Reject Bad Passwords

  Module Information for This Chapter

  References for More Information

  12. SNMP

  Using SNMP from Perl

  Sending and Receiving SNMP Traps, Notifications, and Informs

  Alternative SNMP Programming Interfaces

  Module Information for This Chapter

  References for More Information

  13. Network Mapping and Monitoring

  Network Mapping

  Discovering Hosts

  Discovering Network Services

  Physical Location

  Presenting the Information

  Textual Presentation Tools

  Graphical Presentation Tools

  Monitoring Frameworks

  Extending Existing Monitoring Packages

  What's Left?

  Module Information for This Chapter

  References for More Information

  14. Experiential Learning

  Playing with Timelines

  Task One: Parsing crontab Files

  Task Two: Displaying the Timeline

  Task Three: Writing Out the Correct XML File

  Putting It All Together

  Summary: What Can We Learn from This?

  Playing with Geocoding

  Geocoding from Postal Addresses

  Geocoding from IP Addresses

  Summary: What Can We Learn from This?

  Playing with an MP3 Collection

  Summary: What Can We Learn from This?

  One Final Exploration

  Part One: Retrieving the Wiki Page with WWW::Mechanize

  Part Two: Extracting the Data

  Part Three: Geocoding and Mapping the Data

  Summary: What Can We Learn from This?

  Remember to Play

  Module Information for This Chapter

  Source Material for This Chapter

  A. The Eight-Minute XML Tutorial

  B. The 10-Minute XPath Tutorial

  C. The 10-Minute LDAP Tutorial

  D. The 15-Minute SQL Tutorial

  E. The Five-Minute RCS Tutorial

  F. The Two-Minute VBScript-to-Perl Tutorial

  G. The 20-Minute SNMP Tutorial

  Index

标签:
声明:此文信息来源于网络,登载此文只为提供信息参考,并不用于任何商业目的。如有侵权,请及时联系我们:yongganaa@126.com

评论留言

我要留言

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。

声明:此文信息来源于网络,登载此文只为提供信息参考,并不用于任何商业目的。如有侵权,请及时联系我们:yongganaa@126.com