How Linux works: what every superuser should know
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
San Francisco, Calif.
No Starch Press
2015
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXII, 366 S. Ill. 24 cm |
ISBN: | 9781593275679 1593275676 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042376498 | ||
003 | DE-604 | ||
005 | 20150328 | ||
007 | t | ||
008 | 150224s2015 a||| |||| 00||| eng d | ||
020 | |a 9781593275679 |9 978-1-59327-567-9 | ||
020 | |a 1593275676 |9 1-59327-567-6 | ||
035 | |a (OCoLC)907332747 | ||
035 | |a (DE-599)BVBBV042376498 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-11 |a DE-573 |a DE-523 |a DE-859 |a DE-703 |a DE-473 | ||
084 | |a ST 261 |0 (DE-625)143633: |2 rvk | ||
100 | 1 | |a Ward, Brian |d 1972- |e Verfasser |0 (DE-588)131522655 |4 aut | |
245 | 1 | 0 | |a How Linux works |b what every superuser should know |c by Brian Ward |
250 | |a 2. ed. | ||
264 | 1 | |a San Francisco, Calif. |b No Starch Press |c 2015 | |
300 | |a XXII, 366 S. |b Ill. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Linux | |
650 | 4 | |a Operating systems (Computers) | |
650 | 0 | 7 | |a LINUX |0 (DE-588)4337730-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a LINUX |0 (DE-588)4337730-0 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027812665&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027812665 |
Datensatz im Suchindex
_version_ | 1804153016400478208 |
---|---|
adam_text | CONTENTS IN DETAIL PREFACE xix Who Should Read This Book?.................................................................................................. xx Prerequisites.............................................................................................................................. xx How to Read This Book.............................................................................................................. xx A Hands-On Approach..............................................................................................................xx How This Book Is Organized....................................................................................................xxi What s New in the Second Edition?........................................................................................xxi A Note on Terminology..........................................................................................................xxii ACKNOWLEDGMENTS xxiii 1 THE BIG PICTURE 1.1 1.2 1.3 1.4 1.5 1.6 1 Levels and Layers of Abstraction in a Linux System......................................................... 2 Hardware: Understanding Main Memory....................................................................... 4 The Kernel........................................................................................................................4 1.3.1 Process Management...................................................................................5 1.3.2 Memory Management.................................................................................6 1.3.3 Device
Drivers and Management............................................................... 7 1.3.4 System Calls and Support...........................................................................7 User Space........................................................................................................................ 8 Users................................................................................................................................. 9 Looking Forward........................................................................................................... 10 2 BASIC COMMANDS AND DIRECTORY HIERARCHY 11 2.1 2.2 12 12 12 13 13 14 14 15 15 15 16 16 16 16 17 17 17 2.3 2.4 The Bourne Shell:/bin/sh................ Using the Shell............................................................................................................. 2.2.1 The Shell Window................................................................................... 2.2.2 cat............................................................................................................. 2.2.3 Standard Input and Standard Output.................................................... Basic Commands........................................................................................................... 2.3.1 Is............................................................................................................... 2.3.2 cp............................................................................................................. 2.3.3
.................................................................................................................. 2.3.4 touch........................................................................................................ 2.3.5 rm............................... 2.3.6 echo........................................................................................................ Navigating Directories................................................................................................. 2.4.1 cd............................................................................................................. 2.4.2 mkdir........................................................................................................ 2.4.3 rmdir........................................................................................................ 2.4.4 Shell Globbing (Wildcards)..................................................................
2.5 2.6 2.7 2.8 2.9 2.10 2.11 2.12 2.13 2.14 2.15 2.16 2.17 2.18 2.19 2.20 2.21 Intermediate Commands............................................................................................. 18 2.5.1 grep.................................................................................................... .. . 18 2.5.2 less......................................................................................................... 19 2.5.3 pwd......................................................................................................... 19 2.5.4 dlff.............................................................................................................. 20 2.5.5 file.............................................................................................................. 20 2.5.6 find and locate.........................................................................................20 2.5.7 head and tail........................................................................................... 21 2.5.8 sort............................................................................................................21 Changing Your Password and Shell.............................................................................21 Dot Files..........................................................................................................................21 Environment and Shell Variables..................................................................................21 The Command
Path....................................................................................................... 22 Special Characters....................................................................................................... 23 Command-Line Editing................................................................................................24 Text Editors...................................................................................................................24 Getting Online Help.....................................................................................................25 Shell Input and Output................................................................................................27 2.14.1 Standard Error...................................................................................... 27 2.14.2 Standard Input Redirection....................................................................28 Understanding Error Messages..................................................................................28 2.15.1 Anatomy of a UNIX Error Message..................................................... 28 2.15.2 Common Errors...................................................................................... 29 Listing and Manipulating Processes.......................................................................... 30 2.16.1 Command Options............................................................................... 31 2.16.2 Killing Processes.................................................................................... 31 2.16.3
Job Control............................................................................................. 32 2.16.4 Background Processes.......................................................................... 32 File Modes and Permissions...................................................................................... 33 2.17.1 Modifying Permissions...........................................................................34 2.17.2 Symbolic Links.........................................................................................35 2.17.3 Creating Symbolic Links........................................................................ 36 Archiving and Compressing Files............................................................................... 37 2.18.1 gzip......................................................................................................... 37 2.18.2 tar............................................................................................................37 2.18.3 Compressed Archives (.tar.gz)............................................................... 38 2.18.4 zcat......................................................................................................... 39 2.18.5 Other Compression Utilities....................................................................39 Linux Directory Hierarchy Essentials...........................................................................40 2.19.1 Other Root Subdirectories...................................................................... 41 2.19.2 The/usr
Directory.................................................................................. 41 2.19.3 Kernel Location.......................................................................................42 Running Commands as the Superuser........................................................................ 42 2.20.1 sudo....................................................................................................... 42 2.20.2 /etc/sudoers........................................................................................... 43 Looking Forward......................................................................................................... 43 3 DEVICES 45 3.1 3.2 Device Files..................................................................................................................... 46 The sysfs Device Path.....................................................................................................47 VIII Contents in Detail
3.3 3.4 3.5 3.6 dd and Devices...................................................................................................................... 48 Device Name Summary....................................................................................................... 49 3.4.1 Hard Disks: /dev/sd*................................................................................... 50 3.4.2 CD and DVD Drives:/dev/sr*.................................................................... 51 3.4.3 PATA Hard Disks:/dev/hd*......................................................................... 51 3.4.4 Terminals:/dev/tty*,/dev/pts/*, and/dev/tty...................................... 51 3.4.5 Serial Ports: /dev/ttyS*.................................................................................52 3.4.6 Parallel Ports:/dev/lpO and/dev/lpl....................................................... 52 3.4.7 Audio Devices: /dev/snd/*, /dev/dsp, /dev/audio, and More. ... 53 3.4.8 Creating Device Files......................................................................................53 udev.......................................................................................................................................... 54 3.5.1 devtmpfs............................................................................................................ 54 3.5.2 udevd Operation and Configuration.......................................................... 55 3.5.3 udevadm..........................................................................................................57 3.5.4
Monitoring Devices........................................................................................ 57 In-Depth: SCSI andthe Linux Kernel.....................................................................................58 3.6.1 USB Storage and SCSI................................................................................... 61 3.6.2 SCSI and ATA.................................................................................................. 62 3.6.3 Generic SCSI Devices................................................................................... 63 3.6.4 Multiple Access Methods for a Single Device........................................... 63 4 DISKS AND FILESYSTEMS 4.1 4.2 4.3 4.4 4.5 65 Partitioning Disk Devices....................................................................................................... 67 4.1.1 Viewing a Partition Table.............................................................................. 68 4.1.2 Changing Partition Tables.............................................................................. 69 4.1.3 Disk and Partition Geometry......................................................................... 70 4.1.4 Solid-State Disks (SSDs).................................................................................72 Filesystems.............................................................................................................................. 72 4.2.1 Filesystem Types............................................................................................. 73 4.2.2 Creating a
Filesystem...................................................................................... 74 4.2.3 Mounting a Filesystem................................................................................... 75 4.2.4 Filesystem UUID................................................................................................76 4.2.5 Disk Buffering, Caching, and Filesystems...................................................77 4.2.6 Filesystem Mount Options.............................................................................. 77 4.2.7 Remounting a Filesystem................................................................................. 79 4.2.8 The /etc/fstab Filesystem Table.................................................................... 79 4.2.9 Alternatives to/etc/fstab...............................................................................80 4.2.10 Filesystem Capacity...................................................................................... 81 4.2.11 Checking and Repairing Filesystems........................................ 82 4.2.12 Special-Purpose Filesystems......................................................................... 84 Swap Space............................................................................................................................85 4.3.1 Using a Disk Partition as Swap Space........................................................85 4.3.2 Using a File as Swap Space......................................................................... 85 4.3.3 How Much Swap Do You
Need?..................................................................86 Looking Forward: Disks and User Space.............................................................................86 Inside a Traditional Filesystem............................................................................................. 87 4.5.1 Viewing Inode Details................................................................................... 89 4.5.2 Working with Filesystems in User Space..................................................... 90 4.5.3 The Evolution of Filesystems............................................................................91 Contents ¡n Detail IX
5 HOW THE LINUX KERNEL BOOTS 5.1 5.2 5.3 5.4 5.5 5.6 5.7 5.8 93 Startup Messages.................................................................................................................94 Kernel Initialization and Boot Options............................................................................. 95 Kernel Parameters.................................................................................................................96 Boot Loaders...........................................................................................................................97 5.4.1 Boot Loader Tasks..................................................................................... 97 5.4.2 Boot Loader Overview...................................................................................98 GRUB Introduction.................................................................................................................98 5.5.1 Exploring Devices and Partitions with the GRUB Command Line ... 100 5.5.2 GRUB Configuration................................................................................ 102 5.5.3 GRUB Installation....................................................................................... 104 UEFI Secure Boot Problems............................................................................................ 106 Chainloading Other OperatingSystems....................................................................... 106 Boot Loader Details.........................................................................................................
107 5.8.1 MBR Boot..................................................................................................... 107 5.8.2 UEFI Boot..................................................................................................... 108 5.8.3 How GRUB Works...................................................................................... 108 6 HOW USER SPACE STARTS 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 X Introduction to init............................................................................................................ System V Runlevels........................................................................................................... Identifying Your init......................................................................................................... systemd............................................................................................................................. 6.4.1 Units and Unit Types................................................................................ 6.4.2 systemd Dependencies............................................................................. 6.4.3 systemd Configuration............................................................................. 6.4.4 systemd Operation..................................................................................... 6.4.5 Adding Units to systemd........................................................................... 6.4.6 systemd Process Tracking and Synchronization................................... 6.4.7 systemd On-Demand and Resource-Parallelized
Startup.................... 6.4.8 systemd System V Compatibility.............................................................. 6.4.9 systemd Auxiliary Programs................................................................... Upstart................................................................................................................................ 6.5.1 Upstart Initialization Procedure.............................................................. 6.5.2 Upstart Jobs............................................................................................... 6.5.3 Upstart Configuration................................................................................ 6.5.4 Upstart Operation..................................................................................... 6.5.5 Upstart Logs............................................................................................... 6.5.6 Upstart Runlevels and System V Compatibility..................................... System V init..................................................................................................................... 6.6.1 System V init: Startup Command Sequence........................................... 6.6.2 The System V init Link Farm...................................................................... 6.6.3 run-parts...................................................................................................... 6.6.4 Controlling System V init........................................................................... Shutting Down Your
System............................................................................................ The Initial RAM Filesystem............................................................................................... Emergency Booting and Single-User Mode................................................................. Contents in Detail 111 112 113 114 114 114 115 117 120 122 123 124 129 129 130 130 131 133 137 138 138 139 141 142 143 143 144 145 146
7 SYSTEM CONFIGURATION: LOGGING/ SYSTEM TIME/ BATCH JOBS/ AND USERS 149 7.1 7.2 The Structure of/etc................................................................................................... 150 System Logging.......................................................................................................... 150 7.2.1 The System Logger................................................................................ 151 7.2.2 Configuration Files................................................................................ 151 7.3 User Management Files............................................................................................ 153 7.3.1 The/etc/passwd File........................................................................... 153 7.3.2 Special Users....................................................................................... 155 7.3.3 The/etc/shadow File........................................................................... 155 7.3.4 Manipulating Users and Passwords.................................................... 155 7.3.5 Working with Groups......................................................................... 156 7.4 getty and login.......................................................................................................... 157 7.5 Setting the Time.......................................................................................................... 157 7.5.1 Kernel Time Representation and Time Zones..................................... 158 7.5.2 Network
Time....................................................................................... 158 7.6 Scheduling Recurring Tasks with cron....................................................................... 159 7.6.1 Installing Crontab Files......................................................................... 160 7.6.2 System Crontab Files........................................................................... 161 7.6.3 The Future of cron...................................................................... 161 7.7 Scheduling One-Time Tasks with at......................................................................... 161 7.8 Understanding User IDs and User Switching........................................................... 162 7.8.1 Process Ownership, Effective UID, Real UID, and Saved UID............... 162 7.9 User Identification and Authentication.................................................................... 164 7.9.1 Using Libraries for User Information.................................................... 164 7.10 PAM........................................................................................................................ 165 7.10.1 PAM Configuration........................................................................... 166 7.10.2 Notes on PAM.................................................................................. 169 7.10.3 PAM and Passwords......................................................................... 170 7.11 Looking
Forward..................................................................................................... 170 8 A CLOSER LOOK AT PROCESSES AND RESOURCE UTILIZATION 8.1 8.2 Tracking Processes..................................................................................................... Finding Open Files with Isof..................................................................................... 8.2.1 Reading the Isof Output....................................................................... 8.2.2 Using Isof.............................................................................................. 8.3 Tracing Program Execution and System Calls........................................................ 8.3.1 strace..................................................................................................... 8.3.2 Itrace..................................................................................................... 8.4 Threads...................................................................................................................... 8.4.1 Single-Threaded and Multithreaded Processes................................... 8.4.2 Viewing Threads.................................................................................. 8.5 Introduction to Resource Monitoring......................................................................... 8.6 Measuring CPU Time................................................................................................. 8.7 Adjusting Process
Priorities....................................................................................... 171 172 172 172 173 174 174 176 176 176 177 178 178 179 Contents in Detail
8.8 8.9 8.10 8.11 8.12 8.13 Load Averages........................................................................................................ 180 8.8.1 Using uptime........................................................................................ 180 8.8.2 High Loads ........................................................................................ 181 Memory.................................................................................................................... 181 8.9.1 How Memory Works.......................................................................... 182 8.9.2 Page Faults.......................................................................................... 182 Monitoring CPU and Memory Performance with vmstat....................................... 183 I/O Monitoring...................................................................................................... 185 8.11.1 Using iostat........................................................................................ 185 8.11.2 Per-Process I/O Utilization and Monitoring: iotop............................ 186 Per-Process Monitoring with pidstat..................................................................... 187 Further Topics......................................................................................................... 188 9 UNDERSTANDING YOUR NETWORK AND ITS CONFIGURATION 9.1 9.2 9.3 9.4 9.5 9.6 9.7 9.8 9.9 9.10 9.11 9.12 9.13 9.14 ХІІ 189 Network Basics........................................................................................................
190 9.1.1 Packets.................................................................................................. 190 Network Layers.......................................................................................... 191 The Internet Layer.................................................................................................... 192 9.3.1 Viewing Your Computer s IPAddresses............................................. 193 9.3.2 Subnets................................................................................................ 194 9.3.3 Common Subnet Masks andCIDR Notation....................................... 195 Routes and the Kernel Routing Table........................................................................ 195 9.4.1 The Default Gateway......................................................................... 196 Basic ICMP and DNS Tools...................................................................................... 197 9.5.1 ping....................................................................................................... 197 9.5.2 traceroute............................................................................................. 198 9.5.3 DNS and host...................................................................................... 198 The Physical Layer and Ethernet.............................................................................. 199 Understanding Kernel Network Interfaces............................................................... 199 Introduction to Network Interface
Configuration........................................................ 200 9.8.1 Manually Adding andDeleting Routes.................................................. 201 Boot-Activated Network Configuration...................................................................... 202 Problems with Manual and Boot-Activated Network Configuration.......................202 Network Configuration Managers...........................................................................203 9.11.1 NetworkManager Operation............................................................... 203 9.11.2 Interacting with NetworkManager.....................................................204 9.11.3 NetworkManager Configuration........................................................ 204 Resolving Hostnames...............................................................................................206 9.12.1 /etc/hosts............................................................................................. 207 9.12.2 resolv.conf........................................................................................... 207 9.12.3 Caching and Zero-Configuration DNS...............................................208 9.12.4 /etc/nsswitch.conf.............................................................. 208 Localhost...................................................................................................................209 The Transport Layer: TCP, UDP, and Services......................................................209 9.14.1 TCP Ports and
Connections................................................................. 210 9.14.2 Establishing TCP Connections.............................................................210 9.14.3 Port Numbers and/etc/services........................................................ 211 Contents in Detail
9.15 9.16 9.17 9.18 9.19 9.20 9.21 9.22 9.23 9.24 9.14.4 Characteristics of TCP.............................................................................. 212 9.14.5 UDP............................................................................................................... 212 Revisiting a Simple Local Network.................................................................................214 Understanding DHCP....................................................................................................... 214 9.16.1 The Linux DHCP Client.............................................................................. 214 9.16.2 Linux DHCP Servers................................................................................... 215 Configuring Linux as a Router........................................................................................ 215 9.17.1 Internet Uplinks...........................................................................................216 Private Networks............................................................................................................... 216 Network Address Translation (IP Masquerading)....................................................... 217 Routers and Linux............................................................................................................... 218 Firewalls.............................................................................................................................. 219 9.21.1 Linux Firewall
Basics.................................................................................220 9.21.2 Setting Firewall Rules.............................................................................. 221 9.21.3 Firewall Strategies......................................................................................223 Ethernet, IP, and ARP....................................................................................................... 225 Wireless Ethernet............................................................................................................... 226 9.23.1 iw..................................................................................................................227 9.23.2 Wireless Security........................................................................................ 228 Summary............................................................................................................................228 10 NETWORK APPLICATIONS AND SERVICES 229 10.1 The Basics of Services..................................................................................................... 230 10.1.1 A Closer Look............................................................................................. 230 10.2 Network Servers............................................................................................................... 232 10.3 Secure Shell (SSH).............................................................................................................233 10.3.1 The SSHD
Server........................................................................................ 234 10.3.2 The SSH Client........................................................................................... 236 10.4 The inetd and xinetd Daemons......................................................................................237 10.4.1 TCP Wrappers: tcpd, /etc/hosts.allow, and /etc/hosts.deny .... 238 10.5 Diagnostic Tools............................................................................................................... 238 10.5.1 Isof............................................................................................................... 239 10.5.2 tcpdump........................................................................................................240 10.5.3 netcat.............................................................................................................241 10.5.4 Port Scanning..............................................................................................242 10.6 Remote Procedure Call (RPC)...........................................................................................243 10.7 Network Security.............................................................................................................. 243 10.7.1 Typical Vulnerabilities.............................................................................. 244 10.7.2 Security Resources..................................................................................... 245 10.8 Looking
Forward............................................................................................................... 2-45 10.9 Sockets: How Processes Communicatewith the Network........................................... 246 10.10 Unix Domain Sockets..................................................................................................... 247 10.10.1 Advantages for Developers.................................................................... 247 10.10.2 Listing Unix Domain Sockets..................................................................248 11 INTRODUCTION TO SHELL SCRIPTS 11.1 249 Shell Script Basics............................................................................................................ 249 11.1.1 Limitations of Shell Scripts......................................................................... 250 Contents in Detail XIII
11.2 11.3 11.4 11.5 11.6 11.7 11.8 11.9 11.10 11.11 11.12 11.13 11.14 Quoting and Literals............................................................................................... 251 11.2.1 Literals.................................................................................................. 251 11.2.2 Single Quotes...................................................................................... 252 11.2.3 Double Quotes....................................................................................252 11.2.4 Passing a Literal Single Quote............................................................ 253 Special Variables......................................................................................................253 11.3.1 Individual Arguments: $1, $2,........................................................... 254 11.3.2 Number of Arguments: $#................................................................. 254 11.3.3 All Arguments: $@............................................................................... 254 11.3.4 Script Name: $0................................................................................. 255 11.3.5 Process ID: $$...................................................................................... 255 11.3.6 Exit Code: $?...................................................................................... 255 Exit Codes............................................................................................................... 255
Conditionals.............................................................................................................256 11.5.1 Getting Around Empty Parameter Lists...............................................257 11.5.2 Using Other Commands for Tests........................................................257 11.5.3 elif......................................................................................................... 258 11.5.4 and I I Logical Constructs.............................................................258 11.5.5 Testing Conditions...............................................................................258 11.5.6 Matching Strings with case................................................................. 261 Loops.........................................................................................................................262 11.6.1 for Loops............................................................................................. 262 11.6.2 while Loops.......................................................................................... 262 Command Substitution............................................................................................ 263 Temporary File Management.................................................................................... 264 Here Documents......................................................................................................265 Important Shell Script Utilities............................................................................... 265 11.10.1
basename........................................................................................... 265 11.10.2 awk.....................................................................................................266 11.10.3 sed.....................................................................................................266 11.10.4 xargs...................................................................................................267 11.10.5 expr.....................................................................................................268 11.10.6 exec.....................................................................................................268 Subshells................................................................................................................ 268 Including Other Files in Scripts................................................................................269 Reading User Input.................................................................................................. 269 When (Not) to Use Shell Scripts............................................................................. 270 12 MOVING FILES ACROSS THE NETWORK 12.1 12.2 XIV 271 Quick Copy.............................................................................................................. 272 rsync..........................................................................................................................272 12.2.1 rsync Basics......................................................................................... 272 12.2.2 Making
Exact Copies of a Directory Structure................................... 273 12.2.3 Using the Trailing Slash...................................................................... 274 12.2.4 Excluding Files and Directories...........................................................275 12.2.5 Transfer Integrity, Safeguards, and Verbose Modes.......................... 276 12.2.6 Compression.........................................................................................277 12.2.7 Limiting Bandwidth................................................................................277 12.2.8 Transferring Files to Your Computer....................................................277 12.2.9 Further rsync Topics............................................................................. 278 Contents in Detail
12.3 12.4 12.5 12.6 Introduction to File Sharing...................................................................................... 278 Sharing Files with Samba..........................................................................................278 12.4.1 Configuring the Server......................................................................... 279 12.4.2 Server Access Control......................................................................... 279 12.4.3 Passwords............................................................................................280 12.4.4 Starting the Server................................................................................ 282 12.4.5 Diagnostics and Log Files.................................................................... 282 12.4.6 Configuring a File Share.......................................................................282 12.4.7 Home Directories.................................................................................. 283 12.4.8 Sharing Printers.....................................................................................283 12.4.9 Using the Samba Client.......................................................................283 12.4.10 Accessing Files as a Client............................................................... 284 NFS Clients................................................................................................................. 285 Further Network File Service Options and Limitations............................................ 286 13 USER ENVIRONMENTS 13.1 13.2 13.3
13.4 13.5 13.6 13.7 14 A BRIEF SURVEY OF THE LINUX DESKTOP 14.1 14.2 14.3 14.4 287 Guidelines for Creating Startup Files...................................................................... 288 When to Alter Startup Files.......................................................................................288 Shell Startup File Elements.......................................................................................... 288 13.3.1 The Command Path.............................................................................. 289 13.3.2 The Manual Page Path......................................................................... 290 13.3.3 The Prompt............................................................................................ 290 13.3.4 Aliases................................................................................................... 290 13.3.5 The Permissions Mask............................................................................291 Startup File Order and Examples.............................................................................291 13.4.1 The bash Shell........................................................................................292 13.4.2 The tcsh Shell....................................................................................... 294 Default User Settings................................................................................................. 295 13.5.1 Shell Defaults....................................................................................... 295 13.5.2
Editor......................................................................................................295 13.5.3 Pager......................................................................................................296 Startup File Pitfalls..................................................................................................... 296 Further Startup Topics................................................................................................ 296 297 Desktop Components................................................................................................ 298 14.1.1 Window Managers.............................................................................. 298 14.1.2 Toolkits................................................................................................... 299 14.1.3 Desktop Environments............................................................................299 14.1.4 Applications..........................................................................................299 A Closer Look at the X Window System.................................................................299 14.2.1 Display Managers................................................................................ 300 14.2.2 Network Transparency......................................................................... 300 Exploring X Clients......................................................................................................301 14.3.1 X
Events.................................................................................................301 14.3.2 Understanding X Input and Preference Settings................................. 302 The Future of X.......................................................................................................... 305 Contents in Detail
14.5 14.6 14.7 D-Bus..........................................................................................................................305 14.5.1 System and SessionInstances.............................................................. 306 14.5.2 Monitoring D-Bus Messages...............................................................306 Printing....................................................................................................................... 307 14.6.1 CUPS.................................................................................................... 307 14.6.2 Format Conversion andPrint Filters.................................................... 308 Other Desktop Topics................................................................................................308 15 DEVELOPMENT TOOLS 15.1 15.2 15.3 15.4 15.5 15.6 15.7 The C Compiler......................................................................................................... 310 15.1.1 Multiple Source Files.......................................................................... 311 15.1.2 Header (Include) Files and Directories.............................................. 311 15.1.3 Linking with Libraries.......................................................................... 313 15.1.4 Shared Libraries..................................................................................314 make..........................................................................................................................318 15.2.1 A Sample
Makefile.............................................................................318 15.2.2 Built-in Rules.........................................................................................319 15.2.3 Final Program Build.............................................................................319 15.2.4 Staying Up-to-Date............................................................................... 320 15.2.5 Command-Line Arguments and Options............................................ 320 15.2.6 Standard Macros and Variables........................................................ 321 15.2.7 Conventional Targets...........................................................................322 15.2.8 Organizing a Makefile........................................................................ 322 Debuggers................................................................................................................ 323 LexandYacc............................................................................................................324 Scripting Languages.................................................................................................. 325 15.5.1 Python.................................................................................................. 326 15.5.2 Perl....................................................................................................... 326 15.5.3 Other Scripting Languages................................................................. 326
Java............................................................................................................................ 327 Looking Forward: Compiling Packages....................................................................328 16 INTRODUCTION TO COMPILING SOFTWARE FROM C SOURCE CODE 16.1 16.2 16.3 16.4 xvi 309 329 Software Build Systems............................................................................................. 330 Unpacking C Source Packages............................................................................... 330 16.2.1 Where to Start.................................................................................... 331 GNU Autoconf......................................................................................................... 332 16.3.1 An Autoconf Example...........................................................................332 16.3.2 Installing Using a Packaging Tool......................................................333 16.3.3 configure Script Options...................................................................... 334 16.3.4 Environment Variables........................................................................ 334 16.3.5 Autoconf Targets.................................................................................. 336 16.3.6 Autoconf Log Files............................................................................... 336 16.3.7 pkg-config........................................................................................... 336 Installation
Practice.................................................................................................. 338 16.4.1 Where to Install...................................................................................338 Contents in Detail
16.5 16.6 16.7 Applying a Patch....................................................................................................... 339 Troubleshooting Compiles and Installations..............................................................340 16.6.1 Specific Errors....................................................................................... 340 Looking Forward....................................................................................................... 342 17 BUILDING ON THE BASICS 17.1 17.2 17.3 17.4 17.5 17.6 345 Web Servers and Applications................................................................................ 346 Databases....................................................................................................................346 17.2.1 Types of Databases..............................................................................347 Virtualization...............................................................................................................347 Distributed and On-Demand Computing ............................................................... 348 Embedded Systems.................................................................................................. 348 Final Remarks.............................................................................................................349 BIBLIOGRAPHY 351 INDEX 355 Contents in Detail
|
any_adam_object | 1 |
author | Ward, Brian 1972- |
author_GND | (DE-588)131522655 |
author_facet | Ward, Brian 1972- |
author_role | aut |
author_sort | Ward, Brian 1972- |
author_variant | b w bw |
building | Verbundindex |
bvnumber | BV042376498 |
classification_rvk | ST 261 |
ctrlnum | (OCoLC)907332747 (DE-599)BVBBV042376498 |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01445nam a2200373 c 4500</leader><controlfield tag="001">BV042376498</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150328 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150224s2015 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781593275679</subfield><subfield code="9">978-1-59327-567-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1593275676</subfield><subfield code="9">1-59327-567-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)907332747</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042376498</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 261</subfield><subfield code="0">(DE-625)143633:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ward, Brian</subfield><subfield code="d">1972-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)131522655</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How Linux works</subfield><subfield code="b">what every superuser should know</subfield><subfield code="c">by Brian Ward</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco, Calif.</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXII, 366 S.</subfield><subfield code="b">Ill.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">LINUX</subfield><subfield code="0">(DE-588)4337730-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">LINUX</subfield><subfield code="0">(DE-588)4337730-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027812665&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027812665</subfield></datafield></record></collection> |
id | DE-604.BV042376498 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:19:54Z |
institution | BVB |
isbn | 9781593275679 1593275676 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027812665 |
oclc_num | 907332747 |
open_access_boolean | |
owner | DE-11 DE-573 DE-523 DE-859 DE-703 DE-473 DE-BY-UBG |
owner_facet | DE-11 DE-573 DE-523 DE-859 DE-703 DE-473 DE-BY-UBG |
physical | XXII, 366 S. Ill. 24 cm |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | No Starch Press |
record_format | marc |
spelling | Ward, Brian 1972- Verfasser (DE-588)131522655 aut How Linux works what every superuser should know by Brian Ward 2. ed. San Francisco, Calif. No Starch Press 2015 XXII, 366 S. Ill. 24 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Linux Operating systems (Computers) LINUX (DE-588)4337730-0 gnd rswk-swf LINUX (DE-588)4337730-0 s DE-604 Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027812665&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Ward, Brian 1972- How Linux works what every superuser should know Linux Operating systems (Computers) LINUX (DE-588)4337730-0 gnd |
subject_GND | (DE-588)4337730-0 |
title | How Linux works what every superuser should know |
title_auth | How Linux works what every superuser should know |
title_exact_search | How Linux works what every superuser should know |
title_full | How Linux works what every superuser should know by Brian Ward |
title_fullStr | How Linux works what every superuser should know by Brian Ward |
title_full_unstemmed | How Linux works what every superuser should know by Brian Ward |
title_short | How Linux works |
title_sort | how linux works what every superuser should know |
title_sub | what every superuser should know |
topic | Linux Operating systems (Computers) LINUX (DE-588)4337730-0 gnd |
topic_facet | Linux Operating systems (Computers) LINUX |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027812665&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT wardbrian howlinuxworkswhateverysuperusershouldknow |