[www.ed2k.online]下載基地為您提供軟件、遊戲、圖書、教育等各種資源的ED2K電驢共享下載和MAGNET磁力鏈接下載。
設為首頁
加入收藏
首頁 圖書資源 軟件資源 游戲資源 教育資源 其他資源
 電驢下載基地 >> 图书资源 >> 計算機與網絡 >> 《Perl 自動化系統管理》(Automating.System.Administration.with.Perl.2nd.Edition)(David N. Blank-Edelman)第2版[PDF]
《Perl 自動化系統管理》(Automating.System.Administration.with.Perl.2nd.Edition)(David N. Blank-Edelman)第2版[PDF]
下載分級 图书资源
資源類別 計算機與網絡
發布時間 2017/7/10
大       小 -
《Perl 自動化系統管理》(Automating.System.Administration.with.Perl.2nd.Edition)(David N. Blank-Edelman)第2版[PDF] 簡介: 中文名 : Perl 自動化系統管理 原名 : Automating.System.Administration.with.Perl.2nd.Edition 作者 : David N. Blank-Edelman 資源格式 : PDF 版本 : 第2版 出版社 : O’Reilly Media, Inc. 書號 : ISBN: 978-0-596-00639-6 發行時間 :
電驢資源下載/磁力鏈接資源下載:
全選
"《Perl 自動化系統管理》(Automating.System.Administration.with.Perl.2nd.Edition)(David N. Blank-Edelman)第2版[PDF]"介紹
中文名: Perl 自動化系統管理
原名: Automating.System.Administration.with.Perl.2nd.Edition
作者: David N. Blank-Edelman
資源格式: PDF
版本: 第2版
出版社: O’Reilly Media, Inc.
書號: ISBN: 978-0-596-00639-6
發行時間: 2009年05月
地區: 美國
語言: 英文
簡介:

內容簡介:
perl 是類UNIX系統管理的一個利器,維護系統如果不會Perl,最少也應該弄熟SHELL,兩者都能得心應手當然最好。
Perl是一種腳本語言。 最初的設計者為拉裡·沃爾(Larry Wall),它於1987年12月18日發表。Perl借取了C、sed、awk、shell scripting 以及很多其他編程語言的特性。其中最重要的特性是他內部集成了正則表達式的功能,以及巨大的第三方代碼庫 CPAN。
Perl原名pearl,但是在這個語言官方發表前,拉裡·沃爾發現已經有個編程語言“pearl”,便將這個編程語言的名字改成Perl。對於Perl 這四個字母,有一些解釋,包括充滿幽默感的“Pathologically Eclectic Rubbish Lister”。“Practical Extraction and Report Language”曾經出現在很多有關Perl的數據裡,包括官方的首頁。不過事實上這個長名字是後來湊出來的。它的名字第一個字母大寫(Perl)時就指這個編程語言,無大寫字母(perl)時就指它的解釋器。將Perl寫成“PERL”是不適當的,因為它並非一個縮寫字。
內容截圖:

目錄:
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Automation Is a Must 1
How Perl Can Help You 2
This Book Will Show You How 3
What You Need 5
Some Notes About the Perl Versions Used for This Book 6
What About Perl 5.10? 6
What About Strawberry Perl? 6
What About Perl 6? 6
Some Notes About Using Vista with the Code in This Book 7
Locating and Installing Modules 8
Installing Modules on Unix 9
Installing Modules on Win32 9
It’s Not Easy Being Omnipotent 10
Don’t Do It 10
Drop Your Privileges As Soon As Possible 10
Be Careful When Reading Data 11
Be Careful When Writing Data 12
Avoid Race Conditions 12
Enjoy 13
References for More Information 13
2. Filesystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Perl to the Rescue 15
Filesystem Differences 16
Unix 16
Windows-Based Operating Systems 16
Mac OS X 18
Filesystem Differences Summary 19
Dealing with Filesystem Differences from Perl 19
Walking or Traversing the Filesystem by Hand 21
Walking the Filesystem Using the File::Find Module 26
Walking the Filesystem Using the File::Find::Rule Module 36
Manipulating Disk Quotas 38
Editing Quotas with edquota Trickery 40
Editing Quotas Using the Quota Module 44
Editing NTFS Quotas Under Windows 45
Querying Filesystem Usage 46
Module Information for This Chapter 48
References for More Information 48
3. User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Unix User Identities 50
The Classic Unix Password File 50
Changes to the Password File in BSD 4.4 Systems 57
Shadow Passwords 58
Windows-Based Operating System User Identities 59
Windows User Identity Storage and Access 59
Windows User ID Numbers 61
Windows Passwords Don’t Play Nice with Unix Passwords 63
Windows Groups 63
Windows User Rights 68
Building an Account System to Manage Users 71
The Backend Database 73
The Low-Level Component Library 78
The Process Scripts 89
Account System Wrap-Up 94
Module Information for This Chapter 97
References for More Information 97
Unix Password Files 97
Windows User Administration 98
4. User Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Process Management 100
Windows-Based Operating System Process Control 100
Unix Process Control 119
File and Network Operations 125
Tracking File Operations on Windows 125
Tracking Network Operations on Windows 128
Tracking File and Network Operations in Unix 129
Module Information for This Chapter 135
Installing Win32::Setupsup 135
References for More Information 136
5. TCP/IP Name and Configuration Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Host Files 137
Generating Host Files 140
Error-Checking the Host File Generation Process 143
Improving the Host File Output 144
Incorporating a Source Code Control System 148
NIS, NIS+, and WINS 151
NIS+ 154
Windows Internet Name Server (WINS) 154
Domain Name Service (DNS) 155
Generating DNS (BIND) Configuration Files 156
DNS Checking: An Iterative Approach 165
DHCP 174
Active Probing for Rogue DHCP Servers 176
Monitoring Legitimate DHCP Servers 181
Module Information for This Chapter 183
References for More Information 184
6. Working with Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Configuration File Formats 188
Binary 188
Naked Delimited Data 189
Key/Value Pairs 190
Markup Languages 192
All-in-One Modules 235
Advanced Configuration Storage Mechanisms 236
Module Information for This Chapter 236
References for More Information 237
XML and YAML 237
7. SQL Database Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Interacting with a SQL Server from Perl 240
Using the DBI Framework 243
Using ODBC from Within DBI 249
Server Documentation 251
MySQL Server via DBI 252
Oracle Server via DBI 254
Microsoft SQL Server via ODBC 255
Database Logins 258
Monitoring Space Usage on a Database Server 260
Module Information for This Chapter 263
References for More Information 263
DBI 263
Microsoft SQL Server 264
ODBC 264
Oracle 264
8. Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Sending Mail 265
Getting sendmail (or a Similar Mail Transport Agent) 266
Using the OS-Specific IPC Framework to Drive a Mail Client 266
Speaking the Mail Protocols Directly 268
Common Mistakes in Sending Email 273
Overzealous Message Sending 273
Subject Line Waste 282
Insufficient Information in the Message Body 282
Fetching Mail 285
Talking POP3 to Fetch Mail 285
Talking IMAP4rev1 to Fetch Mail 287
Processing Mail 291
Dissecting a Single Message 291
Dissecting a Whole Mailbox 296
Dealing with Spam 297
Support Mail Augmentation 305
Module Information for This Chapter 310
References for More Information 311
9. Directory Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
What’s a Directory? 313
Finger: A Simple Directory Service 314
The WHOIS Directory Service 318
LDAP: A Sophisticated Directory Service 321
LDAP Programming with Perl 322
The Initial LDAP Connection 323
Performing LDAP Searches 325
Entry Representation in Perl 329
Adding Entries with LDIF 331
Adding Entries with Standard LDAP Operations 333
Deleting Entries 334
Modifying Entry Names 335
Modifying Entry Attributes 337
Deeper LDAP Topics 339
Putting It All Together 348
Active Directory Service Interfaces 354
ADSI Basics 355
Using ADSI from Perl 357
Dealing with Container/Collection Objects 359
Identifying a Container Object 360
So How Do You Know Anything About an Object? 360
Searching 363
Performing Common Tasks Using the WinNT and LDAP Namespaces 366
Working with Users via ADSI 367
Working with Groups via ADSI 369
Working with File Shares via ADSI 369
Working with Print Queues and Print Jobs via ADSI 370
Working with Windows-Based Operating System Services via ADSI 371
Module Information for This Chapter 373
References for More Information 373
LDAP 373
ADSI 374
10. Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Reading Text Logs 377
Reading Binary Log Files 378
Using unpack() 378
Calling an OS (or Someone Else’s) Binary 383
Using the OS’s Logging API 384
Structure of Log File Data 385
Dealing with Log File Information 388
Space Management of Logging Information 388
Log Parsing and Analysis 395
Writing Your Own Log Files 425
Logging Shortcuts and Formatting Help 425
Basic/Intermediate Logging Frameworks 426
Advanced Logging Framework 428
Module Information for This Chapter 429
References for More Information 430
11. Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Noticing Unexpected or Unauthorized Changes 434
Local Filesystem Changes 434
Changes in Data Served Over the Network 440
Noticing Suspicious Activities 442
Local Signs of Peril 442
Finding Problematic Patterns 444
Danger on the Wire, or “Perl Saves the Day” 449
Preventing Suspicious Activities 460
Suggest Better Passwords 460
Reject Bad Passwords 461
Module Information for This Chapter 466
References for More Information 467
12. SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Using SNMP from Perl 469
Sending and Receiving SNMP Traps, Notifications, and Informs 480
Alternative SNMP Programming Interfaces 484
Module Information for This Chapter 486
References for More Information 486
13. Network Mapping and Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Network Mapping 489
Discovering Hosts 490
Discovering Network Services 499
Physical Location 501
Presenting the Information 503
Textual Presentation Tools 503
Graphical Presentation Tools 507
Monitoring Frameworks 522
Extending Existing Monitoring Packages 524
What’s Left? 526
Module Information for This Chapter 527
References for More Information 527
14. Experiential Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
Playing with Timelines 530
Task One: Parsing crontab Files 530
Task Two: Displaying the Timeline 531
Task Three: Writing Out the Correct XML File 533
Putting It All Together 534
Summary: What Can We Learn from This? 536
Playing with Geocoding 537
Geocoding from Postal Addresses 537
Geocoding from IP Addresses 541
Summary: What Can We Learn from This? 544
Playing with an MP3 Collection 544
Summary: What Can We Learn from This? 546
One Final Exploration 546
Part One: Retrieving the Wiki Page with WWW::Mechanize 547
Part Two: Extracting the Data 550
Part Three: Geocoding and Mapping the Data 551
Summary: What Can We Learn from This? 554
Remember to Play 555
Module Information for This Chapter 555
Source Material for This Chapter 556
A. The Eight-Minute XML Tutorial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
B. The 10-Minute XPath Tutorial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
C. The 10-Minute LDAP Tutorial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
D. The 15-Minute SQL Tutorial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
E. The Five-Minute RCS Tutorial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
F. The Two-Minute VBScript-to-Perl Tutorial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597
G. The 20-Minute SNMP Tutorial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617 
相關資源:

免責聲明:本網站內容收集於互聯網,本站不承擔任何由於內容的合法性及健康性所引起的爭議和法律責任。如果侵犯了你的權益,請通知我們,我們會及時刪除相關內容,謝謝合作! 聯系信箱:[email protected]

Copyright © 電驢下載基地 All Rights Reserved