Professional Linux Deployment
Professional Linux Deployment is part of the Wrox Programmer to Programmer series. In the Introduction the book states it will teach professional administrators steps to replace existing network systems with Linux. The book is targeted towards the NT and non-Linux UNIX administrator. It presumes the reader is a knowledgeable NT administrator and has learned Linux installation and basic setups elsewhere.
Professional Linux Deployment (PLD) opens by recognizing that some readers may first have to provide a convincing argument for why Linux should be integrated into the organization's information technology architecture. To keep things balanced, the authors also provide arguments against Linux. Several pro and con Linux web sites are suggested. The book then moves on to integrating Linux platforms into NT and other UNIX computing environments.
The first major integration topic to be covered is replacing NT-based file and print servers with Samba. Implementing web and ftp servers is the next integration area presented. At this point the authors provide an e-commerce case study using Linux and Apache. Next they examine the integration of databases and directory services.
Network infrastructure services are discussed next and here the authors provide details on replacing your current routers, gateways, mail and DNS servers, proxies and firewalls with Linux-based machines. Secure networks and links have become important to the average business. PLD's cryptography chapter suggests various encryption tools available for integration into an IT architecture to secure network traffic.
The integration of distributed systems is discussed and provides some idea as to whether or not Linux could be implemented within a particular environment. The last area of integration looks at providing component object model (COM) and distributed component object model (DCOM) functionality from a Linux platform.
In closing, the book offers a case study on migrating to Linux. This study primarily discusses migrating an application from UNIX to Linux. Each chapter concludes with a list of resources, which include web sites, books, mailing lists and news groups.
Three appendices provide a 5,000 foot overview of Linux, Linux commands and utilities, and pointers on system administration. As a reference, these appendices are okay, but do not expect to learn all you need to know about Linux and Linux administration here.
Deployment decisions must be economically, politically and technically acceptable to the organization. Since this is a book on deployment, I expected to see some deployment guidance or suggested methodology. Sadly, this book fails to discuss this area in any depth.
The book provides the technical knowledge and experience necessary when making Linux-deployment recommendations. It delineates the steps to set up Linux-based services in comparison to those provided by NT or other UNIX variants. This allows for a careful examination of the similarities and differences between services provided by NT and Linux platforms. It makes it easier to compare the quality of a current service with the same Linux-based service. The book also made it easier to contrast the resources required in setting up and maintaining Linux-based services with the services on your current platform. The knowledge gained from this resource should provide the technical foundation for deciding whether deploying Linux-based services makes technical and financial sense.
Considerable credit must be given to the book's editors as well. If it were not for the author list, it would be difficult to recognize that ten people contributed text to this book.
Daniel Lazenby (email@example.com) first encountered UNIX in 1983 and discovered Linux in 1994.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide