图书介绍
使用Perl实现系统管理自动化PDF|Epub|txt|kindle电子书版本网盘下载
![使用Perl实现系统管理自动化](https://www.shukui.net/cover/69/33286822.jpg)
- DAVIDN.BLANK-EDELMAN著 著
- 出版社: 南京:东南大学出版社
- ISBN:9787564119287
- 出版时间:2010
- 标注页数:644页
- 文件大小:36MB
- 文件页数:666页
- 主题词:PERL语言-程序设计
PDF下载
下载说明
使用Perl实现系统管理自动化PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
1.Introduction1
Automation Is a Must1
How Perl CanHelp You2
This Book Will Show You How3
What You Need5
Some Notes About the Perl Versions Used for This Book6
What About Perl 5.10?6
What About Strawberry Perl?6
What About Perl 6?6
Some Notes About Using Vista with the Code in This Book7
Locating and Installing Modules8
Installing Modules on Unix9
Installing Modules on Win329
It's Not Easy Being Omnipotent10
Don't Do It10
Drop Your Privileges As Soon As Possible10
Be Careful When Reading Data11
Be Careful When Writing Data12
Avoid Race Conditions12
Enjoy13
References for More Information13
2.Filesystems15
Perl to the Rescue15
Filesystem Differences16
Unix16
Windows-Based Operating Systems16
Mac OS X18
Filesystem Differences Summary19
Dealing with Filesystem Differences from Perl19
Walking or Traversing the Filesystem by Hand21
Walking the Filesystem Using the File::Find Module26
Walking the Filesystem Using the File::Find::Rule Module36
Manipulating Disk Quotas38
Editing Quotas with edquota Trickery40
Editing Quotas Using the Quota Module44
Editing NTFS Quotas Under Windows45
Querying Filesystem Usage46
Module Information for This Chapter48
References for More Information48
3.User Accounts49
Unix User Identities50
The Classic Unix Password File50
Changes to the Password File in BSD 4.4 Systems57
Shadow Passwords58
Windows-Based Operating System User Identities59
Windows User Identity Storage and Access59
Windows User ID Numbers61
Windows Passwords Don't Play Nice with Unix Passwords63
Windows Groups63
Windows User Rights68
Building an Account System to Manage Users71
The Backend Database73
The Low-Level Component Library78
The Process Scripts89
Account System Wrap-Up94
Module Information for This Chapter97
References for More Information97
Unix Password Files97
Windows User Administration98
4.User Activity99
Process Management100
Windows-Based Operating System Process Control100
Unix Process Control119
File and Network Operations125
Tracking File Operations on Windows125
Tracking Network Operations on Windows128
Tracking File and Network Operations in Unix129
Module Information for This Chapter135
Installing Win32::Setupsup135
References for More Information136
5.TCP/IP Name and Configuration Services137
Host Files137
Generating Host Files140
Error-Checking the Host File Generation Process143
Improving the Host File Output144
Incorporating a Source Code Control System148
NIS,NIS+,and WINS151
NIS+154
Windows Internet Name Server(WINS)154
Domain Name Service(DNS)155
Generating DNS(BIND)Configuration Files156
DNS Checking:An Iterative Approach165
DHCP174
Active Probing for Rogue DHCP Servers176
Monitoring Legitimate DHCP Servers181
Module Information for This Chapter183
References for More Information184
6.Working with Configuration Files185
Configuration File Formats188
Binary188
Naked Delimited Data189
Key/Value Pairs190
Markup Languages192
All-in-One Modules235
Advanced Configuration Storage Mechanisms236
Module Information for This Chapter236
References for More Information237
XML and YAML237
7.SQL Database Administration239
Interacting with a SQL Server from Perl240
Using the DBI Framework243
Using ODBC from Within DBI249
Server Documentation251
MySQL Server via DBI252
Oracle Server via DBI254
Microsoff SQL Server via ODBC255
Database Logins258
Monitoring Space Usage on a Database Server260
Module Information for This Chapter263
References for More Information263
DBI263
Microsoft SQL Server264
ODBC264
Oracle264
8.Email265
Sending Mail265
Getting sendmail(or a Similar Mail Transport Agent)266
Using the OS-Specific IPC Framework to Drive a Mail Client266
Speaking the Mail Protocols Directly268
Common Mistakes in Sending Email273
Overzealous Message Sending273
Subject Line Waste282
Insufficient Information in the Message Body282
Fetching Mail285
Talking POP3 to Fetch Mail285
Talking IMAP4revl to Fetch Mail287
Processing Mail291
Dissecting a Single Message291
Dissecting a Whole Mailbox296
Dealing with Spam297
Support Mail Augmentation305
Module Information for This Chapter310
References for More Information311
9.Directory Services313
What's a Directory?313
Finger:A Simple Directory Service314
The WHOIS Directory Service318
LDAP:A Sophisticated Directory Service321
LDAP Programming with Perl322
The Initial LDAP Connection323
Performing LDAP Searches325
Entry Representation in Perl329
Adding Entries with LDIF331
Adding Entries with Standard LDAP Operations333
Deleting Entries334
Modifring Entry Names335
Modifying Entry Attributes337
Deeper LDAP Topics339
Putting It All Together348
Active Directory Service Interfaces354
ADSI Basics355
Using ADSI from Perl357
Dealing with Container/Collection Objects359
Identifying a Container Object360
So How Do Yon Know Anything About an Object?360
Searching363
Performing Common Tasks Using the WinNT and LDAP Namespaces366
Working with Users via ADSI367
Working with Groups via ADSI369
Working with File Shares via ADSI369
Working with Print Queues and Print Jobs via ADSI370
Working with Windows-Based Operating System Services via ADSI371
Module Information for This Chapter373
References for More Information373
LDAP373
ADSI374
10.Log Files377
Reading Text Logs377
Reading Binary Log Files378
Using unpack()378
Calling an OS(or Someone Else's)Binary383
Using the OS's Logging API384
Structure of Log File Data385
Dealing with Log File Information388
Space Management of Logging Information388
Log Parsing and Analysis395
Writing Your Own Log Files425
Logging Shortcuts and Formatting Help425
Basic/Intermediate Logging Frameworks426
Advanced Logging Framework428
Module Information for This Chapter429
References for More Information430
11.Security433
Noticing Unexpected or Unauthorized Changes434
Local Filesystem Changes434
Changes in Data Served Over the Network440
Noticing Suspicious Activities442
Local Signs of Peril442
Finding Problematic Patterns444
Danger on the Wire,or"Perl Saves the Day"449
Preventing Suspicious Activities460
Suggest Better Passwords460
Reiect Bad Passwords461
Module Information for This Chapter466
References for More Information467
12.SNMP469
Using SNMP from Perl469
Sending and Receiving SNMP Traps,Notifications,and Informs480
Alternative SNMP Programming Interfaces484
Module Information for This Chapter486
References for More Information486
13.Network Mapping and Monitoring489
Network Mapping489
Discovering Hosts490
Discovering Network Services499
Physical Location501
Presenting the Information503
Textual Presentation Tools503
Graphical Presentation Tools507
Monitoring Frameworks522
Extending Existing Monitoring Packages524
What's Left?526
Module Information for This Chapter527
References for More Information527
14.Experiential Learning529
Playing with Timelines530
Task One:Parsing crontab Files530
Task Two:Displaying the Timeline531
Task Three:Writing Out the Correct XML File533
Putting It All Together534
Summary:What Can We Learn from This?536
Playing with Geocoding537
Geocoding from Postal Addresses537
Geocoding from IP Addresses541
Summary:What Can We Learn from This?544
Playing with an MP3 Collection544
Summary:What Can We Learn from This?546
One Final Exploration546
Part One:Retrieving the Wiki Page with WWW::Mechanize547
Part Two:Extracting the Data550
Part Three:Geocoding and Mapping the Data551
Summary:What Can We Learn from This?554
Remember to Play555
Module Information for This Chapter555
Source Material for This Chapter556
A.The Eight-Minute XML Tutorial557
B.The 10-Minute XPath Tutorial563
C.The 10-Minute LDAP Tutorial573
D.The 15-Minute SQL Tutorial579
E.The Five-Minute RCS Tutorial593
F.The Two-Minute VBScript-to-Perl Tutorial597
G.The 20-Minute SNMP Tutorial603
Index617