图书介绍

使用Perl实现系统管理自动化PDF|Epub|txt|kindle电子书版本网盘下载

使用Perl实现系统管理自动化
  • DAVIDN.BLANK-EDELMAN著 著
  • 出版社: 南京:东南大学出版社
  • ISBN:9787564119287
  • 出版时间:2010
  • 标注页数:644页
  • 文件大小:36MB
  • 文件页数:666页
  • 主题词:PERL语言-程序设计

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

使用Perl实现系统管理自动化PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

1.Introduction1

Automation Is a Must1

How Perl CanHelp You2

This Book Will Show You How3

What You Need5

Some Notes About the Perl Versions Used for This Book6

What About Perl 5.10?6

What About Strawberry Perl?6

What About Perl 6?6

Some Notes About Using Vista with the Code in This Book7

Locating and Installing Modules8

Installing Modules on Unix9

Installing Modules on Win329

It's Not Easy Being Omnipotent10

Don't Do It10

Drop Your Privileges As Soon As Possible10

Be Careful When Reading Data11

Be Careful When Writing Data12

Avoid Race Conditions12

Enjoy13

References for More Information13

2.Filesystems15

Perl to the Rescue15

Filesystem Differences16

Unix16

Windows-Based Operating Systems16

Mac OS X18

Filesystem Differences Summary19

Dealing with Filesystem Differences from Perl19

Walking or Traversing the Filesystem by Hand21

Walking the Filesystem Using the File::Find Module26

Walking the Filesystem Using the File::Find::Rule Module36

Manipulating Disk Quotas38

Editing Quotas with edquota Trickery40

Editing Quotas Using the Quota Module44

Editing NTFS Quotas Under Windows45

Querying Filesystem Usage46

Module Information for This Chapter48

References for More Information48

3.User Accounts49

Unix User Identities50

The Classic Unix Password File50

Changes to the Password File in BSD 4.4 Systems57

Shadow Passwords58

Windows-Based Operating System User Identities59

Windows User Identity Storage and Access59

Windows User ID Numbers61

Windows Passwords Don't Play Nice with Unix Passwords63

Windows Groups63

Windows User Rights68

Building an Account System to Manage Users71

The Backend Database73

The Low-Level Component Library78

The Process Scripts89

Account System Wrap-Up94

Module Information for This Chapter97

References for More Information97

Unix Password Files97

Windows User Administration98

4.User Activity99

Process Management100

Windows-Based Operating System Process Control100

Unix Process Control119

File and Network Operations125

Tracking File Operations on Windows125

Tracking Network Operations on Windows128

Tracking File and Network Operations in Unix129

Module Information for This Chapter135

Installing Win32::Setupsup135

References for More Information136

5.TCP/IP Name and Configuration Services137

Host Files137

Generating Host Files140

Error-Checking the Host File Generation Process143

Improving the Host File Output144

Incorporating a Source Code Control System148

NIS,NIS+,and WINS151

NIS+154

Windows Internet Name Server(WINS)154

Domain Name Service(DNS)155

Generating DNS(BIND)Configuration Files156

DNS Checking:An Iterative Approach165

DHCP174

Active Probing for Rogue DHCP Servers176

Monitoring Legitimate DHCP Servers181

Module Information for This Chapter183

References for More Information184

6.Working with Configuration Files185

Configuration File Formats188

Binary188

Naked Delimited Data189

Key/Value Pairs190

Markup Languages192

All-in-One Modules235

Advanced Configuration Storage Mechanisms236

Module Information for This Chapter236

References for More Information237

XML and YAML237

7.SQL Database Administration239

Interacting with a SQL Server from Perl240

Using the DBI Framework243

Using ODBC from Within DBI249

Server Documentation251

MySQL Server via DBI252

Oracle Server via DBI254

Microsoff SQL Server via ODBC255

Database Logins258

Monitoring Space Usage on a Database Server260

Module Information for This Chapter263

References for More Information263

DBI263

Microsoft SQL Server264

ODBC264

Oracle264

8.Email265

Sending Mail265

Getting sendmail(or a Similar Mail Transport Agent)266

Using the OS-Specific IPC Framework to Drive a Mail Client266

Speaking the Mail Protocols Directly268

Common Mistakes in Sending Email273

Overzealous Message Sending273

Subject Line Waste282

Insufficient Information in the Message Body282

Fetching Mail285

Talking POP3 to Fetch Mail285

Talking IMAP4revl to Fetch Mail287

Processing Mail291

Dissecting a Single Message291

Dissecting a Whole Mailbox296

Dealing with Spam297

Support Mail Augmentation305

Module Information for This Chapter310

References for More Information311

9.Directory Services313

What's a Directory?313

Finger:A Simple Directory Service314

The WHOIS Directory Service318

LDAP:A Sophisticated Directory Service321

LDAP Programming with Perl322

The Initial LDAP Connection323

Performing LDAP Searches325

Entry Representation in Perl329

Adding Entries with LDIF331

Adding Entries with Standard LDAP Operations333

Deleting Entries334

Modifring Entry Names335

Modifying Entry Attributes337

Deeper LDAP Topics339

Putting It All Together348

Active Directory Service Interfaces354

ADSI Basics355

Using ADSI from Perl357

Dealing with Container/Collection Objects359

Identifying a Container Object360

So How Do Yon Know Anything About an Object?360

Searching363

Performing Common Tasks Using the WinNT and LDAP Namespaces366

Working with Users via ADSI367

Working with Groups via ADSI369

Working with File Shares via ADSI369

Working with Print Queues and Print Jobs via ADSI370

Working with Windows-Based Operating System Services via ADSI371

Module Information for This Chapter373

References for More Information373

LDAP373

ADSI374

10.Log Files377

Reading Text Logs377

Reading Binary Log Files378

Using unpack()378

Calling an OS(or Someone Else's)Binary383

Using the OS's Logging API384

Structure of Log File Data385

Dealing with Log File Information388

Space Management of Logging Information388

Log Parsing and Analysis395

Writing Your Own Log Files425

Logging Shortcuts and Formatting Help425

Basic/Intermediate Logging Frameworks426

Advanced Logging Framework428

Module Information for This Chapter429

References for More Information430

11.Security433

Noticing Unexpected or Unauthorized Changes434

Local Filesystem Changes434

Changes in Data Served Over the Network440

Noticing Suspicious Activities442

Local Signs of Peril442

Finding Problematic Patterns444

Danger on the Wire,or"Perl Saves the Day"449

Preventing Suspicious Activities460

Suggest Better Passwords460

Reiect Bad Passwords461

Module Information for This Chapter466

References for More Information467

12.SNMP469

Using SNMP from Perl469

Sending and Receiving SNMP Traps,Notifications,and Informs480

Alternative SNMP Programming Interfaces484

Module Information for This Chapter486

References for More Information486

13.Network Mapping and Monitoring489

Network Mapping489

Discovering Hosts490

Discovering Network Services499

Physical Location501

Presenting the Information503

Textual Presentation Tools503

Graphical Presentation Tools507

Monitoring Frameworks522

Extending Existing Monitoring Packages524

What's Left?526

Module Information for This Chapter527

References for More Information527

14.Experiential Learning529

Playing with Timelines530

Task One:Parsing crontab Files530

Task Two:Displaying the Timeline531

Task Three:Writing Out the Correct XML File533

Putting It All Together534

Summary:What Can We Learn from This?536

Playing with Geocoding537

Geocoding from Postal Addresses537

Geocoding from IP Addresses541

Summary:What Can We Learn from This?544

Playing with an MP3 Collection544

Summary:What Can We Learn from This?546

One Final Exploration546

Part One:Retrieving the Wiki Page with WWW::Mechanize547

Part Two:Extracting the Data550

Part Three:Geocoding and Mapping the Data551

Summary:What Can We Learn from This?554

Remember to Play555

Module Information for This Chapter555

Source Material for This Chapter556

A.The Eight-Minute XML Tutorial557

B.The 10-Minute XPath Tutorial563

C.The 10-Minute LDAP Tutorial573

D.The 15-Minute SQL Tutorial579

E.The Five-Minute RCS Tutorial593

F.The Two-Minute VBScript-to-Perl Tutorial597

G.The 20-Minute SNMP Tutorial603

Index617

热门推荐