作者:empty 页数:668 出版社:empty |
Safarifor 45 days withBooks OnLinepurchase of this book.Second Edition, not only offers you the right tools for your job,but also suggests the best ways to approach specific problemsand to securely automate recurring tasks.Updated and expanded to cover the latest operating systems,technologies, and Perl modules, this edition of the“Otter Book'
·Script email protocols and spam control·Create, handle, and analyze logfiles effectively·Administer network name and configuration services,·Maintain, monitor, and map network services·Improve filesystem.process, and network securityThis edition includes addtional appendixes to get you upto speed on technologies such as XML/XPath, LDAP, SNMP.and SQL With this book in hand and Perl in your toolbox,you can do more wth less—fewer resources, less effort, andfar less hassle,
Many of the designations used by manufacturers and sellers to distinguish their praductsareclzimedastrade marles.Where those designations appear in this ba ok, and O'Really Media, Inc.was aware of atrademark claim, the designations have been pnn ted in caps or initial caps.While eve type ccu con has been kenntheprspaatnefths book.he pubs her and auhor assumeno responsiblity for errors or omissions, or for damages resulting trom the use of them nformation con-tained herein.
Preface.
1.Introduction.
Auro mation Is a Must
How Perl Can Help You
This Book Will Show You How
What You Need
Some Notes About the Perl Versions Used for This Book
What About Perl 5.10?
What About Strawberry Perl?
What About Perl 6?
Some Notes About Using Vista with the Code in This Book
Locating and Installing Modules
Installing Modules on Unix
Installing Modules on Win 32
It's Not Easy Being Omnipotent
Don't Do It
Drop Your Privilege sAsSoon As Possible
Be Careful When Reading Data
Be Careful When Writing Data
Avoid Race Conditions
Enjoy
References forM or c Information
2.Filesystems.
Perl to the Rescue
Filesystem Differences
Windows-Based Operating Systems
MacOSX
Filesystem Differences Summary
The Classic Unix Password File
De a ing with Filesystem Differences from Perl
Walking or Traversing the Filesystem by Hand
Walking the Filesystem Using the File::Find Module
Walking the Filesystem Using the File Find::Rule Module
Manipulating Disk Quotas
Editing Quotas with ed quo a Trickery
Editing Quotas Using the Quota Module
Editing NTFS Quotas Under Windows
Querying Filesystem Usage
Module Information for This Chapter
References for More Information
3.User Accounts.
Unx User ident it is
Changes to the Password File in BSD 4.4 Systems
Shadow Passwords
Windows-Based OperatingSystem User Identities
Windows User Identity Storage and Access
Windows UserID Numbers
Windows-Based OperatingSystem Process Control
Unix Process Control
Tracking File Operations on Windows
Tracking Network Operations on Windows
Tracking File and Ner work Operations in Unix
Installing Win 32::Setups up
Windows Passwords Don't Play Nice with Unix Passwords
Windows Groups
Windows User Rights
Building an Account System to Manage Users
The Backend Database
The Low-Level Component Library
The Process Scripts
Account System Wrap-Up
Module Information for This Chapter
References for More Information
Unix Password Files
Windows User Administration
4.User Activity.
Process Management
File