| | Copyright |
| | About the Author |
| | About the Technical Reviewers |
| | Acknowledgments |
| | Tell Us What You Think |
| | Introduction |
| | | Who Should Read This Book? |
| | | The Objectives |
| | | Organization of This Book |
| | | Conventions Used in This Book |
| | | Onward and Upward |
|
| | Part I: The System Manager |
| | | Chapter 1. Job Description |
| | | The Solaris Operating Environment |
| | | The Roles of the System Manager |
| | | The Tasks of the System Manager |
| | | Summary |
|
| | | Chapter 2. The IT Budget |
| | | Staff |
| | | Capital Costs |
| | | Running Costs |
| | | Forecasting |
| | | Revenue! |
| | | Summary |
|
| | | Chapter 3. Delivering the Goods |
| | | Overview |
| | | Service Level Management |
| | | Creating a Service Level Agreement: An Example |
| | | Summary |
|
| | | Chapter 4. Testing |
| | | Lessons Learned from Y2K |
| | | The Stages of Testing |
| | | Compatibility Testing |
| | | Acceptance Testing |
| | | End-to-End Testing |
| | | Final Testing Before Implementation |
| | | Summary |
|
|
| | Part II: Management of the Solaris Environment |
| | | Chapter 5. Solaris Installations and Upgrades |
| | | 24x7 Operations |
| | | New Installation |
| | | Upgrade |
| | | Patches |
| | | Summary |
|
| | | Chapter 6. Solaris Security |
| | | Strategic Planning and Techniques |
| | | Tactical Options |
| | | Summary |
|
| | | Chapter 7. Disaster Recovery and Contingency Management |
| | | Disaster Recovery |
| | | Contingency Management |
| | | Creating a Disaster Recovery Plan |
| | | Summary |
|
| | | Chapter 8. Strategic Management |
| | | Saving Money |
| | | Documenting the Systems |
| | | Configuration Management |
| | | Big Brother's Watching |
| | | Summary |
|
| | | Chapter 9. Tactical Management |
| | | Daily Procedures |
| | | Managing Outages |
| | | System Logging (syslogd) |
| | | User Accounts |
| | | Performance Monitoring |
| | | Useful Commands |
| | | Summary |
|
| | | Chapter 10. Working with PCs |
| | | PC Integration Products |
| | | PC Connectivity Products |
| | | StarOffice |
| | | Summary |
|
| | | Chapter 11. Shells and Public Domain Software |
| | | Shells |
| | | Software in the Public Domain |
| | | Summary |
|
|
| | Part III: Management of the Solaris Network |
| | | Chapter 12. Internet Protocol Version 6 |
| | | What Is IPv6? |
| | | IPv6 Addressing |
| | | Getting Ready for IPv6 |
| | | Summary |
|
| | | Chapter 13. Network Monitoring |
| | | Big BrotherA Network Monitoring Product |
| | | Network Capacity |
| | | Network Load |
| | | Routing |
| | | Troubleshooting Network Problems |
| | | Summary |
|
| | | Chapter 14. Network Management Tools |
| | | Benefits of Using Network Management Tools |
| | | Sun Network Management Products |
| | | Other Network Management Products |
| | | Which Tool(s) Do I Need? |
| | | Summary |
|
|
| | Appendix A. Resources |
| | | Getting Help |
| | | Useful References on the World Wide Web |
|