Академический Документы
Профессиональный Документы
Культура Документы
Data management
Chapter 10. Data management
Table of Contents
10.1. Sharing, copying, and archiving
10.1.1. Archive and compression tools
10.1.2. Copy and synchronization tools
10.1.3. Idioms for the archive
10.1.4. Idioms for the copy
10.1.5. Idioms for the selection of files
10.1.6. Archive media
10.1.7. Removable storage device
10.1.8. Filesystem choice for sharing data
10.1.9. Sharing data via network
10.2. Backup and recovery
10.2.1. Backup utility suites
10.2.2. An example script for the system backup
10.2.3. A copy script for the data backup
10.3. Data security infrastructure
10.3.1. Key management for GnuPG
10.3.2. Using GnuPG on files
10.3.3. Using GnuPG with Mutt
10.3.4. Using GnuPG with Vim
10.3.5. The MD5 sum
10.4. Source code merge tools
10.4.1. Extracting differences for source files
10.4.2. Merging updates for source files
10.4.3. Updating via 3-way-merge
10.5. Version control systems
10.5.1. Comparison of VCS commands
10.6. Git
10.6.1. Configuration of Git client
10.6.2. Git references
10.6.3. Git commands
10.6.4. Git for the Subversion repository
10.6.5. Git for recording configuration history
10.7. CVS
10.7.1. Configuration of CVS repository
10.7.2. Local access to CVS
10.7.3. Remote access to CVS with pserver
10.7.4. Remote access to CVS with ssh
10.7.5. Importing a new source to CVS
10.7.6. File permissions in CVS repository
10.7.7. Work flow of CVS
10.7.8. Latest files from CVS
10.7.9. Administration of CVS
10.7.10. Execution bit for CVS checkout
10.8. Subversion
10.8.1. Configuration of Subversion repository
10.8.2. Access to Subversion via Apache2 server
10.8.3. Local access to Subversion by group
10.8.4. Remote access to Subversion via SSH
10.8.5. Subversion directory structure
10.8.6. Importing a new source to Subversion
10.8.7. Work flow of Subversion
Tools and tips for managing binary and text data on the Debian system are described.
Warning
The uncoordinated write access to actively accessed devices and files from multiple processes must not be done to
avoid the race condition. File locking mechanisms using flock(1) may be used to avoid it.
10.1. Sharing, copying, and archiving
The security of the data and its controlled sharing have several aspects.
The creation of data archive
The remote storage access
The duplication
The tracking of the modification history
The facilitation of data sharing
The prevention of unauthorized file access
The detection of unauthorized file modification
These can be realized by using some combination of tools.
Archive and compression tools
Copy and synchronization tools
Network filesystems
Removable storage media
The secure shell
The authentication system
Version control system tools
Hash and cryptographic encryption tools
10.1.1. Archive and compression tools
Here is a summary of archive and compression tools available on the Debian system.
Table 10.1. List of archive and compression tools
package popcon size extension command comment
tar
V:532,
I:999
2516 .tar tar(1) the standard archiver (de facto standard)
cpio
V:384,
I:999
844 .cpio cpio(1) Unix System V style archiver, use with find(1)
binutils
V:364,
I:738
18832 .ar ar(1) archiver for the creation of static libraries
fastjar
V:10,
I:100
191 .jar fastjar(1) archiver for Java (zip like)
pax
V:20,
I:71
181 .pax pax(1) new POSIX standard archiver, compromise between tar and cpio
gzip
V:862,
I:999
235 .gz
gzip(1),
zcat(1),
GNU LZ77 compression utility (de facto standard)
bzip2
V:420,
I:874
119 .bz2
bzip2(1),
bzcat(1),
Burrows-Wheeler block-sorting compression utility with higher compression ratio than
gzip(1) (slower than gzip with similar syntax)
lzma
V:13,
I:177
144 .lzma lzma(1) LZMA compression utility with higher compression ratio than gzip(1) (deprecated)
V:249,
xz(1),
XZ compression utility with higher compression ratio than bzip2(1) (slower than gzip
xz-utils I:916 472 .xz xzdec(1),