Авторизация 
		         
		        
					
 
		          
		        
			          
		        
			        Поиск по указателям 
		         
		        
			        
					 
		          
		        
			          
			
			         
       		 
			          
                
                    
                        
                     
                  
		
			          
		        
			          
		
            
	     
	    
	    
            
		
                    Smith R. — Linux in a Windows World 
                  
                
                    
                        
                            
                                
                                    Обсудите книгу на научном форуме    Нашли опечатку? 
 
                                
                                    Название:   Linux in a Windows WorldАвтор:   Smith R.  Аннотация:  Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. System administrators realize that this robust alternative can greatly improve their operating system's reliability and save them money, too. Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. Linux in a Windows World takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows systems. Featuring a litany of insider tips and techniques, Linux in a Windows World dispenses all the practical advice you need to migrate to this revolutionary open source software. Author Roderick W. Smith, himself a renowned system administrator and Linux convert, understands that the skills required to install, deploy, and maintain Linux are not easy to find. That's why he has tapped the absolute best source of information available: the Linux server experts who have made it their life's work to build and manage the Linux system. The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment.
Язык:  Рубрика:  Технология /Статус предметного указателя:  Готов указатель с номерами страниц ed2k:   ed2k stats Год издания:  2005Количество страниц:  494Добавлена в каталог:  14.06.2007Операции:  Положить на полку  |
	 
	Скопировать ссылку для форума  | Скопировать ID 
                                 
                             
                        
                     
                 
                                                                
			          
                
                    Предметный указатель 
                  
                
                    
                        Accelerated-X access control by IP address access.db ACLs (access control lists) 2nd ACLs, Kerberos, usage in AD (Active Directory) 2nd AD, Kerberos and addprinc Administration administration, CUPS, web-based tool for administration, desktop systems administration, Kerberos realms administration, remote text-mode tools, used for 2nd [See also text-mode logins] administration, remote via text-mode logins aliases.db AMANDA (Advanced Maryland Automatic Network Disk Archiver) 2nd AMANDA, data backup and restoration AMANDA, dump type and backup set definition AMANDA, Linux client configuration AMANDA, network protocols used by AMANDA, options AMANDA, server configuration AMANDA, server programs AMANDA, tape preparation AMANDA, Windows client configuration Anti-aliasing antispam and antivirus tools antispam and antivirus tools, Bogofilter [See Bogofilter] antispam and antivirus tools, Postfix antispam and antivirus tools, Procmail [See Procmail] antispam and antivirus tools, SpamAssassin [See SpamAssassin] AppleShare AppleTalk ATA (Advanced Technology Attachment) Authentication authentication servers authentication, domain configuration, advantages authentication, Kerberos [See Kerberos] authentication, LDAP [See LDAP] authentication, Linux authentication of NT domains [See Winbind] authentication, NetLogon authentication authentication, pass-through authentication authentication, pass-through authentication, NetLogon authentication and authentication, Samba [See domain controllers] Automachron backup clients backup servers 2nd Backups [See network backups] Bayesian tests BIND (Berkeley Internet Name Domain) 2nd bitmap fonts blackhole lists Bogofilter Bogofilter, database file Bogofilter, spamicity classification Bogofilter, training Bogofilter, training scripts Boolean values broadcast name resolution Browsers browsers, domain master browsers 2nd browsers, GUI workgroup browsers (SMB/CIFS) browsers, local master browsers 2nd browsers, local master browsers, elections browsers, master browsers [See master browsers] browsers, network browsers (SMB/CIFS) BRU (Backup and Recovery Utility) BSD LPD, defining SMB/CIFS printers using CAP (Columbia AppleTalk Package) CAs (Certificate Authorities) case-sensitive and case-retentive filesystems cdrecord and optical recorder specifications CentOS certificates challenge-response tests cifs driver cifs filesystem type code Citrix Metaframe client software Clients code examples Code pages code pages, Samba and Collisions country code TLDs Courier IMAP Courier mail server cp command and backups cpio crackers cron CUPS (Common Unix Printing System) CUPS, adding printers CUPS, browsing and security settings CUPS, installing CUPS, SMB/CIFS printers, defining CUPS, web-based administration tool cupsaddsmb cupsd.conf Cygwin OpenSSH Cyrus IMAP 2nd Debian deployment strategies desktop environments desktop systems desktop systems, administration desktop systems, configuring desktop systems, CPUs desktop systems, disks desktop systems, migration to Linux desktop systems, peripherals desktop systems, RAM desktop systems, thin clients, versus desktop systems, user interfaces DHCP (Dynamic Host Configuration Protocol) 2nd DHCP, address assignment DHCP, address assignment, dynamic assignment DHCP, address assignment, fixed assignment DHCP, address broadcast and Windows clients DHCP, client program DHCP, configuration files DHCP, configuration files, parameters and declarations DHCP, configuration files, servers DHCP, dhcpd server versus dhcpcd client DHCP, kernel and routing requirements DHCP, leases DHCP, leases, lease times, testing versus use DHCP, Linux servers, configuration for thin clients DHCP, MAC (media access control) addresses and DHCP, NBNS information delivery DHCP, NBNS information delivery, Windows client configuration DHCP, network addressing and DHCP, network addressing and, advantages DHCP, network addressing and, security concerns DHCP, packet sockets, enabling DHCP, server configuration DHCP, Windows client configuration dhcpd.conf dhcpd.conf versus dhcpcd.conf dhcpd.conf, example file directories DISPLAY environment variable distributed hashes Distributions distributions, desktop use distributions, licensing djbdns DNs (Distinguished Names) and their types DNS (Domain Name System) 2nd 3rd DNS, BIND (Berkeley Internet Name Domain) DNS, client configuration DNS, djbdns DNS, domain hierarchy DNS, domain name caching DNS, domains, setting up DNS, domains, setting up, forward zone files, configuration DNS, domains, setting up, reverse zone files, configuration DNS, hostnames DNS, local DNS servers, advantages DNS, name server configuration DNS, name server configuration, options DNS, name server configuration, zone definitions DNS, name server operation domain controllers domain controllers, as file and print servers domain controllers, authentication, advantages for domain controllers, domain member configuration domain controllers, domain member configuration, Windows 9x/ME domain controllers, domain member configuration, Windows NT/200x/XP domain controllers, domain member servers 2nd domain controllers, file shares domain controllers, file shares, domain logon shares, configuring domain controllers, file shares, roaming profiles, configuring domain controllers, machine trust accounts domain controllers, NT domain controllers domain controllers, password database maintenance domain controllers, Samba controller parameters domain controllers, Samba versus NT domain controllers, Windows versions, Linux authentication of [See Winbind] domain master browsers 2nd domain member servers 2nd DOS-style filesystem flags and file permissions Dovecot 2nd 3rd dovecot.conf Dumb terminal Dump eBones eDirectory elections 2nd email attachments, security risks ESP Print Pro Ethernet Exceed Exim 2nd fc-cache command Fedora Core Fetchmail Fetchmail, configuration file Fetchmail, cron job operation Fetchmail, global directives Fetchmail, polling Fetchmail, purpose of Fetchmail, remote password file permissions Fetchmail, running and testing Fetchmail, sample .fetchmailrc file Fetchmail, server options Fetchmail, user options file compatibility, Windows and Linux file ownership file permissions file permissions, ACLs (Access Control Lists) 2nd file permissions, DOS-style filesystem flags and file permissions, file-exchange shares and file permissions, Unix extensions file servers file sharing 2nd file sharing, access control file sharing, domain controllers and file sharing, domain controllers and, domain logon shares, configuring file sharing, domain controllers and, roaming profiles, configuring file sharing, examples file sharing, examples, file-exchange shares file sharing, examples, Windows program shares file sharing, examples, [homes] share file sharing, Linux clients over SMB/CIFS systems file sharing, printer sharing, compared to file sharing, write access filename mangling filenames filenames, case-sensitivity versus case-retentivity filenames, character sets and firewalls and the X client-server model font servers Fonts fonts, anti-aliasing fonts, bitmap fonts fonts, font smoothing fonts, OpenOffice.org fonts, scaleable fonts fonts, TrueType fonts fonts, X core fonts 2nd fonts, Xft 2nd Foomatic forward lookups Free SSH FreSSH full backups full restores GDM (GNOME Display Manager) generic TLDs Gentoo Georgia Softworks Telnet and SSH getent GhostScript 2nd GIMP Print GINA (Graphical Identification and Authentication) 2nd [See also pGina] Gnomba GNOME (GNU Network Object Model Environment) GNU Privacy Guard GNU tar [See tar] GPL (GNU General Public License) GUI login tools GUI login tools, VNC [See VNC] GUI login tools, X [See X] GUI workgroup browsers hackers hashes hashes, distributed hashes headless servers Heimdal ICA (Independent Computing Architecture) IMAP (Internet Message Access Protocol) IMAP servers 2nd IMAP servers, authentication IMAP servers, launching incremental backups inetd super server init command Internet Software Consortium IPP (Internet Printing Protocol) kadmin kadmin.local kdc.conf KDCs (key distribution centers) KDCs, startup and operation KDE (K Desktop Environment) KDM (KDE Display Manager) Kerberized Telnet Kerberos 2nd Kerberos, account maintenance Kerberos, ACLs (access control lists) Kerberos, application servers 2nd Kerberos, application servers, configuration Kerberos, application servers, keytabs 2nd Kerberos, application servers, options Kerberos, application servers, principals Kerberos, application servers, startup and operation Kerberos, available versions Kerberos, centralized single-authentication logins Kerberos, clients 
                            
                     
                  
			Реклама