Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Smith R. — Linux in a Windows World
Smith R. — Linux in a Windows World



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Linux in a Windows World

Автор: Smith R.

Аннотация:

Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. System administrators realize that this robust alternative can greatly improve their operating system's reliability and save them money, too. Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. Linux in a Windows World takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows systems. Featuring a litany of insider tips and techniques, Linux in a Windows World dispenses all the practical advice you need to migrate to this revolutionary open source software. Author Roderick W. Smith, himself a renowned system administrator and Linux convert, understands that the skills required to install, deploy, and maintain Linux are not easy to find. That's why he has tapped the absolute best source of information available: the Linux server experts who have made it their life's work to build and manage the Linux system. The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 494

Добавлена в каталог: 14.06.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Accelerated-X      
access control by IP address      
access.db      
ACLs (access control lists)      2nd
ACLs, Kerberos, usage in      
AD (Active Directory)      2nd
AD, Kerberos and      
addprinc      
Administration      
administration, CUPS, web-based tool for      
administration, desktop systems
administration, Kerberos realms
administration, remote text-mode tools, used for      2nd [See also text-mode logins]
administration, remote via text-mode logins      
aliases.db      
AMANDA (Advanced Maryland Automatic Network Disk Archiver)      2nd
AMANDA, data backup and restoration
AMANDA, dump type and backup set definition
AMANDA, Linux client configuration      
AMANDA, network protocols used by      
AMANDA, options      
AMANDA, server configuration
AMANDA, server programs
AMANDA, tape preparation
AMANDA, Windows client configuration
Anti-aliasing      
antispam and antivirus tools
antispam and antivirus tools, Bogofilter      [See Bogofilter]
antispam and antivirus tools, Postfix
antispam and antivirus tools, Procmail      [See Procmail]
antispam and antivirus tools, SpamAssassin      [See SpamAssassin]
AppleShare      
AppleTalk
ATA (Advanced Technology Attachment)
Authentication      
authentication servers
authentication, domain configuration, advantages      
authentication, Kerberos      [See Kerberos]
authentication, LDAP      [See LDAP]
authentication, Linux authentication of NT domains      [See Winbind]
authentication, NetLogon authentication      
authentication, pass-through authentication
authentication, pass-through authentication, NetLogon authentication and
authentication, Samba      [See domain controllers]
Automachron
backup clients
backup servers      2nd
Backups      [See network backups]
Bayesian tests
BIND (Berkeley Internet Name Domain)      2nd
bitmap fonts
blackhole lists
Bogofilter      
Bogofilter, database file
Bogofilter, spamicity classification
Bogofilter, training
Bogofilter, training scripts
Boolean values      
broadcast name resolution
Browsers
browsers, domain master browsers      2nd
browsers, GUI workgroup browsers (SMB/CIFS)      
browsers, local master browsers      2nd
browsers, local master browsers, elections
browsers, master browsers      [See master browsers]
browsers, network browsers (SMB/CIFS)      
BRU (Backup and Recovery Utility)
BSD LPD, defining SMB/CIFS printers using      
CAP (Columbia AppleTalk Package)
CAs (Certificate Authorities)
case-sensitive and case-retentive filesystems
cdrecord and optical recorder specifications
CentOS
certificates
challenge-response tests      
cifs driver      
cifs filesystem type code      
Citrix Metaframe      
client software
Clients
code examples      
Code pages      
code pages, Samba and      
Collisions      
country code TLDs
Courier IMAP
Courier mail server      
cp command and backups      
cpio      
crackers
cron
CUPS (Common Unix Printing System)
CUPS, adding printers
CUPS, browsing and security settings
CUPS, installing      
CUPS, SMB/CIFS printers, defining
CUPS, web-based administration tool      
cupsaddsmb
cupsd.conf      
Cygwin OpenSSH
Cyrus IMAP      2nd
Debian
deployment strategies
desktop environments      
desktop systems
desktop systems, administration
desktop systems, configuring
desktop systems, CPUs
desktop systems, disks
desktop systems, migration to Linux      
desktop systems, peripherals
desktop systems, RAM      
desktop systems, thin clients, versus      
desktop systems, user interfaces
DHCP (Dynamic Host Configuration Protocol)      2nd
DHCP, address assignment
DHCP, address assignment, dynamic assignment      
DHCP, address assignment, fixed assignment
DHCP, address broadcast and Windows clients
DHCP, client program
DHCP, configuration files
DHCP, configuration files, parameters and declarations
DHCP, configuration files, servers
DHCP, dhcpd server versus dhcpcd client
DHCP, kernel and routing requirements
DHCP, leases      
DHCP, leases, lease times, testing versus use
DHCP, Linux servers, configuration for thin clients
DHCP, MAC (media access control) addresses and
DHCP, NBNS information delivery      
DHCP, NBNS information delivery, Windows client configuration      
DHCP, network addressing and
DHCP, network addressing and, advantages
DHCP, network addressing and, security concerns      
DHCP, packet sockets, enabling      
DHCP, server configuration
DHCP, Windows client configuration
dhcpd.conf
dhcpd.conf versus dhcpcd.conf
dhcpd.conf, example file      
directories      
DISPLAY environment variable
distributed hashes
Distributions
distributions, desktop use
distributions, licensing      
djbdns      
DNs (Distinguished Names) and their types      
DNS (Domain Name System)      2nd 3rd
DNS, BIND (Berkeley Internet Name Domain)      
DNS, client configuration      
DNS, djbdns      
DNS, domain hierarchy
DNS, domain name caching
DNS, domains, setting up
DNS, domains, setting up, forward zone files, configuration      
DNS, domains, setting up, reverse zone files, configuration      
DNS, hostnames      
DNS, local DNS servers, advantages      
DNS, name server configuration      
DNS, name server configuration, options
DNS, name server configuration, zone definitions      
DNS, name server operation      
domain controllers
domain controllers, as file and print servers
domain controllers, authentication, advantages for
domain controllers, domain member configuration
domain controllers, domain member configuration, Windows 9x/ME      
domain controllers, domain member configuration, Windows NT/200x/XP      
domain controllers, domain member servers      2nd
domain controllers, file shares
domain controllers, file shares, domain logon shares, configuring
domain controllers, file shares, roaming profiles, configuring
domain controllers, machine trust accounts
domain controllers, NT domain controllers
domain controllers, password database maintenance      
domain controllers, Samba controller parameters
domain controllers, Samba versus NT      
domain controllers, Windows versions, Linux authentication of      [See Winbind]
domain master browsers      2nd
domain member servers      2nd
DOS-style filesystem flags and file permissions      
Dovecot      2nd 3rd
dovecot.conf
Dumb terminal
Dump
eBones
eDirectory      
elections      2nd
email attachments, security risks
ESP Print Pro
Ethernet
Exceed
Exim      2nd
fc-cache command
Fedora Core      
Fetchmail
Fetchmail, configuration file
Fetchmail, cron job operation      
Fetchmail, global directives
Fetchmail, polling
Fetchmail, purpose of
Fetchmail, remote password file permissions      
Fetchmail, running and testing      
Fetchmail, sample .fetchmailrc file
Fetchmail, server options
Fetchmail, user options
file compatibility, Windows and Linux
file ownership
file permissions
file permissions, ACLs (Access Control Lists)      2nd
file permissions, DOS-style filesystem flags and
file permissions, file-exchange shares and
file permissions, Unix extensions
file servers      
file sharing      2nd
file sharing, access control
file sharing, domain controllers and
file sharing, domain controllers and, domain logon shares, configuring
file sharing, domain controllers and, roaming profiles, configuring
file sharing, examples
file sharing, examples, file-exchange shares
file sharing, examples, Windows program shares
file sharing, examples, [homes] share
file sharing, Linux clients over SMB/CIFS systems
file sharing, printer sharing, compared to
file sharing, write access
filename mangling
filenames
filenames, case-sensitivity versus case-retentivity
filenames, character sets and
firewalls and the X client-server model
font servers
Fonts
fonts, anti-aliasing
fonts, bitmap fonts
fonts, font smoothing
fonts, OpenOffice.org
fonts, scaleable fonts      
fonts, TrueType fonts
fonts, X core fonts      2nd
fonts, Xft      2nd
Foomatic
forward lookups
Free SSH
FreSSH
full backups
full restores
GDM (GNOME Display Manager)
generic TLDs
Gentoo
Georgia Softworks Telnet and SSH
getent      
GhostScript      2nd
GIMP Print
GINA (Graphical Identification and Authentication)      2nd [See also pGina]
Gnomba      
GNOME (GNU Network Object Model Environment)
GNU Privacy Guard      
GNU tar      [See tar]
GPL (GNU General Public License)
GUI login tools
GUI login tools, VNC      [See VNC]
GUI login tools, X      [See X]
GUI workgroup browsers
hackers
hashes      
hashes, distributed hashes
headless servers
Heimdal
ICA (Independent Computing Architecture)
IMAP (Internet Message Access Protocol)      
IMAP servers      2nd
IMAP servers, authentication
IMAP servers, launching
incremental backups
inetd super server
init command
Internet Software Consortium
IPP (Internet Printing Protocol)
kadmin      
kadmin.local
kdc.conf
KDCs (key distribution centers)
KDCs, startup and operation
KDE (K Desktop Environment)      
KDM (KDE Display Manager)
Kerberized Telnet
Kerberos      2nd
Kerberos, account maintenance
Kerberos, ACLs (access control lists)      
Kerberos, application servers      2nd
Kerberos, application servers, configuration
Kerberos, application servers, keytabs      2nd
Kerberos, application servers, options
Kerberos, application servers, principals
Kerberos, application servers, startup and operation
Kerberos, available versions
Kerberos, centralized single-authentication logins
Kerberos, clients      
1 2 3 4
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте