Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Smith R. — Linux in a Windows World
Smith R. — Linux in a Windows World



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Linux in a Windows World

Автор: Smith R.

Аннотация:

Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. System administrators realize that this robust alternative can greatly improve their operating system's reliability and save them money, too. Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. Linux in a Windows World takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows systems. Featuring a litany of insider tips and techniques, Linux in a Windows World dispenses all the practical advice you need to migrate to this revolutionary open source software. Author Roderick W. Smith, himself a renowned system administrator and Linux convert, understands that the skills required to install, deploy, and maintain Linux are not easy to find. That's why he has tapped the absolute best source of information available: the Linux server experts who have made it their life's work to build and manage the Linux system. The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 494

Добавлена в каталог: 14.06.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Accelerated-X      
access control by IP address      
access.db      
ACLs (access control lists)      2nd
ACLs, Kerberos, usage in      
AD (Active Directory)      2nd
AD, Kerberos and      
addprinc      
Administration      
administration, CUPS, web-based tool for      
administration, desktop systems      
administration, Kerberos realms      
administration, remote text-mode tools, used for      2nd [See also text-mode logins]
administration, remote via text-mode logins      
aliases.db      
AMANDA (Advanced Maryland Automatic Network Disk Archiver)      2nd
AMANDA, data backup and restoration
AMANDA, dump type and backup set definition      
AMANDA, Linux client configuration
AMANDA, network protocols used by      
AMANDA, options      
AMANDA, server configuration      
AMANDA, server programs
AMANDA, tape preparation      
AMANDA, Windows client configuration      
Anti-aliasing      
antispam and antivirus tools      
antispam and antivirus tools, Bogofilter      [See Bogofilter]
antispam and antivirus tools, Postfix      
antispam and antivirus tools, Procmail      [See Procmail]
antispam and antivirus tools, SpamAssassin      [See SpamAssassin]
AppleShare      
AppleTalk      
ATA (Advanced Technology Attachment)
Authentication
authentication servers
authentication, domain configuration, advantages
authentication, Kerberos      [See Kerberos]
authentication, LDAP      [See LDAP]
authentication, Linux authentication of NT domains      [See Winbind]
authentication, NetLogon authentication      
authentication, pass-through authentication
authentication, pass-through authentication, NetLogon authentication and
authentication, Samba      [See domain controllers]
Automachron      
backup clients      
backup servers      2nd
Backups      [See network backups]
Bayesian tests      
BIND (Berkeley Internet Name Domain)      2nd
bitmap fonts      
blackhole lists      
Bogofilter      
Bogofilter, database file      
Bogofilter, spamicity classification      
Bogofilter, training      
Bogofilter, training scripts      
Boolean values      
broadcast name resolution      
Browsers      
browsers, domain master browsers      2nd
browsers, GUI workgroup browsers (SMB/CIFS)      
browsers, local master browsers      2nd
browsers, local master browsers, elections
browsers, master browsers      [See master browsers]
browsers, network browsers (SMB/CIFS)      
BRU (Backup and Recovery Utility)      
BSD LPD, defining SMB/CIFS printers using      
CAP (Columbia AppleTalk Package)      
CAs (Certificate Authorities)      
case-sensitive and case-retentive filesystems      
cdrecord and optical recorder specifications      
CentOS      
certificates
challenge-response tests
cifs driver      
cifs filesystem type code
Citrix Metaframe
client software
Clients
code examples
Code pages      
code pages, Samba and      
Collisions      
country code TLDs      
Courier IMAP      
Courier mail server
cp command and backups      
cpio      
crackers      
cron      
CUPS (Common Unix Printing System)      
CUPS, adding printers      
CUPS, browsing and security settings      
CUPS, installing
CUPS, SMB/CIFS printers, defining      
CUPS, web-based administration tool      
cupsaddsmb      
cupsd.conf      
Cygwin OpenSSH
Cyrus IMAP      2nd
Debian      
deployment strategies      
desktop environments
desktop systems      
desktop systems, administration      
desktop systems, configuring      
desktop systems, CPUs      
desktop systems, disks      
desktop systems, migration to Linux
desktop systems, peripherals
desktop systems, RAM
desktop systems, thin clients, versus      
desktop systems, user interfaces
DHCP (Dynamic Host Configuration Protocol)      2nd
DHCP, address assignment
DHCP, address assignment, dynamic assignment
DHCP, address assignment, fixed assignment      
DHCP, address broadcast and Windows clients
DHCP, client program
DHCP, configuration files
DHCP, configuration files, parameters and declarations
DHCP, configuration files, servers
DHCP, dhcpd server versus dhcpcd client
DHCP, kernel and routing requirements
DHCP, leases
DHCP, leases, lease times, testing versus use
DHCP, Linux servers, configuration for thin clients
DHCP, MAC (media access control) addresses and
DHCP, NBNS information delivery
DHCP, NBNS information delivery, Windows client configuration      
DHCP, network addressing and
DHCP, network addressing and, advantages
DHCP, network addressing and, security concerns
DHCP, packet sockets, enabling      
DHCP, server configuration
DHCP, Windows client configuration
dhcpd.conf
dhcpd.conf versus dhcpcd.conf
dhcpd.conf, example file
directories      
DISPLAY environment variable      
distributed hashes      
Distributions      
distributions, desktop use
distributions, licensing
djbdns      
DNs (Distinguished Names) and their types
DNS (Domain Name System)      2nd 3rd
DNS, BIND (Berkeley Internet Name Domain)
DNS, client configuration
DNS, djbdns
DNS, domain hierarchy      
DNS, domain name caching
DNS, domains, setting up
DNS, domains, setting up, forward zone files, configuration
DNS, domains, setting up, reverse zone files, configuration
DNS, hostnames
DNS, local DNS servers, advantages
DNS, name server configuration      
DNS, name server configuration, options      
DNS, name server configuration, zone definitions      
DNS, name server operation      
domain controllers
domain controllers, as file and print servers      
domain controllers, authentication, advantages for
domain controllers, domain member configuration
domain controllers, domain member configuration, Windows 9x/ME
domain controllers, domain member configuration, Windows NT/200x/XP      
domain controllers, domain member servers      2nd
domain controllers, file shares
domain controllers, file shares, domain logon shares, configuring      
domain controllers, file shares, roaming profiles, configuring      
domain controllers, machine trust accounts
domain controllers, NT domain controllers
domain controllers, password database maintenance      
domain controllers, Samba controller parameters
domain controllers, Samba versus NT
domain controllers, Windows versions, Linux authentication of      [See Winbind]
domain master browsers      2nd
domain member servers      2nd
DOS-style filesystem flags and file permissions
Dovecot      2nd 3rd
dovecot.conf      
Dumb terminal
Dump
eBones
eDirectory
elections      2nd
email attachments, security risks
ESP Print Pro
Ethernet
Exceed
Exim      2nd
fc-cache command
Fedora Core
Fetchmail
Fetchmail, configuration file
Fetchmail, cron job operation
Fetchmail, global directives      
Fetchmail, polling      
Fetchmail, purpose of      
Fetchmail, remote password file permissions
Fetchmail, running and testing
Fetchmail, sample .fetchmailrc file
Fetchmail, server options
Fetchmail, user options
file compatibility, Windows and Linux
file ownership
file permissions
file permissions, ACLs (Access Control Lists)      2nd
file permissions, DOS-style filesystem flags and      
file permissions, file-exchange shares and
file permissions, Unix extensions
file servers
file sharing      2nd
file sharing, access control      
file sharing, domain controllers and      
file sharing, domain controllers and, domain logon shares, configuring      
file sharing, domain controllers and, roaming profiles, configuring      
file sharing, examples
file sharing, examples, file-exchange shares
file sharing, examples, Windows program shares      
file sharing, examples, [homes] share      
file sharing, Linux clients over SMB/CIFS systems
file sharing, printer sharing, compared to
file sharing, write access      
filename mangling      
filenames
filenames, case-sensitivity versus case-retentivity      
filenames, character sets and      
firewalls and the X client-server model      
font servers      
Fonts
fonts, anti-aliasing
fonts, bitmap fonts
fonts, font smoothing
fonts, OpenOffice.org
fonts, scaleable fonts
fonts, TrueType fonts
fonts, X core fonts      2nd
fonts, Xft      2nd
Foomatic      
forward lookups
Free SSH
FreSSH
full backups
full restores      
GDM (GNOME Display Manager)
generic TLDs
Gentoo      
Georgia Softworks Telnet and SSH      
getent      
GhostScript      2nd
GIMP Print      
GINA (Graphical Identification and Authentication)      2nd [See also pGina]
Gnomba
GNOME (GNU Network Object Model Environment)      
GNU Privacy Guard      
GNU tar      [See tar]
GPL (GNU General Public License)
GUI login tools      
GUI login tools, VNC      [See VNC]
GUI login tools, X      [See X]
GUI workgroup browsers
hackers
hashes
hashes, distributed hashes
headless servers      
Heimdal      
ICA (Independent Computing Architecture)      
IMAP (Internet Message Access Protocol)      
IMAP servers      2nd
IMAP servers, authentication
IMAP servers, launching      
incremental backups
inetd super server
init command      
Internet Software Consortium      
IPP (Internet Printing Protocol)
kadmin
kadmin.local
kdc.conf
KDCs (key distribution centers)      
KDCs, startup and operation
KDE (K Desktop Environment)      
KDM (KDE Display Manager)      
Kerberized Telnet      
Kerberos      2nd
Kerberos, account maintenance
Kerberos, ACLs (access control lists)
Kerberos, application servers      2nd
Kerberos, application servers, configuration
Kerberos, application servers, keytabs      2nd
Kerberos, application servers, options      
Kerberos, application servers, principals
Kerberos, application servers, startup and operation
Kerberos, available versions
Kerberos, centralized single-authentication logins
Kerberos, clients      
1 2 3 4
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте