Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Smith R. — Linux in a Windows World
Smith R. — Linux in a Windows World



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Linux in a Windows World

Автор: Smith R.

Аннотация:

Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. System administrators realize that this robust alternative can greatly improve their operating system's reliability and save them money, too. Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. Linux in a Windows World takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows systems. Featuring a litany of insider tips and techniques, Linux in a Windows World dispenses all the practical advice you need to migrate to this revolutionary open source software. Author Roderick W. Smith, himself a renowned system administrator and Linux convert, understands that the skills required to install, deploy, and maintain Linux are not easy to find. That's why he has tapped the absolute best source of information available: the Linux server experts who have made it their life's work to build and manage the Linux system. The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 494

Добавлена в каталог: 14.06.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Accelerated-X
access control by IP address
access.db      
ACLs (access control lists)      2nd
ACLs, Kerberos, usage in      
AD (Active Directory)      2nd
AD, Kerberos and
addprinc
Administration
administration, CUPS, web-based tool for
administration, desktop systems
administration, Kerberos realms
administration, remote text-mode tools, used for      2nd [See also text-mode logins]
administration, remote via text-mode logins
aliases.db
AMANDA (Advanced Maryland Automatic Network Disk Archiver)      2nd
AMANDA, data backup and restoration
AMANDA, dump type and backup set definition
AMANDA, Linux client configuration      
AMANDA, network protocols used by      
AMANDA, options
AMANDA, server configuration
AMANDA, server programs      
AMANDA, tape preparation
AMANDA, Windows client configuration
Anti-aliasing
antispam and antivirus tools
antispam and antivirus tools, Bogofilter      [See Bogofilter]
antispam and antivirus tools, Postfix
antispam and antivirus tools, Procmail      [See Procmail]
antispam and antivirus tools, SpamAssassin      [See SpamAssassin]
AppleShare      
AppleTalk
ATA (Advanced Technology Attachment)
Authentication      
authentication servers
authentication, domain configuration, advantages
authentication, Kerberos      [See Kerberos]
authentication, LDAP      [See LDAP]
authentication, Linux authentication of NT domains      [See Winbind]
authentication, NetLogon authentication
authentication, pass-through authentication
authentication, pass-through authentication, NetLogon authentication and
authentication, Samba      [See domain controllers]
Automachron      
backup clients      
backup servers      2nd
Backups      [See network backups]
Bayesian tests
BIND (Berkeley Internet Name Domain)      2nd
bitmap fonts      
blackhole lists      
Bogofilter      
Bogofilter, database file      
Bogofilter, spamicity classification      
Bogofilter, training      
Bogofilter, training scripts      
Boolean values      
broadcast name resolution      
Browsers      
browsers, domain master browsers      2nd
browsers, GUI workgroup browsers (SMB/CIFS)      
browsers, local master browsers      2nd
browsers, local master browsers, elections
browsers, master browsers      [See master browsers]
browsers, network browsers (SMB/CIFS)
BRU (Backup and Recovery Utility)      
BSD LPD, defining SMB/CIFS printers using
CAP (Columbia AppleTalk Package)      
CAs (Certificate Authorities)
case-sensitive and case-retentive filesystems
cdrecord and optical recorder specifications
CentOS
certificates
challenge-response tests
cifs driver
cifs filesystem type code
Citrix Metaframe
client software
Clients      
code examples      
Code pages      
code pages, Samba and      
Collisions      
country code TLDs      
Courier IMAP      
Courier mail server      
cp command and backups      
cpio      
crackers      
cron      
CUPS (Common Unix Printing System)      
CUPS, adding printers      
CUPS, browsing and security settings      
CUPS, installing      
CUPS, SMB/CIFS printers, defining      
CUPS, web-based administration tool      
cupsaddsmb
cupsd.conf      
Cygwin OpenSSH      
Cyrus IMAP      2nd
Debian      
deployment strategies      
desktop environments
desktop systems      
desktop systems, administration      
desktop systems, configuring      
desktop systems, CPUs      
desktop systems, disks      
desktop systems, migration to Linux
desktop systems, peripherals
desktop systems, RAM      
desktop systems, thin clients, versus
desktop systems, user interfaces
DHCP (Dynamic Host Configuration Protocol)      2nd
DHCP, address assignment
DHCP, address assignment, dynamic assignment      
DHCP, address assignment, fixed assignment      
DHCP, address broadcast and Windows clients      
DHCP, client program      
DHCP, configuration files      
DHCP, configuration files, parameters and declarations      
DHCP, configuration files, servers      
DHCP, dhcpd server versus dhcpcd client      
DHCP, kernel and routing requirements      
DHCP, leases      
DHCP, leases, lease times, testing versus use      
DHCP, Linux servers, configuration for thin clients      
DHCP, MAC (media access control) addresses and      
DHCP, NBNS information delivery      
DHCP, NBNS information delivery, Windows client configuration
DHCP, network addressing and      
DHCP, network addressing and, advantages      
DHCP, network addressing and, security concerns      
DHCP, packet sockets, enabling      
DHCP, server configuration      
DHCP, Windows client configuration
dhcpd.conf      
dhcpd.conf versus dhcpcd.conf      
dhcpd.conf, example file
directories
DISPLAY environment variable
distributed hashes
Distributions
distributions, desktop use
distributions, licensing
djbdns
DNs (Distinguished Names) and their types
DNS (Domain Name System)      2nd 3rd
DNS, BIND (Berkeley Internet Name Domain)
DNS, client configuration
DNS, djbdns
DNS, domain hierarchy
DNS, domain name caching
DNS, domains, setting up
DNS, domains, setting up, forward zone files, configuration
DNS, domains, setting up, reverse zone files, configuration      
DNS, hostnames
DNS, local DNS servers, advantages
DNS, name server configuration
DNS, name server configuration, options
DNS, name server configuration, zone definitions
DNS, name server operation
domain controllers      
domain controllers, as file and print servers      
domain controllers, authentication, advantages for      
domain controllers, domain member configuration
domain controllers, domain member configuration, Windows 9x/ME      
domain controllers, domain member configuration, Windows NT/200x/XP      
domain controllers, domain member servers      2nd
domain controllers, file shares
domain controllers, file shares, domain logon shares, configuring
domain controllers, file shares, roaming profiles, configuring
domain controllers, machine trust accounts      
domain controllers, NT domain controllers
domain controllers, password database maintenance
domain controllers, Samba controller parameters      
domain controllers, Samba versus NT
domain controllers, Windows versions, Linux authentication of      [See Winbind]
domain master browsers      2nd
domain member servers      2nd
DOS-style filesystem flags and file permissions
Dovecot      2nd 3rd
dovecot.conf
Dumb terminal
Dump
eBones
eDirectory
elections      2nd
email attachments, security risks
ESP Print Pro
Ethernet
Exceed
Exim      2nd
fc-cache command      
Fedora Core
Fetchmail
Fetchmail, configuration file      
Fetchmail, cron job operation      
Fetchmail, global directives
Fetchmail, polling
Fetchmail, purpose of      
Fetchmail, remote password file permissions
Fetchmail, running and testing      
Fetchmail, sample .fetchmailrc file
Fetchmail, server options
Fetchmail, user options
file compatibility, Windows and Linux
file ownership
file permissions
file permissions, ACLs (Access Control Lists)      2nd
file permissions, DOS-style filesystem flags and      
file permissions, file-exchange shares and      
file permissions, Unix extensions      
file servers      
file sharing      2nd
file sharing, access control
file sharing, domain controllers and      
file sharing, domain controllers and, domain logon shares, configuring
file sharing, domain controllers and, roaming profiles, configuring      
file sharing, examples      
file sharing, examples, file-exchange shares      
file sharing, examples, Windows program shares      
file sharing, examples, [homes] share      
file sharing, Linux clients over SMB/CIFS systems      
file sharing, printer sharing, compared to      
file sharing, write access      
filename mangling      
filenames      
filenames, case-sensitivity versus case-retentivity      
filenames, character sets and      
firewalls and the X client-server model      
font servers      
Fonts      
fonts, anti-aliasing      
fonts, bitmap fonts      
fonts, font smoothing      
fonts, OpenOffice.org      
fonts, scaleable fonts      
fonts, TrueType fonts      
fonts, X core fonts      2nd
fonts, Xft      2nd
Foomatic      
forward lookups      
Free SSH      
FreSSH      
full backups      
full restores      
GDM (GNOME Display Manager)      
generic TLDs      
Gentoo      
Georgia Softworks Telnet and SSH      
getent      
GhostScript      2nd
GIMP Print      
GINA (Graphical Identification and Authentication)      2nd [See also pGina]
Gnomba      
GNOME (GNU Network Object Model Environment)      
GNU Privacy Guard      
GNU tar      [See tar]
GPL (GNU General Public License)
GUI login tools
GUI login tools, VNC      [See VNC]
GUI login tools, X      [See X]
GUI workgroup browsers      
hackers      
hashes      
hashes, distributed hashes      
headless servers      
Heimdal      
ICA (Independent Computing Architecture)
IMAP (Internet Message Access Protocol)      
IMAP servers      2nd
IMAP servers, authentication      
IMAP servers, launching      
incremental backups      
inetd super server
init command
Internet Software Consortium      
IPP (Internet Printing Protocol)      
kadmin      
kadmin.local
kdc.conf
KDCs (key distribution centers)      
KDCs, startup and operation      
KDE (K Desktop Environment)
KDM (KDE Display Manager)      
Kerberized Telnet      
Kerberos      2nd
Kerberos, account maintenance      
Kerberos, ACLs (access control lists)
Kerberos, application servers      2nd
Kerberos, application servers, configuration      
Kerberos, application servers, keytabs      2nd
Kerberos, application servers, options      
Kerberos, application servers, principals      
Kerberos, application servers, startup and operation      
Kerberos, available versions      
Kerberos, centralized single-authentication logins      
Kerberos, clients      
1 2 3 4
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2026
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте