Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Smith R. — Linux in a Windows World
Smith R. — Linux in a Windows World



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Linux in a Windows World

Автор: Smith R.

Аннотация:

Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. System administrators realize that this robust alternative can greatly improve their operating system's reliability and save them money, too. Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. Linux in a Windows World takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows systems. Featuring a litany of insider tips and techniques, Linux in a Windows World dispenses all the practical advice you need to migrate to this revolutionary open source software. Author Roderick W. Smith, himself a renowned system administrator and Linux convert, understands that the skills required to install, deploy, and maintain Linux are not easy to find. That's why he has tapped the absolute best source of information available: the Linux server experts who have made it their life's work to build and manage the Linux system. The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 494

Добавлена в каталог: 14.06.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Kerberos, clients, installing      
Kerberos, clients, operation      
Kerberos, clients, preparation      
Kerberos, clients, Windows      
Kerberos, dependency on clock synchronization      
Kerberos, KDCs (key distribution centers)      
Kerberos, KDCs, startup and operation      
Kerberos, KDCs, Windows and Linux KDCs, comparison      
Kerberos, Linux packages      
Kerberos, Linux servers      
Kerberos, login tools      
Kerberos, master keys      
Kerberos, master keys, permissions      
Kerberos, network logins using      
Kerberos, PAM and      
Kerberos, principals      2nd
Kerberos, realms      2nd
Kerberos, realms, administration      
Kerberos, realms, configuration      
Kerberos, stash files      
Kerberos, stash files, permissions      
Kerberos, TGTs (ticket-granting tickets)      
Kerberos, tickets      
Kerberos, tickets, network time and      
Kerberos, Windows and      2nd
Kerberos, Windows and, application servers and Active Directory      
Kerberos, Windows and, compatibility issues      2nd
Kerberos, Windows and, Kerberos Telnet      
Kerberos, Windows and, operation      
Kerberos, Windows and, Windows and Linux KDCs, compared      
Keys      
Konqueror      2nd
krb5.conf      
kstash      
ktadd command      
LANs      
LANs, NetBIOS LANs      
LANs, Windows and NetBIOS names      
LDAP (Lightweight Directory Access Protocol)      
LDAP, client configuration      
LDAP, configuring Linux for login authentication      
LDAP, database backends      
LDAP, DNs (Distinguished Names) and their types      
LDAP, LDIF      
LDAP, NSS configuration      
LDAP, OpenLDAP      [See OpenLDAP]
LDAP, PAM configuration      
LDAP, pGina      
LDAP, pGina, client configuration      
LDAP, software packages      
LDAP, terminology      
LDAP, testing user authentication      
LDAP, Windows, configuring for login authentication      
LDAP, Windows, configuring for login authentication, certificates, registering      
LDIF      
leases      
Legato      2nd
libnss_winbind.so      
libnss_wins.so      
licensing      
licensing, GPL (GNU General Public License)      
LinNeighborhood      2nd
Linux      
Linux desktop systems      
Linux desktop systems, applications      
Linux desktop systems, as clients on Windows networks      [See SMB/CIFS Linux
Linux desktop systems, configuration files      
Linux desktop systems, default configurations, creating      
Linux desktop systems, environment login option      
Linux desktop systems, fonts      
Linux desktop systems, fonts, OpenOffice.org      
Linux desktop systems, fonts, X core fonts      2nd
Linux desktop systems, fonts, Xft      2nd
Linux desktop systems, GUI login tools      
Linux desktop systems, Windows file and filesystem compatibility      
Linux desktop systems, Windows programs, running in      
Linux Printing web site      
Linux, advantages      
Linux, desktop systems      [See Linux desktop systems]
Linux, distributions      [See distributions]
Linux, Ethernet support      
Linux, file permissions, setting      
Linux, filesystem filenames      
Linux, hardware flexibility      
Linux, installation      
Linux, integration, planning      [See deployment strategies]
Linux, Kerberos      [See Kerberos]
Linux, licensing      
Linux, login authentication and LDAP      
Linux, mail servers      [See mail servers]
Linux, mascot      
Linux, networks and      
Linux, NT domains, authentication      [See Winbind]
Linux, resource use      
Linux, security      
Linux, servers      [See servers]
Linux, thin client computing      [See thin clients]
Linux, Windows applications, running on      2nd
Linux, Windows file and filesystem compatibility      
Linux, Windows, compared to      
Linux, Windows, integration with      
listed parameter values      
lmhosts file      
local master browsers      2nd
local master browsers, elections      
login.krb5      
Logins      
logins, centralized single-authentication logins via Kerberos      
logins, GUI login tools      [See GUI login tools]
logins, Kerberos login tools      
logins, Linux configuration for LDAP login authentication      
logins, Linux desktops, environment login option      
logins, Linux Desktops, GUI login tools      
logins, Linux login authentication via LDAP      
logins, network logins using Kerberos      
logins, PXES and remote login servers      
logins, remote login servers      
logins, remote logins      2nd
logins, remote logins, text-mode logins      [See text-mode logins]
logins, remote X login servers      
logins, rlogin      2nd
logins, Winbind      
logins, Windows remote login tools      
logins, Windows, configuration for LDAP authentication      
LPD (Line Printer Daemon)      
LPRng, defining SMB/CIFS printers using      
lsh      
LTSP      
MAC (Media Access Control) addresses      
machine trust accounts      2nd
mail servers      2nd
mail servers, Dovecot      2nd
mail servers, Fetchmail      [See Fetchmail]
mail servers, Microsoft Exchange servers, supplementing with Linux servers      
mail servers, options      
mail servers, POP and IMAP servers      2nd
mail servers, POP and IMAP servers, authentication      
mail servers, POP and IMAP servers, launching      
mail servers, push and pull protocols      
mail servers, security      
mail servers, SMTP servers      
mail servers, SMTP servers, Postfix      [See Postfix]
mail servers, SMTP servers, Procmail and      
mail servers, SMTP servers, sendmail      [See sendmail]
mail servers, spam, worm, and virus scanning      
mail servers, spam, worm, and virus scanning, antispam and antivirus tools      
mail servers, spam, worm, and virus scanning, attachments, discard or quarantine of      
mail servers, spam, worm, and virus scanning, Bogofilter      
mail servers, spam, worm, and virus scanning, in Postfix      
mail servers, spam, worm, and virus scanning, in sendmail      
mail servers, spam, worm, and virus scanning, Procmail      [See Procmail]
mail servers, spam, worm, and virus scanning, SpamAssassin      [See SpamAssassin]
mail servers, UW IMAP      [See UW IMAP]
main.cf      
master browsers      2nd
master browsers, local master browser elections      
master browsers, potential conflicts      
master browsers, services      
MI/X
MIMEDefang tool      
MIT Kerberos      
mount      
name resolution      2nd [See also DNS]
name resolution, NetBIOS Name Servers      [See NBNS systems]
name resolve order parameters      
NAMED      
named.conf      
Nautilus      
NBNS (NetBIOS Name Server) systems      2nd 3rd
NBNS, DHCP and      
NBNS, information delivery via DHCP      
NBNS, information delivery via DHCP, Windows client configuration      
NBNS, Samba, configuration in      
NCP (NetWare Core Protocol)      
Netatalk      
NetBIOS LANs      
NetBIOS LANs, domain controllers      [See domain controllers]
NetBIOS name resolution      
NetBIOS name resolution, non-Samba programs      
NetBIOS name resolution, smb.conf options, setting      
NETBIOS names      
NetBIOS names, non-SMB/CIFS tools and      
NetBIOS names, workgroup name options      
NetLogon authentication      
NETLOGON share      
NetTime      
network backups      
network backups, advantages      
network backups, AMANDA      [See AMANDA]
network backups, backup servers      
network backups, common problems      
network backups, hardware      
network backups, hardware and software interaction      
network backups, hardware, backup media      
network backups, Linux and      
network backups, Linux backup packages      
network backups, Samba, using for      
network backups, Samba, using for, advantages and disadvantages      
network backups, Samba, using for, backup shares, creating      
network backups, Samba, using for, backup shares, using      
network backups, Samba, using for, data restoration      
network backups, Samba, using for, NTFS filesystem and      
network backups, Samba, using for, smbtar      [See smbtar]
network backups, security issues      
network backups, strategies      
network backups, strategies, client- versus server-initiated backups      
network backups, strategies, complete versus incremental backups      
network backups, strategies, local versus network backups      
network backups, tape, incremental backups on      
network backups, tar      2nd
network backups, tar, available functions      
network backups, tar, backups to optical media      
network backups, tar, common options      
network backups, tar, local restores      
network protocols on Linux      
NFS (Network File Server)      
nmbd      
NoMachine      
non-Unix printing systems      
NSS (Name Service Switch)      2nd 3rd
NSS, configuring      
NSS, LDAP configuration      
NSS, Winbind options      
NT domain controllers      
NT domain controllers, authentication of Linux clients      2nd [See also Winbind]
NT domain controllers, versus Samba      
NT domains      
NT domains, PAM and NSS, linking to      
NTP (Network Time Protocol)      2nd 3rd
NTP for Windows      
NTP, Linux NTP client configuration      
NTP, server configuration      
NTP, server configuration, options      
NTP, upstream NTP servers, selecting      
NTP, Windows client configuration      
NTP, Windows client configuration, NET SET command      
NTP, Windows NTP clients      
nupop      
NX Server and NX Client      
open relays      
OpenLDAP      
OpenLDAP, database backends      
OpenLDAP, dependencies      
OpenLDAP, encryption      
OpenLDAP, included programs      
OpenLDAP, installing      
OpenLDAP, LDIF      
OpenLDAP, options      
OpenLDAP, server configuration      
OpenLDAP, server startup      
OpenLDAP, slapd.conf      
OpenLDAP, testing      
OpenLDAP, user directory, creating      
OpenSSH      
OpenSSH for Windows      
OpenSSL      
OpenSSL, configuration      
optical media and backups      
PAC (Privilege Access Certificate)      
Packages      
packages, samba      
packet sockets      
page swapping      
PAM (pluggable authentication modules)      2nd 3rd
PAM, configuration files      
PAM, Kerberos and      
PAM, LDAP configuration      
PAM, management features      
PAM, module stacks      
PAM, modules      
PAM, modules, nonstandard      
PAM, modules, standard      
PAM, sample configurations      
PAM, UW IMAP, usage of      
PAM, Winbind options      
PAM, Winbind, configuring for      
pam_winbind.so      
Parameters      
partial restores      
Partition Image      
pass-through authentication      
password servers      
Passwords      
passwords, domain controllers, database maintenance      
passwords, Samba and      [See Samba password
passwords, Samba and, sniffing      
PDF files, generating via printer share      
pGina      
pGina, client configuration      
POP (Post Office Protocol)      
POP servers      2nd
POP servers, authentication      
POP servers, launching      
popa3d      
Postfix      2nd 3rd
Postfix, address options      
Postfix, antispam options      
Postfix, configuration files      
Postfix, mail relay configuration      
Postfix, mail relay configuration, to forward mail      
1 2 3 4
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте