Авторизация
Поиск по указателям
Smith R. — Linux in a Windows World
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Linux in a Windows World
Автор: Smith R.
Аннотация: Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. System administrators realize that this robust alternative can greatly improve their operating system's reliability and save them money, too. Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. Linux in a Windows World takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows systems. Featuring a litany of insider tips and techniques, Linux in a Windows World dispenses all the practical advice you need to migrate to this revolutionary open source software. Author Roderick W. Smith, himself a renowned system administrator and Linux convert, understands that the skills required to install, deploy, and maintain Linux are not easy to find. That's why he has tapped the absolute best source of information available: the Linux server experts who have made it their life's work to build and manage the Linux system. The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 494
Добавлена в каталог: 14.06.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Postfix, mail relay configuration, to relay mail
Postfix, mail relay configuration, to use a relay
Postfix, postfix reload command
Postfix, Procmail and
PostScript and PDF file generation
PostScript Type 1 font format
Principals
printer sharing 2nd 3rd
printer sharing, creating shares
printer sharing, CUPS
printer sharing, CUPS, adding printers to
printer sharing, CUPS, installing
printer sharing, drivers, distributing to Windows clients
printer sharing, examples
printer sharing, examples, PDF-generation printer share
printer sharing, examples, [printers] share
printer sharing, file sharing, compared to
printer sharing, Linux clients over SMB/CIFS networks
printer sharing, non-PostScript printers 2nd
printer sharing, PostScript printers 2nd
printer sharing, printer compatibility, determining
printer sharing, printer drivers
printer sharing, printer drivers, clients, installing on
printer sharing, printer drivers, defining shares
printer sharing, printer drivers, Linux, installing from
printer sharing, printer drivers, servers, installing on
printer sharing, printer drivers, Windows NT/200x/XP, installing from
printer sharing, uninstalling printer software
printers.conf
procmail
Procmail, calling
Procmail, calling as root
Procmail, configuration files
Procmail, recipes
Procmail, recipes, actions
Procmail, recipes, conditions
Procmail, recipes, examples
Procmail, recipes, flags 2nd
Procmail, recipes, lockfiles
Procmail, recipes, regular expressions
Procmail, recipes, techniques
Procmail, SpamAssassin, calling from
procmailrc
promiscuous_relay
push and pull mail protocols 2nd 3rd
PuTTY 2nd
PXES
PXES, boot files
PXES, configuration
PXES, network booting
PXES, remote login servers and
PXES, testing
Qmail 2nd
qmail-pop3d
qpopper
rdesktop
RDNs (relative distinguished names)
RDP (Remote Desktop Protocol) 2nd
realms
realms, Linux, configuration on
RealVNC
recursive lookups
Red Hat
Regular expressions
Remote Desktop Protocol (RDP)
Remote Frame Buffer protocol
remote login servers
remote logins 2nd [See also logins]
remote logins, text-mode logins [See text-mode logins]
remote X login servers
removable disks and backups
removable hard disks
RFB (Remote Frame Buffer) 2nd 3rd [See also VNC]
Rlogin 2nd
RS-232 serial connections
rsh
Samba 2nd
Samba, access control
Samba, authentication services [See domain controllers]
Samba, backups, using for
Samba, backups, using for, advantages and disadvantages
Samba, backups, using for, backup methods
Samba, backups, using for, backup shares, creating
Samba, backups, using for, backup shares, using
Samba, backups, using for, data restoration
Samba, backups, using for, NTFS filesystem and
Samba, backups, using for, smbtar [See smbtar]
Samba, components
Samba, configuration file format
Samba, configuration file format, global- and share-level parameters
Samba, delimited parameter values
Samba, file permissions
Samba, file sharing [See file sharing]
Samba, filename parameters
Samba, global-level parameters
Samba, installing
Samba, master browser configuration
Samba, master browser options
Samba, NBNS configuration
Samba, NetBIOS LANs
Samba, password options
Samba, password options, cleartext passwords
Samba, password options, encrypted passwords
Samba, password options, password servers
Samba, printer sharing [See printer sharing]
Samba, server identification options
Samba, server identification options, name resolve order parameters
Samba, server identification options, NetBIOS names
Samba, server identification options, workgroup name options
Samba, UID and GID mapping
Samba, Winbind [See Winbind]
Sample Procmail Recipes with Comments
SASL (simple authentication and security layer)
SATA (Serial ATA) disks
SATA RAID systems
scaleable fonts
SCSI (Small Computer Systems Interface)
SCSI, RAID systems
Security
security, email attachments and
sendmail 2nd
sendmail, address options
sendmail, antispam options
sendmail, configuration files
sendmail, mail relay configuration
sendmail, mail relay configuration, promiscuous_relay
sendmail, mail relay configuration, to forward mail
sendmail, mail relay configuration, to relay mail
sendmail, mail relay configuration, to use a relay
sendmail, Procmail and
sendmail, restarting after configuration
sendmail, SpamAssassin, calling from
sendmail.cf
server programs
Servers 2nd
servers, authentication servers
servers, backup servers
servers, choosing programs
servers, definition of
servers, disk space requirements
servers, DNS servers
servers, file servers
servers, hardware
servers, mail servers
servers, remote login servers
servers, time servers
Services
share-level parameters
Slackware
slapd-cert.crt 2nd
slapd-key.pem
slapd.conf
smb.conf
smb.conf, domain controller parameters
smb.conf, file ownership parameters
smb.conf, file permission parameters
smb.conf, name resolution options, setting
smb.conf, Winbind options
SMB/CIFS (Server Message Block/Common Internet File System) 2nd 3rd [See also Samba]
SMB/CIFS, AMANDA and
SMB/CIFS, backups using 2nd
SMB/CIFS, Linux clients
SMB/CIFS, Linux clients, CUPS, defining printers with
SMB/CIFS, Linux clients, file share access limitations
SMB/CIFS, Linux clients, file shares, accessing
SMB/CIFS, Linux clients, GUI workgroup browsers, configuring
SMB/CIFS, Linux clients, LPRng or BSD LPD, defining printers
SMB/CIFS, Linux clients, NetBIOS name resolution
SMB/CIFS, Linux clients, printer sharing
SMB/CIFS, network browsers
SMB/CIFS, password encoding
SMB2WWW
smbclient 2nd
smbclient, commands
smbclient, parameters
smbclient, printing with
smbd
smbfs driver
smbfs filesystem type codes
smbmount 2nd
smbmount, parameters
smbpasswd command
smbpasswd file
smbtar
smbtar, important options
smbtar, performing backups
smbtar, Windows client file share configuration
smbumount
SMTP (Simple Mail Transfer Protocol)
SMTP, servers 2nd
sniffing
Spam
SpamAssassin
SpamAssassin, calling from Procmail
SpamAssassin, calling from sendmail
SpamAssassin, Perl dependencies
SpamAssassin, testing and message scoring
SpamBouncer
SSH (Secure Shell) 2nd 3rd 4th
SSH Tectia
SSH, client options
SSH, server configuration
SSH, server options
SSH, server startup and operation
SSH, tunneling
SSH, tunneling, advantages and disadvantages
SSH, tunneling, Windows clients
SSH, VNC connection encryption
sshd_config
ssh_config
SSL (Secure Sockets Layer)
stash files
stratum servers
string parameter values
SunOne
super servers, identifying type
SUSE
SWAT (Samba Web Administration Tool)
tape backups
tape backups, AMANDA, automation using [See AMANDA]
tape backups, tape formats
tar 2nd
tar, - (dash) in non-GNU versions
tar, available functions
tar, backups to optical media
tar, backups to optical media, archive direct to media
tar, backups to optical media, archive on carrier filesystem
tar, backups to optical media, archive on optical filesystem
tar, common options
tar, local restores from
tar, restores from
tar, restores from, emergency boot disks and
tar, restores from, emergency OS installations and
tar, restores from, partial OS bootstraps
tar, restores from, second computer assist
tar, tape backups and the compression options
tcpd
Telnet 2nd 3rd
Telnet, drawbacks
Telnet, enabling and disabling
Telnet, encryption, adding to
Telnet, security concerns
Terminal Services (Windows)
text-mode logins
text-mode logins, access speed
text-mode logins, GUI programs, compared to
text-mode logins, remote administration
text-mode logins, SSH [See SSH]
text-mode logins, Telnet [See Telnet]
text-mode logins, text-mode programs
text-mode logins, tools for remote access
text-mode logins, unencrypted remote access
text-mode logins, Windows and
TGTs (ticket-granting tickets)
thin clients 2nd
thin clients, advantages
thin clients, available protocols
thin clients, client hardware
thin clients, client hardware, dedicated clients
thin clients, client hardware, diskless systems
thin clients, client hardware, old PCs
thin clients, client hardware, video RAM
thin clients, disadvantages
thin clients, hardware
thin clients, hardware, determining requirements
thin clients, ICA
thin clients, Linux clients
thin clients, Linux clients, distribution selection
thin clients, Linux clients, PXES [See PXES]
thin clients, Linux clients, specialty distributions
thin clients, Linux servers
thin clients, Linux servers, DHCP configuration
thin clients, Linux servers, distribution, selecting
thin clients, Linux servers, TFTP configuration
thin clients, Linux servers, XDMCP and VNC options
thin clients, network equipment
thin clients, remote GUI access using
thin clients, SATA RAID compared to SCSI RAID systems
thin clients, server hardware
thin clients, suitable applications
ThinStation
tickets
TightVNC
time servers
TLDs (top-level domains)
TLS (Transport Layer Security)
transport maps
TrueType fonts
Tunneling 2nd
tunnelling
Tux
Unicode
Unix extensions 2nd 3rd
UW IMAP 2nd
UW IMAP, PAM authentication
UW IMAP, xinetd and
UW-IMAP (University of Washington IMAP)
Veritas
Veritas NetBackup
Viruses 2nd
Реклама