Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Regan Sch., White K. — Mac OS X Server 10.4 Tiger: Visual QuickPro Guide
Regan Sch., White K. — Mac OS X Server 10.4 Tiger: Visual QuickPro Guide



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Mac OS X Server 10.4 Tiger: Visual QuickPro Guide

Авторы: Regan Sch., White K.

Аннотация:

Offering Apple's legendary ease of use plus everything you would expect from a Unix-based operating system — preemptive multitasking, symmetric multiprocessing, and support for networking and security standards — Mac OS X Server has revolutionized the world of network administration. Mac OS X Tiger server continues that tradition by offering more than 200 new features that make the server even easier to deploy and manage. Here to ensure that you don't endure a minute of downtime while getting up to speed on it is a thoroughly updated edition of everyone's favorite Mac OS X Server guide. In these pages, veteran Mac trainer Schoun Regan and Kevin White show you how to manage their local networks, navigate the Unix file system permission architecture (including the brand-new Access Control Lists, which let you set up collaborative environments without compromising security), and manage Internet and Web services. Along the way you'll also learn about all of Tiger Server's newest features: improved email services, Internet Gateway Setup Assistant, QuickTime Streaming Server, site-to-site VPN, and much more.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2006

Количество страниц: 506

Добавлена в каталог: 16.12.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Network Names window      
network ports      
network printers      2nd
network ranges      
Network Solutions      
network time servers      2nd
network user accounts      
Network Utility      2nd
network views      
network-related services      [See also specific services.]
networks      
NFS      
nfs service      
NIS      2nd 3rd
nonroutable address ranges      
obtaining/registering      
OD master      [See Open Directory master.]
Often setting      
OmniGraffle      2nd
Once setting      
online resources      
Open Directory      
Open Directory master      
Open Directory passwords      
Open Directory Replica option      
Open Directory roles      
Open Directory Server      
Open Directory structure      
Open Firmware instructions      
Open Firmware Password application      2nd
open relay testing sites      
Open Source project      
open source software      
opening firewall for      
OpenLDAP      
Operating systems      [See also Mac OS X.]
optional features for
organizational tools
Other Media tab
overhead required for      
Overloading      
overview
Packages      
packets, logging      
padlocks
PAP      2nd
Parameter RAM      
Partitioning
passing messages between
passing out information via
passphrases      2nd 3rd 4th
Password
password policies
password security      2nd
Password Server
password type
password types
password-protecting
Passwords
PasswordService process
Paths
PCS      [See also Windows.]
PDC      2nd 3rd 4th
peer directories      
Performance      2nd 3rd 4th
performance cache      2nd 3rd 4th
performance issues
Perl scripts      2nd
permission levels for      
PERMISSIONS
persistent
persistent connections
PHP scripts
Physical      2nd 3rd 4th
Physical security      2nd 3rd 4th
physical security of
Placeholder      
placeholder Web sites
plain-text files
Planning
planning deployment of
playlist
playlists
Plug-ins
Point-to-Point Tunneling
Point-to-Point Tunneling Protocol
POINTER
pointer records      
policies
Pool Printers command      
pop      [See Post Office Protocol.]
POP mail servers      2nd 3rd
POP service      2nd
popular implementations of
populating with users/groups      
portable computers      [See also specific models.]
Portable tab
Ports
POSIX permissions      2nd 3rd 4th
Post Office Protocol      [See Post Office Protocol.]
Postfix      2nd 3rd
PostScript printers
Power Macs      2nd
power-saver settings
power-saving
power-saving preferences
PowerBooks      2nd 3rd
PowerPC-based
PowerPC-based Macintoshes
PPP
PPP authentication
PPTP      2nd
PRAM
preference      2nd
preference files      2nd
Preference Manifest      
Preference Pane
Preferences
preformatted Web pages
presets
preventing access to changing
Primary
Primary Domain Controller      [See PDC.]
primary group
print jobs
print logs
print queue
print servers      2nd 3rd
Print Service log      
print sharing via      2nd 3rd
Printer
Printer Access Protocol
Printer Browser
printer drivers
Printer list
printer pools
printer queues
printer quotas      2nd
printer settings
Printer Setup Utility
printer sharing
printer-sharing
printer-sharing protocols
printers      2nd 3rd
Printing managed preference
printing protocol
private address ranges
Private keys
private/public key
Privileges      2nd 3rd 4th 5th
process for creating      
Processes
processor considerations
processor requirements
property lists
Protocol
protocol considerations      2nd
Protocols      2nd 3rd
proxy settings      
Ptr
PTR records
public IP addresses      2nd
Public keys
public views
public vs. private      2nd 3rd
publisher      [See QTSS Publisher.]
Publisher tool      [See QTSS Publisher.]
purpose of
pwpolicy command      2nd
Python scripts
qtaccess file
QTB      2nd
qtgroups files
QTSS      2nd
QTSS Publisher
QTSS template
qtusers files      
Queues
QuickTime
QuickTime Broadcaster      [See QTB.]
QuickTime Player      2nd 3rd 4th 5th
QuickTime Pro      2nd
QuickTime Streaming Server      2nd 3rd 4th
QuickTimeStreamingServer.pkg
quota command
quotacheck command
quotaoff command
quotaon command
Quotas      2nd 3rd 4th
rack security
rack/room
RAID      
RAID Admin
RAID hardware      2nd 3rd 4th 5th
RAM      [See also cache.]
random playlists
ranges for
raster printers
Rating
rating media files in
Real-Time Streaming Protocol
realms      2nd
reapplying settings for
reconstructing from command line
reconstructing mailbox from
Records
Recursion
Red Hat Linux      [See also Linux.]
redirects
redundancy in
Redundant Array of Independent Disks      [See RAID.]
refreshing
registering
registering domain names for
registrars, domain name
reinstalling
relational
relational database management
Relays tab
Remote Desktop service      2nd
Remote Directory Access settings      2nd
remote installation with      
Remote login      2nd
remote login to
renaming
Rendezvous
replicas, Open Directory      
repquota command
requirements for      2nd
requirements for using
Resources      
restart command      
restoring default settings for
restricting access to
restricting directory access for
restricting IP addresses from
restricting launch of
restricting launch of applications on
restricting server access      2nd
restricting to specific computers      
reverse zone
reverse zone records
room security
root privileges      
root user      2nd 3rd
routers      
royalty guidelines
rsync command
RTSP
Rules tab
Running
running Mac OS X Server as      
running NetBoot on      2nd
running Software Update server with      
SACLs      2nd
Safari      2nd
safeguarding passwords with
Samba      2nd 3rd
Sample      2nd
sample files
sample media files      
saving configuration settings      
saving settings for
scanning for spam/viruses
scanning for viruses      2nd
Schedule      
Schedule tab
score, junk mail      
screen zoom options      
script support
scripting language for
Scripting languages      2nd
Scripts tab
scripts, running at login/logout
Search feature      
Searching
searching for NetBoot server from
secondary
secondary servers
Secure File Transfer Protocol      [See Secure File Transfer Protocol.]
secure FTP      [See Secure File Transfer Protocol.]
Secure Sockets Layer      [See SSL.]
Security      
security considerations      2nd
security techniques
security tools
Seeing tab
self-assigned addresses
Self-signed certificates
sending to another broadcast server
sending/receiving email via      2nd
serial numbers      2nd
SERVER ADMIN      
Server Admin SSL settings      2nd
Server Admin tool
Server Admin Toolbar      
Server Administration Software package      2nd
Server Administration Tools package      2nd
Server Aliases field
Server Assistant      
1 2 3 4 5 6
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2026
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте