Muutke küpsiste eelistusi

CentOS Bible [Pehme köide]

  • Formaat: Paperback / softback, 984 pages, kõrgus x laius x paksus: 234x187x52 mm, kaal: 1504 g, Illustrations, Contains 1 Digital (on physical carrier)
  • Sari: Bible
  • Ilmumisaeg: 07-Aug-2009
  • Kirjastus: John Wiley & Sons Ltd
  • ISBN-10: 047048165X
  • ISBN-13: 9780470481653
Teised raamatud teemal:
  • Pehme köide
  • Hind: 70,75 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 984 pages, kõrgus x laius x paksus: 234x187x52 mm, kaal: 1504 g, Illustrations, Contains 1 Digital (on physical carrier)
  • Sari: Bible
  • Ilmumisaeg: 07-Aug-2009
  • Kirjastus: John Wiley & Sons Ltd
  • ISBN-10: 047048165X
  • ISBN-13: 9780470481653
Teised raamatud teemal:

Authoritative guide to a rapidly growing Linux distribution

This is one of the first, if not the first comprehensive guide to the CentOS Linux operating system. Linux guru Tim Bornocyzyk, thoroughly covers the topic whether you're a Linux novice or a regular who now wants to master this increasingly popular distribution.

First find out how to install and configure CentOS. From there, you'll cover a wealth of Linux and CentOS tools, functions, and techniques, including: how to work in the GNOME and KDE desktop environments; how to use the Linux shell, file system, and text editor; how to configure CUPS printers, Samba for file and printer sharing and other features using GUI tools; and more.

  • CentOS (Community ENTerprise Operating System) is a Linux operating system maintained by a small team of core developers based on Red Hat Enterprise Linux (RHEL)
  • Lead author Christopher Negus is the bestselling Linux author of such books as Fedora 10 and Red Hat Enterprise Linux Bible and Linux 2009 Edition Bible; he is also a member of the Red Hat Enterprise Linux training team
  • Tech edited by key member of the CentOS development team, Ralph Angenendt, and foreword written by lead CentOS developer, Karanbir Singh.
  • Learn how to set up users, automate system tasks, back up and restore files, and prepare for the latest security issues and threats; also learn how to use and customize the desktop menus, icons, window manager, and xterm; and how to create and publish formatted documents
  • Explores available Linux multimedia applications for graphics, audio, video and CD burning
  • The DVD includes complete copy of the most current CentOS Distribution – CentOS 5.3

For getting the most out of CentOS Linux, this is the book you need to succeed.

Introduction xxv
Part I Getting Started
An Overview of CentOS
3(12)
What You Get with CentOS
5(1)
Stepping Stone to Red Hat Enterprise Linux
6(1)
What Is Linux?
7(1)
Linux's Roots in UNIX
7(3)
Common Linux Features
10(1)
Primary Advantages of Linux
11(1)
Going Forward with CentOS
12(2)
Help from the CentOS Project
12(1)
Training and Certification
13(1)
Documentation
13(1)
Summary
14(1)
Installing CentOS
15(54)
Using the CentOS Live CD
16(1)
Quick Installation
17(1)
Detailed Installation Instructions
18(17)
Installing CentOS 5
19(2)
Choosing Computer Hardware
21(1)
Preparing for Installation Using the Live CD
22(3)
Beginning the Installation
25(7)
Running CentOS Firstboot
32(2)
Going Forward after Installation
34(1)
Special Installation Procedures
35(11)
Alternatives for Starting Installation
35(2)
Installing from Other Media
37(3)
Starting a VNC Install
40(1)
Performing a Kickstart Installation
41(5)
Special Installation Topics
46(19)
Setting up to Dual-Boot Linux and Windows
46(6)
Partitioning Your Disks
52(8)
Using the GRUB Boot Loader
60(5)
Troubleshooting Installation
65(2)
Summary
67(2)
Getting Started with the Desktop
69(50)
Logging in to CentOS
69(3)
Getting Familiar with the Desktop
72(8)
Touring Your Desktop
72(7)
Tips for Configuring Your Desktop
79(1)
Using the GNOME Desktop
80(16)
Using the Metacity Window Manager
81(2)
Using the GNOME Panels
83(5)
Using the Nautilus File Manager
88(3)
Changing GNOME Preferences
91(1)
Managing Removable Media
92(1)
Trying Other GNOME Applications
93(2)
Exiting GNOME
95(1)
Running 3D Accelerated Desktop Effects
96(2)
Switching Desktop Environments
98(1)
Using the KDE Desktop
98(15)
Starting with KDE
99(1)
KDE Desktop Basics
100(2)
Managing Files with the Konqueror File Manager
102(5)
Using the Konqueror Browser Features
107(1)
Configuring Konqueror Options
107(3)
Managing Windows
110(1)
Configuring the Desktop
111(2)
Adding Widgets
113(1)
Using the Xfce Desktop Environment
113(1)
Troubleshooting Your Desktop
114(4)
GUI Doesn't Work at Startup
115(1)
Tuning Your Video Card and Monitor
116(2)
Configuring Video Cards for Gaming
118(1)
Getting More Information
118(1)
Summary
118(1)
Using Linux Commands
119(46)
The Shell Interface
119(6)
Checking Your Login Session
120(1)
Checking Directories and Permissions
121(2)
Checking System Activity
123(2)
Exiting the Shell
125(1)
Understanding the Shell
125(1)
Using the Shell in Linux
126(21)
Locating Commands
127(2)
Rerunning Commands
129(6)
Connecting and Expanding Commands
135(3)
Using Shell Environment Variables
138(3)
Managing Background and Foreground Processes
141(2)
Configuring Your Shell
143(4)
Working with the Linux File System
147(8)
Creating Files and Directories
149(6)
Moving, Copying, and Deleting Files
155(1)
Using the vi Text Editor
155(6)
Starting with Vi
156(3)
Moving around the File
159(1)
Searching for Text
159(1)
Using Numbers with Commands
160(1)
Summary
161(4)
Part II Using CentOS
Accessing and Running Applications
165(56)
Getting and Installing Software Packages
166(10)
Downloading and Installing Applications with yum
167(8)
Getting CentOS Software Updates
175(1)
Managing RPM Packages
176(12)
Using the Add/Remove Window
176(2)
Using the rpm Command
178(10)
Using Software in Different Formats
188(7)
Understanding Software Package Names and Formats
189(2)
Understanding Different Archive Formats
191(1)
Building and Installing from Source Code
191(4)
Using CentOS to Run Applications
195(10)
Finding Common Desktop Applications in Linux
196(1)
Investigating Your Desktop
196(2)
Starting Applications from a Menu
198(1)
Starting Applications from a Run Application Window
198(1)
Starting Applications from a Terminal Window
199(2)
Running Remote X Applications
201(4)
Running Microsoft Windows, DOS, and Macintosh Applications
205(9)
Running DOS Applications
207(2)
Running Microsoft Windows Applications in Linux
209(5)
Running Applications in Virtual Environments
214(6)
Running Applications Virtually with Xen
214(4)
Running Applications Virtually with KVM and QEMU
218(2)
Summary
220(1)
Publishing with CentOS
221(28)
Desktop Publishing in Linux
222(4)
Using Text Editors and Notepads
222(1)
Using Word Processors
222(4)
Using Traditional Linux Publishing Tools
226(12)
Creating Documents in Groff or LaTeX
227(1)
Text Processing with Groff
228(3)
Text Processing with TeX/LaTeX
231(2)
Converting Documents
233(1)
Creating DocBook Documents
234(1)
Understanding SGML and XML
235(3)
Displaying PDF Files with Evince
238(1)
Doing Page Layout with Scribus
239(2)
Working with Graphics
241(5)
Manipulating Images with GIMP
241(2)
Taking Screen Captures
243(1)
Creating Vector Graphic Images with Inkscape
244(2)
Using Scanners Driven by SANE
246(1)
Web Publishing
247(1)
Summary
248(1)
Music, Video, and images in Linux
249(48)
Understanding Multimedia and Legal Issues in Linux
250(1)
Extending Freedom to Codecs
251(1)
Listening to Music in Linux
251(27)
Configuring a Sound Card
253(6)
Choosing Audio Players
259(1)
Automatically Playing CDs
260(1)
Playing and Managing Music with Rhythmbox
261(3)
Playing Music with XMMS Audio Player
264(3)
Using ogg123, mpg321, and play Command-Line Players
267(1)
Using MIDI Audio Players
268(1)
Converting Audio Files with SoX
268(3)
Extracting and Encoding Music
271(3)
Creating Your Own Music CDs
274(3)
Creating CD Labels with cdlabelgen
277(1)
Viewing TV and Webcams
278(7)
Watching TV with Tvtime
279(2)
Videoconferencing and VOIP with Ekiga
281(4)
Playing Video
285(8)
Examining Laws Affecting Video and Linux
285(1)
Understanding Video Content Types
286(2)
Watching Video with Xine
288(4)
Using Totem Movie Player
292(1)
Using a Digital Camera
293(3)
Displaying Images in gThumb
293(2)
Using Your Camera as a Storage Device
295(1)
Summary
296(1)
Using the Internet and the Web
297(48)
Overview of Internet Applications and Commands
297(3)
Browsing the Web
300(17)
Understanding Web Browsing
301(4)
Browsing the Web with Firefox
305(3)
Setting Up Firefox
308(8)
Using Text-Based Web Browsers
316(1)
Communicating with E-Mail
317(9)
E-Mail Basics
319(1)
Using Evolution E-Mail
320(2)
Thunderbird Mail Client
322(2)
Text-Based Mail Programs
324(2)
Participating in Newsgroups
326(1)
Instant Messaging with Pidgin
326(2)
Sharing Files with BitTorrent
328(1)
Using Remote Login, Copy, and Execution
329(12)
Using Telnet for Remote Login
330(1)
Copying Files with FTP
331(6)
Getting Files with Wget
337(2)
Using ssh for Remote Login/Remote Execution
339(1)
Using scp for Remote File Copy
340(1)
Using the ``r'' Commands: rlogin, rcp, and rsh
341(1)
Summary
341(4)
Part III Adminstration
Understanding System Administration
345(50)
Using the root User Account
346(1)
Becoming Super User (the su Command)
346(2)
Learning about Administrative GUI Tools, Commands, Configuration Files, and Log Files
348(12)
Using Graphical Administration Tools
348(5)
Administrative Commands
353(1)
Administrative Configuration Files
354(4)
Administrative Log Files
358(1)
Using Other Administrative Logins
358(2)
Administering Your Linux System
360(1)
Configuring Hardware
361(5)
Checking Your Hardware
361(1)
Managing Hardware with HAL
361(1)
Reconfiguring Hardware with kudzu
362(2)
Configuring Modules
364(2)
Managing File Systems and Disk Space
366(19)
Mounting File Systems
369(8)
Using the mkfs Command to Create a File System
377(1)
Adding a Hard Disk
378(3)
Using RAID Disks
381(1)
Checking System Space
382(3)
Monitoring System Performance
385(3)
Watch Computer Usage with System Monitor
385(1)
Monitoring CPU Usage with top
386(1)
Monitoring Power Usage on Laptop Computers
387(1)
Using Security Enhanced Linux
388(1)
Understanding Security Enhanced Linux
389(2)
Types and Roles in SELinux
389(1)
Users in SELinux
390(1)
Policies in SELinux
390(1)
Tools in SELinux
390(1)
Using SELinux in CentOS
391(3)
SELinux
391(1)
Checking Whether SELinux Is On
392(1)
Checking SELinux Status
393(1)
Summary
394(1)
Setting up and Maintaining User Accounts
395(32)
Creating User Accounts
395(7)
Adding Users with useradd
396(4)
Adding Users with User Manager
400(2)
Setting User Defaults
402(8)
Supplying Initial Login Scripts
405(1)
Supplying Initial .bashrc and .bash_profile Files
406(1)
Supplying an Initial .tcshrc File
407(1)
Configuring System-Wide Shell Options
407(1)
Setting System Profiles
408(1)
Adding User Accounts to Servers
409(1)
Creating Portable Desktops
410(1)
Providing Support to Users
411(2)
Creating a Technical Support Mailbox
412(1)
Resetting a User's Password
412(1)
Modifying Accounts
413(3)
Modifying User Accounts with usermod
413(2)
Modifying User Accounts with User Manager
415(1)
Deleting User Accounts
416(2)
Deleting User Accounts with userdel
417(1)
Deleting User Accounts with User Manager
418(1)
Checking Disk Quotas
418(6)
Using Quota to Check Disk Usage
418(5)
Using du to Check Disk Use
423(1)
Removing Temp Files Automatically
423(1)
Sending Mail to All Users
424(1)
Summary
425(2)
Automating System Tasks
427(40)
Understanding Shell Scripts
427(14)
Executing and Debugging Shell Scripts
428(1)
Understanding Shell Variables
429(2)
Performing Arithmetic in Shell Scripts
431(1)
Using Programming Constructs in Shell Scripts
432(6)
Some Useful External Programs
438(1)
Trying Some Simple Shell Scripts
439(2)
System Initialization
441(5)
Starting init
442(1)
The inittab File
442(4)
System Startup and Shutdown
446(12)
Starting Run-Level Scripts
447(1)
Understanding Run-Level Scripts
447(3)
Understanding What Start-Up Scripts Do
450(2)
Changing Run-Level Script Behavior
452(1)
Reorganizing or Removing Run-Level Scripts
453(2)
Adding Run-Level Scripts
455(1)
Managing xinetd Services
456(1)
Manipulating Run Levels
457(1)
Scheduling System Tasks
458(7)
Using at.allow and at.deny
458(1)
Specifying When Jobs Are Run
458(1)
Submitting Scheduled Jobs
459(1)
Viewing Scheduled Jobs
460(1)
Deleting Scheduled Jobs
460(1)
Using the batch Command
461(1)
Using the cron Facility
461(4)
Summary
465(2)
Creating Backups and Restoring Data
467(38)
Making a Simple Backup Archive
467(2)
Doing a Simple Backup with rsync
469(3)
Backing Up Files Locally
469(1)
Backing Up Files Remotely
470(2)
Choosing Backup Tools
472(1)
Selecting a Backup Strategy
472(2)
Full Backup
473(1)
Incremental Backup
473(1)
Disk Mirroring
473(1)
Network Backup
474(1)
Selecting a Backup Medium
474(8)
Magnetic Tape
474(2)
Writable CD Drives
476(4)
Writable DVD Drives
480(1)
Writing CDs or DVDs with growisofs
481(1)
Backing Up to a Hard Drive
482(1)
Backing Up Files with dump
483(4)
Creating a Backup with dump
484(2)
Understanding Dump Levels
486(1)
Automating Backups with cron
487(1)
Restoring Backed-Up Files
488(5)
Restoring an Entire File System
490(1)
Recovering Individual Files
491(2)
Configuring Amanda for Network Backups
493(6)
Creating Amanda Directories
494(1)
Creating the amanda.conf file
495(2)
Creating a disklist File
497(1)
Adding Amanda Network Services
498(1)
Performing an Amanda Backup
499(1)
Using the pax Archiving Tool
499(4)
Summary
503(2)
Security
505(56)
Linux Security Checklist
505(3)
Using Password Protection
508(3)
Choosing Good Passwords
508(1)
Using a Shadow Password File
509(2)
Securing Linux with iptables Firewalls
511(14)
Using the Security Level Configuration Window
512(1)
Configuring an iptables Firewall
513(12)
Controlling Access to Services with TCP Wrappers
525(3)
Checking Log Files
528(4)
Replacing the sysklogd Package
528(1)
Understanding the rsyslogd Service
528(3)
Tracking Log Messages with logwatch
531(1)
Using the Secure Shell Package
532(4)
Starting the SSH Service
533(1)
Using the ssh, sftp, and scp commands
533(2)
Using SSH, SCP, and SFTP without Passwords
535(1)
Securing Linux Servers
536(22)
Understanding Attack Techniques
536(1)
Protecting against Denial-of-Service Attacks
537(3)
Protecting against Distributed DOS Attacks
540(4)
Protecting against Intrusion Attacks
544(4)
Securing Servers with SELinux
548(1)
Protecting Web Servers with Certificates and Encryption
548(10)
Summary
558(3)
Part IV Networking
Setting Up Network Connections and LANs
561(50)
Connecting to the Network with NetworkManager
561(4)
Connecting to a Wireless Network
563(1)
Connecting to a Wired Network
563(1)
Setting Up a Virtual Private Network Connection
564(1)
Understanding Local Area Networks
565(10)
Planning, Getting, and Setting Up LAN Hardware
566(5)
Configuring TCP/IP for Your LAN
571(4)
Setting Up a Wireless LAN
575(16)
Understanding Wireless Networks
576(1)
Choosing Wireless Hardware
577(5)
Getting Wireless Drivers
582(2)
Installing Wireless Linux Software
584(1)
Configuring the Wireless LAN
584(6)
Testing Distances
590(1)
Setting Wireless Extensions
590(1)
Understanding Internet Protocol Addresses
591(6)
IP Address Classes
593(1)
Understanding Netmasks
593(1)
Classless Inter-Domain Routing
594(2)
Getting IP Addresses
596(1)
Troubleshooting Your LAN
597(12)
Did Linux Find Your Ethernet Driver at Boot Time?
597(1)
Can You Reach Another Computer on the LAN?
597(1)
Is Your Ethernet Connection Up?
598(2)
Troubleshooting a Wireless LAN
600(4)
Watching LAN Traffic with Wireshark
604(5)
Summary
609(2)
Setting Up an Internet Connection
611(46)
Understanding How the Internet Is Structured
611(6)
Internet Domains
613(2)
Hostnames and IP Addresses
615(1)
Routing
616(1)
Proxies
617(1)
Using Dial-Up Connections to the Internet
617(12)
Getting Information
617(1)
Setting Up Dial-Up PPP
618(1)
Creating a Dial-Up Connection with the Network Configuration Window
619(2)
Launching Your PPP Connection
621(1)
Launching Your PPP Connection on Demand
621(1)
Checking Your PPP Connection
622(7)
Connecting Your LAN to the Internet
629(1)
Setting Up Linux as a Router
630(4)
Configuring the Linux Router
630(3)
Configuring Network Clients
633(1)
Configuring a Virtual Private Network Connection
634(9)
Understanding IPsec
635(1)
Using IPsec Protocols
635(1)
Using IPsec in CentOS
636(1)
Configuring an Open VPN Server
637(6)
Setting Up Linux as a Proxy Server
643(10)
Starting the Squid Daemon
644(1)
Using a Simple squid.conf File
645(3)
Modifying the Squid Configuration File
648(3)
Debugging Squid
651(2)
Setting Up Proxy Clients
653(2)
Configuring Firefox to Use a Proxy
654(1)
Configuring Other Browsers to Use a Proxy
655(1)
Summary
655(2)
Setting Up Printers and Printing
657(22)
Common UNIX Printing Service
658(1)
Setting Up Printers
658(15)
Using the Printer Configuration Window
659(8)
Using Web-Based CUPS Administration
667(3)
Configuring the CUPS Server (cupsd.conf)
670(2)
Configuring CUPS Printer Options
672(1)
Using Printing Commands
673(2)
Using lpr to Print
673(1)
Listing Status with lpc
674(1)
Removing Print Jobs with lprm
674(1)
Configuring Print Servers
675(2)
Configuring a Shared CUPS Printer
675(1)
Configuring a Shared Samba Printer
676(1)
Summary
677(2)
Setting Up a File Server
679(40)
Goals of Setting Up a File Server
679(1)
Setting Up an NFS File Server
680(16)
Sharing NFS File Systems
682(7)
Using NFS File Systems
689(5)
Unmounting NFS File Systems
694(1)
Other Cool Things to Do with NFS
695(1)
Setting Up a Samba File Server
696(22)
Getting and Installing Samba
697(1)
Configuring a Simple Samba Server
698(3)
Configuring Samba with SWAT
701(9)
Working with Samba Files and Commands
710(4)
Setting Up Samba Clients
714(1)
Troubleshooting Your Samba Server
715(3)
Summary
718(1)
Setting Up a Mail Server
719(32)
Introducing SMTP and Sendmail
719(1)
Installing and Running Sendmail
720(4)
Starting Sendmail
721(1)
Other Programs
722(1)
Logging Performed by Sendmail
722(2)
Configuring Sendmail
724(13)
Getting a Domain Name
725(1)
Configuring Basic Sendmail Settings (sendmail.mc)
725(4)
Defining Outgoing Mail Access
729(2)
Configuring Virtual Servers
731(1)
Configuring Virtual Users
732(1)
Adding User Accounts
733(1)
Starting Sendmail and Generating Database Files
733(1)
Re-Directing Mail
734(3)
Introducing Postfix
737(1)
Stopping Spam with SpamAssassin
738(3)
Using SpamAssassin
738(1)
Setting Up SpamAssassin on Your Mail Server
739(2)
Setting E-Mail Readers to Filter Spam
741(1)
Getting Mail from the Server (POP3 or IMAPv4)
741(3)
Accessing Mailboxes in Linux
742(1)
Configuring IMAPv4 and POP3 with Dovecot
743(1)
Getting Mail from Your Browser with SquirrelMail
744(2)
Administering a Mailing List with Mailman
746(3)
Summary
749(2)
Setting Up an FTP Server
751(12)
Understanding FTP Servers
752(1)
Attributes of FTP Servers
752(1)
FTP User Types
753(1)
Using the Very Secure FTP Server
753(8)
Quick-Starting vsFTPd
754(1)
Configuring vsFTPd
755(6)
Getting More Information about FTP Servers
761(1)
Summary
761(2)
Setting Up a Web Server
763(52)
Introduction to Web Servers
764(2)
The Apache Web Server
764(1)
Other Web Servers Available for CentOS
765(1)
Quick-Starting the Apache Web Server
766(2)
Configuring the Apache Server
768(38)
Configuring the Web Server (httpd.conf)
769(35)
Configuring Modules and Related Services (/etc/httpd/conf.d/*.conf)
804(2)
Starting and Stopping the Server
806(1)
Monitoring Server Activities
807(7)
Displaying Server Information
808(1)
Displaying Server Status
808(2)
Further Security of Server-Info and Server-Status
810(1)
Logging Errors
811(1)
Logging Hits
811(1)
Analyzing Web-Server Traffic
812(2)
Summary
814(1)
Setting Up an LDAP Address Book Server
815(18)
Understanding LDAP
816(3)
Defining Information in Schemas
817(2)
Structuring Your LDAP Directories
819(1)
Setting Up the OpenLDAP Server
819(3)
Installing OpenLDAP Packages
819(1)
Configuring the OpenLDAP Server (slapd.conf)
819(3)
Starting the OpenLDAP Service
822(1)
Setting Up the Address Book
822(6)
More Ways to Configure LDAP
828(1)
Accessing an LDAP Address Book from Thunderbird
829(2)
Summary
831(2)
Setting Up a DHCP Boot Server
833(12)
Using the Dynamic Host Configuration Protocol
834(1)
Setting Up a DHCP Server
834(9)
Opening Your Firewall and SELinux for DHCP
835(1)
Configuring the /etc/dhcpd.conf File
836(6)
Starting the DHCP Server
842(1)
Setting Up a DHCP Client
843(1)
Summary
844(1)
Setting Up a MySQL Database Server
845(34)
Finding MySQL Packages
846(2)
Configuring the MySQL Server
848(7)
Using MySQL User/Group Accounts
848(1)
Adding Administrative Users
848(1)
Setting MySQL Options
849(5)
Using Sample my.cnf Files
854(1)
Starting the MySQL Server
855(1)
Checking That MySQL Server Is Working
856(1)
Working with MySQL Databases
857(6)
Starting the mysql Command
857(1)
Creating a Database with MySQL
858(2)
Adding Data to a MySQL Database Table
860(3)
Understanding MySQL Tables
863(5)
Displaying MySQL Databases
868(3)
Displaying All or Selected Records
868(1)
Displaying Selected Columns
869(1)
Sorting Data
870(1)
Making Changes to Tables and Records
871(2)
Altering the Structure of MySQL Tables
871(1)
Updating and Deleting MySQL Records
872(1)
Adding and Removing User Access
873(2)
Adding Users and Granting Access
873(1)
Revoking Access
874(1)
Backing Up Databases
875(1)
Checking and Fixing Databases
875(2)
Summary
877(2)
Making Servers Public with DNS
879(28)
Determining Goals for Your Server
880(1)
Using a Hosting Service
880(1)
Connecting a Public Server
881(5)
Choosing an ISP
881(3)
Getting a Domain Name
884(2)
Configuring Your Public Server
886(4)
Configuring Networking
886(1)
Configuring Servers
887(1)
Managing Security
888(2)
Setting Up a Domain Name System Server
890(15)
Understanding DNS
890(4)
DNS Name Server Example
894(1)
Quick-Starting a DNS Server
895(8)
Checking That DNS Is Working
903(2)
Getting More Information about BIND
905(1)
Summary
905(2)
Appendix A: About the Media 907(4)
Index 911
Timothy Boronczyk is a professional software developer by day, and a freelance programmer and author by night. Christopher Negus is the author of the bestselling Red Hat Linux Bible, Linux Toys, and Linux Toolbox series. He is an instructor for Red Hat, Inc., training students for RHCT and RHCE certification.