Muutke küpsiste eelistusi

Fedora 8 and Red Hat Enterprise Linux Bible [Pehme köide]

  • Formaat: Paperback / softback, 1080 pages, kõrgus x laius: 234x188 mm, kaal: 1440 g, ill, Contains 1 Digital (on physical carrier)
  • Sari: Bible
  • Ilmumisaeg: 08-Jan-2008
  • Kirjastus: John Wiley & Sons Ltd
  • ISBN-10: 0470230207
  • ISBN-13: 9780470230206
Teised raamatud teemal:
  • Pehme köide
  • Hind: 55,89 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 1080 pages, kõrgus x laius: 234x188 mm, kaal: 1440 g, ill, Contains 1 Digital (on physical carrier)
  • Sari: Bible
  • Ilmumisaeg: 08-Jan-2008
  • Kirjastus: John Wiley & Sons Ltd
  • ISBN-10: 0470230207
  • ISBN-13: 9780470230206
Teised raamatud teemal:
More than a quarter of a million copies sold in previous editions! Freedom is a feature. With Fedora's new Online Desktop, you are free to shape your desktop environment to include the services, applications, and online friends you desire. As always, Fedora's total dedication to freedom lets you draw on thousands of free software packages to create the exact desktop or server computer you need. Fedora puts together the software (provided here on CD and DVD).This book acts as a guide to everything from playing music and writing documents to configuring many powerful Web, file, print, DHCP, and database servers. Customize Fedora or Red Hat Enterprise Linux to: Explore your computer or the Internet from GNOME[ registered], KDE[ registered], or Online Desktops Manage and use documents, spreadsheets, presentations, music, and images; Try the new advanced PulseAudio sound server; Draw from online software repositories with Package Manager and Package Updater; Build an Internet server with e-mail, Web, DNS, FTP, and database services; Secure your computer with firewalls, password protection, and SELinux; and try out cutting-edge. Fedora 8 features: Use Codeina to get legal software to play MP3, Windows media, and other audio/video formats Organize photos, music, friends, docs, and Web favorites in the new experimental Online Desktop; and explore the latest in KVM and QEMU virtualization and AIGLX 3D-desktop. What's on the DVD and CD-ROM? Install Fedora 8 (8GB) from DVD Boot Fedora 8 GNOME Live CD, and then install its contents to your hard drive System Requirements: Please see the Preface and Appendix A for details and complete system requirements. Open for more! Check out the new Online Desktop. Find ten cool things to do with Fedora Run a Fedora 8 quick install Add pop and power with Online Desktop and 3D acceleration. Organizing the people, places, and things you need on your desktop is now easier with the new GNOME Online Desktop. Get organized, then pile on some bling with 3D-accelerated desktop effects. Put friends, photos, and fun on your new Online Desktop. Your favorite people and your online favorites are totally accessible from the new GNOME Online Desktop. Play with 3D desktop animations. Continued improvements in 3D software let you rotate workspaces on a 3D cube, choose 3D minimize effects, and set 3D wobble effects.
Part I: Getting Started in Fedora and RHEL
An Overview of Fedora and Red Hat Enterprise Linux
3(20)
Introducing Fedora 8 and Red Hat Enterprise Linux
4(1)
What Is Linux?
5(1)
Linux's Roots in UNIX
6(2)
Common Linux Features
8(2)
Primary Advantages of Linux
10(1)
What Are Red Hat Enterprise Linux and Fedora?
11(4)
Red Hat forms the Fedora Project
11(3)
Red Hat shifts to Red Hat Enterprise Linux
14(1)
Choosing between Fedora and Enterprise
14(1)
Why Choose Fedora or Red Hat Enterprise Linux?
15(2)
New Features in Fedora 8
17(3)
Getting custom Fedora spins
18(1)
Creating your own spins
19(1)
The GNOME Online Desktop
19(1)
Infinity look-and-feel and Nodoka theme
19(1)
PulseAudio sound system
20(1)
Codeina utility for getting codecs
20(1)
Package Manager
20(1)
IcedTea Java environment
20(1)
Firewall Configuration
20(1)
The Culture of Free Software
20(3)
Installing Fedora
23(62)
Understanding Fedora Installation Media
24(1)
Using the Fedora 8 Live CD
24(2)
Quick Installation
26(2)
Detailed Installation Instructions
28(21)
Installing Fedora 8
29(1)
Choosing an installation method
29(2)
Choosing computer hardware
31(2)
Installing Fedora on a Laptop
33(1)
Preparing for installation using the live CD
33(3)
Beginning the installation
36(9)
Running Fedora Setup Agent
45(3)
Going forward after installation
48(1)
Special Installation Procedures
49(12)
Alternatives for starting installation
49(3)
Installing from other media
52(3)
Starting a VNC install
55(1)
Performing a kickstart installation
56(5)
Special Installation Topics
61(20)
Setting up to dual-boot Linux and Windows
62(5)
Partitioning your disks
67(8)
Using the GRUB boot loader
75(6)
Troubleshooting Installation
81(2)
Spinning Your Own Fedora Install or Live Media
83(2)
Getting Started with the Desktop
85(62)
Logging in to Fedora or RHEL
86(2)
Getting Familiar with the Desktop
88(9)
Using the GNOME Desktop
97(18)
Using the Metacity window manager
99(2)
Using the GNOME panels
101(5)
Using the Nautilus file manager
106(3)
Changing GNOME preferences
109(1)
Managing removable media (CDs, DVD, and cameras)
110(2)
Trying other GNOME applications
112(2)
Switching to another user
114(1)
Exiting GNOME
114(1)
Setting Up an Online Desktop
115(3)
Switching Desktop Environments
118(1)
Using the KDE Desktop
119(18)
Starting with KDE
120(1)
KDE desktop described
120(3)
Managing files with the Konqueror File Manager
123(5)
Configuring Konqueror options
128(4)
Managing windows
132(1)
Configuring the desktop
133(3)
Adding application launchers and MIME types
136(1)
Running 3D Accelerated Desktop Effects
137(3)
Troubleshooting Your Desktop
140(7)
GUI doesn't work at start-up
141(1)
Tuning your video card and monitor
142(2)
Configuring video cards for gaming
144(1)
Getting more information
144(3)
Using Linux Commands
147(44)
The Shell Interface
147(5)
Checking your login session
148(1)
Checking directories and permissions
149(2)
Checking system activity
151(1)
Exiting the shell
152(1)
Understanding the Shell
152(1)
Using the Shell in Linux
153(22)
Locating commands
154(3)
Rerunning commands
157(6)
Connecting and expanding commands
163(3)
Using shell environment variables
166(3)
Managing background and foreground processes
169(3)
Configuring your shell
172(3)
Working with the Linux File System
175(9)
Creating files and directories
177(7)
Moving, copying, and deleting files
184(1)
Using the vi Text Editor
184(7)
Starting with vi
185(3)
Moving around the file
188(1)
Searching for text
188(1)
Using numbers with commands
189(2)
Part II: Using Fedora and RHEL
Accessing and Running Applications
191(60)
Getting and Installing Software Packages
192(11)
Downloading and installing applications with yum
194(7)
Getting Fedora and RHEL software updates
201(1)
Getting updates with Package Updater
202(1)
Managing RPM Packages
203(12)
Using the Package Manager window
203(1)
Using the rpm command
204(11)
Using Software in Different Formats
215(7)
Understanding software package names and formats
215(2)
Using different archive and document formats
217(2)
Building and installing from source code
219(3)
Using Fedora or RHEL to Run Applications
222(10)
Finding common desktop applications in Linux
224(1)
Investigating your desktop
225(1)
Starting applications from a menu
226(1)
Starting applications from a Run Application window
226(1)
Starting applications from a Terminal window
227(2)
Running remote X applications
229(3)
Running Microsoft Windows, DOS, and Macintosh Applications
232(10)
Running DOS applications
234(2)
Running Microsoft Windows applications in Linux
236(6)
Running Macintosh applications with ARDI Executor
242(1)
Running Applications in Virtual Environments
242(9)
Running applications virtually with Xen
243(4)
Running applications virtually with KVM and QEMU
247(4)
Publishing with Fedora and RHEL
251(36)
Using OpenOffice.org
252(2)
Other Word Processors
254(4)
Using StarOffice
255(1)
AbiWord
256(1)
Using KOffice
257(1)
Using Traditional Linux Publishing Tools
258(1)
Creating Documents in Groff or LaTeX
259(18)
Text processing with Groff
259(10)
Text processing with TeX/LaTeX
269(3)
Converting documents
272(1)
Creating DocBook documents
273(1)
Understanding SGML and XML
274(3)
Printing Documents with Fedora and RHEL
277(3)
Printing to the default printer
278(1)
Printing from the shell
278(1)
Checking the print queues
279(1)
Removing print jobs
279(1)
Checking printer status
280(1)
Displaying PDF Files with Adobe Acrobat Reader
280(1)
Working with Graphics
281(3)
Manipulating images with GIMP
282(1)
Taking screen captures
283(1)
Using Scanners Driven by SANE
284(3)
Gaming in Fedora and RHEL
287(28)
Basic Linux Gaming Information
288(3)
Where to get information on Linux gaming
288(1)
Choosing a video card for gaming
289(2)
Running Open Source Linux Games
291(13)
GNOME games
292(1)
KDE games
293(1)
Adding more games from Fedora repository
294(10)
Commercial Linux Games
304(11)
Getting Started with commercial games in Linux
305(1)
Playing commercial Linux games
305(1)
id Software Games
306(2)
Gaming with Cedega
308(1)
Loki Software game demos
309(3)
Neverwinter Nights
312(3)
Music, Video, and Images in Linux
315(50)
Understanding Multimedia and Legal Issues in Linux
315(1)
Extending Freedom to Codecs
316(1)
Listening to Music in Linux
317(28)
Configuring a sound card
319(6)
Choosing audio players
325(1)
Automatically playing CDs
326(2)
Playing CDs with gnome-cd
328(1)
Playing and managing music with Rhythmbox
328(3)
Playing music with XMMS Audio Player
331(4)
Using ogg123, mpg321, and play command-line players
335(1)
Using MIDI audio players
336(1)
Converting audio files with SoX
336(2)
Extracting and encoding music
338(3)
Creating your own music CDs
341(4)
Creating CD labels with cdlabelgen
345(1)
Viewing TV and Webcams
345(7)
Watching TV with TVtime
346(3)
Video conferencing and VOIP with Ekiga
349(3)
Playing Video
352(9)
Examining laws affecting video and Linux
353(1)
Understanding video content types
354(1)
Watching video with Xine
355(4)
Using Totem movie player
359(2)
Using a Digital Camera
361(4)
Displaying images in gThumb
361(2)
Using your camera as a storage device
363(2)
Using the Internet and the Web
365(50)
Overview of Internet Applications and Commands
365(3)
Browsing the Web
368(18)
Understanding Web browsing
369(4)
Browsing the Web with Firefox
373(3)
Setting up Firefox
376(8)
Using text-based Web browsers
384(2)
Communicating with E-mail
386(8)
E-mail basics
387(1)
Using Evolution e-mail
388(3)
Thunderbird mail client
391(1)
Text-based mail programs
392(1)
Mail readers and managers
393(1)
Participating in Newsgroups
394(1)
Instant Messaging with Pidgin
395(2)
Sharing Files with BitTorrent
397(1)
Using Remote Login, Copy, and Execution
398(17)
Using telnet for remote login
398(2)
Copying files with FTP
400(6)
Getting files with wget
406(3)
Using ssh for remote login/remote execution
409(1)
Using scp for remote file copy
410(1)
Using the ``r'' commands: rlogin, rcp, and rsh
410(5)
Part III: Administering Fedora and RHEL
Understanding System Administration
415(54)
Using the root user account
416(1)
Becoming Super User (The su Command)
416(2)
Learning about Administrative GUI Tools, Commands, Configuration Files, and Log Files
418(13)
Using graphical administration tools
419(4)
Administrative commands
423(1)
Administrative configuration files
424(4)
Administrative log files
428(1)
Using other administrative logins
428(3)
Administering Your Linux System
431(1)
Configuring Hardware
432(4)
Checking your hardware
432(1)
Reconfiguring hardware with kudzu
432(1)
Configuring modules
433(3)
Managing File Systems and Disk Space
436(18)
Mounting file systems
439(7)
Using the mkfs command to create a file system
446(1)
Adding a hard disk
447(3)
Using RAID disks
450(2)
Checking system space
452(2)
Monitoring System Performance
454(5)
Watch computer usage with System Monitor
454(2)
Monitoring CPU usage with top
456(1)
Monitoring power usage on laptop computers
456(3)
Choosing Software Alternatives
459(2)
Selecting mail and printing alternatives
459(2)
Using mail alternatives
461(1)
Using Security Enhanced Linux
461(1)
Understanding Security Enhanced Linux
461(3)
Types and roles in SELinux
462(1)
Users in SELinux
463(1)
Policies in SELinux
463(1)
Tools in SELinux
463(1)
Using SELinux in Fedora and RHEL
464(3)
Getting SELinux
464(1)
Checking whether SELinux is on
465(1)
Checking SELinux status
466(1)
Learning More about SELinux
467(2)
Setting Up and Supporting Users
469(32)
Creating User Accounts
469(8)
Adding users with useradd
470(5)
Adding users with User Manager
475(2)
Setting User Defaults
477(8)
Supplying initial login scripts
480(1)
Supplying initial .bashrc and .bash_profile files
480(1)
Supplying an initial .tcshrc file
481(1)
Configuring system-wide shell options
482(1)
Setting system profiles
483(1)
Adding user accounts to servers
484(1)
Creating Portable Desktops
485(1)
Providing Support to Users
486(2)
Creating a technical support mailbox
486(1)
Resetting a user's password
487(1)
Modifying Accounts
488(3)
Modifying user accounts with usermod
488(2)
Modifying user accounts with User Manager
490(1)
Deleting User Accounts
491(2)
Deleting user accounts with userdel
491(2)
Deleting user accounts with User Manager
493(1)
Checking Disk Quotas
493(6)
Using quota to check disk usage
493(5)
Using du to check disk use
498(1)
Removing temp files automatically
498(1)
Sending Mail to All Users
499(2)
Automating System Tasks
501(40)
Understanding Shell Scripts
501(15)
Executing and debugging shell scripts
502(1)
Understanding shell variables
503(3)
Performing arithmetic in shell scripts
506(1)
Using programming constructs in shell scripts
506(6)
Some useful external programs
512(2)
Trying some simple shell scripts
514(2)
System Initialization
516(5)
Starting init
516(1)
The inittab file
517(4)
System Startup and Shutdown
521(12)
Starting run-level scripts
521(1)
Understanding run-level scripts
522(3)
Understanding what startup scripts do
525(2)
Changing run-level script behavior
527(1)
Reorganizing or removing run-level scripts
528(2)
Adding run-level scripts
530(1)
Managing xinetd services
531(1)
Manipulating run levels
532(1)
Scheduling System Tasks
533(8)
Using at.allow and at.deny
533(1)
Specifying when jobs are run
534(1)
Submitting scheduled jobs
534(1)
Viewing scheduled jobs
535(1)
Deleting scheduled jobs
536(1)
Using the batch command
536(1)
Using the cron facility
537(4)
Backing Up and Restoring Files
541(38)
Making a Simple Backup Archive
542(1)
Doing a Simple Backup with rsync
543(3)
Backing up files locally
544(1)
Backing up files remotely
545(1)
Choosing Backup Tools
546(1)
Selecting a Backup Strategy
547(1)
Full backup
547(1)
Incremental backup
547(1)
Disk mirroring
547(1)
Network backup
548(1)
Selecting a Backup Medium
548(9)
Magnetic tape
549(2)
Writable CD drives
551(4)
Writable DVD drives
555(1)
Writing CD or DVDs with growisofs
556(1)
Backing Up to a Hard Drive
557(1)
Backing Up Files with dump
558(3)
Creating a backup with dump
559(2)
Understanding dump levels
561(1)
Automating Backups with cron
561(2)
Restoring Backed-Up Files
563(5)
Restoring an entire file system
564(1)
Recovering individual files
565(3)
Configuring Amanda for Network Backups
568(6)
Creating Amanda directories
569(1)
Creating the amanda.conf file
569(2)
Creating a disklist file
571(1)
Adding Amanda network services
572(1)
Performing an Amanda backup
573(1)
Using the pax Archiving Tool
574(5)
Computer Security Issues
579(56)
Linux Security Checklist
579(3)
Using Password Protection
582(4)
Choosing good passwords
583(1)
Using a shadow password file
584(2)
Securing Linux with iptables Firewalls
586(14)
Using the Firewall Configuration window
586(2)
Configuring an iptables firewall
588(12)
Controlling Access to Services with TCP Wrappers
600(3)
Checking Log Files
603(5)
Understanding the syslogd service
603(3)
Tracking log messages with logwatch
606(2)
Using the Secure Shell Package
608(3)
Starting the SSH service
608(1)
Using the ssh, sftp, and scp commands
608(2)
Using ssh, scp, and sftp without passwords
610(1)
Securing Linux Servers
611(24)
Understanding attack techniques
612(1)
Protecting against denial-of-service attacks
613(3)
Protecting against distributed DOS attacks
616(4)
Protecting against intrusion attacks
620(3)
Securing servers with SELinux
623(1)
Protecting Web servers with certificates and encryption
624(11)
Part IV: Fedora and RHEL Network and Server Setup
Setting Up a Local Area Network
635(46)
Understanding Local Area Networks
635(11)
Planning, getting, and setting up LAN hardware
636(4)
Configuring TCP/IP for your LAN
640(6)
Setting Up a Wireless LAN
646(18)
Understanding wireless networks
647(1)
Choosing wireless hardware
648(5)
Getting wireless drivers
653(3)
Installing wireless Linux software
656(1)
Configuring the wireless LAN
656(6)
Testing distances
662(1)
Setting wireless extensions
662(2)
Understanding Internet Protocol Addresses
664(4)
IP address classes
664(1)
Understanding netmasks
665(1)
Classless Inter-Domain Routing
666(1)
Getting IP addresses
667(1)
Troubleshooting Your LAN
668(13)
Did Linux find your Ethernet driver at boot time?
668(1)
Can you reach another computer on the LAN?
669(1)
Is your Ethernet connection up?
670(1)
Troubleshooting a wireless LAN
671(4)
Watching LAN traffic with Wireshark
675(6)
Connecting to the Internet
681(44)
Understanding How the Internet Is Structured
682(5)
Internet domains
684(1)
Hostnames and IP addresses
685(1)
Routing
686(1)
Proxies
687(1)
Using Dial-Up Connections to the Internet
687(13)
Getting information
688(1)
Setting up dial-up PPP
689(1)
Creating a dial-up connection with the Network Configuration window
689(3)
Launching your PPP connection
692(1)
Launching your PPP connection on demand
692(1)
Checking your PPP connection
693(7)
Connecting Your LAN to the Internet
700(1)
Setting Up Linux as a Router
701(5)
Configuring the Linux router
701(3)
Configuring network clients
704(1)
Configuring Windows network clients
705(1)
Configuring a Virtual Private Network Connection
706(3)
Understanding IPsec
707(1)
Using IPsec protocols
708(1)
Using IPsec in Fedora or RHEL
709(1)
Setting Up Linux as a Proxy Server
709(10)
Starting the squid daemon
710(2)
Using a simple squid.conf file
712(2)
Modifying the Squid configuration file
714(4)
Debugging Squid
718(1)
Setting Up Proxy Clients
719(6)
Configuring Firefox to use a proxy
720(1)
Configuring Internet Explorer to use a proxy
721(1)
Configuring other browsers to use a proxy
722(3)
Setting Up a Print Server
725(22)
Common UNIX Printing Service
725(1)
Setting Up Printers
726(15)
Using the Printer configuration window
727(9)
Using Web-based CUPS administration
736(2)
Configuring the CUPS server (cupsd.conf)
738(2)
Configuring CUPS printer options
740(1)
Using Printing Commands
741(2)
Using Ipr to print
742(1)
Listing status with lpc
742(1)
Removing print jobs with lprm
743(1)
Configuring Print Servers
743(4)
Configuring a shared CUPS printer
744(1)
Configuring a shared Samba printer
745(2)
Setting Up a File Server
747(42)
Goals of Setting Up a File Server
747(1)
Setting Up an NFS File Server
748(16)
Sharing NFS file systems
750(7)
Using NFS file systems
757(6)
Unmounting NFS file systems
763(1)
Other cool things to do with NFS
763(1)
Setting Up a Samba File Server
764(25)
Getting and installing Samba
765(1)
Configuring a simple Samba server
766(3)
Configuring Samba with SWAT
769(9)
Working with Samba files and commands
778(4)
Setting up Samba clients
782(3)
Troubleshooting your Samba server
785(4)
Setting Up a Mail Server
789(32)
Introducing SMTP and sendmail
790(1)
Installing and Running sendmail
790(4)
Starting sendmail
791(1)
Other programs
792(1)
Logging performed by sendmail
793(1)
Configuring sendmail
794(13)
Getting a domain name
795(1)
Configuring basic sendmail settings (sendmail.mc)
795(4)
Defining outgoing mail access
799(2)
Configuring virtual servers
801(1)
Configuring virtual users
802(1)
Adding user accounts
803(1)
Starting sendmail and generating database files
804(1)
Redirecting mail
805(2)
Introducing Postfix
807(1)
Stopping Spam with SpamAssassin
808(4)
Using SpamAssassin
809(1)
Setting up SpamAssassin on your mail server
809(2)
Setting e-mail readers to filter spam
811(1)
Getting Mail from the Server (POP3 or IMAP)
812(2)
Accessing mailboxes in Linux
812(1)
Configuring IMAP and POP3 with dovecot
813(1)
Getting Mail from Your Browser with SquirrelMail
814(2)
Administering a Mailing List with mailman
816(5)
Setting Up an FTP Server
821(12)
Understanding FTP Servers
822(1)
Attributes of FTP servers
822(1)
FTP user types
823(1)
Using the Very Secure FTP Server
823(8)
Quick-starting vsFTPd
824(1)
Configuring vsFTPd
825(6)
Getting More Information about FTP Servers
831(2)
Setting Up a Web Server
833(54)
Introduction to Web Servers
834(2)
The Apache Web server
834(1)
Other Web servers available for Fedora and RHEL
835(1)
Quick Starting the Apache Web Server
836(2)
Configuring the Apache Server
838(38)
Configuring the Web server (httpd.conf)
839(35)
Configuring modules and related services (/etc/httpd/conf.d/*.conf)
874(2)
Starting and Stopping the Server
876(2)
Monitoring Server Activities
878(9)
Displaying server information
879(1)
Displaying server status
880(1)
Further security of server-info and server-status
881(1)
Logging errors
881(1)
Logging hits
882(1)
Analyzing Web-server traffic
883(4)
Setting Up an LDAP Address Book Server
887(16)
Understanding LDAP
888(3)
Defining information in schemas
889(1)
Structuring your LDAP directories
890(1)
Setting Up the OpenLDAP Server
891(3)
Installing OpenLDAP packages
891(1)
Configuring the OpenLDAP server (slapd.conf)
891(3)
Starting the OpenLDAP service
894(1)
Setting Up the Address Book
894(5)
More Ways to Configure LDAP
899(1)
Accessing an LDAP Address Book from Thunderbird
900(3)
Setting Up a DHCP Boot Server
903(12)
Using Dynamic Host Configuration Protocol
903(1)
Setting Up a DHCP Server
904(9)
Opening your firewall for DHCP
905(1)
Configuring the/etc/dhcpd.conf file
905(7)
Starting the DHCP server
912(1)
Setting Up a DHCP Client
913(2)
Setting Up a MySQL Database Server
915(34)
Finding MySQL Packages
916(1)
Getting More MySQL Packages
916(2)
Configuring the MySQL Server
918(7)
Using mysql user/group accounts
918(1)
Adding administrative users
918(1)
Setting MySQL options
919(5)
Using sample my.cnf files
924(1)
Starting the MySQL Server
925(1)
Checking That MySQL Server Is Working
926(1)
Working with MySQL Databases
927(7)
Starting the mysql command
927(2)
Creating a database with mysql
929(1)
Adding data to a MySQL database table
930(4)
Understanding MySQL Tables
934(5)
Displaying MySQL Databases
939(3)
Displaying all or selected records
940(1)
Displaying selected columns
941(1)
Sorting data
941(1)
Making Changes to Tables and Records
942(2)
Altering the structure of MySQL tables
942(1)
Updating and deleting MySQL records
943(1)
Adding and Removing User Access
944(2)
Adding users and granting access
944(1)
Revoking access
945(1)
Backing Up Databases
946(1)
Checking and Fixing Databases
946(3)
Making Servers Public with DNS
949(28)
Determining Goals for Your Server
950(1)
Using a hosting service
950(1)
Connecting a Public Server
951(5)
Choosing an ISP
951(3)
Getting a domain name
954(2)
Configuring Your Public Server
956(4)
Configuring networking
956(1)
Configuring servers
957(1)
Managing security
958(2)
Setting Up a Domain Name System Server
960(15)
Understanding DNS
961(3)
DNS name server example
964(2)
Quick-starting a DNS server
966(8)
Checking that DNS is working
974(1)
Getting More Information about Bind
975(2)
Integrating Fedora with Apple Macs
977(28)
Looking Inside Mac OS X
978(1)
Using Network Services from Mac OS X
979(6)
Using AppleTalk (netatalk) from Mac OS X
980(2)
Using AppleTalk from Mac OS 8 or OS 9
982(1)
Using Mac, Windows, and Linux servers (Samba)
982(2)
Sharing X applications
984(1)
Configuring an Apple Talk Server in Linux
985(14)
Before you start using netatalk
985(1)
Setting up the netatalk server
986(5)
Securing netatalk volumes
991(6)
Troubleshooting netatalk
997(2)
Accessing NFS Servers from the Mac
999(2)
Connecting to NFS from the Connect to Server window
999(2)
Connecting to NFS from the command line
1001(1)
Installing Fedora on an Intel-based Mac
1001(4)
Before installing Fedora on your Mac
1002(1)
Installing Fedora
1002(3)
Appendix A: About the Media
1005(4)
Fedora Source Code
1006(1)
Fedora Rescue CD
1006(3)
Appendix B: Running Network Services
1009(22)
Checklist for Running Networking Services
1009(2)
Networking Service Daemons
1011(2)
The xinetd super-server
1011(1)
The init.d start-up scripts
1012(1)
Choosing Alternatives
1013(1)
Referencing Network Services
1014(17)
Webserver
1014(1)
File servers
1015(1)
Login servers
1016(1)
E-mail servers
1017(1)
News server
1018(1)
Print servers
1018(1)
Network administration servers
1018(2)
Information servers
1020(1)
Database services
1021(1)
User services
1022(1)
Security services
1023(8)
Appendix C: Red Hat Enterprise Linux 5 Features
1031(10)
What's in RHEL 5?
1031(2)
Choosing an RHEL System
1033(1)
Getting RHEL Evaluation Subscriptions
1034(1)
Hardware Compatibility and Commercial Software
1035(1)
Training and Certification
1035(1)
Documentation and Support
1036(1)
Managing RHEL Systems
1036(3)
Using Red Hat Network
1036(2)
Using RHEL for high-performance computing clusters
1038(1)
Using RHEL Global File System
1038(1)
More Information on RHEL
1039(2)
Index 1041


Christopher Negus has been working with UNIX systems, the Internet, and (most recently) Linux Systems for more than two decades. During that time, Chris worked at AT&T Bell Laboratories, UNIX System Laboratories, and Novell, helping to develop the UNIX operating system. Features from many of the UNIX projects Chris worked on at AT&T have found their way into Red Hat Enterprise Linux, Fedora, and other Linux systems. Chris is the author of all editions of what started out as Red Hat Linux Bible, which because of the name changes of Red Hat's Linux Projects has evolved into the book you are holding. Most recently, Chris co-authored three books in the Linux Toolbox series: Fedora Linux Toolbox, Ubuntu Linux Toolbox, and SUSE Linux Toolbox (Wiley Publishing, 2007). Before that, Chris authored Linux Bible 2008 Edition and co-wrote Linux Troubleshooting Bible and Linux Toys II for Wiley Publishing. During the past few years, Chris has written several books on UNIX and the Internet, including Internet Explorer 4 Bible and Netscape Plug-Ins For Dummies for Wiley Publishing. He also co-wrote several books for Que Publishing, including The Complete Idiot's Guide to Networking (Second and third editions) and Using UNIX (second edition).