Flylib.com
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
ISBN: B00007FYF7
EAN: N/A
Year: 2003
Pages: 118
Authors:
Bill McCarty
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Organization of This Book
Sources of Information
Conventions Used in This Book
How to Contact Us
Acknowledgments
Chapter 1. Why Run Linux?
1.1 What Is Linux?
1.2 Reasons to Choose or Not Choose Linux
Chapter 2. Preparing to Install Red Hat Linux
2.1 Minimum Hardware Requirements
2.2 Collecting Information About Your System
2.3 Installation Types
2.4 Preparing Your Hard Disk
Chapter 3. Installing Red Hat Linux
3.1 Installing the Operating System and Applications
3.2 Start the Installation
3.3 The Setup Agent
3.4 Logging into GNOME
3.5 Getting Help
Chapter 4. How Linux Works
4.1 User Accounts
4.2 How Linux Organizes Data
4.3 Using X
Chapter 5. Using the GNOME and KDE Desktops
5.1 Using the GNOME Desktop
5.2 Using the KDE Desktop
Chapter 6. Using Linux Applications
6.1 OpenOffice.org
6.2 Evolution
6.3 PilotHandspring Tool
6.4 CD Writer
Chapter 7. Conquering the bash Shell
7.1 Issuing Shell Commands
7.2 Working with the Linux Command Prompt
7.3 Useful Linux Programs
Chapter 8. Installing Software Using the RPM Package Manager
8.1 The Package Management Tool
8.2 The redhat-install-packages Command
8.3 The rpm Command
8.4 Querying the RPM Database
8.5 Installing a Package
8.6 Uninstalling a Package
8.7 Updating a Package
8.8 Freshening a Package
8.9 Advanced RPM Techniques
8.10 Red Hat Network
Chapter 9. Configuring and Administering Linux
9.1 Configuring Red Hat Linux by Using the System Settings Menu
9.2 Administering Red Hat Linux by Using the System Tools Menu
9.3 Administering Services by Using the Server Settings Menu
Chapter 10. Connecting to the Internet
10.1 Networking Overview
10.2 Configuring an Internet Connection
10.3 The Mozilla Web Browser
10.4 gFTP FTP Client
10.5 Using wvdial
10.6 Configuring Linux to Use a Cable or DSL Modem
Chapter 11. Setting Up a Networked Workstation
11.1 Configuring Hosts
11.2 Samba
11.3 Setting Up a DHCP Server
Chapter 12. Setting Up Internet Services
12.1 Running an FTP Server
12.2 Running Apache
12.3 The Secure Shell
12.4 Configuring DNS
12.5 Implementing a Basic Firewall
12.6 Checking Your Security by Using Nmap
12.7 Network Security Tips
Chapter 13. Advanced Shell Usage and Shell Scripts
13.1 The Power of the Unix Shell
13.2 Filename Globbing
13.3 Shell Aliases
13.4 Using Virtual Consoles
13.5 X and the Shell
13.6 Shell Scripts
13.7 Understanding Shell Scripts
Appendix A. Linux Directory Tree
Appendix B. Principal Linux Files
Appendix C. Managing the Boot Process
C.1 Booting Linux
C.2 Boot Floppies
C.3 The GRUB Loader
C.4 Boot Parameters
Appendix D. Linux Command Quick Reference
Colophon
Index
Index SYMBOL
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index K
Index L
Index M
Index N
Index O
Index P
Index Q
Index R
Index S
Index T
Index U
Index V
Index W
Index X
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
ISBN: B00007FYF7
EAN: N/A
Year: 2003
Pages: 118
Authors:
Bill McCarty
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Why Risk Assessment
The Goals and Objectives of a Risk Assessment
Document Tracking Form
Executive Summary
Typical RFP Procurement Steps
WebLogic: The Definitive Guide
JDBC
Overview of JDBC Resources
Container-Managed Relationships
Creating Domains
UDDI
SQL Hacks
Hack 7. Modify a Schema Without Breaking Existing Queries
Text Handling
Hack 25. Keep a Running Total
Hack 32. Cope with Rounding Errors
Hack 99. Dont Run Out of Disk Space
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Parsing Data
Introduction
Automating Tedious Problems with VBA
Shooting Boundary Value Problems
Figuring Out Required Rate of Return
Visual C# 2005 How to Program (2nd Edition)
Controlling Access to Members
Answers To Self-Review Exercises
Summary
Terminology
F.2. Editing XHTML
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity I
Snort
NFR Security
Laws, Standards, and Organizations
Security Business Issues
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies