Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: The Basics
Figure 1-1: The pieces of a file mode
Chapter 4: Essential System Files, Servers, and Utilities
Figure 4-1: An entry in the password file.
Figure 4-2: An entry in the group file.
Figure 4-3: An entry in the crontab file.
Chapter 5: Configuring Your Network
Figure 5-1: A typical local area network with an Internet link.
Figure 5-2: A typical PPP link.
Figure 5-3: A twisted-pair Ethernet local area network.
Figure 5-4: Two subnets joined with a router.
Figure 5-5: Three subnets.
Chapter 10: Maintaining the Kernel
Figure 10-1: The
make menuconfig
kernel configuration menu.
Chapter 13: Backups
Figure 13-1: Files and file marks on a tape.
Figure 13-2: The tape head at the beginning of a tape.
Figure 13-3: The tape containing three archive files with the head at the start of a new file.
Figure 13-4: The tape head at the end of file 0.
Figure 13-5: The tape head at the beginning of file 1.
Chapter 17: Buying Hardware for Linux
Figure 17-1: Costs of several processors.
Figure 17-2: Performance value.
Previous page
Table of content
Next page
How Linux Works: What Every Superuser Should Know
ISBN: 1593270356
EAN: 2147483647
Year: 2004
Pages: 189
Authors:
Brian Ward
BUY ON AMAZON
Java I/O
Flushing Output Streams
Subclassing OutputStream
Sockets
PushbackInputStream
Controlling Devices
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Point-to-Point Protocol (PPP)
User Datagram Protocol
Transmission Control Protocol (TCP) Data Flow
Dynamic Host Configuration Protocol (DHCP) Server Service
Domain Name System (DNS)
Cisco IOS Cookbook (Cookbooks (OReilly))
Using BGP Route Reflectors
Showing HSRP State Information
Automatically Generating IPv6 Addresses for an Interface
Manually Configuring IPv6 Addresses on an Interface
Dynamic Routing with RIP
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Tcpdump
Internet Security Systems RealSecure
Cisco Secure IDS
Snort
NFR Security
DNS & BIND Cookbook
Preventing Remote Name Servers from Caching a Resource Record
Introduction
Configuring a Name Server to Forward Queries to Another Name Server
Configuring DNS for Virtual Email Addresses
Logging Dynamic Updates
Digital Character Animation 3 (No. 3)
Adding Personality to a Walk
Animating Dialogue
Chapter Eight. Animal Motion
Chapter Nine. Acting
Acting and the Body
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies