Fedora 7 and Red Hat Enterprise Linux Bible

Overview

For a home desktop or a business server, here's all the Linux you need

Fedora 7 contains thousands of the latest Linux software projects. The Fedora 7 merge of Fedora Core and Extras software on our special DVD means that you get the most complete Fedora installation set available. The included Fedora 7 desktop live CD can be run live, and then installed to your hard disk. In all, you get the latest Linux desktop, server, and systems administration software and instruction, so ...

See more details below
Paperback
$44.56
BN.com price
(Save 10%)$49.99 List Price
Other sellers (Paperback)
  • All (32) from $1.99   
  • New (13) from $5.99   
  • Used (19) from $1.99   
Sending request ...

Overview

For a home desktop or a business server, here's all the Linux you need

Fedora 7 contains thousands of the latest Linux software projects. The Fedora 7 merge of Fedora Core and Extras software on our special DVD means that you get the most complete Fedora installation set available. The included Fedora 7 desktop live CD can be run live, and then installed to your hard disk. In all, you get the latest Linux desktop, server, and systems administration software and instruction, so you can learn skills that scale up to professional, commercial-quality Linux systems.

Configure Fedora or Red Hat Enterprise Linux to:

* Explore your computer or the Internet from GNOME(r) and KDE(r) desktops

*

Manage and use documents, spreadsheets, presentations, music, and images

*

Draw from online software repositories with Package Manager and Package Updater

*

Build an Internet server with e-mail, Web, DNS, FTP, and database services

*

Secure your computer with firewalls, password protection, and SELinux

Try out cutting edge Fedora 7 features:

* Boot up the first official Fedora 7 desktop live CD to try before you install

*

Play with the latest 3D-desktop technology with AIGLX and Compiz

*

Run virtualized versions of Fedora on your desktop, using KVM and QEMU

What's on the DVD and CD-ROM?

* Install complete Fedora 7 (8GB) from DVD

*

Boot Fedora 7 desktop live CD, and then install its contents to your hard drive

Open for more!

* Play with 3D animation and applets on the desktop

*

Find ten cool things to do with Fedora

*

Run a Fedora 7 quick install

System Requirements: Please see the Preface and Appendix A for details and complete system requirements.

Engage 3D acceleration and play with desktop applets

Navigating your Fedora desktop has more bling when you enable 3D-hardware acceleration with AIGLX and the Compiz window manager. Adding desktop applets can bring more fun and function to your Fedora desktop as well.

Play with 3D desktop animations

Experimental 3D software lets you rotate workspaces on a 3D cube, choose 3D minimalize effects, and set 3D fade effects.

Add fun and function to the desktop

Use personalized applets, backgrounds, themes, and icons to turn your Fedora desktop into a workspace that is all your own.

Read More Show Less

Product Details

  • ISBN-13: 9780470130759
  • Publisher: Wiley
  • Publication date: 7/23/2007
  • Series: Bible Series , #431
  • Edition number: 1
  • Pages: 1128
  • Product dimensions: 7.50 (w) x 9.30 (h) x 2.10 (d)

Table of Contents


Getting Started in Fedora and RHEL
An Overview of Fedora and Red Hat Enterprise Linux     3
Introducing Fedora 7 and Red Hat Enterprise Linux     4
What Is Linux?     5
Linux's Roots in UNIX     6
Common Linux Features     8
Primary Advantages of Linux     10
What Are Red Hat Enterprise Linux and Fedora?     11
Red Hat forms the Fedora Project     11
Red Hat shifts to Red Hat Enterprise Linux     13
Choosing between Fedora and Enterprise     14
Why Choose Fedora or Red Hat Enterprise Linux?     15
New Features in Fedora 7     17
Massive Fedora 7 Repository (Merged Core and Extras)     18
3D improvements and other cool desktop features     19
Virtualization with KVM     19
Improved wireless card support     19
Improved FireWire support     20
Support for dual booting     20
Faster software updates     20
Creating your own spins (Pungi and livecd-creator)     20
The Culture of Free Software     21
Installing Fedora     23
Understanding Fedora Installation Media     24
Using the Fedora 7 Live CD     24
Quick Installation     26
Detailed Installation Instructions     28
Installing Fedora 7     28
Choosing an installation method     29
Choosing computer hardware     31
Preparing for installation using the live CD     33
Beginning the installation     36
Running Fedora Setup Agent     45
Going forward after installation     49
Special Installation Procedures     49
Alternatives for starting installation     50
Installing from other media     52
Starting a VNC install     55
Performing a kickstart installation     56
Special Installation Topics     62
Setting up to dual-boot Linux and Windows     62
Partitioning your disks     67
Using the GRUB boot loader     75
Troubleshooting Installation     81
Getting Started with the Desktop     85
Logging in to Fedora or RHEL     86
Getting Familiar with the Desktop     89
Using the GNOME Desktop     98
Using the Metacity window manager     99
Using the GNOME panels     102
Using the Nautilus file manager     107
Changing GNOME preferences      109
Managing removable media (CDs, DVD, and cameras)     111
Trying other GNOME applications     113
Exiting GNOME     115
Switching Desktop Environments     115
Using the KDE Desktop     116
Starting with KDE     116
KDE desktop described     117
Managing files with the Konqueror File Manager     120
Configuring Konqueror options     125
Managing windows     129
Configuring the desktop     130
Adding application launchers and MIME types     133
Running 3D Accelerated Desktop Effects     134
Troubleshooting Your Desktop     137
GUI doesn't work at start-up     137
Tuning your video card and monitor     139
Configuring video cards for gaming     141
Getting more information     141
Using Linux Commands     143
The Shell Interface     143
Checking your login session     144
Checking directories and permissions     145
Checking system activity     147
Exiting the shell     148
Understanding the Shell     148
Using the Shell in Linux     149
Locating commands      150
Rerunning commands     152
Connecting and expanding commands     158
Using shell environment variables     161
Managing background and foreground processes     164
Configuring your shell     166
Working with the Linux File System     169
Creating files and directories     172
Moving, copying, and deleting files     177
Using the vi Text Editor     178
Starting with vi     179
Moving around the file     181
Searching for text     182
Using numbers with commands     183
Using Fedora and RHEL
Accessing and Running Applications     187
Getting and Installing Software Packages     188
Downloading and installing applications with yum     190
Getting Fedora and RHEL software updates     197
Getting updates with Package Updater     198
Managing RPM Packages     199
Using the Package Manager window     199
Using the rpm Command     200
Using Software in Different Formats     210
Understanding software package names and formats     211
Using different archive and document formats     213
Building and installing from source code      214
Using Fedora or RHEL to Run Applications     218
Finding common desktop applications in Linux     219
Investigating your desktop     220
Starting applications from a menu     221
Starting applications from a Run Application window     222
Starting applications from a Terminal window     222
Running remote X applications     224
Running Microsoft Windows, DOS, and Macintosh Applications     228
Running DOS applications     229
Running Microsoft Windows applications in Linux     232
Running Macintosh applications with ARDI Executor     237
Running Applications in Virtual Environments     237
Running applications virtually with Xen     238
Running applications virtually with KVM and QEMU     242
Publishing with Fedora and RHEL     245
Using OpenOffice.org     246
Other Word Processors     248
Using StarOffice     249
AbiWord     250
Using KOffice     251
Using Traditional Linux Publishing Tools     252
Creating Documents in Groff or LaTeX     253
Text processing with Groff     253
Text processing with TeX/LaTeX      263
Converting documents     266
Creating DocBook documents     267
Understanding SGML and XML     268
Printing Documents with Fedora and RHEL     271
Printing to the default printer     272
Printing from the shell     272
Checking the print queues     273
Removing print jobs     273
Checking printer status     274
Displaying PDF Files with Adobe Acrobat Reader     274
Working with Graphics     275
Manipulating images with GIMP     276
Taking screen captures     277
Using Scanners Driven by SANE     278
Gaming in Fedora and RHEL     281
Basic Linux Gaming Information     282
Where to get information on Linux gaming     282
Choosing a video card for gaming     283
Running Open Source Linux Games     285
GNOME games     286
KDE games     286
Adding more games from Fedora Repository     288
Commercial Linux Games     298
Getting started with commercial games in Linux     299
Playing commercial Linux games     299
id software games     300
Gaming with Cedega      302
Loki Software game demos     303
Neverwinter Nights     306
Music, Video, and Images in Linux     309
Understanding Multimedia and Legal Issues in Linux     309
Listening to Music in Linux     310
Configuring a sound card     312
Choosing audio players     319
Automatically playing CDs     320
Playing CDs with gnome-cd     321
Playing and managing music with Rhythmbox     322
Playing music with XMMS Audio Player     325
Using ogg123, mpg321, and play command-line players     328
Using MIDI audio players     329
Converting audio files with SoX     330
Extracting and encoding music     332
Creating your own music CDs     335
Creating CD labels with cdlabelgen     338
Viewing TV and Webcams     339
Watching TV with TVtime     340
Video conferencing and VOIP with Ekiga     342
Playing Video     346
Examining laws affecting video and Linux     346
Understanding video content types     347
Watching video with Xine     348
Using Totem movie player     353
Using a Digital Camera      354
Displaying images in gThumb     354
Using your camera as a storage device     356
Using the Internet and the Web     359
Overview of Internet Applications and Commands     359
Browsing the Web     362
Understanding Web browsing     363
Browsing the Web with Mozilla Firefox     367
Setting up Firefox     370
Using text-based Web browsers     378
Communicating with E-Mail     379
E-mail basics     380
Using Evolution e-mail     381
Thunderbird mail client     384
Text-based mail programs     386
Mail readers and managers     386
Participating in Newsgroups     388
Instant Messaging with Pidgin (formerly GAIM)     388
Sharing Files with Bittorrent     390
Using Remote Login, Copy, and Execution     391
Using telnet for remote login     391
Copying files with FTP     393
Getting files with wget     400
Using ssh for remote login/remote execution     402
Using scp for remote file copy     403
Using the "r" commands: rlogin, rcp, and rsh     404
Administering Fedora and RHEL
Understanding System Administration     407
Using the root User Account     408
Becoming Super User (the su Command)     408
Learning About Administrative GUI Tools, Commands, Configuration Files, and Log Files     410
Using graphical administration tools     411
Administrative commands     415
Administrative configuration files     416
Administrative log files     420
Using other administrative logins     420
Administering Your Linux System     423
Configuring Hardware     423
Checking your hardware     424
Reconfiguring hardware with kudzu     424
Configuring modules     425
Managing File Systems and Disk Space     428
Mounting file systems     431
Using the mkfs command to create a file system     438
Adding a hard disk     438
Using RAID disks     441
Checking system space     443
Monitoring System Performance     446
Watch computer usage with System Monitor     446
Monitoring CPU usage with top     447
Monitoring power usage on laptop computers     448
Choosing Software Alternatives     450
Selecting mail and printing alternatives     451
Using mail alternatives     452
Using Security Enhanced Linux     452
Understanding Security Enhanced Linux     453
Types and roles in Selinux     453
Users in SELinux     454
Policies in SELinux     454
Tools in SELinux     455
Using SELinux in Fedora and RHEL     455
Getting SELinux     456
Checking whether SELinux is on     456
Checking SELinux status     457
Learning More About SELinux     460
Setting Up and Supporting Users     463
Creating User Accounts     463
Adding users with useradd     464
Adding users with User Manager     468
Setting User Defaults     471
Supplying initial login scripts     473
Supplying initial .bashrc and .bash_profile files     474
Supplying an initial .tcshrc file     475
Configuring system-wide shell options     475
Setting system profiles     476
Adding user accounts to servers     477
Creating Portable Desktops     478
Providing Support to Users     479
Creating a technical support mailbox      479
Resetting a user's password     480
Modifying Accounts     481
Modifying user accounts with usermod     481
Modifying user accounts with User Manager     483
Deleting User Accounts     484
Deleting user accounts with userdel     484
Deleting user accounts with User Manager     485
Checking Disk Quotas     486
Using quota to check disk usage     486
Using du to check disk use     491
Removing temp files automatically     491
Sending Mail to All Users     492
Automating System Tasks     495
Understanding Shell Scripts     495
Executing and debugging shell scripts     496
Understanding shell variables     497
Performing arithmetic in shell scripts     500
Using programming constructs in shell scripts     500
Some useful external programs     506
Trying some simple shell scripts     508
System Initialization     510
Starting init     510
The inittab file     510
System Startup and Shutdown     514
Starting run-level scripts     515
Understanding run-level scripts      515
Understanding what startup scripts do     519
Changing run-level script behavior     520
Reorganizing or removing run-level scripts     521
Adding run-level scripts     523
Managing xinetd services     524
Manipulating run levels     525
Scheduling System Tasks     526
Using at.allow and at.deny     526
Specifying when jobs are run     527
Submitting scheduled jobs     527
Viewing scheduled jobs     528
Deleting scheduled jobs     529
Using the batch command     529
Using the cron facility     529
Backing Up and Restoring Files     535
Doing a Simple Backup with Rsync     536
Backing up files locally     536
Backing up files remotely     537
Choosing Backup Tools     540
Selecting a Backup Strategy     539
Full backup     540
Incremental backup     540
Disk mirroring     540
Network backup     541
Selecting a Backup Medium     541
Magnetic tape     542
Writable CD drives     543
Writable DVD drives     547
Writing CD or DVDs with growisofs     549
Backing Up to a Hard Drive     550
Backing Up Files with dump     551
Creating a backup with dump     551
Understanding dump levels     553
Automating Backups with cron     554
Restoring Backed-Up Files     556
Restoring an entire file system     557
Recovering individual files     558
Configuring Amanda for Network Backups     560
Creating Amanda directories     561
Creating the amanda.conf file     562
Creating a disklist file     564
Adding Amanda network services     565
Performing an Amanda backup     566
Using the pax Archiving Tool     566
Computer Security Issues     571
Linux Security Checklist     571
Using Password Protection     574
Choosing good passwords     574
Using a shadow password file     575
Securing Linux with iptables Firewalls     577
Starting with iptables in Fedora and RHEL     578
Configuring an iptables firewall     579
Controlling Access to Services with TCP Wrappers     590
Checking Log Files     593
Understanding the syslogd service     593
Tracking log messages with logwatch     596
Using the Secure Shell Package     598
Starting the SSH service     598
Using the ssh, sftp, and scp commands     598
Using ssh, scp and sftp without passwords     599
Securing Linux Servers     601
Understanding attack techniques     601
Protecting against denial-of-service attacks     602
Protecting against distributed DOS attacks     605
Protecting against intrusion attacks     610
Securing servers with SELinux     612
Protecting Web servers with certificates and encryption     613
Fedora and RHEL Network and Server Setup
Setting Up a Local Area Network     627
Understanding Local Area Networks     627
Planning, getting, and setting up LAN hardware     628
Configuring TCP/IP for your LAN     632
Setting Up a Wireless LAN     638
Understanding wireless networks     639
Choosing wireless hardware     640
Getting wireless drivers     645
Installing wireless Linux software     647
Configuring the wireless LAN     648
Testing distances     654
Setting wireless extensions      654
Understanding Internet Protocol Addresses     656
IP address classes     656
Understanding netmasks     657
Classless Inter-Domain Routing     658
Getting IP addresses     659
Troubleshooting Your LAN     660
Did Linux find your Ethernet driver at boot time?     660
Can you reach another computer on the LAN?     661
Is your Ethernet connection up?     662
Troubleshooting a wireless LAN     663
Watching LAN traffic with Wireshark     667
Connecting to the Internet     673
Understanding How the Internet Is Structured     674
Internet domains     676
Hostnames and IP addresses     677
Routing     678
Proxies     679
Using Dial-Up Connections to the Internet     679
Getting information     679
Setting up dial-up PPP     681
Creating a dial-up connection with the Network Configuration Window     681
Launching your PPP connection     684
Launching your PPP connection on demand     684
Checking your PPP connection     685
Connecting Your LAN to the Internet     692
Setting Up Linux as a Router     693
Configuring the Linux router     693
Configuring network clients     696
Configuring Windows network clients     697
Configuring a Virtual Private Network Connection     698
Understanding IPsec     699
Using IPsec protocols     700
Using IPsec in Fedora or RHEL     701
Setting Up Linux as a Proxy Server     701
Starting the squid daemon     702
Using a simple squid.conf file     704
Modifying the Squid configuration file     706
Debugging Squid     710
Setting Up Proxy Clients     711
Configuring Firefox to use a proxy     712
Configuring Internet Explorer to use a proxy     713
Configuring other browsers to use a proxy     714
Setting Up a Print Server     717
Common UNIX Printing Service     717
Setting Up Printers     718
Using the Printer configuration window     719
Using Web-based CUPS administration     728
Configuring the CUPS server (cupsd.conf)     731
Configuring CUPS printer options     733
Using Printing Commands     734
Using 1pr to print     734
Listing status with 1pc     735
Removing print jobs with 1prm     735
Configuring Print Servers     736
Configuring a shared CUPS printer     736
Configuring a shared Samba printer     737
Setting Up a File Server     741
Goals of Setting Up a File Server     741
Setting Up an NFS File Server     742
Sharing NFS file systems     744
Using NFS file systems     751
Unmounting NFS file systems     757
Other cool things to do with NFS     757
Setting Up a Samba File Server     758
Getting and installing Samba     759
Configuring a simple Samba server     760
Configuring Samba with SWAT     763
Working with Samba files and commands     772
Setting up Samba clients     776
Troubleshooting your Samba server     779
Setting Up a Mail Server     783
Introducing SMTP and sendmail     784
Installing and Running sendmail     784
Starting sendmail     785
Other programs     786
Logging performed by sendmail     787
Configuring Sendmail     788
Getting a domain name      789
Configuring basic sendmail settings (sendmail.mc)     789
Defining outgoing mail access     793
Configuring virtual servers     795
Configuring virtual users     796
Adding user accounts     797
Starting sendmail and generating database files     797
Redirecting mail     799
Introducing Postfix     801
Stopping Spam with SpamAssassin     802
Using SpamAssassin     803
Setting up SpamAssassin on your mail server     803
Setting e-mail readers to filter spam     805
Getting Mail from the Server (POP3 or IMAP)     806
Accessing mailboxes in Linux     806
Configuring IMAP and POP3 with dovecot     807
Getting Mail from Your Browser with SquirrelMail     808
Administering a Mailing List with mailman     810
Setting Up an FTP Server     815
Understanding FTP Servers     815
Attributes of FTP servers     816
FTP user types     817
Using the Very Secure FTP Server     817
Quick-starting vsFTPd     818
Configuring vsFTPd     819
Getting More Information about FTP Servers     824
Setting Up a Web Server      827
Introduction to Web Servers     828
The Apache Web server     828
Other Web servers available for Fedora and RHEL     829
Quick Starting the Apache Web Server     830
Configuring the Apache Server     832
Configuring the Web server (httpd.conf)     833
Configuring modules and related services (/etc/httpd/conf.d/*.conf)     869
Starting and Stopping the Server     870
Monitoring Server Activities     872
Displaying server information     873
Displaying server status     874
Further security of server-info and server-status     875
Logging errors     875
Logging hits     876
Analyzing Web-server traffic     877
Setting Up an LDAP Address Book Server     881
Understanding LDAP     882
Defining information in schemas     883
Structuring your LDAP directories     884
Setting Up the OpenLDAP Server     885
Installing OpenLDAP packages     885
Configuring the OpenLDAP server (slapd.conf)     885
Starting the OpenLDAP service     888
Setting Up the Address Book     888
More Ways to Configure LDAP      893
Accessing an LDAP Address Book from Thunderbird     894
Setting Up Boot Servers: DHCP and NIS     897
Using Dynamic Host Configuration Protocol     898
Setting Up a DHCP Server     898
Opening your firewall for DHCP     899
Configuring the /etc/dhcpd.conf file     899
Starting the DHCP server     906
Setting Up a DHCP Client     907
Understanding Network Information Service     908
Setting Up Fedora or RHEL as an NIS Client     910
Defining an NIS domain name     911
Setting up the /etc/yp.conf file     912
Configuring NIS client daemons     912
Checking that NIS is working     913
Using NIS maps     913
Setting Up Fedora or RHEL as an NIS Master Server     914
Creating NIS maps     914
Setting Up Fedora or RHEL as an NIS Slave Server     918
Setting Up a MySQL Database Server     921
Finding MySQL Packages     922
Getting More MySQL Packages     922
Configuring the MySQL Server     924
Using mysql user/group accounts     924
Adding administrative users     924
Setting MySQL options     925
Using sample my.cnf files     930
Starting the MySQL Server     931
Checking That MySQL Server Is Working     932
Working with MySQL Databases     933
Starting the mysql command     933
Creating a database with mysql     935
Adding data to a MySQL database table     936
Understanding MySQL Tables     940
Displaying MySQL Databases     945
Displaying all or selected records     946
Displaying selected columns     947
Sorting data     947
Making Changes to Tables and Records     948
Altering the structure of MySQL tables     948
Updating and deleting MySQL records     949
Adding and Removing User Access     949
Adding users and granting access     950
Revoking access     951
Backing Up Databases     952
Checking and Fixing Databases     952
Making Servers Public with DNS     955
Determining Goals for Your Server     956
Using a hosting service     956
Connecting a Public Server     957
Choosing an ISP     957
Getting a domain name     960
Configuring Your Public Server      962
Configuring networking     962
Configuring servers     963
Managing security     964
Setting Up a Domain Name System Server     966
Understanding DNS     967
DNS name server example     970
Quick-starting a DNS server     972
Checking that DNS is working     980
Getting More Information about BIND     981
Integrating Fedora with Apple Macs     983
Looking Inside Mac OS X     984
Using Network Services from Mac OS X     985
Using AppleTalk (netatalk) from Mac OS X     986
Using AppleTalk from Mac OS 8 or OS 9     988
Using Mac, Windows and Linux servers (Samba)     988
Sharing X applications     990
Configuring an AppleTalk Server in Linux     991
Before you start using netatalk     991
Setting up the netatalk server     992
Securing netatalk volumes     997
Troubleshooting netatalk     1003
Accessing NFS Servers from the Mac     1005
Connecting to NFS from the Connect to Server window     1005
Connecting to NFS from the command line     1007
Installing Fedora on an Intel-Based Mac     1007
Before installing Fedora on your Mac     1008
Installing Fedora     1008
About the Media     1011
Fedora Source Code     1012
Fedora Rescue CD     1012
Running Network Services     1015
Checklist for Running Networking Services     1015
Networking Service Daemons     1017
The xinetd super-server     1017
The init.d start-up scripts     1019
Choosing Alternatives     1019
Referencing Network Services     1020
Web server     1020
File servers     1021
Login servers     1022
E-mail servers     1023
News server     1024
Print servers     1024
Network administration servers     1024
Information servers     1026
Database services     1027
User services     1028
Security services     1029
Red Hat Enterprise Linux 4 Features     1037
What's in RHEL5?     1037
Choosing an RHEL System     1039
Getting RHEL Evaluation Subscriptions     1040
Hardware Compatibility and Commercial Software     1040
Training and Certification      1041
Documentation and Support     1042
Managing RHEL Systems     1042
Using Red Hat Network     1042
Using RHEL for high-performance computing clusters     1044
Using RHEL Global File System     1044
More Information on RHEL     1045
Index     1047
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)