X Window System Administrator's Guide

Overview

As X moves out of the hacker's domain and into the "real world," users can't be expected to master all the ins and outs of setting up and administering their own X software. That will increasingly become the domain of system administrators. Even for experienced system administrators, X raises many issues, both because of subtle changes in the standard UNIX way of doing things and because X blurs the boundaries between different platforms. Under X, users can run applications across the network on systems with ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (41) from $1.99   
  • New (6) from $17.36   
  • Used (35) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$17.36
Seller since 2009

Feedback rating:

(284)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
0937175838 Trade Paperback. New. Clean, tight and unmarked.

Ships from: Spring Branch, TX

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$17.37
Seller since 2005

Feedback rating:

(101)

Condition: New
PAPERBACK New 0937175838 Trade Paperback. New. Clean, tight and unmarked.

Ships from: Spring Branch, TX

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$18.36
Seller since 2014

Feedback rating:

(4)

Condition: New
have blessed day

Ships from: santa cruz, CA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$19.99
Seller since 2009

Feedback rating:

(144)

Condition: New
PAPERBACK New 0937175838 NEW: Minimal shelving wear. Packaged Carefully & Shipped Promptly. 100% Satisfaction Guaranteed.

Ships from: Berkeley, CA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$32.68
Seller since 2014

Feedback rating:

(1)

Condition: New
0937175838 New Book. Please allow 4-14 business days to arrive. We will ship Internationally as well. Very Good Customer Service is Guaranteed!! Millions sold offline.

Ships from: Newport, United Kingdom

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$65.00
Seller since 2014

Feedback rating:

(114)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

As X moves out of the hacker's domain and into the "real world," users can't be expected to master all the ins and outs of setting up and administering their own X software. That will increasingly become the domain of system administrators. Even for experienced system administrators, X raises many issues, both because of subtle changes in the standard UNIX way of doing things and because X blurs the boundaries between different platforms. Under X, users can run applications across the network on systems with different resources (including fonts, colors, and screen size). Many of these issues are poorly understood, and the technology for dealing with them is in rapid flux.

This book is the first and only book devoted to the issues of system administration for X and X-based networks, written not just for UNIX system administrators but for anyone faced with the job of administering X (including those running X on stand-alone workstations). The book includes:

  • An overview of X that focuses on issues that affect the system administrator's job.
  • Information on obtaining, compiling, and installing the X software, including a discussion of the trade-offs between vendor-supplied and the free MIT versions of X.
  • How to set up xdm, the X display manager, which takes the place of the login program under X and can be used to create a customized turnkey X session for each user.
  • How to set up user accounts under X (includes a comparison of the familiar shell setup files and programs to the new mechanisms provided by X).
  • Issues involved in making X more secure. X's security features are not strong, but an understanding of what features are available can be very important, since X makes it possible for users to intrude on each other in new and sometimes unexpected ways.
  • How fonts are used by X, including a description of the font server.
  • A discussion of the issues raised by running X on heterogenous networks.
  • How colors are managed under X and how to get the same colors across multiple devices with different hardware characteristics.
  • The administration issues involved in setting up and managing an X terminal.
  • How to use PC and Mac X servers to maximize reuse of existing hardware and convert outdated hardware into X terminals.
  • How to obtain and install additional public domain software and patches for X.
  • Covers features new in R5, including the font server and Xcms.

This book is the first and only book devoted to the issues of system administration for X and X-based networks, written not just for UNIX system administrators but for anyone faced with the job of administering X (including those running X on stand-alone workstations).

Read More Show Less

Editorial Reviews

Booknews
A book/compact-disc package for the administrator of X and X- based networks. The reader is assumed to be familiar with UNIX and the general principles of system and network administration, and to have copies of the basic references for X close at hand; a knowledge of programming in C is not required, but some programming in the UNIX shell would help. The CD ROM contains over 600 megabytes of related software. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9780937175835
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 10/8/1992
  • Series: Definitive Guides to the X Window System Series
  • Edition description: 1st ed
  • Edition number: 1
  • Pages: 370
  • Product dimensions: 7.01 (w) x 9.17 (h) x 0.83 (d)

Meet the Author

Linda Mui started working for O'Reilly & Associates in 1986. She was first hired as a production assistant, later became an apprentice system administrator, and now is a writer. Her first writing job was for termcap and terminfo, which she co-authored with John Strang and Tim O'Reilly. She also wrote Pick BASIC, on programming applications for Pick systems. In between writing jobs, Linda works on troff macros and tools for the O'Reilly & Associates production staff. Linda was raised in the Bronx, New York and now lives in Cambridge, Massachusetts. Lately she has been trying to improve herself by learning how to swim, play billiards, and accessorize.

Eric Pearce is an author and technical resource for O'Reilly & Associates. In addition to co-authoring this book, he is also responsible for developing CD-ROM companion disks for books produced by O'Reilly & Associates. Eric's interests include promoting public domain software, Internet connectivity, and network services. Before coming to work for O'Reilly & Associates, Eric worked as a systems programmer for Boston University, which he also attended as a student. His favorite activities include bicycling, snowboarding, rock climbing, and dangerous sports.

Read More Show Less

Table of Contents

How to Use this Book
Chapter 1. An Introduction to X Administration
1.1 The Design of X11
1.1.1 Display Servers
1.1.2 Clients and Resources
1.1.3 Toolkits and GUIs
1.2 X Administration
1.2.1 Installing X
1.2.2 Supporting Users
1.2.3 Maintaining Software
1.2.4 Maintaining Multiple Machines
1.2.5 A Philosophy of X Administration
Chapter 2. The X User Environment
2.1 The Configured X Session
2.1.1 The Twilight Zone
2.2 Components of the X Environment
2.2.1 Window Managers
2.2.2 Customizing Clients
2.2.2.2 The -geometry Command-line Option
2.2.2.3 Specifying Colors
2.2.2.4 Using Resources
2.2.3 The Startup Script
2.3 The Shell Environment
2.3.1 Setting the DISPLAY Variable
2.3.2 Redefining the Search Path
2.3.2.2 Setting the Search Path for Mixed Environments
2.3.3 xterm Issues
2.3.3.2 The Resize Client
2.3.3.3 xterm and the Login Shell (C Shell)
2.3.4 Starting Remote Clients
2.4 Startup Methods
2.4.1 xinit and startx
2.4.2 Differences Between .xinitrc and .xsession
2.5 Related Documentation
Chapter 3. The X Display Manager
3.1 xdm Concepts
3.2 xdm Configuration Files
3.3 xdm the Easy Way
3.4 Troubleshooting xdm
3.5 Customizing xdm
3.5.1 The Master Configuration File (xdm-config)
3.5.2 Listing X Servers (the Xservers File)
3.5.3 xdm Host Access Control: the Xaccess File (R5 Only)
3.5.3.2 Indirect Access and the Chooser
3.5.3.3 Using Macros
3.5.3.4 Advantages and Disadvantages of the Chooser
3.5.4 The Xresources File
3.5.4.2 The xconsole Client
3.5.5 Starting Up Individual X Sessions (the Xsession File)
3.5.6 Display Classes
3.6 Testing Your xdm Setup
3.6.1 Resetting the Keyboard
3.6.2 Restarting xdm Using xdm-pid (R4 and Later)
3.6.3 Rereading XDM Configuration Files (R3)
3.7 Permanent Installation of xdm
3.8 Related Documentation
Chapter 4. Security
4.1 Host-based Access Control
4.1.1 The /etc/Xn.hosts File
4.1.2 The xhost Client
4.1.3 Problems with Host-based Access Control
4.2 Access Control with MIT-MAGIC-COOKIE-1
4.2.1 Using MIT-MAGIC-COOKIE-1 with xdm
4.2.2 The xauth Program
4.2.3 Using MIT-MAGIC-COOKIE with xinit
4.2.4 xauth vs. xhost
4.3 The XDM-AUTHORIZATION-1 Mechanism (R5)
4.4 The SUN-DES-1 Mechanism (R5)
4.4.1 Public Key Encryption
4.4.2 Prerequisites for Using SUN-DES-1
4.4.3 Using SUN-DES-1 with xdm
4.4.4 Using SUN-DES-1 with xinit
4.4.5 Adding Another User with SUN-DES-1
4.4.6 xterm and SUN-DES-1
4.4.7 Troubleshooting SUN-DES-1
4.5 xterm and Secure Keyboard
4.6 Other Security Issues
4.6.1 The Console xterm (R4 and Earlier)
4.6.2 The Console and xdm (R5)
4.6.3 Hanging the Server Remotely (R3)
4.6.4 Reading the Framebuffer (Sun Workstat
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)