Uh-oh, it looks like your Internet Explorer is out of date.
For a better shopping experience, please upgrade now.
Get it by Wednesday, January 24
, Order by 12:00 PM Eastern and choose Expedited Delivery during checkout.
Same Day delivery in Manhattan. Details
- Starts with the basics of Red Hat, the leading Linux distribution in the U.S., such as network planning and Red Hat installation and configuration
- Offers a close look at the new Red Hat Enterprise Linux 4 and Fedora Core 4 releases
- New chapters cover configuring a database server, creating a VNC server, monitoring performance, providing Web services, exploring SELinux security basics, and exploring desktops
- Demonstrates how to maximize the use of Red Hat Network, upgrade and customize the kernel, install and upgrade software packages, and back up and restore the file system
- The four CDs contain the full Fedora Core 4 distribution
|Product dimensions:||7.40(w) x 9.20(h) x 2.10(d)|
About the Author
Terry Collings is the owner of TAC Technology, located in eastern Pennsylvania. He provides Linux consulting and training services to a variety of clients. Terry has been an adjunct faculty member at several colleges in his area where he has taught A+ and Network + certification courses. He also has taught courses on Unix, Linux, TCP/IP, and Novell Netware.
Terry is the author of Red Hat Enterprise Linux 4 For Dummies and has co-authored and contributed to several other Linux books. He has been a technical editor for the following books: KDE Bible, The Samba Book, Unix Weekend Crash Course, Red Hat Linux 9 For Dummies, Solaris 9 For Dummies, Fedora Linux 2 For Dummies, and Linux Timesaving Techniques For Dummies.
Kurt Wall first touched a computer in 1980 when he learned FORTRAN on an IBM mainframe of forgotten vintage; things have improved since then. A professional technical writer by trade, a historian by training, and an all-around Linux guy by avocation, Kurt’s work history is diverse. These days, Kurt works in the Customer Engineering group at TimeSys Corporation in Pittsburgh, Pennsylvania. His primary responsibilities include building and maintaining TimeSys’s Developer Exchange and working with portal customers and users. He also fixes broken servers, writes documentation, and builds TimeSys software.
Kurt, who dislikes writing about himself in the third person, receives entirely too much e-mail at email@example.com.
Table of Contents
Part One: System and Network Administration Defined.
Chapter 1: Duties of the System Administrator.
Chapter 2: Planning the Network.
Chapter 3: Standard Installation.
Chapter 4: Kickstart Installation.
Chapter 5: Exploring the Desktops.
Chapter 6: System Startup and Shutdown.
Chapter 7: The File System Explained.
Chapter 8: Examining the System Configuration Files.
Part Two: Network Services.
Chapter 9: Managing the X Window System.
Chapter 10: Configuring Printers.
Chapter 11: TCP/IP Networking.
Chapter 12: The Network File System.
Chapter 13: The Network Information System.
Chapter 14: Connecting to Microsoft and Novell Networks.
Chapter 15: Configuring a Database Server.
Chapter 16: Creating a VNC Server.
Chapter 17: Providing Additional Network Services.
Chapter 18: Optimizing Network Services.
Part Three: Internet Services.
Chapter 19: What Are Internet Services?
Chapter 20: Configuring BIND: The Domain Name System.
Chapter 21: Configuring Mail Services.
Chapter 22: Configuring FTP Services.
Chapter 23: Configuring a Web Server.
Chapter 24: Providing Web Services.
Chapter 25: Optimizing Internet Services.
Part Four: System Administration.
Chapter 26: Keeping Your System Updated with up2date and the Red Hat Network.
Chapter 27: Upgrading and Customizing the Kernel.
Chapter 28: Configuring the System at the Command Line.
Chapter 29: Administering Users and Groups.
Chapter 30: Installing and Upgrading Software Packages.
Chapter 31: Backing Up and Restoring the File System.
Chapter 32: Performance Monitoring.
Part Five: System Security and Problem Solving.
Chapter 33: Exploring SELinux Security.
Chapter 34: Implementing Network Security.
Chapter 35: Troubleshooting and Problem Solving.
Appendix A: Bash Shell Scripting.