Advanced.Linux.Networking..Roderick.Smith [Electronic resources] نسخه متنی
لطفا منتظر باشید ...
صفحه اصلی تبیان
شبکه اجتماعی
مشاوره
آموزش
فیلم
صوت
تصاویر
حوزه
کتابخانه
دانلود
وبلاگ
فروشگاه اینترنتی
ورود
✕
فارسی
کردی
العربیه
اردو
Türkçe
Русский
English
Français
✕
کانال فیلم من
تبیان من
فایلهای من
کتابخانه من
پنل پیامکی
وبلاگ من
اینجــــا یک کتابخانه دیجیتالی است
با بیش از
100000
منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی
جستجو بر اساس ...
همه
عنوان
پدیدآور
موضوع
یادداشت
تمام متن
اصطلاحنامه
مجموعه ها
مرورالفبایی
لغت نامه دهخدا
➟
جستجو در لغت نامه
بیشتر
کتابخانه شخصی
پرسش از کتابدار
ارسال منبع
Advanced.Linux.Networking..Roderick.Smith [Electronic resources] - نسخه متنی
Roderick W. Smith
|
نمايش فراداده
،
افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
میخواهم بخوانم
درحال خواندن
خوانده شده
ارسال به دوستان
آدرس پست الکترونیک گیرنده :
آدرس پست الکترونیک فرستنده :
نام و نام خانوارگی فرستنده :
پیغام برای گیرنده ( حداکثر 250 حرف ) :
کد امنیتی را وارد نمایید
ارسال
جستجو در متن کتاب
بیشتر
تنظیمات قلم
فونت
پیش فرض
تیتر
کودک
میترا
نازنین
اندازه قلم
+
-
پیش فرض
حالت نمایش
روز
نیمروز
شب
➟
جستجو در لغت نامه
بیشتر
لیست موضوعات
Sitemap
Copyright
Preface
Who Should Buy This Book
Linux Distributions
How This Book Is Organized
Conventions Used in This Book
Contacting Me
Acknowledgments
Part I: Low-Level Configuration
Chapter 1. Kernel Network Configuration
Starting Kernel Configuration
Network Protocol Support
Network Hardware Options
Compiling and Installing a Kernel
Summary
Chapter 2. TCP/IP Network Configuration
Loading Network Drivers
Using a DHCP Client
Configuring a Static IP Address
Using a PPP Link
Summary
Chapter 3. Alternative Network Stacks
Understanding Network Stacks
AppleTalk
IPX/SPX
NetBEUI
Summary
Chapter 4. Starting Servers
Using SysV Startup Scripts
Using inetd
Using xinetd
Using Local Startup Scripts
Using GUI Tools
When to Use Each Startup Method
Summary
Part II: Local Network Servers
Chapter 5. Configuring Other Computers via DHCP
When to Run a DHCP Server
Kernel and Network Interface Issues
DHCP Configuration Files
Assigning Dynamic Addresses
Assigning Fixed Addresses
Integrating with Other Protocols
Summary
Chapter 6. Authenticating Users via Kerberos
When to Run a Kerberos Server
Understanding Kerberos Operation
Setting Up a Kerberos Server
Configuring a Kerberos Application Server
Configuring a Kerberos Client
Summary
Chapter 7. File and Printer Sharing via Samba
When to Run a Samba Server
General Samba Configuration
Serving Files with Samba
Serving Printers with Samba
Samba Scripting Features
Summary
Chapter 8. File Sharing via NFS
When to Run an NFS Server
NFS Servers Available for Linux
Understanding the Portmapper
Serving Files with NFS
Username Mapping Options
Summary
Chapter 9. Printer Sharing via LPD
When to Run an LPD Server
LPD Server Options for Linux
Configuring a BSD LPD Server
Configuring an LPRng Server
Configuring a CUPS Server
Summary
Chapter 10. Maintaining Consistent Time: Time Servers
When to Run a Time Server
Setting Up an NTP Server
Using Samba to Serve Time
Summary
Chapter 11. Pull Mail Protocols: POP and IMAP
When to Run a Pull Mail Server
Understanding POP and IMAP
Configuring a POP Server
Configuring an IMAP Server
Using Fetchmail
Summary
Chapter 12. Running a News Server
When to Run a News Server
Understanding NNTP
Running INN
Using Leafnode
Summary
Chapter 13. Maintaining Remote Login Servers
When to Run a Remote Login Server
Configuring rlogind
Configuring Telnet
Configuring SSH
Summary
Chapter 14. Handling GUI Access with X and VNC Servers
When to Run a GUI Access Server
Configuring Basic X Access
Using an XDMCP Server
Running a VNC Server
A Comparison of Access Techniques
Summary
Chapter 15. Providing Consistent Fonts with Font Servers
When to Run a Font Server
Understanding Font File Formats
Running a Traditional Font Server
Running an Expanded Font Server
Summary
Chapter 16. Maintaining a System Remotely
When to Run Remote System Maintenance Tools
The Challenge of a Cross-Distribution Configuration Tool
Running Linuxconf Remotely
Running Webmin
Running SWAT
Remote Administration Security Concerns
Summary
Chapter 17. Performing Network Backups
When to Run Network Backup Servers
Types of Network Backup Solutions
Using tar
Using SMB/CIFS
Using AMANDA
Restoring Data
Summary
Part III: Internet Servers
Chapter 18. Administering a Domain via DNS
When to Run a DNS Server
Obtaining a Domain Name
DNS Server Options for Linux
Core DNS Configuration
Domain Administration Options
Running a Caching-Only Name Server
Communicating with a DHCP Server
Starting and Testing the Server
Summary
Chapter 19. Push Mail Protocol: SMTP
When to Run an SMTP Server
SMTP Server Options for Linux
Mail Domain Administration
Understanding SMTP Transport
SMTP Server Configuration Options
Basic Sendmail Configuration
Basic Exim Configuration
Basic Postfix Configuration
Using a Procmail Filter
Summary
Chapter 20. Running Web Servers
When to Run a Web Server
Web Server Options for Linux
Basic Apache Configuration
Configuring kHTTPd
Handling Forms and Scripts
Handling Secure Sites
Handling Virtual Domains
Producing Something Worth Serving
Analyzing Server Log Files
Summary
Chapter 21. Running FTP Servers
When to Run an FTP Server
FTP Server Options for Linux
Basic FTP Server Configuration
Setting Up an Anonymous FTP Server
Summary
Part IV: Network Security and Router Functions
Chapter 22. General System Security
Shutting Down Unnecessary Servers
Controlling Accounts and Passwords
Keeping the System Up to Date
Monitoring for Intrusion Attempts
Keeping Abreast of Security Developments
Summary
Chapter 23. Configuring a chroot Jail
What Is a chroot Jail?
Necessary chroot Environment Files
Configuring a Server to Operate in a chroot Jail
Maintaining the chroot Environment
Summary
Chapter 24. Advanced Router Options
When to Use Advanced Router Configurations
Advanced Kernel Options
Using iproute2
Using Routing Protocols
Summary
Chapter 25. Configuring iptables
What Is iptables?
Kernel Configuration for iptables
Checking Your iptables Configuration
Configuring a Firewall with iptables
Configuring NAT with iptables
Forwarding Ports with iptables
Logging iptables Activity
Summary
Chapter 26. Using a VPN
When to Use a VPN
VPN Options for Linux
Configuring PPTP in Linux
Configuring a Linux FreeS/WAN Server
Potential Security Risks with a VPN
Summary
توضیحات
افزودن یادداشت جدید
Part II: Local Network
Servers