Advanced.Linux.Networking..Roderick.Smith [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Advanced.Linux.Networking..Roderick.Smith [Electronic resources] - نسخه متنی

Roderick W. Smith

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید








How This Book
Is Organized


This book is broken down into four parts of
four to thirteen chapters. The structure represents the assumption that your
network includes some servers that are used primarily by local users and others
that are exposed to the Internet at large, but of course some servers can do
double duty, so the placement of some servers may not reflect the configuration
on your network. The book's four parts are as follows:

href="http:// /?xmlid=0-201-77423-2/part01#part01"> Part I : Low-Level Configuration This part is the shortest, at only four chapters. It covers kernel
network configuration options, basic TCP/IP network configuration, network
stacks, and starting servers.

href="http:// /?xmlid=0-201-77423-2/part02#part02"> Part II : Local Network Servers This part covers servers and procedures that are most likely to be
used by other computers on your local network. This includes DHCP servers,
Kerberos, Samba, NFS servers, printing with LPD, time servers, POP and IMAP
mail servers, news servers, remote login servers, X and VNC servers, font
servers, remote administration servers, and network backups.

href="http:// /?xmlid=0-201-77423-2/part03#part03"> Part III : Internet Servers These chapters cover servers that are often accessible to the
world at large. Topics include DNS servers, SMTP mail servers, Web servers, and
FTP servers.

href="http:// /?xmlid=0-201-77423-2/part04#part04"> Part IV : Network Security and Router Functions This part diverges from the emphasis on servers as distinct topics
for chapters and focuses on network security. Topics include a general look at
network security, using a chroot jail, configuring advanced router functions, using iptables for
firewall and NAT purposes, and setting up a VPN.



/ 201