List of Tables - Red Hat Linux Bible: Fedora and Enterprise Edition [Electronic resources] نسخه متنی
لطفا منتظر باشید ...
List of Tables
Chapter 3: Getting Started with the Desktop
Table 3-1: Metacity Keyboard Shortcuts
Table 3-2: Mouse Actions
Chapter 4: Using Linux Commands
Table 4-1: Keystrokes for Navigating Command Lines
Table 4-2: Keystrokes for Editing Command Lines
Table 4-3: Keystrokes for Cutting and Pasting Text in Command Lines
Chapter 5: Accessing and Running Applications
Table 5-1: Windows-Equivalent Linux Applications
Table 5-2: Linux Archive File Formats
Table 5-3: Linux Document Formats
Table 5-4: Mtools Available with Linux
Table 5-5: Windows Drive Letters in WINE
Chapter 6: Publishing with Red Hat Linux
Table 6-1: Man Macros
Chapter 7: Playing Games with Red Hat Linux
Table 7-1: GNOME Games
Table 7-2: Games for the KDE Desktop
Chapter 8: Multimedia in Red Hat Linux
Table 8-1: Sound Formats Supported by Sox Utility
Table 8-2: Shortcuts for TV Watching (xawtv)
Chapter 9: Tools for Using the Internet and the Web
Table 9-1: Protocols in Web URLs
Chapter 11: Setting Up and Supporting Users
Table 11-1: useradd Command Options
Table 11-2: useradd Options for Changing User Defaults
Table 11-3: usermod Options for Changing Existing Accounts
Table 11-4: Using find to Locate and Change User Files
Chapter 12: Automating System Tasks
Table 12-1: Examples of bash parameter expansion
Table 12-2: Operators for Test Expressions
Table 12-3: Valid init Actions
Table 12-4: Possible Run Levels
Table 12-5: Run-Level Scripts Contained in /etc/init.d
Table 12-6: Samples for Specifying Times in an at Job
Table 12-7: Valid /etc/crontab Field Values
Chapter 13: Backing Up and Restoring Files
Table 13-1: Comparison of Common Backup Media
Table 13-2: Programs in the dump Package
Table 13-3: Options to dump
Table 13-4: Recommended dump Schedule
Table 13-5: Restore Command Options
Table 13-6: Interactive restore Commands
Table 13-7: Backup Commands Used with Amanda
Table 13-8: Examples of pax Use
Table 13-9: Options to pax
Chapter 14: Computer Security Issues
Table 14-1: netstat Parameters
Table 14-2: Socket States
Table 14-3: Ipchains Action Parameters
Table 14-4: Ipchains Optional Parameters
Table 14-5: ipchains Targets
Table 14-6: Log Files in the /var/log Directory
Table 14-7: Message Levels
Table 14-8: Ideas for Good Passwords
Chapter 15: Setting Up a Local Area Network
Table 15-1: Supported Wireless Network Adapters and Modules
Table 15-2: Options to the iwconfig Command
Table 15-3: Private IP Addresses
Chapter 19: Setting Up a Mail Server
Table 19-1: File Prefixes in /var/spool/mqueue
Table 19-2: Other Related Sendmail Programs
Table 19-3: Timeout Events
Table 19-4: Precedence Names
Table 19-5: Programs Included with majordomo
Chapter 21: Setting Up a Web Server
Table 21-1: Dynamic Shared Object (DSO) Modules
Table 21-2: Special Server Features for the Options Directive
Table 21-3: Special Access Features for the AllowOverride Directive
Table 21-4: UserDir Path Name and URL Examples
Table 21-5: Available Tokens within LogFormat
Table 21-6: Server Response Codes
Table 21-7: Command-Line Arguments to httpd
Chapter 23: Setting Up Boot Servers: DHCP and NIS
Table 23-1: Data Types
Table 23-2: DHCP Options
Chapter 24: Setting Up a MySQL Database Server
Table 24-1: Option Groups Associated with MySQL Commands
Table 24-2: Numeric Data Types for Columns
Table 24-3: Time/Date Data Types for Columns
Table 24-4: String Data Types for Columns
Chapter 25: Making Servers Public with DNS
Table 25-1: Zones and Related Zone Files in DNS Example
Appendix C: Running Network Services
Table C-1: Quick Reference to Network Services