Beginning Fedora "X"
Hungry Minds Inc,U.S. (Verlag)
978-0-7645-6996-8 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
What is this book about? Beginning Fedora 2 teaches you everything you need to know in order to install, configure, use, and maintain Fedora. This book targeted primarily at readers who are using (or planning to use) the Fedora Linux operating system for the first time. It offers the simple, plain-speaking guidance you need as you begin to explore the vast potential of open source software.
The key features of the book include the following: * Installing Linux, especially how to prepare so that you don't get any nasty surprises halfway through * The basics of Linux, including a tour of the desktop interface and how to use user accounts, the Linux file system, hardware configuration, and managing your machine's resources * Configuring your Linux machine to connect to the Internet, or to a local area network, so that you can start to send and receive e-mails and use the Internet * Installing new packages, upgrading packages, and removing packages * Exploring the many applications to perform everyday tasks, such as web browsers, office applications, and MP3 players * Explaining how to use the shell, including combining commands into a script, defining the input to (and output from) a script, and how to build logical structures into scripts, get them to run in specific circumstances, and manage multiple tasks at the same time * A detailed explanation of the Linux file system, how to manage your files and directories, and how to use the shell to generate and manipulate the output from predefined or custom scripts * Configuring your Linux machine to provide services to other machines on a network, such as how to set your machine up as a FTP server, a Web server, a file server, a printer servers, a mail server, or a DHCP server * Administration topics, such as how to analyze system log files and use them to track down problems with the system, backups and archives, tarballs, and explore how to customize and recompile the Linux kernel * Using scripting, specifically Perl, to automate the common task of managing the log files * Securing your machine using a firewall New features include how to participate in the Fedora community, strategies for working in an unsupported environment, how to keep up with Core releases, and more!
Shishir Gundavaram is the Chief Technology Officer for MechanicNet Group, a company that specializes in providing CRM services for the automotive repair and maintenance industry. When he is not dealing with auto mechanics and broken-down cars, Shishir consults for a number of companies, designing architecture and providing technical expertise. He has more than a decade of experience in various aspects of software development and is considered an expert in wireless applications, distributed systems, electronic commerce, and Web backend architecture. He is also the author of various articles and books, including Professional Perl Development, CGI Programming on the World Wide Web, and Scripting Languages: Automating the Web, and he is regularly invited to speak at technical conferences around the world. Pancrazio "Ezio" de Mauro has been using Red Hat Linux since 1996. He is a Linux consultant specializing in system integration, mobile technologies, and training. He actively supports and advocates the use of free software. Ezio spends most of his free time traveling and backpacking. He welcomes comments and questions at his e-mail address, pdm@demauro.net. Mark Mamone, a Solutions Specialist working for Syntegra Ltd in the UK, has 16 years of experience in the IT industry ranging from Assembler to MS-DOS and now specializing in the development of enterprise and mobile systems using a variety of technologies, including Microsoft .NET, Java, and Linux. Kapil Sharma developed a keen interest in Linux and open source technology in the mid-1990s and has been working on various UNIX systems and Internet security technologies for more than 10 years. He is a postgraduate in Business Computing and has deployed many UNIX, High availability, Clustering, and Internet security projects. He is a Sun Certified System Administrator (SCSA) and Sun Certified Network Administrator (SCNA). Kapil is also actively involved in the open source community and has contributed many technical articles on system and network security. He enjoys working on new challenges in Internet security, Internet architecture design, and various UNIX flavors. He also fancies technical writing and thereby sharing his knowledge with the community. He maintains a consultancy company for providing UNIX and Internet security solutions, and a Web site with loads of security resources at www.linux4biz.net. Apart from his hectic technical life, Kapil also enjoys clubbing, music, and touring the world. He currently lives with his wife, Usha Sharma, in London, U.K., and can be contacted via e-mail at kapil@linux4biz.net. Deepak Thomas lives and works in the San Francisco Bay area. His interests include PHP, Linux, and J2EE technologies. He has coauthored and reviewed several books for Wrox in these areas. In their spare time Deepak and Ansu go bike riding along the many beautiful trails in their part of the country. Simon Whiting, a graduate of Clare College, University of Cambridge, is a Principal Consultant for AnIX Group Ltd and has been a Unix system administrator. He is an expert in Linux, storage area networks, and C, Perl, and Korn Shell programming. Sandip Bhattacharya is an independent technology consultant specializing in Open Source technologies. He is a Red Hat Certified Engineer (RHCE), holds degrees in engineering and management, and is the author of a number of books and articles on Open Source software. He currently runs Puroga Technologies, a small startup with a focus on helping businesses use the Open Source revolution to their advantage. He can be contacted at sandip@puroga.com. Sandip is an active participant in various Open Source communities in India, especially his local LUG, the Indian Linux Users Group, Delhi (ILUGD).
About the Authors. Introduction. What Is Fedora? Why Fedora? What Is Linux? Who Is Red Hat, Inc? Why Linux? Want to Participate? Who Is This Book For? What Is Covered in This Book? What You Need to Use This Book. Conventions. Tell Us What You Think. Errata. Chapter 1: Installing Fedora 2. Preparing for the Installation. The Installation. Chapter 2: Fedora 2 Basics. Finding Your Way Around the Desktop. The Filesystem. Managing the Hardware. Monitoring the System. Using Load Average to Measure CPU Usage. Configuring the Desktop. Managing Processes. Managing Services. Managing Users. Chapter 3: Connecting to the Internet. Connecting to the Internet. Connecting Securely. Managing Multiple ISPs and Connections. Software and Configuration. Chapter 4: Everyday Applications. Office Applications. Internet Applications. Personal Information Management. Multimedia Applications. System Utilities. Chapter 5: The Filesystem. What Is the Filesystem? File Search Utilities. Navigating the Filesystem. Managing Drives and Partitions. Filesystem Maintenance. Chapter 6: The Shell. The Shell as a Command Line Interface. Built-in Programs and External Programs. Some Common Shell Commands. Special Keys and Shortcuts. Command Line Syntax. Configuring the Shell. Managing Tasks. Shell Scripting. Chapter 7: Managing Your User Accounts. The Purpose of Different User Accounts. The User Manager. How Linux Stores User Account Information. Advanced User Account Management. Advanced Group Management. Users, Groups, and Filesystem Permissions. When root Is Not Necessary. Who Is Logged In? Chapter 8: Installing and Updating Software. What Is RPM? The RPM Command Line Tool. Building from Source. Keeping Systems Up-to-Date. Chapter 9: Building Networks. Networking. Setting Up a Web Server. Setting Up an FTP Server. Setting Up a Print Server. Setting Up a File Server. Setting Up a Mail Server. Setting Up a DHCP Server. Chapter 10: Security. What Is Computer Security? Countering the Threats. Encryption and Verification. Monitoring Security. Network Security. Security Enhanced Linux. Security Awareness. Where to Find Out More. Chapter 11: Advanced System Administration. System Configuration. Logging. Backing Up and Archiving. Building from Source. Chapter 12: Rebuilding the Linux Kernel. Why Rebuild the Kernel? Chapter 13: Managing Your System with Perl. What Is Perl? Installation. Installing Extensions. Learning Perl. And Finally ... Chapter 14: Contributing to the Fedora Project. Communicating with Users and Developers. Accessing the Source Code. Chapter 15: Where to Now? Online Resources and Licensing Schemes. System Administration Applications. Development Applications. Appendix: Answers to Exercises. Index.
Erscheint lt. Verlag | 23.7.2004 |
---|---|
Verlagsort | Foster City |
Sprache | englisch |
Maße | 187 x 233 mm |
Gewicht | 964 g |
Einbandart | Paperback |
Themenwelt | Informatik ► Betriebssysteme / Server ► Unix / Linux |
ISBN-10 | 0-7645-6996-1 / 0764569961 |
ISBN-13 | 978-0-7645-6996-8 / 9780764569968 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich