Red Hat Fedora Linux 2 All-In-One Desk Reference for Dummies
- This essential reference organizes material into a set of nine stand-alone, task-oriented minibooks that enable readers to understand all aspects of the Fedora OS, the latest release of the most popular Linux distribution
- Each minibook covers a different aspect of Fedora, such as getting users started with Fedora, the various workstations and applications, OpenOffice.org, networking, system administration, security, running Internet servers on a Fedora system, and programming
- More experienced readers can use this desktop reference to look up how to perform specific tasks, such as hooking up to the Internet, using a cable modem, or reading e-mail
- Includes the full Fedora Core distribution with source code on DVD and all of the CD content that comes with Fedora, saving readers hours of download time
Over the past 15 years, Naba has written over 25 computer books on a number of topics ranging from Windows programming with C++ to Linux. He has authored several bestselling titles, such as The Waite Group’s Turbo C++ Bible, Object-Oriented Programming in C++, X Window System Programming, Visual C++ Developer’s Guide, Borland C++ 4 Developer’s Guide, and Linux Secrets. His books have been translated into many languages, including Spanish, French, Polish, Greek, Italian, Chinese, Japanese, and Korean. Naba’s most recent book is Red Hat Linux 9 Professional Secrets, also published by Wiley.
Table of Contents
Book I: Fedora Basics.
Chapter 1: Introducing Fedora Core.
Chapter 2: Installing Fedora Core.
Chapter 3: Troubleshooting and Configuring Fedora Core.
Chapter 4: Trying Out Fedora Core.
Chapter 5: Cool Fedora Core Install Projects.
Book II: Workstations and Applications.
Chapter 1: Exploring the GUI Desktops.
Chapter 2: Learning the Shell.
Chapter 3: Navigating the Linux File System.
Chapter 4: Exploring Fedora Core Applications.
Chapter 5: Using Text Editors.
Book III: OpenOffice.org.
Chapter 1: Writing with OpenOffice.org Writer.
Chapter 2: Preparing Spreadsheets with OpenOffice.org Calc.
Chapter 3: Making Presentations with OpenOffice.org Impress.
Chapter 4: Drawing with OpenOffice.org Draw.
Book IV: Networking.
Chapter 1: Connecting to the Internet.
Chapter 2: Setting Up a Local Area Network.
Chapter 3: Adding a Wireless Ethernet LAN.
Chapter 4: Managing the Network.
Chapter 5: Cool Networking Projects.
Book V: Internet.
Chapter 1: Exchanging E-Mail and Instant Messages.
Chapter 2: Using the Web.
Chapter 3: Reading Newsgroups.
Chapter 4: Transferring Files with FTP.
Book VI: Administration.
Chapter 1: Performing Basic System Administration.
Chapter 2: Managing Users.
Chapter 3: Managing the File System.
Chapter 4: Managing Applications.
Chapter 5: Managing Devices and Printers.
Chapter 6: Upgrading and Customizing the Kernel.
Book VII: Security.
Chapter 1: Understanding Network and Host Security.
Chapter 2: Securing the Host.
Chapter 3: Securing the Network.
Chapter 4: Performing Security Audits.
Book VIII: Internet Servers.
Chapter 1: Managing the Servers.
Chapter 2: Running the Apache Web Server.
Chapter 3: Setting Up the FTP Server.
Chapter 4: Serving Up Mail and News.
Chapter 5: Setting Up DNS.
Chapter 6: Running Samba and NFS.
Book IX: Programming.
Chapter 1: Fedora Core Programming Essentials.
Chapter 2: Programming in C.
Chapter 3: Writing Shell Scripts.
Chapter 4: Programming in Perl.
Appendix: About the DVD.
Sign up now »
- FTTechnical Business AnalystNSW
- FTSenior Python DeveloperNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTLead Software EngineerSA
- FTR&D EngineerSA
- FTQuality ManagerSA
- FTFlash / ActionScript Developer - ContractNSW
- FTOS Web Applications DeveloperNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
According to the 2012 Verizon Data Breach Investigations report, 99% of breaches led to data compromise within “days” or less, whereas 85% of breaches took “weeks” or more to discover. ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- DHS warns employees that years-old database hole puts their privacy at risk
- Twitter's two-step authentication a good start, experts say
- U.S. urged to let companies 'hack-back' at IP cyber thieves
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- CITRIX SYNERGY ’13: Partners and customers main focus in mobile strategy, says Willis
- CITRIX SYNERGY ’13: Mobile is key to a digital worklife, says CEO (+12 photos)
- ASI brings LapCabby to Australia
- Two in three Australian tweens are on a social network: McAfee
- Huawei Australia 2012 revenue up 61 per cent to $368m
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes