دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: سیستم های عامل ویرایش: 1 نویسندگان: Christian Gross سری: Administrator's Advantage Series ISBN (شابک) : 9781584503477, 1584506628 ناشر: Charles River Media سال نشر: 2005 تعداد صفحات: 689 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 9 مگابایت
در صورت تبدیل فایل کتاب Open Source for Windows Administrators (Administrator's Advantage Series) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب منبع باز برای مدیران ویندوز (سری Advantage Administrator) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Contents......Page 6
About this Book......Page 16
The Origins of Open Source......Page 17
The Three Cs......Page 18
Should an Administrator Care About Open Source?......Page 19
Understanding the Open Source Licenses......Page 20
What Hardware and Software Should an Administrator Use?......Page 23
Understanding Open Source Packages......Page 24
Summary......Page 28
About this Chapter......Page 30
Filesystems......Page 31
Mounting a Device in a Directory......Page 32
Modern File Management in Windows......Page 34
Windows Shell and Environment......Page 35
Integration: Registry......Page 38
Project: Cygwin......Page 48
Additional Notes......Page 49
Impatient Installation......Page 51
Deployment: File Server Variant......Page 56
Deployment: Automated Installation of Cygwin......Page 58
Deployment: Tweaking the Environment......Page 62
Technique: Understanding Command-Line Applications......Page 66
Technique: Managing Files and Directories......Page 67
Technique: Running the Shell......Page 68
Technique: Getting Help Using man......Page 69
Technique: Editing Files with Vi (VIM)......Page 70
Technique: Writing BASH Scripts......Page 74
Technique: Using Regular Expressions......Page 104
Technique: Some Additional Commands......Page 109
Technique: Using awk to Process Data......Page 113
Summary......Page 123
About this Chapter......Page 124
Project: Python......Page 125
Impatient Installation......Page 127
Deployment: Simple Python Distribution......Page 129
Deployment: External Python Modules......Page 132
Technique: Learning the Python Shell......Page 146
Technique: Writing Python Code......Page 149
Technique: Interacting with the Environment......Page 166
Technique: Integrating with BASH Scripts......Page 178
Summary......Page 179
About this Chapter......Page 182
Managing a Windows Computer Security Policy......Page 183
Managing Updates......Page 187
Project: GNU Privacy Guard and Windows Privacy Tray......Page 196
Additional Notes......Page 199
Impatient Installation......Page 200
Deployment......Page 202
Technique: Trusting Content Using PKI......Page 206
Technique: Creating and Deleting Keys......Page 207
Technique: Encrypting and Decrypting Content......Page 213
Technique: Passing the Passphrase on the Console......Page 214
Technique: Signing Documents......Page 215
Technique: I Lost My Public or Private Key, Help!......Page 216
Technique: Using WinPT......Page 217
Deployment......Page 219
Technique: Adding Keys to the Key Server......Page 221
Technique: Deleting Keys from the Key Server......Page 222
Project: STunnel and OpenSSL......Page 223
Impatient Installation......Page 225
Deployment......Page 226
Technique: Generating a Server Certificate......Page 228
Technique: Signing a Certificate By a CA......Page 230
Technique: Becoming a Signing Authority......Page 232
Technique: Enabling SSL on a Non-SSL Enabled Application......Page 236
Technique: Redirecting a Port......Page 238
Technique: Port Redirection and Authentication......Page 239
Project: OpenVPN......Page 241
Deployment and Impatient Installation......Page 243
Technique: Installing OpenVPN as a Service......Page 244
Technique: Creating a Static Key......Page 245
Technique: Creating a Peer-to-Peer Network......Page 246
Technique: Setting Up a Network......Page 249
Technique: Using Certificates for Authentication......Page 258
Technique: Disabling a VPN User......Page 260
Summary......Page 262
About this Chapter......Page 264
Computer Startup and Shutdown Scripts......Page 265
Profile and Login Scripts......Page 267
Running Tasks Periodically......Page 270
Project: XYNTService......Page 276
Impatient Installation and Deployment......Page 277
Technique: Running a Console Program......Page 278
Technique: Restarting the Processes......Page 279
Technique: Restarting Services and XYNTService......Page 280
Project: VNC Server......Page 281
Additional Notes......Page 282
Impatient Installation......Page 283
Deployment......Page 284
Technique: Tweaking the Server......Page 287
Project: Unison......Page 290
Additional Notes......Page 292
Technique: Setting Up a Unison Server......Page 293
Technique: Running a Client Process......Page 294
Technique: How Unison Synchronizes......Page 296
Technique: Selectively Synchronizing Files and Paths......Page 298
Technique: Backing Up Original Versions of the Files......Page 300
Project: 7-Zip......Page 301
Additional Notes......Page 302
Deployment......Page 303
Technique: Expanding an Archive from the Console......Page 304
Technique: Creating and Updating an Archive from the Console......Page 305
Technique: Creating a Self-Extracting Archive......Page 306
Additional Notes......Page 308
Summary......Page 309
About this Chapter......Page 310
Project: OpenLDAP......Page 311
Impatient Installation......Page 313
Deployment: OpenLDAP Server......Page 317
Technique: Initializing the OpenLDAP security......Page 319
Technique: Structuring an LDAP Database......Page 321
Technique: Managing LDAP Database Content Using LDIF Files......Page 322
Technique: Manipulating LDAP Data in a Script......Page 334
Technique: Securing the LDAP Server......Page 336
Technique: Replicated Directory Service......Page 342
Technique: Some Common Configuration Tips......Page 345
Project: Samba......Page 347
Additional Notes......Page 350
Impatient Installation......Page 351
Deploying Samba......Page 362
Technique: Starting and Restarting Samba......Page 367
Technique: Guest File Sharing......Page 368
Technique: Sharing Files Using File-Based Security......Page 370
Technique: Managing a Closed Group Global Share......Page 380
Technique: Using Macros to Create Dynamic Shares......Page 381
Technique: Adding a Samba Server to an Existing Domain......Page 384
Technique: Resolving Network Servers Using WINS......Page 386
Technique: Defining a Primary Domain Controller (PDC)......Page 387
Summary......Page 390
Project: MySQL......Page 392
Additional Notes......Page 395
Impatient Installation......Page 396
Deployment: MySQL Server......Page 401
Technique: Managing the MySQL Service......Page 402
Technique: Using the MySQL Control Center......Page 412
Technique: Querying a Database......Page 418
Technique: Automating Queries Using Scripts......Page 419
Technique: Creating a Database......Page 421
Technique: Creating and Managing Tables......Page 423
Technique: Managing Users and Security......Page 437
Technique: Backing Up and Dumping a Database......Page 441
Technique: Replicating a Database......Page 445
Technique: Performance Tuning and Profiling......Page 452
Summary......Page 453
About this Chapter......Page 454
Project: Apache HTTPD......Page 455
Impatient Installation......Page 457
Deployment: Apache HTTPD Server and Modules......Page 461
Technique: Managing the Configuration File......Page 462
Technique: Stopping the Apache Process......Page 465
Technique: Multi-Processing Modules (MPM) Tuning......Page 466
Technique: Block Defined Configuration Files for Dynamic Configuration......Page 468
Technique: Defining URLs......Page 472
Technique: Running CGI Programs and Modules......Page 482
Technique: Logging Requests......Page 484
Technique: Virtual Hosting......Page 493
Technique: Serving Content in Multiple Languages and Formats......Page 498
Technique: Custom Error Pages......Page 502
Technique: Activating SSL......Page 503
Technique: Authentication......Page 508
Authenticating Using Passwords......Page 509
Technique: Providing a User Home Access......Page 517
Technique: User Tracking......Page 518
Technique: URL Rewriting......Page 519
Technique: Installing PHP......Page 524
Technique: Sharing Files Using WebDAV......Page 527
Summary......Page 531
About this Chapter......Page 532
An E-mail Strategy......Page 533
Project: XMail Server......Page 536
Impatient Installation and Deployment......Page 538
Technique: Controlling Relay......Page 545
Technique: Configuring the XMail Server Programmatically......Page 547
Technique: Adding a Domain......Page 549
Technique: Adding a User to a Domain......Page 552
Technique: Assigning User Filters and Properties......Page 556
Technique: Using Scripting and Local E-mails to Implement Autoresponders......Page 562
Technique: Managing Mailing Lists......Page 568
Technique: Routing and Managing Domains and Aliases......Page 571
Technique: Changing a Port, Logging Requests, Performance Tuning, and Controlling Relay......Page 573
Technique: Synchronizing with a POP3 Account......Page 575
Technique: Custom Authentication......Page 578
Understanding the Spam Problem......Page 580
Solution: ASSP......Page 581
Impatient Installation and Deployment......Page 583
Technique: Rebuilding a Spam Database......Page 584
Technique: Building a Ring of Trust......Page 585
Technique: Additional Processing Techniques to Determine Spam Level......Page 587
Technique: Managing Processed E-mails......Page 588
Technique: Managing and Allowing Relaying......Page 590
Technique: Adding, Deleting, and Modifying White Lists or Spam Databases......Page 591
Project: E-mailRelay......Page 593
Impatient Installation and Deployment......Page 594
Technique: Using E-mailRelay as a Proxy......Page 595
Technique: Assigning Logging, Port Definition, and Other Settings......Page 596
Technique: Using E-mailRelay as a Filter......Page 597
Technique: Using E-mailRelay for User Authentication......Page 598
Summary......Page 599
About this Chapter......Page 600
OpenOffice Issues......Page 601
Mozilla Issues......Page 603
Project: OpenOffice......Page 604
Impatient Installation......Page 606
Deployment......Page 607
Technique: Other Languages and Dictionaries......Page 609
Technique: Managing Document Templates......Page 616
Technique: Creating and Binding a Macro......Page 624
Technique: Analyzing the Document Structure......Page 631
Technique: Using Auto Pilots......Page 635
Technique: Writing Automation Scripts Using OpenOffice Basic or Python......Page 636
Technique: Creating Database Bindings in OpenOffice......Page 646
Project: Mozilla......Page 648
Deployment......Page 650
Technique: Relocating an Installation......Page 651
Technique: Managing Security Policies......Page 653
Technique: Managing Accounts and Folders......Page 655
Technique: Using the Spam Filters......Page 659
Technique: Installing and Managing Plug-ins such as Java or Flash......Page 662
Technique: Relocating User Profiles......Page 665
Technique: Using Profiles......Page 668
Summary......Page 669
Appendix A: About the DVD......Page 670
Appendix B: Open Source License......Page 674
A......Page 680
D......Page 681
F......Page 682
I......Page 683
M......Page 684
P......Page 685
R......Page 686
S......Page 687
V......Page 688
Z......Page 689