Books & Videos

Table of Contents

  1. Linux’s Place in a Windows Network

    1. Chapter 1 Linux’s Features

      1. Where Linux Fits in a Network
      2. Linux as a Server
      3. Linux on the Desktop
      4. Comparing Linux and Windows Features
      5. Summary
    2. Chapter 2 Linux Deployment Strategies

      1. Linux Server Options
      2. Linux Desktop Migration
      3. Linux and Thin Clients
      4. Summary
  2. Sharing Files and Printers

    1. Chapter 3 Basic Samba Configuration

      1. Installing Samba
      2. The Samba Configuration File Format
      3. Identifying the Server
      4. Setting Master Browser Options
      5. Setting Password Options
      6. Summary
    2. Chapter 4 File and Printer Shares

      1. Common File Share Options
      2. Printing with CUPS
      3. Creating a Printer Share
      4. Delivering Printer Drivers to Windows Clients
      5. Example Shares
      6. Summary
    3. Chapter 5 Managing a NetBIOS Network with Samba

      1. Enabling Domain Controller Functions
      2. Enabling NBNS Functions
      3. Assuming Master Browser Duties
      4. Summary
    4. Chapter 6 Linux as an SMB/CIFS Client

      1. Using NetBIOS Name Resolution
      2. Accessing File Shares
      3. Printing to Printer Shares
      4. Configuring GUI Workgroup Browsers
      5. Summary
  3. Centralized Authentication Tools

    1. Chapter 7 Using NT Domains for Linux Authentication

      1. The Principles Behind Winbind
      2. Samba Winbind Configuration
      3. PAM and NSS Winbind Options
      4. Winbind in Action
      5. Summary
    2. Chapter 8 Using LDAP

      1. The Principles Behind LDAP
      2. Configuring an OpenLDAP Server
      3. Creating a User Directory
      4. Configuring Linux to Use LDAP for Login Authentication
      5. Configuring Windows to Use LDAPfor Login Authentication
      6. Summary
    3. Chapter 9 Kerberos Configuration and Use

      1. Kerberos Fundamentals
      2. Linux Kerberos Server Configuration
      3. Kerberos Application Server Configuration
      4. Linux Kerberos Client Configuration
      5. Windows Kerberos Tools
      6. Summary
  4. Remote Login Tools

    1. Chapter 10 Remote Text-Mode Administration and Use

      1. What Can Text-Mode Logins Do?
      2. SSH Server Configuration
      3. Telnet Server Configuration
      4. Windows Remote-Login Tools
      5. Summary
    2. Chapter 11 Running GUI Programs Remotely

      1. What Can GUI Logins Do?
      2. Using Remote X Access
      3. Encrypting X by SSH Tunneling
      4. VNC Configuration and Use
      5. Running Windows Programs from Linux
      6. Summary
    3. Chapter 12 Linux Thin Client Configurations

      1. The Role of Thin Client Computing
      2. Hardware Requirements
      3. Linux as a Server for Thin Clients
      4. Linux as a Thin Client
      5. Summary
  5. Additional Server Programs

    1. Chapter 13 Configuring Mail Servers

      1. Linux Mail Server Options
      2. Configuring Sendmail
      3. Configuring Postfix
      4. Configuring POP and IMAP Servers
      5. Scanning for Spam, Worms, and Viruses
      6. Supplementing a Microsoft Exchange Server
      7. Using Fetchmail
      8. Summary
    2. Chapter 14 Network Backups

      1. Backup Strategies
      2. Backing Up the Linux System
      3. Backing Up with Samba
      4. Backing Up with AMANDA
      5. Summary
    3. Chapter 15 Managing a Network with Linux

      1. Delivering IP Addresses with DHCP
      2. Delivering Names with DNS
      3. Keeping Clocks Synchronized with NTP
      4. Summary
  6. Appendixes

    1. Appendix Configuring PAM

      1. PAM Principles
      2. The PAM Configuration File Format
      3. PAM Modules
      4. Sample PAM Configurations
      5. Summary
    2. Appendix Linux on the Desktop

      1. Linux Desktop Applications for All Occasions
      2. Configuring Applications and Environments
      3. Running Windows Programs in Linux
      4. File and Filesystem Compatibility
      5. Font Handling
      6. Summary
  1. Colophon