List Price: $29.99

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

So you've decided to find out about Linux. Who better to fill you in than PC Magazine? If you can imagine something you'd like your computer to do, you can probably do it with versatile, economical, powerful Linux. Here's how to tap that power, from installation to Linux desktop environments to getting things done. The accompanying CD-ROM gives you everything you need to get started, and with the dual boot option, you don't even have to give up the familiar comfort of Windows in order to try it out. What are you waiting for? If Linux is free, why is it sold? What's open source? Is Linux the same as Unix? What do abbreviations like GNU, GNOME, and KDE mean? Why are there so many versions of one operating system? Isn't Linux just for hackers and geeks? Find the answers here! A few of the things you'll learn The differences in the various Linux distributions and which is right for you How to install Linux, even if you've never installed an operating system All about the GNOME and KDE desktops How the unique Linux terminal works Ways to back up data, add and remove software, and manage your Internet connection Secrets of security for Linux systems The scoop on servers-Apache, Postfix, and Squid Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Author Biography

Joe Merlino is a freelance author and consultant who's been running Linux since 1997. He is the author or coauthor of half a dozen books on Linux and Unix, including StarOffice for Linux Bible.</p>

Table of Contents

Acknowledgments xx
Introduction xxi
Who This Book Is For xxii
How This Book Is Organized xxii
Part I: Before Installation xxii
Part II: During Installation xxiii
Part III: Running Linux xxiii
Part IV: Basic Administration xxiii
Part V: Server Solutions xxiii
What You Need to Use This Book xxiv
What's on the Companion CD-ROM xxiv
Where to Go from Here xxiv
Part I Before Installation
Why Use Linux?
3(10)
The Evolution of Linux
4(6)
The C language
4(1)
Unix goes public
5(1)
The GNU project
6(1)
Enter Linus
7(1)
The distributors
8(1)
The situation today
9(1)
What Makes Linux Different?
10(2)
Summary
12(1)
Which Distribution Is Right for You?
13(10)
Debian
13(1)
Fedora Core
14(1)
Knoppix
15(1)
Mandriva
16(1)
Puppy Linux
16(1)
Red Hat Enterprise Linux
17(1)
Slackware
17(1)
SUSE/Novell
18(1)
Ubuntu
19(1)
Xandros
19(1)
Yellow Dog
20(1)
Special-Purpose Distributions
21(1)
Standalone, Dual Boot, or Live CD?
21(1)
Summary
22(1)
Preparing for Installation
23(12)
Deciding on the Kind of Installation
23(4)
Choosing a server installation
24(1)
Choosing a personal desktop installation
25(1)
Choosing a workstation installation
26(1)
Choosing a custom installation
26(1)
Getting System Information
27(3)
What do you need to know?
27(2)
Sleuthing your system hardware from Windows
29(1)
Finding compatible hardware lists
29(1)
Backing Up Your Data
30(2)
Why back up your system?
30(1)
Gathering the installation and restore disks
31(1)
Making backups on Windows
31(1)
Summary
32(3)
Part II During Installation
Getting Linux and Starting to Install
35(10)
Getting Linux
35(4)
Download, buy, or acquire?
36(1)
Creating CDs from ISO files
37(1)
Creating ISO files for later burning
38(1)
Understanding the Boot Process
39(2)
Accessing the BIOS
40(1)
Setting the boot order
40(1)
Beginning the Installation
41(1)
Setting System Options
41(3)
Summary
44(1)
Partitioning Your Hard Drive
45(12)
Mount Points
46(2)
Physical media versus mount points
46(1)
Mounting and unmounting file systems
47(1)
Logical versus Physical Partitions
48(1)
How Much Space?
49(1)
What Is Swap Space?
50(1)
Automatic Partitioning Schemes
50(4)
Logical Volumes
54(1)
Summary
55(2)
Using Accounts
57(18)
Users, System Users, and Groups
57(6)
The user database: /etc/passwd
58(1)
Groups
59(1)
The group database: /etc/group
60(3)
The Superuser
63(1)
Administering Users and Groups Graphically
63(4)
Determining Your Account Information
67(1)
Switching Users with the su Command
68(1)
Passwords
69(4)
Changing your own password and account information
69(1)
Administering passwords and account information as root
70(1)
Group passwords
71(1)
Choosing good passwords
71(2)
Summary
73(2)
Setting Network Information
75(16)
Networking Fundamentals
75(3)
Routers and gateways
75(1)
Understanding IP addresses
76(1)
DNS settings
77(1)
Manual versus dynamic settings
77(1)
Connecting to the Internet
78(11)
Connecting to a local area network
78(5)
Direct Internet connections
83(3)
Dial-up connections
86(3)
Wireless connections
89(1)
You Can Always Do It Later
89(1)
Summary
89(2)
Dual-Boot Installation
91(22)
The Boot Process in Detail
91(1)
Linux and Windows Together
92(1)
Backing Up Your Windows Data
93(1)
Making Room for Linux
94(2)
Partitioning Your Hard Drive
96(6)
Installing Linux on the New Partition
102(5)
Selecting an Operating System at Boot Time
107(2)
Summary
109(4)
Part III Running Linux
Desktop Solutions
113(30)
The X Window System
113(1)
GNOME
114(11)
The GNOME desktop
114(8)
Using the Nautilus file manager and Web browser
122(2)
Window behavior
124(1)
Managing multiple workspaces
125(1)
KDE
125(11)
The Fedora Core KDE desktop
126(1)
KDE on Knoppix
127(8)
KDE window behavior
135(1)
Using Konqueror's file manager and Web browser
135(1)
GNOME and KDE Interoperability
136(1)
The Essential Applications
137(5)
OpenOffice.org
137(2)
Mozilla Firefox
139(2)
E-mail programs
141(1)
Summary
142(1)
Customizing GNOME and KDE
143(18)
Customizing GNOME
143(13)
Customizing your desktop background
145(2)
Desktop themes
147(6)
Customizing the panel
153(3)
Customizing KDE
156(4)
The KDE Control Center
156(4)
Summary
160(1)
Using the Terminal
161(22)
The Unix Shell
162(1)
Finding the Terminal
163(1)
Anatomy of a Command
164(5)
A simple example command
165(1)
Adding options
166(2)
Sources and destinations
168(1)
Some Common Useful Commands
169(2)
pwd
169(1)
cd
169(1)
Is
170(1)
cat
170(1)
less and more
171(1)
Advanced Command Writing
171(3)
Redirecting input and output
171(2)
Pipes
173(1)
A (Very) Brief Introduction to Shell Programming
174(7)
The magic word
175(1)
Comments
175(1)
A simple shell program
176(5)
Summary
181(2)
Internet Solutions in Linux
183(24)
Browsing the World Wide Web
183(6)
Running Firefox
184(2)
Configuring Firefox
186(3)
Using Electronic Mail
189(10)
E-mail setup
190(1)
Using Evolution
190(4)
Using Thunderbird
194(2)
Antispam features
196(1)
Encryption
197(2)
Instant Messaging
199(4)
Getting an account
199(1)
Configuring GAIM
200(1)
Using GAIM
201(2)
Summary
203(4)
Part IV Basic Administration
User and File Management Solutions
207(20)
Understanding User and Superuser
207(4)
The su command
208(1)
``Visual'' su
209(1)
sudo
210(1)
Switching groups
210(1)
Creating New User Accounts
211(4)
Using text mode
211(2)
Using graphical tools
213(2)
Creating and Assigning Users to Groups
215(3)
Creating groups
216(1)
Assigning users to groups
217(1)
Setting File Permissions
218(6)
A graphical look at permissions
219(2)
Checking permissions from the terminal
221(1)
Changing permissions
222(2)
Changing Ownership
224(1)
Changing user ownership
224(1)
Changing group ownership
224(1)
Changing ownership with graphical methods
224(1)
Setuid and Setgid Programs
225(1)
Summary
226(1)
Backing Up Data
227(22)
What Do You Need to Back Up?
227(3)
Routine backups
227(2)
Backup schedules
229(1)
Bare-metal recovery
229(1)
Backup Devices
230(2)
Tapes
230(1)
CD/DVD
231(1)
Zip/REV drives
231(1)
USB keys
231(1)
Another hard drive
231(1)
Compression
232(1)
Using the tar Command
232(5)
Creating tar archives
232(1)
Compressing the output
233(1)
Listing tar file contents
233(1)
Extracting files
234(1)
Deleting files from a tar archive
235(1)
Refreshing or replacing files in a tar archive
235(1)
Appending to tar files
236(1)
Changing media
236(1)
Controlling a Tape Drive with mt
237(1)
Putting It All Together
238(1)
KDat: A Graphical Tool for Tape Backups
239(4)
Performing a backup
241(1)
Verifying your backup
241(1)
Restoring files and folders
241(1)
Creating a backup profile
241(1)
Configuring user preferences
242(1)
Burning CDs and DVDs
243(2)
Commercial Backup and Recovery Packages
245(1)
Solutions for Common Backup Issues
246(2)
Undeleting files
246(1)
Backing up OpenOffice.org documents
246(1)
Copying an entire partition
247(1)
Backing up databases
248(1)
Summary
248(1)
Software Management Solutions
249(18)
RPM
249(11)
Acquiring the right software packages
250(1)
Installing and upgrading with RPM
251(2)
Verifying a package with RPM
253(1)
Querying a package with RPM
254(3)
Using YUM
257(3)
APT
260(5)
Setting up for APT
261(1)
Installing packages with APT
262(1)
Updating with APT
262(1)
Upgrading packages with APT
262(1)
Removing packages with APT
263(1)
Using a CD-ROM
263(1)
Querying packages with APT
264(1)
Summary
265(2)
Installing and Removing Hardware
267(20)
How Linux Handles Hardware
267(5)
Loading device drivers at boot time
269(1)
Accessing devices
270(1)
Finding new hardware dynamically with hotplugging
271(1)
Getting Information About Your Hardware Manually
272(12)
Locating, listing, and activating PCI devices
273(4)
Locating, listing, and activating USB devices
277(1)
Getting hardware information from the /proc and /sys file systems
278(6)
Getting Information from System Logs
284(2)
Summary
286(1)
Automation and Timed Execution
287(8)
Overview of Scheduling Options
287(1)
Using at
288(2)
Using at interactively
289(1)
Viewing the queue
289(1)
Canceling jobs
290(1)
Restricting access to at
290(1)
Using cron
290(3)
The crontab file
290(1)
Some tips for using cron effectively
291(1)
Other cron and crontab functions
292(1)
Controlling access to cron
293(1)
The batch Command
293(1)
Summary
293(2)
File Sharing Solutions
295(26)
Linux-to-Windows File Sharing
295(21)
Preparing to set up a SAMBA server
295(1)
Installing the software
296(1)
Configuring the SAMBA server
296(15)
Setting up the Windows clients
311(3)
Setting up Linux clients
314(2)
Setting up Macintosh clients
316(1)
Linux-to-Linux File Sharing
316(4)
Setting up an NFS server
316(3)
Setting up NFS clients
319(1)
Summary
320(1)
Adjusting Your Internet Settings
321(16)
Overview of the Linux TCP/IP System
321(3)
Networking from an Administrator's Perspective
324(3)
Lookup order in /etc/nsswitch.conf
325(1)
Name resolution in /etc/resolv.conf
326(1)
Using Graphical Network Managers
327(4)
Configuring Network Settings from the Command Line
331(4)
Using the ifconfig command
332(1)
Using the route command
333(2)
Summary
335(2)
Linux Security Solutions
337(28)
Security Threats
337(2)
Security Best Practices
339(15)
Secure physical access to the system
339(1)
Use a firewall
339(2)
Back up regularly
341(1)
Don't use the superuser account
342(1)
Don't make files executable
342(1)
Use permissions and ownership
342(1)
Log out or use a screensaver
342(1)
Use SSH rather than Telnet for remote access
342(1)
Prefer encrypted versions of other protocols
343(1)
Prefer open source software
344(1)
Install from source
344(1)
Keep up with patches and upgrades from your distribution
344(4)
Check for tampering with checksums
348(1)
Check for tampering with rpm
348(2)
Uninstall services you don't need
350(2)
Deactivate services you don't need but don't want to uninstall
352(1)
Deactivate inetd services you don't need
353(1)
Uninstall any other software you don't need
353(1)
Install a spam filter
353(1)
Hide your e-mail address
354(1)
Encrypt your files and protect your identity with GnuPG
354(1)
Trust but verify, or it's not paranoia if they're really out to get you
354(1)
Using GnuPG
354(7)
Creating a key
355(2)
The web of trust
357(1)
Revoking a key
358(1)
Uploading and downloading keys
359(1)
Digital signatures and encryption
359(1)
Signing keys
360(1)
Learning More About Security
361(1)
Summary
362(3)
Part V Server Solutions
Web Server Solutions
365(14)
Getting and Installing Apache
365(1)
Configuring Apache
366(10)
Configuration directives
367(5)
A sample configuration
372(4)
Tuning Apache's Performance
376(2)
Summary
378(1)
Mail Server Solutions
379(22)
How Electronic Mail Works
379(2)
Installing and Configuring Postfix
381(7)
Step 1: Install the software
381(1)
Step 2: Configure Postfix
382(4)
Step 3: Turn off Sendmail and turn on Postfix
386(1)
Step 4: Test Postfix
387(1)
The Dovecot Mail Delivery Agent
388(6)
Step 1: Install Dovecot
389(1)
Step 2: Configure Dovecot
389(2)
Step 3: Start and test the server
391(1)
Step 4: Configure Postfix and Dovecot to start at boot
392(2)
Serving Mail via the Web
394(3)
Dealing with Spam
397(1)
Summary
398(3)
Proxy Server Solutions
401(16)
Types of Proxy Servers
401(2)
Installing and Configuring Squid
403(8)
Configuring Squid to start at boot
411(1)
Configuring Squid Clients
411(3)
Configuring a Web browser
412(1)
Configuring general network settings
413(1)
Access Control with Squid
414(1)
Summary
415(2)
Index 417(32)
End-User License Agreement 449

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.