Cover image for Linux complete : Linux Documentation Project
Linux complete : Linux Documentation Project
Taylor, Grant, 1973-
Personal Author:
Publication Information:
San Francisco, Calif. : SYBEX, [1999]

Physical Description:
xxxviii, 985 pages ; 22 cm
Title Subject:
Added Corporate Author:
Format :


Call Number
Material Type
Home Location
Item Holds
QA76.76.O63 T39 1999 Adult Non-Fiction Central Closed Stacks

On Order



Despite the recent economic crisis experienced globally, the luxury industry has continued to grow through a combination of marketing, repositioning and targeting new/emerging markets. This book, written by an experienced practitioner in the sector, examines how luxury has grown and what the future holds for it. The results of a recent study show that brands classed as luxury enjoy greater resistance in stagnant markets and are actually growing in emerging markets (such as China and India). This book examines the distinguishing features of a luxury brand and the positioning strategies of leading companies. It looks at the implications of environmental issues and how luxury companies are cleverly incorporating that into their brands. The book provides important management and marketing lessons for companies from all sectors.

Table of Contents

Introductionp. xxvii
Part I Getting Startedp. 1
Chapter 1 Introduction to Linuxp. 3
What Is Linux?p. 4
A Brief History of Linuxp. 4
System Featuresp. 7
Software Featuresp. 9
Copyright Issuesp. 21
The Design and Philosophy of Linuxp. 22
Differences between Linux and Other Operating Systemsp. 25
Hardware Requirementsp. 29
Sources of Linux Informationp. 34
Getting Help with Linuxp. 38
Chapter 2 Unix and Internet Fundamentalsp. 41
Introductionp. 42
Basic Anatomy of Your Computerp. 43
What Happens When You Switch on a Computer?p. 43
What Happens When You Run Programs from the Shell?p. 45
How Do Input Devices and Interrupts Work?p. 47
How Does My Computer Do Several Things at Once?p. 48
How Does My Computer Keep Processes from Stepping On Each Other?p. 49
How Does My Computer Store Things on Disk?p. 50
How Do Computer Languages Work?p. 53
How Does the Internet Work?p. 55
Chapter 3 Distributionsp. 61
What Are Distributions?p. 62
Red Hatp. 63
Debianp. 64
Special Purpose Distributionsp. 65
Chapter 4 Installing Linuxp. 67
Introductionp. 68
The Easiest Option: Buy, Don't Buildp. 69
Before You Beginp. 70
Installation Overviewp. 73
Installation in Detailp. 75
Booting Your New Systemp. 91
After Your First Bootp. 92
Terms of Usep. 94
Acknowledgementsp. 94
Part II Hardwarep. 95
Chapter 5 XFree86p. 97
Introductionp. 98
Hardware Requirementsp. 99
Installing XFree86p. 103
Configuring XFree86p. 105
Running XFree86p. 109
Terms of Usep. 110
Acknowledgementsp. 111
Translationsp. 111
Chapter 6 Printersp. 113
Introductionp. 114
How to Printp. 115
Kernel Printer Devicesp. 115
Supported Printersp. 118
Which Spooling Software?p. 124
How It Works: Basicp. 124
How to Set Up the Basicsp. 125
Getting Printing Softwarep. 127
Vendor Solutionsp. 128
Ghostscriptp. 129
How to Print to a Printer over the Networkp. 130
Windows-Only Printersp. 138
How to Print to a Fax Machinep. 139
How to Generate Something Worth Printingp. 139
On-Screen Previewing of Printable Thingsp. 142
Serial Printers under lpdp. 143
Creditsp. 145
Part III Networkingp. 147
Chapter 7 Networking Overviewp. 149
Introductionp. 150
What Is Linux?p. 150
What Makes Linux Different?p. 150
Networking Protocolsp. 151
Networking Hardware Supportedp. 154
File Sharing and Printingp. 155
Internet/Intranetp. 156
Remote Execution of Applicationsp. 161
Network Interconnectionp. 163
Network Managementp. 168
Enterprise Linux Networkingp. 169
Sources of Informationp. 171
Acknowledgements and Disclaimerp. 171
Chapter 8 Linux Networkingp. 173
Introductionp. 174
How to Use This HOWTO Document (NET-3-HOWTO howto?)p. 174
General Information About Linux Networkingp. 176
Generic Network Configuration Informationp. 181
IP-and Ethernet-Related Informationp. 213
Using Common PC Hardwarep. 230
Other Network Technologiesp. 250
Cables and Cablingp. 263
Glossary of Terms Used in This Documentp. 265
Linux for an ISP?p. 267
Administravap. 268
Chapter 9 PPPp. 271
Introductionp. 272
IP Numbersp. 275
Aims of This Documentp. 277
Software Versions Coveredp. 278
Other Useful/Important Documentsp. 279
Overview of What Has to Be Done to Get PPP Working as a Clientp. 281
Configuring Your Linux Kernelp. 286
Getting the Information You Need about the PPP Serverp. 290
Configuring Your Modem and Serial Portp. 291
Setting up Name to Address Resolution (DNS)p. 297
Using PPP and Root Privilegesp. 299
Setting up the PPP Connection Filesp. 300
If Your PPP Server Uses PAP (Password Authentication Protocol)p. 309
Setting up the PPP Connection Manuallyp. 313
Automating Your Connections--Creating the Connection Scriptsp. 316
Testing Your Connection Scriptp. 323
Shutting down the PPP Linkp. 326
Debuggingp. 326
Getting Help When Totally Stuckp. 330
Common Problems Once the Link Is Workingp. 330
Using Internet Services with Dynamic IP Numbersp. 332
Linking Two Networks Using PPPp. 334
After the Link Comes up--the /etc/ppp/ip-up Scriptp. 336
Using /etc/ppp/ip-downp. 340
Routing Issues on a LANp. 340
Setting up a PPP Serverp. 341
Using PPP Across a Null-Modem (Direct Serial) Connectionp. 345
Chapter 10 Cable Modemsp. 349
Introductionp. 350
Setting Up Your Ethernet Cardp. 351
Your ISPp. 352
Chapter 11 DHCPp. 369
Introductionp. 370
DHCPp. 372
Client Setupp. 372
DHCP Server Setupp. 382
Chapter 12 IP Masqueradingp. 387
Introductionp. 388
What Is IP Masquerade?p. 389
Setting Up IP Masqueradep. 395
Other IP Masquerade Issues and Software Supportp. 413
Frequently Asked Questionsp. 424
Miscellaneousp. 429
Part IV Securityp. 435
Chapter 13 Securityp. 437
Introductionp. 438
Overviewp. 439
Physical Securityp. 445
Local Securityp. 448
Files and Filesystem Securityp. 451
Password Security and Encryptionp. 458
Kernel Securityp. 467
Network Securityp. 472
Security Preparation (Before You Go Online)p. 482
What to Do During and After a Break-Inp. 485
Security Sourcesp. 489
Glossaryp. 491
Frequently Asked Questionsp. 493
Conclusionp. 495
Acknowledgementsp. 496
Chapter 14 IP Chainsp. 499
Introductionp. 500
Packet filtering basicsp. 501
I'm Confused! Routing, Masquerading, Portforwarding, ipautofw...p. 503
IP Firewalling Chainsp. 510
Miscellaneousp. 532
Common Problemsp. 537
Differences between ipchains and ipfwadmp. 539
Using the ipfwadm-wrapper-scriptp. 542
Thanksp. 542
Part V Linux on the Desktopp. 545
Chapter 15 GNOME User's Guidep. 547
Introducing GNOMEp. 548
GNOME Quick Startp. 549
Window Managers and GNOMEp. 552
Using the GNOME Panelp. 553
The GNOME Desktopp. 560
The GNOME File Managerp. 563
Configuring the Panelp. 578
Editing the Main Menup. 584
The GNOME Control Centerp. 587
A Word About Session Managementp. 604
Chapter 16 The K Desktop Environmentp. 609
About This Previewp. 610
Introductionp. 610
Installationp. 613
First Impressionsp. 620
Getting Startedp. 626
All About Your Desktopp. 632
Customizing KDE: The K Control Centerp. 639
Tips and Tricks for Your Daily Workp. 645
Frequently Asked Questions about KDEp. 647
Epiloguep. 649
Appendicesp. 653
Appendix A Command Referencep. 655
Appendix B Linux Reading Listp. 905
Appendix C The Linux HOWTO Indexp. 919
Appendix D GNU General Public Licensep. 945
Indexp. 953