1 / 409
文档名称:

[UNIX].O'Reilly.-.Classic.Shell.Scripting.Feb.2005-DDU.pdf

格式:pdf   页数:409页
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

[UNIX].O'Reilly.-.Classic.Shell.Scripting.Feb.2005-DDU.pdf

上传人:kuo08092 2015/5/29 文件大小:0 KB

下载得到文件列表

[UNIX].O'Reilly.-.Classic.Shell.Scripting.Feb.2005-DDU.pdf

相关文档

文档介绍

文档介绍:Table of Contents
Preface .......................................................... 1
Who this book is for ................................................ 2
Versions ........................................................ 2
Organization ................................... ... ............... 3
Conventions used in this book ......................................... 4
Differences between the first edition and second edition ...................... 5
Comments and questions ............................................ 5
Hal's acknowledgments from the first edition .............................. 6
Acknowledgments for the second edition ................................. 6

1. Networking Fundamentals ......................................... 9
overview ............................ ................ 9
Physical and data link layers ...................................... 11
layer ................................................ 12
Transport layer ................................................ 18
The session and presentation layers ................................. 19

2. Introduction to Directory Services ................................... 24
Purpose of directory services ...................................... 24
Brief survey mon directory services ............................ 25
Name service switch ............................................ 29
Which directory service to use ..................................... 29

3. Network Information Service Operation .............................. 31
Masters, slaves, and clients ....................................... 31
Basics of NIS management ....................................... 34
Files managed under NIS ........................................ 41
Trace of a key match ............................................ 52

4. System Management Using NIS ..................................... 56
work design ....