Red Hat sealed and approved! Compiled by Red Hat’s own documentation team and reviewed by a Red Hat qualified technical expert, this comprehensive, authoritative guide delivers all the know-how you need to install, use, and customize the latest version of Red Hat Linux.
From identifying system requirements to configuring a network, this handbook provides the most specific user-focused information available. Detailed advice guides you through every option listed in the installation program. You’ll find an entire chapter devoted to the new OpenOffice.org office productivity applications as well as a chapter covering the improved graphical interface, which includes the new GNOME 2.0. Whether you’re a Red Hat Linux newcomer or a user upgrading from an older version, you’ll benefit from the technical advice and FAQs, too.
This guidebook is your single official source for documentation, instruction, and answers about Red Hat Linux 8.
An insider’s look into Red Hat Linux technology
- Select the most appropriate installation option for your need
- Solve problems that arise during installation and understand error messages
- Understand and configure the new Red Hat 8 desktop environment
- Discover how to add and update packages on your Red Hat system
- Get online with Mozilla and manipulate images using GIMP
- Configure a firewall to protect your data and privacy from hackers
- Explore package management with RPM
Axioms and Hulls (Lecture Notes in Computer Science)
A FEW YEARS AGO some students and I were looking at a map that pinpointed the
locations of about loo cities. We asked ourselves, "Which of these cities are neighbors
of each other?" We knew intuitively that some pairs of cities were neighbors and others
were not; we wanted to find a formal mathematical characterization that...
Fundamentals of Performance Technology, Second Edition Fundamentals of Performance Technology offers a brief overview of each major component of a Human Performance Technology Model that addresses diagnosing workplace situations, identifying causes, selecting appropriate interventions, implementing change, and evaluating results. The second edition contains two new appendices that describe the ISPI...
Geeks On Call Security and Privacy: 5-Minute Fixes Bringing order to the lawless frontier
Almost daily, the boomtown growth of online activity generates more opportunities for cybercrime, identity theft, loss of data, and invasion of your privacy. To this lawless high-tech frontier comes the cavalry, mounted on (or in) blue PT Cruisers—Geeks On Call. Now they're...
Microsoft Computer Dictionary, Fifth Edition
The Microsoft Computer Dictionary, Fifth Edition is designed to be a comprehensive and authoritative source of definitions for computer-related terms and abbreviations. The dictionary includes terms drawn from a wide variety of topics relevant to computer users, including software, hardware, networking, data...