Fotografía de autor

Sobre El Autor

Craig Zacker, is the author or co-author of dozens of books, manuals, articles, and web sites on computer and networking topics.

Obras de Craig Zacker

Tcp/Ip Administration (1998) 6 copias

Etiquetado

Conocimiento común

Género
male

Miembros

Reseñas

Indeholder "Contents at a Glance", "About This Book", " Intended Audience", " Prerequisites", " About the CD-ROM", " Features of This Book", " Part 1. Learn at Your Own Pace", " Part 2. Prepare for the Exam", " Informational Notes", " Notational Conventions", " Keyboard Conventions", " Getting Started", " Hardware Requirements", " Software Requirements", " Setup Instructions", " The Microsoft Certified Professional Program", " Certifications", " Requirements for Becoming a Microsoft Certified Professional", " Technical Support", " Evaluation Edition Software Support", "Part 1. Learn at Your Own Pace", " 1. Planning a Network Topology", " Why This Chapter Matters", " Before You Begin", " Lesson 1: Windows Server 2003 and the Network Infrastructure", " What is a Network Infrastructure?", " Planning a Network Infrastructure", " Implementing a Network Infrastructure", " Maintaining a Network Infrastructure", " Lesson Review", " Lesson Summary", " Lesson 2: Selecting Data-Link Layer Protocols", " Understanding the OSI Reference Model", " Selecting a Data-Link Layer Protocol", " Practice: Choosing an Ethernet Variant", " Lesson Review", " Lesson Summary", " Lesson 3: Selecting Network/Transport Layer Protocols", " Using TCP/IP", " Lesson Review", " Lesson Summary", " Lesson 4: Locating Network Resources", " Determining Location Criteria", " Locating", " Locating", " Locating", " Locating", " Locating", " Practice: Blueprinting a Network Infrastructure", " Lesson Review", " Lesson Summary", " Case Scenario Exercise", " Chapter Summary", " Exam Highlights", " Key Points", " Key Terms", " Questions and Answers", " 2. Planning a TCP/IP Network Infrastructure", " Why This Chapter Matters", " Before You Begin", " Lesson 1: Determining IP Addressing Requirements", " Using Public and Private Addresses", " Accessing the Internet from a Private Network", " Planning IP Addresses", " Practice: Using Registered and Unregistered IP Addresses", " Lesson Review", " Lesson Summary", " Lesson 2: Planning an IP Routing Solution", " Understanding IP Routing", " Creating LANs", " Creating WANs", " Using Routers", " Using Switches", " Combining Routing and Switching", " Practice: Designing an Internetwork", " Lesson Review", " Lesson Summary", " Lesson 3: Planning an IP Addressing and Subnetting Strategy", " Obtaining Network Addresses", " Understanding IP Address Classes", " Understanding Subnetting", " Subnetting Between Bytes", " Practice: Subnetting IP Addresses", " Lesson Review", " Lesson Summary", " Lesson 4: Assigning IP Addresses", " Manually Configuring TCP/IP Clients", " Installing a DHCP Server", " Understanding DHCP Allocation Methods", " Planning a DHCP Deployment", " Practice: Installing and Configuring the DHCP Service", " Lesson Review", " Lesson Summary", " Lesson 5: Troubleshooting TCP/IP Addressing", " Isolating TCP/IP Problems", " Troubleshooting Client Configuration Problems", " Troubleshooting DHCP Problems", " Lesson Review", " Lesson Summary", " Case Scenario Exercise", " Troubleshooting Lab", " Chapter Summary", " Exam Highlights", " Key Points", " Key Terms", " Questions and Answers", " 3. Planning Internet Connectivity", " Why This Chapter Matters", " Before You Begin", " Lesson 1: Planning an Internet Connectivity Infrastructure", " Determining Internet Connectivity Requirements", " Choosing an Internet Connection Type", " Practice: Understanding WAN Speeds", " Lesson Review", " Lesson Summary", " Lesson 2: Selecting Routers and ISPs", " Choosing a Router Type", " Choosing an ISP", " Practice: Configuring a Windows Server 2003 Router", " Lesson Review", " Lesson Summary", " Lesson 3: Securing and Regulating Internet Access", " Determining Internet Security Requirements", " Using NAT", " Using a Proxy Server", " Selecting an Internet Access Method", " Practice: Configuring a NAT Router", " Lesson Review", " Lesson Summary", " Lesson 4: Troubleshooting Internet Connectivity", " Determining the Scope of the Problem", " Diagnosing Client Configuration Problems", " Diagnosing NAT and Proxy Server Problems", " Diagnosing Internet Connection Problems", " Lesson Review", " Lesson Summary", " Case Scenario Exercise", " Troubleshooting Lab", " Chapter Summary", " Exam Highlights", " Key Points", " Key Terms", " Questions and Answers", " 4. Planning a Name Resolution Strategy", " Why This Chapter Matters", " Before You Begin", " Lesson 1: Determining Name Resolution Requirements", " What is Name Resolution?", " What Types of Names Need to Be Resolved?", " Using the DNS", " Determining DNS Requirements", " Using NetBIOS Names", " Using Local Host Name Resolution", " Practice: Specifying Name Resolution Requirements", " Lesson Review", " Lesson Summary", " Lesson 2: Designing a DNS Namespace", " Using an Existing Namespace", " Creating Internet Domains", " Creating Internal Domains", " Combining Internal and External Domains", " Creating an Internal Root", " Creating Host Names", " Practice: Designing a DNS Namespace", " Lesson Review", " Lesson Summary", " Lesson 3: Implementing a DNS Name Resolution Strategy", " How Many DNS Servers?", " Understanding DNS Server Types", " Creating Zones", " Practice: Understanding DNS Server Functions", " Practice: Creating a Zone", " Lesson Review", " Lesson Summary", " Lesson 4: Implementing a NetBIOS Name Resolution Strategy", " Practice: Installing a WINS Server", " Lesson Review", " Lesson Summary", " Lesson 5: Planning DNS Security", " Determining DNS Security Threats", " Securing DNS", " Practice: Understanding DNS Security Techniques", " Lesson Review", " Lesson Summary", " Lesson 6: Troubleshooting Name Resolution", " Troubleshooting Client Configuration Problems", " Troubleshooting DNS Server Problems", " Lesson Review", " Lesson Summary", " Case Scenario Exercise", " Troubleshooting Lab", " Chapter Summary", " Exam Highlights", " Key Points", " Key Terms", " Questions and Answers", " 5. Using Routing and Remote Access", " Why This Chapter Matters", " Before You Begin", " Lesson 1: Planning a Routing and Remote Access Strategy", " Choosing a WAN Topology", " Selecting a WAN Technology", " Lesson Review", " Lesson Summary", " Lesson 2: Static and Dynamic Routing", " Selecting Routers", " Using Static Routing", " Using Dynamic Routing", " Routing IP Multicast Traffic", " Practice: Installing RIP", " Lesson Review", " Lesson Summary", " Lesson 3: Securing Remote Access", " Determining Security Requirements", " Controlling Access Using Dial-In Properties", " Planning Authentication", " Using Remote Access Policies", " Practice: Installing a Routing and Remote Access Server", " Lesson Review", " Lesson Summary", " Lesson 4: Troubleshooting TCP/IP Routing", " Isolating Router Problems", " Troubleshooting the Routing and Remote Access Configuration", " Troubleshooting the Routing Table", " Lesson Review", " Lesson Summary", " Case Scenario Exercise", " Troubleshooting Lab", " Chapter Summary", " Exam Highlights", " Key Points", " Key Terms", " Questions and Answers", " 6. Maintaining Server Availability", " Why This Chapter Matters", " Before You Begin", " Lesson 1: Monitoring Network Traffic", " Using the Performance Console", " Analyzing Network Traffic with Network Monitor", " Practice: Using Network Monitor", " Lesson Review", " Lesson Summary", " Lesson 2: Monitoring Network Servers", " Monitoring Network Server Services", " Locating System Bottlenecks", " Practice: Establishing a Performance Baseline", " Lesson Review", " Lesson Summary", " Lesson 3: Planning a Backup Strategy", " Understanding Network Backups", " Creating a Backup Plan", " Performing Restores", " Using Volume Shadow Copy", " Practice: Using Windows Server 2003 Backup", " Lesson Review", " Lesson Summary", " Case Scenario Exercise", " Troubleshooting Lab", " Chapter Summary", " Exam Highlights", " Key Points", " Key Terms", " Questions and Answers", " 7. Clustering Servers", " Why This Chapter Matters", " Before You Begin", " Lesson 1: Understanding Clustering", " Clustering Types", " Designing a Clustering Solution", " Lesson Review", " Lesson Summary", " Lesson 2: Using Network Load Balancing", " Understanding Network Load Balancing", " Planning a Network Load Balancing Deployment", " Deploying a Network Load Balancing Cluster", " Monitoring Network Load Balancing", " Practice: Creating a Network Load Balancing Cluster", " Lesson Review", " Lesson Summary", " Lesson 3: Designing a Server Cluster", " Designing a Server Cluster Deployment", " Planning a Server Cluster Hardware Configuration", " Creating an Application Deployment Plan", " Selecting a Quorum Model", " Creating a Server Cluster", " Configuring Failover Policies", " Practice: Creating a Single Node Cluster", " Lesson Review", " Lesson Summary", " Case Scenario Exercise", " Troubleshooting Lab", " Chapter Summary", " Exam Highlights", " Key Points", " Key Terms", " Questions and Answers", " 8. Planning a Secure Baseline Installation", " Why This Chapter Matters", " Before You Begin", " Lesson 1: Selecting Computers and Operating Systems", " Understanding Computer Roles", " Creating Hardware Specifictions", " Selecting Operating Systems", " Lesson Review", " Lesson Summary", " Lesson 2: Planning a Security Framework", " High-Level Security Planning", " Creating a Security Design Team", " Mapping Out a Security Life Cycle", " Lesson Review", " Lesson Summary", " Lesson 3: Identifying Client and Server Default Security Settings", " Evaluating Security Settings", " Practice: Modifying Default Security Settings", " Lesson Review", " Lesson Summary", " Case Scenario Exercise", " Chapter Summary", " Exam Highlights", " Key Points", " Key Terms", " Questions and Answers", " 9. Hardening Servers", " Why This Chapter Matters", " Before You Begin", " Lesson 1: Creating a Baseline for Member Servers", " Creating a Baseline Policy", " Setting Audit Policies", " Setting Event Log Policies", " Configuring Services", " Configuring Security Options", " Practice: Creating a Group Policy Object", " Lesson Review", " Lesson Summary", " Lesson 2: Creating Role-Specific Server Configurations", " Securing Domain Controllers", " Securing Infrastructure Servers", " Securing File and Print Servers", " Securing Application Servers", " Practice: Modifying the GPO for the Domain Controllers Container's GPO", " Lesson Review", " Lesson Summary", " Lesson 3: Deploying Role-Specific GPOs", " Combining GPO Policies", " Practice: Deploying Multiple GPOs", " Lesson Review", " Lesson Summary", " Case Scenario Exercise", " Troubleshooting Lab", " Chapter Summary", " Exam Highlights", " Key Points", " Key Terms", " Questions and Answers", " 10. Deploying Security Configurations", " Why This Chapter Matters", " Before You Begin", " Lesson 1: Creating a Testing and Deployment Plan", " Creating a Testing Environment", " Creating a Pilot Deployment", " Creating a Pilot Deployment Plan", " Lesson Review", " Lesson Summary", " Lesson 2: Introducing Security Templates", " Understanding Security Templates", " Using the Security Templates Console", " Using the Supplied Security Templates", " Practice: Using the Security Templates Snap-In", " Lesson Review", " Lesson Summary", " Lesson 3: Deploying Security Templates", " Using Group Policies", " Using the Security Configuration And Analysis Tool", " Using Secedit.exe", " Practice: Using the Security Configuration And Analysis Snap-In", " Lesson Review", " Lesson Summary", " Case Scenario Exercise", " Troubleshooting Lab", " Chapter Summary", " Exam Highlights", " Key Points", " Key Terms", " Questions and Answers", " 11. Creating and Managing Digital Certificates", " Why This Chapter Matters", " Before You Begin", " Lesson 1: Introducing Certificates", " Introducing the Public Key Infrastructure", " Understanding PKI Functions", " Practice: Viewing a Certificate", " Lesson Review", " Lesson Summary", " Lesson 2: Designing a Public Key Infrastructure", " Defining Certificate Requirements", " Creating a CA Infrastructure", " Configuring Certificates", " Practice: Installing a Windows Server 2003 Certification Authority", " Lesson Review", " Lesson Summary", " Lesson 3: Managing Certificates", " Understanding Certificate Enrollment and Renewal", " Manually Requesting Certificates", " Revoking Certificates", " Practice: Requesting a Certificate", " Lesson Review", " Lesson Summary", " Case Scenario Exercise", " Troubleshooting Lab", " Chapter Summary", " Exam Highlights", " Key Points", " Key Terms", " Questions and Answers", " 12. Securing Network Communications Using IPSec", " Why This Chapter Matters", " Before You Begin", " Lesson 1: Securing Internetwork Communications", " Introducing Packet Filtering", " Packet Filtering Criteria", " Windows Server 2003 Packet Filtering", " Practice: Creating Packet Filters in Routing and Remote Access Service", " Lesson Review", " Lesson Summary", " Lesson 2: Planning an IPSec Implementation", " Evaluating Threats", " Introducing IPSec", " IPSec Protocols", " Transport Mode and Tunnel Mode", " Lesson Review", " Lesson Summary", " Lesson 3: Deploying IPSec", " IPSec Components", " Planning an IPSec Deployment", " Working with IPSec Policies", " Practice: Creating an IPSec Policy", " Lesson Review", " Lesson Summary", " Lesson 4: Troubleshooting Data Transmission Security", " Troubleshooting Policy Mismatches", " Examining IPSec Traffic", " Practice: Using Resultant Set of Policy", " Lesson Review", " Lesson Summary", " Case Scenario Exercise", " Troubleshooting Lab", " Chapter Summary", " Exam Highlights", " Key Points", " Key Terms", " Questions and Answers", " 13. Designing a Security Infrastructure", " Why This Chapter Matters", " Before You Begin", " Lesson 1: Planning a Security Update Infrastructure", " Understanding Software Update Practices", " Using Windows Update", " Updating a Network", " Practice: Using Microsoft Baseline Security Analyzer", " Lesson Review", " Lesson Summary", " Lesson 2: Securing a Wireless Network", " Understanding Wireless Networking Standards", " Wireless Networking Topologies", " Understanding Wireless Network Security", " Controlling Wireless Access Using Group Policies", " Authenticating Users", " Encrypting Wireless Traffic", " Lesson Review", " Lesson Summary", " Lesson 3: Providing Secure Network Administration", " Using Remote Assistance", " Using Remote Desktop", " Practice: Configuring Remote Assistance", " Lesson Review", " Lesson Summary", " Case Scenario Exercise", " Troubleshooting Lab", " Chapter Summary", " Exam Highlights", " Key Points", " Key Terms", " Questions and Answers", "Part 2. Prepare for the Exam", " 14. Planning and Implementing Server Roles and Server Security (1.0)", " Tested Skills and Suggested Practices", " Further Reading", " Configure Security for Servers That Are Assigned Specific Roles", " Objective 1.1 Questions", " Objective 1.1 Answers", " Plan a Secure Baseline Installation", " Objective 1.2 Questions", " Objective 1.2 Answers", " Plan Security for Servers That Are Assigned Specific Roles", " Objective 1.3 Questions", " Objective 1.3 Answers", " Evaluate and Select the Operating System to install on Computers in an Enterprise", " Objective 1.4 Questions", " Objective 1.4 Answers", " 15. Planning, Implementing, and Maintaining a Network Infrastructure (2.0)", " Tested Skills and Suggested Practices", " Further Reading", " Plan a TCP/IP Network Infrastructure Strategy", " Objective 2.1 Questions", " Objective 2.1 Answers", " Plan and Modify a Network Topology", " Objective 2.2 Questions", " Objective 2.2 Answers", " Plan an Internet Connectivity Strategy", " Objective 2.3 Questions", " Objective 2.3 Answers", " Plan Network Traffic Monitoring", " Objective 2.4 Questions", " Objective 2.4 Answers", " Troubleshoot Connectivity to the Internet", " Objective 2.5 Questions", " Objective 2.5 Answers", " Troubleshoot TCP/IP Addressing", " Objective 2.6 Questions", " Objective 2.6 Answers", " Plan a Host Name Resolution Strategy", " Objective 2.7 Questions", " Objective 2.7 Answers", " Plan a NetBIOS Name Resolution Strategy", " Objective 2.8 Questions", " Objective 2.8 Answers", " Troubleshoot Host Name Resolution", " Objective 2.9 Questions", " Objective 2.9 Answers", " 16. Planning, Implementing, and Maintaining Routing and Remote Access (3.0)", " Tested Skills and Suggested Practices", " Further Reading", " Plan a Routing Strategy", " Objective 3.1 Questions", " Objective 3.1 Answers", " Plan Security for Remote Access Users", " Objective 3.2 Questions", " Objective 3.2 Answers", " Implement Secure Access Between Private Networks", " Objective 3.3 Questions", " Objective 3.3 Answers", " Troubleshoot TCP/IP Routing", " Objective 3.4 Questions", " Objective 3.4 Answers", " 17. Planning, Implementing, and Maintaining Server Availability (4.0)", " Tested Skills and Suggested Practices", " Further Reading", " Plan Services for High Availability", " Objective 4.1 Questions", " Objective 4.1 Answers", " Identify System Bottlenecks", " Objective 4.2 Questions", " Objective 4.2 Answers", " Implement a Cluster Server", " Objective 4.3 Questions", " Objective 4.3 Answers", " Manage Network Load Balancing", " Objective 4.4 Questions", " Objective 4.4 Answers", " Plan a Backup and Recovery Strategy", " Objective 4.5 Questions", " Objective 4.5 Answers", " 18. Planning and Maintaining Network Security (5.0)", " Tested Skills and Suggested Practices", " Further Reading", " Configure Network Protocol Security", " Objective 5.1 Questions", " Objective 5.1 Answers", " Configure Security for Data Transmission", " Objective 5.2 Questions", " Objective 5.2 Answers", " Plan for Network Protocol Security", " Objective 5.3 Questions", " Objective 5.3 Answers", " Plan Secure Network Administration Methods", " Objective 5.4 Questions", " Objective 5.4 Answers", " Plan Security for Wireless Networks", " Objective 5.5 Questions", " Objective 5.5 Answers", " Plan Security for Data Transmission", " Objective 5.6 Questions", " Objective 5.6 Answers", " Troubleshoot Security for Data Transmission", " Objective 5.7 Questions", " Objective 5.7 Answers", " 19. Planning, Implementing, and Maintaining Security Infrastructure (6.0)", " Tested Skills and Suggested Practices", " Further Reading", " Configure Active Directory Directory Service for Certificate Publication", " Objective 6.1 Questions", " Objective 6.1 Answers", " Plan a Public Key Infrastructure (PKI) That Uses Certificate Services", " Objective 6.2 Questions", " Objective 6.2 Answers", " Plan a Framework for Planning and Implementing Security", " Objective 6.3 Questions", " Objective 6.3 Answers", " Plan a Security Update Infrastructure", " Objective 6.4 Questions", " Objective 6.4 Answers", "Practices", " Choosing an Ethernet Variant", " Blueprinting a Network Infrastructure", " Using Registered and Unregistered IP Addresses", " Designing an Internetwork", " Subnetting IP Addresses", " Installing and Configuring the DHCP Service", " Understanding WAN Speeds", " Configuring a Windows Server 2003 Router", " Configuring a NAT Router", " Specifying Name Resolution Requirements", " Designing a DNS Namespace", " Understanding DNS Server Functions", " Creating a Zone", " Installing a WINS Server", " Understanding DNS Security Techniques", " Installing RIP", " Installing a Routing and Remote Access Server", " Using Network Monitor", " Establishing a Performance Baseline", " Using Windows Server 2003 Backup", " Creating a Network Load Balancing Cluster", " Creating a Single Node Cluster", " Modifying Default Security Settings", " Creating a Group Policy Object", " Modifying the GPO for the Domain Controllers Containers GPO", " Deploying Multiple GPOs", " Using the Security Templates Snap-in", " Using the Security Configuration And Analysis Snap-in", " Viewing a Certificate", " Installing a Windows Server 2003 Certification Authority", " Requesting a Certificate", " Creating Packet Filters in Routing and Remote Access Service", " Creating an IPSec Policy", " Using Resultant Set of Policy", " Using Microsoft Baseline Security Analyzer", " Configuring Remote Assistance", "Tables", " Table 1-1: Ethernet Variants", " Table 2-1: IP Address Classes", " Table 6-1: Magnetic Tape Drive Types", " Table 7-1: NLB Configuration Advantages and Disadvantages", " Table 8-1: Windows Server 2003 Version", " Table 8-2: Default Windows File System Permissions for System Drive", " Table 9-1: Typical Member Server Service Assignments", " Table 11-1: Sample Certificate Plan", " Table 11-2: Advantages and Disadvantages of Internal and External CAs", " Table 12-1: Well-Known Port Numbers", " Table 12-2: Protocol Codes".

Jeg er vist ikke i målgruppen for at sætte mig ind i et kun nogenlunde ok operativsystem, så den her bliver sat ud igen.
… (más)
 
Denunciada
bnielsen | Apr 11, 2021 |

También Puede Gustarte

Estadísticas

Obras
42
Miembros
208
Popularidad
#106,482
Valoración
3.1
Reseñas
1
ISBNs
78
Idiomas
3

Tablas y Gráficos