Atjaunināt sīkdatņu piekrišanu

E-grāmata: Mike Meyers CompTIA Network+ Certification Passport, Fifth Edition (Exam N10-006)

4.62/5 (16 ratings by Goodreads)
  • Formāts: PDF+DRM
  • Izdošanas datums: 05-Nov-2015
  • Izdevniecība: McGraw-Hill Professional
  • Valoda: eng
  • ISBN-13: 9780071847971
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 31,56 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 05-Nov-2015
  • Izdevniecība: McGraw-Hill Professional
  • Valoda: eng
  • ISBN-13: 9780071847971
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Bestselling certification author and CompTIA training expert Mike Meyers updates hisCompTIA Network+ Certification Passport to give you concise, focused coverage of the new 2015 exam.

In Mike Meyers' CompTIA Network+ Certification Passport, Fifth Edition, the #1 name in professional certification provides you with an intensive focus only on what you need to know to pass CompTIA Network+ Exam N10-006, the latest exam release. The book is completely revised to cover the 2015 exam objectives. New topics include convergence (video and teleconferencing over networks); cloud and virtualization technologies; enhanced networking security concepts; and industry standards and best practices.

The Passport series provides an accelerated review and exam preparation for CompTIA Network+ candidates. In addition, Mike Meyers guides you on your career path, providing expert tips and sound advice along the way. Electronic content includes a test engine with two complete practice exams, Mike's favorite freeware and shareware networking tools, a video introduction to CompTIA Network+, and a PDF copy of the book.

  • A low-priced quick review, cram-style guide for CompTIA Network+--the leading vendor-neutral networking certification
  • CompTIA reviewed and approved: CAQC (CompTIA Authorized Quality Curriculum)
  • Electronic content includes Total Seminar's Total Tester exam simulator with 100+ practice exam questions, a new collection of Mike's favorite shareware and freeware networking tools and utilities, and a PDF copy of the book
  • Includes a 10% discount voucher coupon for any CompTIA exam, a $27 value
Acknowledgments xxvi
Check-In xxvii
1 Network Fundamentals 1(26)
Objective 1.01 Overview of How Networks Work
2(10)
Servers and Clients
4(2)
Network Components
6(6)
Ethernet
7(2)
Hubs and Switches
9(1)
Software
9(2)
Applications
11(1)
Connecting LANs
11(1)
Objective 1.02 The OSI Seven-Layer Model
12(7)
The Layers and What They Represent
12(7)
Layer 1: Physical Layer
13(1)
Layer 2: Data Link Layer
13(1)
Layer 3: Network Layer
14(1)
Layer 4: Transport Layer
15(3)
Layer 5: Session Layer
18(1)
Layer 6: Presentation Layer
18(1)
Layer 7: Application Layer
19(1)
Using the Seven-Layer Model
19(1)
Objective 1.03 The TCP/IP Model
19(8)
The Link Layer
20(1)
The Internet Layer
21(1)
The Transport Layer
21(1)
The Application Layer
21(1)
Checkpoint
22(1)
Review Questions
23(2)
Review Answers
25(2)
2 Network Media 27(38)
Objective 2.01 Coaxial Cabling
28(3)
Coaxial Cable Types
30(1)
Coaxial Connectors
30(1)
Objective 2.02 Twisted-Pair Cabling
31(7)
UTP Cable Types
32(2)
Variations in Core Wires and Sheath Materials
33(1)
UTP Connectors
34(1)
UTP Wiring Standards
35(3)
T568A and 1568B Wiring Standards
35(1)
Straight-through and Crossover Cables
36(2)
Rollover and Loopback
38(1)
Objective 2.03 Optical Fiber
38(6)
Optical Fiber Connectors
41(1)
Mechanical Connection Variations
41(1)
Uses for Fiber
42(1)
1905.1-2013
42(1)
Implementing Multiple Types of Ethernet
43(1)
Objective 2.04 Wireless Media Types
44(9)
802.11 Wireless Networks
44(1)
Wireless Basics
45(6)
BSSID, SSID, and ESSID
46(1)
Wireless Standards
47(2)
Wireless Frequency Ranges
49(2)
Bluetooth
51(2)
Objective 2.05 Structured Cabling
53(12)
Cross-connects, MDF, and IDF
55(1)
Cables
56(2)
Patch Panel
56(2)
Equipment Racks
58(1)
Power Issues
59(1)
Temperature Requirements
60(1)
Checkpoint
60(2)
Review Questions
62(2)
Review Answers
64(1)
3 Network Topologies and Ethernet Standards 65(18)
Objective 3.01 Network Topologies
66(4)
The Bus Topology
66(1)
The Star Topology
67(2)
The Ring Topology
69(1)
The Mesh Topology
69(1)
Point-to-Point and Point-to-Multipoint Topologies
70(1)
Objective 3.02 CSMA/CD and Ethernet Standards
70(8)
How Ethernet Works
71(1)
CSMA/CD
71(2)
Collisions
72(1)
Ethernet Standards
73(1)
Ethernet on the Bus
74(1)
10BaseT and 100BaseT
75(1)
Gigabit Ethernet
75(1)
10/100/1000BaseT Summary
76(1)
10 Gigabit Ethernet (10 GbE)
76(2)
Objective 3.03 CSMA/CA: The Wireless Equivalent to CSMA/CD
78(5)
Checkpoint
79(1)
Review Questions
80(1)
Review Answers
81(2)
4 Network Hardware 83(24)
Objective 4.01 Network Interfaces
84(5)
MAC Address
85(2)
Organizing the Data: Ethernet Frames
87(2)
Preamble
88(1)
Destination and Source MAC Addresses
88(1)
Type
88(1)
Data
89(1)
Frame Check Sequence
89(1)
Objective 4.02 Switched Ethernet
89(7)
The Trouble with Hubs
89(1)
Switches to the Rescue
90(2)
Managed Switches
92(2)
Multilayer Switches
94(1)
Spanning Tree Protocol
95(1)
Objective 4.03 Connecting Switches
96(4)
Uplink Ports
97(1)
Crossover Cables
98(1)
Port Bonding
99(1)
Objective 4.04 Routers
100(2)
Objective 4.05 Wireless Access Points
102(5)
Checkpoint
103(1)
Review Questions
104(1)
Review Answers
105(2)
5 TCP/IP 107(56)
Objective 5.01 The TCP/IP Protocol Suite
108(11)
Application Protocols
108(6)
Port Numbers
108(2)
Sockets
110(1)
List of Application Protocols
111(3)
Compound Application Protocols
114(1)
Transport Protocols
114(3)
TCP
114(2)
UDP
116(1)
Internet Protocols
117(2)
Internet Protocol (IP)
117(1)
Internet Control Message Protocol (ICMP)
118(1)
Objective 5.02 IPv4 Addressing
119(19)
IP Addresses
119(6)
IP Addresses in Action
125(11)
Network IDs
126(1)
Interconnecting
126(3)
Subnet Mask
129(7)
Class IDs
136(2)
Private versus Public IP Addresses
138(1)
Objective 5.03 CIDR and Subnetting
138(8)
Subnetting
139(6)
Calculating Hosts
141(1)
Your First Subnet
141(2)
Calculating Subnets
143(2)
VLSM
145(1)
Supernetting
146(1)
Objective 5.04 IPv6 Addressing
146(5)
IPv6 Addresses
147(1)
IPv6 Protocols
148(2)
ICMPv6
148(1)
DHCPv6
149(1)
EUI-64
149(1)
Tunnels
150(1)
6to4
150(1)
Teredo and Miredo
151(1)
Objective 5.05 DNS and DHCP
151(12)
DNS
151(3)
DHCP
154(4)
Living with DHCP
157(1)
Checkpoint
158(1)
Review Questions
159(2)
Review Answers
161(2)
6 Routing 163(36)
Objective 6.01 Routing Tables
166(9)
Freedom from Layer 2
174(1)
Objective 6.02 Network Address Translation and High Availability
175(8)
The Setup
176(1)
Port Address Translation
177(2)
Port Forwarding
179(1)
Configuring NAT
180(1)
High Availability
180(1)
VRRP and HSRP
181(1)
Routing DHCP
182(1)
Objective 6.03 Dynamic Routing
183(16)
Routing Metrics
184(1)
Distance Vector
185(5)
RIPv1
189(1)
RIPv2
189(1)
Link State
190(1)
OSPF
190(1)
IS-IS
191(1)
BAP
191(2)
Dynamic Routing Makes the Internet
193(2)
Route Redistribution
194(1)
Administrative Distance
194(1)
Checkpoint
195(1)
Review Questions
196(2)
Review Answers
198(1)
7 Virtualization 199(40)
Objective 7.01 Virtual LANs
200(8)
Trunking
201(1)
Configuring a VLAN-Capable Switch
202(1)
Tagging
203(3)
VLAN Trunking Protocol
206(1)
InterVLAN Routing
206(2)
Objective 7.02 Virtual Computing
208(6)
Meet the Hypervisor
209(2)
Why Do We Virtualize?
211(3)
Power Savings
211(1)
Hardware Consolidation
211(1)
System Recovery
211(1)
System Duplication
212(1)
Research
213(1)
Objective 7.03 Virtualization in Modern Networks
214(7)
Hypervisors
214(1)
Type 2 Hypervisors
215(1)
VMware Workstation
215(1)
VMware Player
215(1)
Parallels Desktop for Mac, Server for Mac, Workstation
215(1)
KVM
216(1)
Type 1/Bare-Metal Hypervisors
216(1)
ESXi
216(1)
Hyper-V
217(1)
Virtual Switches
217(2)
Virtual Routers and Firewalls
219(1)
Software-Defined Networking
220(1)
Objective 7.04 Virtual Private Networks
221(6)
PPTP VPNs
223(1)
L2TP VPNs
224(2)
SSL VPNs
226(1)
IPsec
227(1)
GRE
227(1)
Objective 7.05 SAN/NAS
227(2)
SAN
227(1)
Fibre Channel
228(1)
iSCSI
228(1)
NAS
228(1)
Objective 7.06 Cloud Computing
229(10)
Infrastructure as a Service
229(1)
Platform as a Service
230(2)
Software as a Service
232(1)
Public Cloud
232(1)
Private Cloud
233(1)
Community Cloud
233(1)
Hybrid Cloud
233(1)
Checkpoint
234(1)
Review Questions
235(2)
Review Answers
237(2)
8 Wide Area Networking 239(58)
Objective 8.01 Telephony and Beyond
240(22)
The Dawn of Long Distance
242(6)
Digital Telephony
248(2)
It All Starts with DSO
248(2)
Copper Carriers: T1 and T3
250(3)
Fiber Carriers: SONET/SDH and OC
253(2)
Packet Switching
255(5)
Frame Relay
256(1)
ATM
256(1)
MPLS
257(3)
Real-world WAN
260(1)
Alternative to Telephony WAN
261(1)
Objective 8.02 The Last Mile
262(19)
Dial-up
262(7)
Public Switched Telephone Network
263(4)
ISDN
267(2)
DSL
269(3)
SDSL
270(1)
ADSL
270(1)
VDSL
270(1)
DSL Features
271(1)
Installing DSL
271(1)
Broadband Cable
272(3)
Satellite
275(1)
Cellular WAN
276(4)
GSM/EDGE
278(1)
CDMA
278(1)
HSPA+
278(1)
WiMAX
279(1)
LTE
279(1)
Fiber
280(1)
Objective 8.03 Using Remote Access
281(16)
Dial-up to the Internet
282(1)
Private Dial-up
283(2)
Dedicated Connection
285(3)
DSL and Cable
287(1)
Cable Issues
287(1)
Remote Terminal
288(4)
VoIP
291(1)
Skype
292(1)
Streaming Media with RTSP
292(1)
Checkpoint
292(1)
Review Questions
293(2)
Review Answers
295(2)
9 Network Security 297(50)
Objective 9.01 Risk-Related Concepts
298(7)
First Responders
299(1)
Disaster Recovery
299(1)
Business Continuity
300(1)
Battery Backups/UPS
300(1)
End User Awareness and Training
300(1)
Adherence to Standards and Policies
301(1)
Single Point of Failure
301(1)
Critical Assets
301(1)
Critical Nodes
301(1)
Vulnerability Testing
302(1)
Penetration Testing
302(3)
Objective 9.02 Common Network Vulnerabilities and Threats
305(11)
Attacks/Threats
305(1)
Denial of Service
305(1)
ARP Cache Poisoning
306(1)
Packet/Protocol Abuse
307(1)
Spoofing
308(1)
Brute Force
309(1)
Man in the Middle
309(1)
Session Hijacking
309(1)
Social Engineering
309(1)
VLAN Hopping
310(1)
Compromised System
310(1)
Insider Threats/Malicious Employees
310(1)
Zero-Day Attacks
311(1)
Unnecessary Running Services/Open Ports
311(1)
Unpatched/Legacy Systems
311(1)
Unencrypted Channels
311(1)
Cleartext Credentials
312(1)
Unsecure Protocols
312(1)
TEMPEST/RF Emanation
313(1)
Wireless Threats
313(3)
Rogue Access Point
313(1)
Evil Twin
314(1)
War Driving/War Chalking
314(1)
Bluejacking/Bluesnarfing
314(1)
WEP/WPA/WAP2/VVPS Attacks
314(2)
Objective 9.03 Network Hardening Techniques
316(11)
Anti-malware Software
316(1)
Switch Port Security
317(1)
Dynamic ARP Inspection
317(1)
DHCP Snooping
317(1)
MAC Address Filtering
317(1)
VLAN Assignments
318(1)
Security Policies
318(1)
Acceptable Use Policy
318(1)
Network Policies
319(1)
Adherence to Policies
319(1)
Disable Unneeded Network Services
319(1)
Use Secure Protocols
319(2)
SSH
319(1)
SNMPv3
320(1)
SSL/TLS
320(1)
SFTP
320(1)
IPsec
321(1)
Wireless Security
321(1)
User Authentication
322(3)
Hashes
325(2)
EAP
326(1)
TACACS+
327(1)
802.1X
327(1)
Objective 9.04 Physical Security Controls
327(3)
Security Guards
328(1)
Mantraps
328(1)
Network Closets
329(1)
Video Monitoring
329(1)
Door Access Controls
329(1)
Proximity Readers
329(1)
Biometrics
330(1)
Keypad/Cipher Lock
330(1)
Objective 9.05 Firewalls
330(5)
Types of Firewalls
331(1)
Settings/Techniques
332(3)
Routed and Virtual Wire Firewalls
332(1)
Access Lists
332(1)
DMZ
333(2)
Objective 9.06 Network Access Control Models
335(3)
Posture Assessment
336(1)
Guest Network
336(1)
Quarantined Network
337(1)
Agents
337(1)
Objective 9.07 Basic Forensic Concepts
338(9)
First Responder
338(1)
Secure the Area
338(1)
Document the Scene
339(1)
Evidence/Data Collection
339(1)
Chain of Custody
339(1)
Data Transport
340(1)
Forensics Report
340(1)
Legal Hold and E-Discovery
340(1)
Checkpoint
341(2)
Review Questions
343(2)
Review Answers
345(2)
10 The Complete Network 347(28)
Objective 10.01 Designing and Building a Network
348(6)
Define the Network Needs
349(1)
Documentation
349(1)
Network Design
350(2)
Workstations
350(1)
Servers
351(1)
Equipment Room
351(1)
Peripherals
352(1)
Compatibility Issues
352(1)
Internal Connections
352(2)
Structured Cabling
353(1)
Wireless
353(1)
VLANs
353(1)
Network IP Address Scheme
353(1)
External Connections
354(1)
Objective 10.02 Unified Communication
354(7)
It Started with VoIP
355(1)
Unified Communication Features
355(1)
UC Network Components
356(1)
VTC and Medianets
357(1)
ISDN vs. IP/SIP
358(1)
QoS and Medianets
359(2)
Objective 10.03 Specialized Network Devices
361(3)
Intrusion Detection/Intrusion Prevention
361(2)
Proxies
363(1)
VPN Concentrator
364(1)
Objective 10.04 Industrial Control Systems (ICS)
364(11)
DCS
365(3)
PLC
368(1)
SCADA
368(2)
Remote Terminal Unit
369(1)
Segmentation and Industrial Control Systems
369(1)
Checkpoint
370(1)
Review Questions
371(2)
Review Answers
373(2)
11 Troubleshooting Networks 375(60)
Objective 11.01 Troubleshooting Methodology
376(7)
Identify the Problem
377(2)
Gather Information, Duplicate the Problem, Question Users, and Identify Symptoms
377(1)
Determine If Anything Has Changed
378(1)
Approach Multiple Problems Individually
379(1)
Establish a Theory of Probable Cause
379(1)
Test the Theory to Determine the Cause
380(1)
Establish a Plan of Action and Identify Potential Effects
381(1)
Implement the Solution or Escalate as Necessary
381(1)
Verify Full System Functionality and Implement Preventative Measures
382(1)
Document Findings, Actions, and Outcomes
383(1)
Objective 11.02 Troubleshooting Tools
383(15)
Software Tools
384(1)
ipconfig and ifconfig
384(2)
ping
384(2)
tracert
386(1)
pathping
387(1)
netstat
388(1)
nbtstat
389(1)
nslookup
390(1)
arp
391(1)
Looking Glass Sites
392(1)
Protocol Analyzer
392(1)
Wi-Fi Analyzer
392(1)
Speed-Test Sites
393(1)
Hardware Tools
393(1)
Line Testers
393(1)
Light Meter
393(1)
Tone Locators and Toner Probes
393(1)
Cable Testers
394(3)
Multimeters
397(1)
Certifiers
397(1)
Objective 11.03 Troubleshooting Wireless Issues
398(7)
Signal Loss
399(1)
Interference
399(1)
Overlapping Channels
399(1)
Mismatched Channels
400(1)
Device Saturation
400(1)
Bandwidth Saturation
400(1)
Untested Updates
400(1)
Wrong SSID
401(1)
Power Levels
401(1)
Open Networks
401(1)
Rogue Access Point
402(1)
Wrong Antenna Type
402(1)
Incompatibilities
402(1)
Wrong Encryption
403(1)
Bounce
403(1)
MIMO
403(1)
AP Placement
403(1)
Antenna Placement
403(1)
AP Configuration
404(1)
Thin Client/Thick Client/LWAPP
405(1)
Environmental Factors
405(1)
Objective 11.04 Troubleshooting Cable Issues
405(4)
Shorts/Opens
405(1)
Incorrect Termination
406(1)
Crosstalk
406(1)
EMI/RFI
406(1)
Distance Limitations
406(1)
Attenuation/dB Loss
407(1)
Bad Wiring/Bad Connector
407(1)
Split Pair
407(1)
TX/RX Reversed
407(1)
Incorrect VLAN Assignment
407(1)
Cable Placement
408(1)
SFP/GBIC Transceiver Problems—Cable Mismatch
408(1)
Wavelength Mismatch
408(1)
Connector Issues
408(1)
Bend Radius
409(1)
Distance Limitations
409(1)
Objective 11.05 Troubleshooting Network Issues
409(7)
Incorrect IP Configuration/Gateway
409(1)
Broadcast Storms
409(1)
Switching Loops
410(1)
Duplicate IP
410(1)
Speed/Duplex Mismatch
410(1)
End-To-End Connectivity
411(1)
Hardware Failure
411(1)
Misconfigured DHCP
412(1)
Misconfigured DNS
412(1)
Incorrect Interface/Interface Misconfiguration
412(1)
Interface Errors
412(1)
Simultaneous Wired/Wireless Connections
413(1)
Discovering Neighboring Devices/Nodes
414(1)
Power Failure/Power Anomalies
414(1)
MTU/MTU Black Hole
414(1)
Missing IP Routes
415(1)
NIC Teaming Misconfiguration
415(1)
Multicast vs. Broadcast
416(1)
Objective 11.06 Troubleshooting Security Issues
416(9)
Misconfigured Firewall
417(1)
Malware
417(2)
Virus
418(1)
Worm
418(1)
Macro
418(1)
Trojan Horse
418(1)
Rootkit
418(1)
Adware/Spyware
419(1)
Dealing with Malware
419(1)
DoS
419(1)
Unneeded Running Services
420(1)
ICMP-Related Issues
420(1)
Unpatched Firmware/OS
420(1)
Malicious Users
420(1)
Trusted and Untrusted Users
421(1)
Authentication Issues
421(2)
Default Settings, Passwords, Accounts, and Groups
421(1)
AAA
422(1)
ARP Issues
423(1)
Banner Grabbing/OUI
423(1)
Domain/Local Group Configurations
424(1)
Objective 11.07 Troubleshooting WAN Issues
425(10)
Loss of Internet Connectivity
425(1)
Interference
425(1)
Interface Errors
426(1)
DNS Issues
427(1)
Split Horizon
428(1)
Router Configurations
428(2)
Routing Protocols
428(1)
ACLs
429(1)
Missing Routes
429(1)
tracert/traceroute
429(1)
CSU/DSU
430(1)
Copper Line Drivers/Repeaters
430(1)
Company Security Policy
430(1)
Checkpoint
431(1)
Review Questions
432(1)
Review Answers
433(2)
12 Network Management 435(38)
Objective 12.01 Network Policies and Procedures
436(4)
Standard Business Documents
436(2)
Service Level Agreement
436(1)
Memorandum of Understanding
437(1)
Multi-source Agreement
437(1)
Statement of Work
437(1)
Electrical Safety
438(1)
Physical/Installation Safety
438(1)
Rack Installation and Maintenance
439(1)
Emergency Procedures
439(1)
HVAC
439(1)
Objective 12.02 Network Segmentation, Patching, and Updating
440(5)
Segmentation and Industrial Control Systems
441(1)
VLANs
441(1)
Legacy Systems
441(1)
Honeypots and Honeynets
441(2)
Patching and Updates
443(2)
Operating System Updates
443(1)
Feature Changes/Updates
443(1)
Major vs. Minor Updates
443(1)
Vulnerability Patch
444(1)
Upgrading vs. Downgrading
444(1)
How to Patch
444(1)
Objective 12.03 Wireless Configuration and Management
445(4)
Site Survey
445(2)
Power over Ethernet
447(1)
Bring Your Own Device
447(1)
SSID Broadcasting
447(1)
MIMO
448(1)
VLAN Pooling
448(1)
Wireless Bridges
448(1)
Objective 12.04 Network Monitoring
449(10)
Packet Analyzers
449(1)
Interface Monitors
450(2)
SNMP
452(1)
NetFlow
453(2)
Performance Monitors
455(1)
SIEM
455(1)
Power and Environmental Monitors
456(1)
Baselines
456(1)
Log Management
457(2)
Objective 12.05 Change and Configuration Management
459(8)
Change Request
459(1)
Type of Change
459(1)
Configuration Procedures
459(1)
Rollback Process
459(1)
Potential Impact
459(1)
Notification
459(1)
Dealing with the Change Management Team
460(1)
Making the Change Happen
460(1)
Documenting the Change
460(1)
Port Mirroring
461(1)
802.1X Configuration
461(1)
Checkpoint
462(1)
Review Questions
463(2)
Review Answers
465(2)
A Career Flight Path
467(2)
CompTIA Certifications
467(1)
Microsoft Certifications
467(1)
Cisco Certifications
468(1)
B About the CD-ROM
469(4)
Playing the Mike Meyers Introduction Video
469(1)
System Requirements
470(1)
Total Tester Exam Software
470(1)
Assessment Test
470(1)
TotalSims for Network+
470(1)
Mike's Video Training
471(1)
Mike's Cool Tools
471(1)
PDF Copy of the Book
471(1)
Technical Support
472(1)
Total Seminars Technical Support
472(1)
McGraw-Hill Education Content Support
472(1)
Index 473
Michael Meyers, MCP, CompTIA A+, CompTIA Network+, CompTIA Security+ (Houston, TX), is one of the industry's leading authorities on CompTIA certification. He is the president and founder and Total Seminars, LLC, a major provider of PC and network repair seminars for thousands of organizations including IBM, Lucent Technologies, GE, the FBI, the FAA and the United Nations. Mike is the best-selling author of the A+ Certification All-in-One Exam Guide.





Jonathan S. Weissman (Victor, NY) earned his masters degree in Computer and Information Science from Brooklyn College (CUNY), and holds nineteen industry certifications, including Cisco CCNA, CompTIA Security+, CompTIA i-Net+, CompTIA Network+, CompTIA A+, CompTIA Linux+, Novell CNE, Novell CNA, Microsoft Office Master, Microsoft MCAS Word, Microsoft MCAS PowerPoint, Microsoft MCAS Excel, Microsoft MCAS Access, Microsoft MCAS Outlook, and Microsoft MCAS Vista. Jonathan is a tenured Associate Professor of Computing Sciences at Finger Lakes Community College, in Canandaigua, NY, and also teaches graduate and undergraduate computer science courses at nearby Rochester Institute of Technology. In addition, Jonathan does computer, network, and security consulting for area businesses and individuals. Between FLCC and RIT, Jonathan has taught nearly two dozen different computer science courses, including networking, security, administration, forensics, programming, operating systems, hardware, and software. Students evaluating his teaching emphasize that he simplifies their understanding of difficult topics, while at the same time makes the class interesting and entertaining. Jonathan completely designed and configured FLCCs newest Networking & Security Lab. Serving as IT Program Coordinator, he rewrote FLCCs Information Technology course requirements for the degree, keeping it current with the changes in industry over the years.