Atjaunināt sīkdatņu piekrišanu

E-grāmata: Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks, Sixth Edition (Exam N10-008)

  • Formāts: PDF+DRM
  • Izdošanas datums: 25-Mar-2022
  • Izdevniecība: McGraw-Hill Education
  • Valoda: eng
  • ISBN-13: 9781264269044
  • Formāts - PDF+DRM
  • Cena: 93,77 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 25-Mar-2022
  • Izdevniecība: McGraw-Hill Education
  • Valoda: eng
  • ISBN-13: 9781264269044

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This fully updated four-color textbook is designed for classroom use and covers every topic on the latest version of the challenging CompTIA Network+ exam 

Written by Mike Meyers, the leading CompTIA certification and training expert, this full-color resource prepares students for the CompTIA Network+ exam and puts you on the path to becoming an expert networking professional. Thoroughly revised for the current version of the CompTIA Network+ exam, the book contains helpful on-the-job advice, hands-on examples, chapter summaries, key terms quizzes, review questions, lab projects, and hundreds of photographs and illustrations.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Sixth Edition (Exam N10-008) covers the latest concepts and technologies, including basic datacenter, cloud, and virtual networking concepts. Students will learn networking fundamentals and best practices, and networking fundamentals while following the path to becoming an effective networking professional. Special design elements throughout reinforce salient points while preparing you for exam day.

  • Contains 100% coverage of every objective for CompTIA Network+ exam N10-008
  • Online content includes 100 accurate practice questions, a self-assessment practice exam engine, videos and lab simulations from Mike Meyers, and on-the-job tools and utilities
  • Written by CompTIA certification and training guru Mike Meyers
  • Instructor materials and answer keys are available to adopting instructors through your McGraw Hill sales representative (answers are not printed in the book)


Preface xix
Introduction xx
Additional Resources For Teachers xxix
Chapter 1 Network Models 1(29)
Historical/Conceptual
1(1)
Working with Models
1(2)
Biography of a Model
2(1)
Network Models
2(1)
The OSI Seven-Layer Model on a Simple Network
3(1)
Welcome to MHTechEd!
4(1)
Test Specific
4(19)
Let's Get Physical-Network Hardware and Layers 1-2
4(10)
Beyond the Single Wire-Network Software and Layers 3-7
14(9)
The OSI Seven-Layer Model and Remote Work
23(3)
Review
26(4)
Chapter 2 Cabling and Topology 30(18)
Test Specific
31(12)
Network Topologies
31(3)
Bus and Ring
31(1)
Star
32(1)
Hybrid
32(1)
Mesh
33(1)
Parameters of a Topology
34(1)
Cabling and Connectors
34(8)
Copper Cabling and Connectors
35(4)
Fiber-Optic Cabling and Connectors
39(2)
Fire Ratings
41(1)
Networking Industry Standards-IEEE
42(1)
Review
43(5)
Chapter 3 Ethernet Basics 48(20)
Historical/Conceptual
49(1)
Ethernet
49(1)
802.3 Standards
49(1)
Test Specific
50(14)
Ethernet Frames
50(2)
Early Ethernet Standards
52(6)
Bus Ethernet
52(1)
10BASE-T
52(3)
10BASE-FL
55(1)
CSMA/CD
56(2)
Enhancing and Extending Ethernet Networks
58(11)
The Trouble with Hubs
58(1)
Switches to the Rescue
58(2)
Connecting Ethernet Segments
60(2)
Troubleshooting Switches
62(2)
Review
64(4)
Chapter 4 Ethernet Standards 68(18)
Test Specific
69(12)
100-Megabit Ethernet
69(3)
100BASE-T
69(1)
100BASE-FX
70(1)
100BASE-SX
71(1)
Full-Duplex Ethernet
71(1)
Gigabit Ethernet
72(3)
1000BASE-SX
73(1)
1000BASE-LX
73(1)
SFF Fiber Connectors
73(1)
Mechanical Connection Variations
74(1)
Implementing Multiple Types of Gigabit Ethernet
74(1)
Ethernet Evolutions
75(12)
10 Gigabit Ethernet
75(6)
Review
81(5)
Chapter 5 Installing a Physical Network 86(42)
Historical/Conceptual
87(2)
Understanding Structured Cabling
87(2)
Cable Basics-A Star Is Born
88(1)
Test Specific
89(33)
Structured Cable-Network Components
89(8)
Structured Cable-Beyond the Star
97(1)
Demarc
97(2)
Installing Structured Cabling
99(15)
Getting a Floor Plan
99(1)
Mapping the Runs
100(1)
Determining the Location of the Telecommunications Room
101(1)
Pulling Cable
102(2)
Making Connections
104(3)
Testing the Cable Runs
107(7)
NICs
114(3)
Buying NICs
114(2)
Link Lights
116(1)
Diagnostics and Repair of Physical Cabling
117(12)
Diagnosing Physical Problems
117(1)
Check Your Lights
117(1)
Check the NIC
118(1)
Cable Testing
118(1)
Problems in the Telecommunications Room
119(2)
Toners
121(1)
Review
122(6)
Chapter 6 TCP/IP Basics 128(44)
Historical/Conceptual
129(1)
Test Specific
129(38)
The TCP/IP Protocol Suite
129(18)
Network Layer Protocols
130(1)
Transport Layer Protocols
131(1)
Application Layer Protocols
132(1)
IP and Ethernet
133(2)
IP Addresses
135(5)
IP Addresses in Action
140(5)
Class IDs
145(2)
CIDR and Subnetting
147(6)
Subnetting
147(6)
CIDR: Key Takeaways
153(1)
IP Address Assignment
153(20)
Static IP Addressing
154(2)
Dynamic IP Addressing
156(10)
Special IP Addresses
166(1)
Review
167(5)
Chapter 7 Routing 172(40)
Historical/Conceptual
173(34)
How Routers Work
173(1)
Test Specific
174(12)
Routing Tables
174(7)
Freedom from Layer 2
181(1)
Network Address Translation
181(5)
Dynamic Routing
186(9)
Routing Metrics
186(1)
Distance Vector and Path Vector
187(6)
Link State
193(1)
EIGRP
194(1)
Dynamic Routing Makes the Internet
195(1)
Route Redistribution and Administrative Distance
195(1)
Working with Routers
195(18)
Connecting to Routers
196(5)
Basic Router Configuration
201(2)
Router Problems
203(4)
Review
207(5)
Chapter 8 TCP/IP Applications 212(30)
Historical/Conceptual
213(1)
Transport Layer and Network Layer Protocols
213(1)
How People Communicate
213(1)
Test Specific
214(20)
TCP
214(3)
UDP
214(1)
ICMP
215(1)
IGMP
216(1)
The Power of Port Numbers
217(6)
Registered Ports
219(2)
Connection Status
221(2)
Rules for Determining Good vs. Bad Communications
223(1)
Common TCP/IP Applications
223(11)
Telnet and SSH
224(1)
E-mail
225(4)
SQL
229(1)
FTP
230(1)
HTTP and HTTPS
231(3)
TCP/IP Applications Chart
234(1)
Beyond Network+
234(2)
Other Layer 7 Applications
234(2)
Review
236(6)
Chapter 9 Network Naming 242(28)
Historical/Conceptual
243(2)
Before DNS
243(2)
NetBIOS
243(1)
hosts
244(1)
Test Specific
245(21)
DNS
245(18)
How DNS Works
245(9)
Administering DNS Servers
254(7)
Troubleshooting DNS on Clients
261(2)
Diagnosing TCP/IP Network Issues
263(3)
Review
266(4)
Chapter 10 Securing TCP/IP 270(36)
Historical/Conceptual
271(29)
Making TCP/IP Secure
271(13)
Encryption
271(5)
Integrity
276(4)
Nonrepudiation
280(4)
Test Specific
284(1)
Authentication
284(1)
Authorization
284(1)
TCP/IP Security Standards
285(11)
User Authentication Standards
285(6)
Encryption Standards
291(3)
Combining Authentication and Encryption
294(2)
Secure TCP/IP Applications
296(11)
HTTPS
296(1)
Securing E-Mail Protocols
297(1)
SCP
297(1)
SFTP
297(1)
SNMP
298(1)
LDAP
299(1)
NTP
299(1)
Review
300(6)
Chapter 11 Switch Features 306(26)
Test Specific
307(19)
Switch Management
307(3)
Access Management
308(1)
Port Configuration
308(1)
Port Security
309(1)
Virtual LANs
310(6)
Trunking
311(1)
Configuring a VLAN-Capable Switch
311(1)
Assigning VLANs and Tagging
312(1)
VLAN Trunking Protocol
313(1)
Inter-VLAN Routing
314(1)
DHCP and VLANs
315(1)
Voice VLANs
315(1)
Private VLANs
316(1)
Troubleshooting VLANs
316(1)
Multilayer Switches
316(17)
Load Balancing
317(2)
QoS and Traffic Shaping
319(1)
Port Bonding
320(1)
Network Protection
320(6)
Review
326(6)
Chapter 12 IPv6 332(20)
Test Specific
333(15)
IPv6 Concepts
333(6)
IPv6 Addresses
333(5)
Neighbor Discovery
338(1)
IPv6 Implementations
339(6)
Stateless Address Autoconfiguration (SLAAC)
339(3)
Aggregation
342(3)
IPv6 and DNS
345(1)
Moving to IPv6
345(8)
IPv4 and IPv6
345(1)
Transition Mechanisms
346(2)
Review
348(4)
Chapter 13 WAN Connectivity 352(28)
Historical/Conceptual
353(1)
WAN Technologies
353(1)
SONET
353(1)
Test Specific
354(21)
Fiber Improvements
354(1)
Private WANs
354(3)
Last-Mile Technologies
357(7)
DSL
358(2)
Broadband Cable
360(1)
Satellite
361(1)
Fiber
361(1)
Cellular WAN
362(2)
Which Connection?
364(1)
Remote Access
364(8)
Remote Terminal
365(2)
Virtual Private Networks
367(5)
WAN Troubleshooting Scenarios
372(9)
Loss of Internet Connectivity
372(1)
Interface Errors
372(1)
DNS Issues
373(1)
Interference
373(2)
Review
375(5)
Chapter 14 Wireless Networking 380(46)
Historical/Conceptual
381(1)
Test Specific
381(39)
Wi-Fi Standards
381(19)
802.11
381(7)
802.11b
388(1)
802.11a
388(1)
802.11g
389(1)
802.11n
389(1)
802.11ac
390(1)
802.11ax
390(1)
WPS
391(1)
Wi-Fi Security
391(6)
Enterprise Wireless
397(3)
Implementing Wi-Fi
400(12)
Performing a Site Survey
400(2)
Installing the Client
402(1)
Setting Up an Ad Hoc Network
403(1)
Setting Up an Infrastructure Network
404(7)
Extending the Network
411(1)
Verifying the Installation
412(1)
Troubleshooting Wi-Fi
412(15)
No Connection
412(2)
Slow Connection
414(3)
Weird Connection
417(3)
Review
420(6)
Chapter 15 Virtualization and Cloud Computing 426(36)
Test Specific
427(29)
Virtualization and Cloud Computing Concepts
427(12)
Virtualization
427(5)
Cloud Computing
432(5)
Infrastructure as Code
437(2)
Virtual Networking
439(5)
Putting Network Virtualization and Cloud Computing to Work
444(19)
Setting Up Rocket.Chat in a Local Hypervisor
444(3)
Managing Cloud Resources
447(3)
Setting Up Rocket.Chat on IaaS
450(2)
Desktop as a Service
452(2)
Interconnecting Local and Cloud Resources
454(2)
Review
456(6)
Chapter 16 Data Centers 462(22)
Test Specific
463(15)
Classic Data Center Architecture and Design
463(5)
Tiers
464(1)
Traffic Flows
465(1)
Data Storage
466(2)
Where Is the Classic Data Center?
468(1)
The Modern Data Center
468(1)
Virtualization
468(1)
Software-Defined Networking
469(1)
Spine and Leaf
469(1)
High Availability in the Data Center
469(3)
Load Balancing
470(1)
Redundancy
470(1)
Facilities and Infrastructure Support
471(1)
Documenting the Data Center
472(13)
Network Diagrams
473(3)
Baseline Configurations
476(1)
Assessments
476(2)
Review
478(6)
Chapter 17 Integrating Network Devices 484(18)
Test Specific
485(13)
Internet of Things
485(4)
IoT Home Automation
486(1)
IoT Home Security
487(1)
IoT Communications Technologies
487(2)
Hardening IoT Devices
489(1)
Unified Communication
489(4)
It Started with VoIP
489(1)
Unified Communication Features
490(1)
VTC and Medianets
491(2)
UCaaS
493(1)
ICS
493(10)
DCS
494(2)
PLC
496(1)
SCADA
496(2)
Review
498(4)
Chapter 18 Network Operations 502(26)
Test Specific
503(20)
Risk Management
503(14)
Hardening and Security Policies
503(4)
Change Management
507(2)
Patching and Updates
509(1)
Training
510(1)
Common Agreements
511(1)
Security Preparedness
512(5)
Contingency Planning
517(12)
Incident Response
517(1)
Disaster Recovery
518(1)
Business Continuity
519(1)
Forensics
520(3)
Review
523(5)
Chapter 19 Protecting Your Network 528(48)
Test Specific
529(40)
Security Concepts
529(2)
CIA
529(1)
Zero Trust
530(1)
Defense in Depth
530(1)
Separation of Duties
531(1)
Network Threats
531(15)
Threat Terminology
532(1)
Spoofing
532(1)
Packet/Protocol Abuse
533(1)
Zero-Day Attacks
534(1)
Rogue Devices
534(1)
ARP Cache Poisoning
535(2)
Denial of Service
537(2)
On-Path Attack
539(1)
Session Hijacking
539(1)
Password Attacks
540(1)
Physical/Local Access
540(3)
Malware
543(2)
Social Engineering
545(1)
Common Vulnerabilities
546(3)
Unnecessary Running Services
547(1)
Unpatched/Legacy Systems
548(1)
Unencrypted Channels
548(1)
Cleartext Credentials
548(1)
RF Emanation
549(1)
Hardening Your Network
549(14)
Physical Security
549(4)
Network Security
553(6)
Device Hardening
559(1)
Host Security
560(3)
Firewalls
563(14)
Types of Firewalls
563(1)
Implementing and Configuring Firewalls
564(3)
Troubleshooting Firewalls
567(2)
Review
569(7)
Chapter 20 Network Monitoring 576(20)
Test Specific
577(15)
SNMP
577(2)
Monitoring Tools
579(8)
Packet Sniffers
580(1)
Protocol Analyzers
580(3)
Sensors
583(1)
Interface Monitors
584(1)
Performance Monitors
585(2)
Putting It All Together
587(10)
Scenario: Monitoring and Managing
587(4)
SIEM
591(1)
Review
592(4)
Chapter 21 Network Troubleshooting 596(42)
Test Specific
597(34)
Troubleshooting Tools
597(12)
Hardware Tools
597(3)
Software Tools
600(9)
The Troubleshooting Process
609(7)
Identify the Problem
610(2)
Establish a Theory of Probable Cause
612(1)
Test the Theory to Determine the Cause
613(1)
Establish a Plan of Action and Identify Potential Effects
614(1)
Implement the Solution or Escalate as Necessary
614(1)
Verify Full System Functionality and Implement Preventive Measures
615(1)
Document Findings, Actions, Outcomes, and Lessons Learned
615(1)
Resolving Common Network Service Issues
616(40)
"We Can't Access Our Web Server in Istanbul!"
616(1)
Network Troubleshooting Considerations
617(2)
Hands-On Problems
619(2)
Nearby Problems
621(6)
Far-flung Problems
627(2)
Network Performance Issues
629(1)
Troubleshooting Is Fun!
630(1)
Review
631(7)
Appendix A Exam Objective Map 638(17)
Exam N10-008
638(17)
Appendix B Create Your Study Plan 655(1)
Review Your Overall Score
655(1)
Review Your Score by CompTIA Network+ Exam Domain
655(1)
Appendix C About the Online Content 656(5)
System Requirements
656(1)
Your Total Seminars Training Hub Account
656(1)
Privacy Notice
657(1)
Single User License Terms and Conditions
657(1)
TotalTester Online
658(1)
Pre-Assessment
659(1)
Create Your Study Plan
659(1)
Playing the CompTIA Network+ Introduction Video
659(1)
Mike's CompTIA Network+ Video Training Sample
659(1)
TotalSims Sample for CompTIA Network+
659(1)
Mike's Cool Tools
660(1)
Technical Support
660(1)
Glossary 661(54)
Index 715
Michael Meyers, MCP, CompTIA A+, CompTIA Network+, CompTIA Security+ (Houston, TX), is one of the industry's leading authorities on CompTIA certification. He is the president and founder and Total Seminars, LLC, a major provider of PC and network repair seminars for thousands of organizations including IBM, Lucent Technologies, GE, the FBI, the FAA and the United Nations. Mike is the best-selling author of the A+ Certification All-in-One Exam Guide.





Scott Jernigan (Houston, TX) is Editor in Chief for Total Seminars. Jernigan holds a Master of Arts degree in Medieval History, and after leaving academics, Jernigan began a career in IT, working as an instructor, editor, and writer. Mr. Jernigan has edited and contributed to dozens of books on computer literacy, hardware, operating systems, networking, and certification. His is the author of Computer LiteracyYour Ticket to IC3 Certification, and is the co-author of the bestselling CompTIA A+ Certification All-in-One Exam Guide, and the Mike Meyers A+ Guide to Managing and Troubleshooting PCs textbook (both with Mike Meyers). He has taught computer classes all over the United States, including stints at the United Nations in New York and the FBI Academy in Quantico.