nav atļauts
nav atļauts
Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).
Nepieciešamā programmatūra
Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)
Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)
Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.
Introduction 1
Book 1: Getting Started with Networking 5
Chapter 1: Welcome to Networking 7
Chapter 2: Network Infrastructure 23
Chapter 3: Switches, Routers, and VLANs 41
Chapter 4: Cybersecurity. 57
Chapter 5: Servers and Virtualization 69
Chapter 6: Cloud Computing 81
Book 2: Understanding Network Protocols 91
Chapter 1: Network Protocols and Standards 93
Chapter 2: TCP/IP and the Internet 115
Chapter 3: IP Addresses 123
Chapter 4: Routing 145
Chapter 5: Dhcp 155
Chapter 6: Dns 173
Chapter 7: TCP/IP Tools and Commands 207
Book 3: Planning a Network 231
Chapter 1: Local Area Networks 233
Chapter 2: Wide Area Networks 249
Chapter 3: Server Architecture 261
Chapter 4: Virtualization Architecture 271
Chapter 5: Storage Architecture 283
Chapter 6: Backup Architecture 295
Chapter 7: Hyperconverged Infrastructure 313
Book 4: Implementing a Network 325
Chapter 1: Network Hardware 327
Chapter 2: Wireless Networks 339
Chapter 3: Windows Clients 357
Chapter 4: Mac Networking 367
Chapter 5: Network Printers 377
Chapter 6: Virtual Private Networks 385
Book 5: Implementing Virtualization 391
Chapter 1: Hyper-V 393
Chapter 2: VMware 413
Chapter 3: Azure 425
Chapter 4: Amazon Web Services 441
Chapter 5: Desktop Virtualization 459
Book 6: Implementing Windows Server 2025 467
Chapter 1: Installing Windows Server 2025 469
Chapter 2: Configuring Windows Server 2025 487
Chapter 3: Configuring Active Directory 497
Chapter 4: Configuring User Accounts 507
Chapter 5: Configuring a File Server 529
Chapter 6: Using Group Policy 543
Chapter 7: Comandeering Windows Commands 555
Chapter 8: Using PowerShell 583
Book 7: Administering Microsoft 365 603
Chapter 1: Getting Started with Microsoft 365 Administration 605
Chapter 2: Configuring Exchange Online 625
Chapter 3: Administering Teams 641
Book 8: Implementing Linux 657
Chapter 1: Installing a Linux Server 659
Chapter 2: Linux Administration 673
Chapter 3: Basic Linux Network Configuration 705
Chapter 4: Running DHCP and DNS 717
Chapter 5: Linux Commands 725
Book 9: Managing a Network 755
Chapter 1: Welcome to Network Administration 757
Chapter 2: Managing Remotely 771
Chapter 3: Managing Network Assets 791
Chapter 4: Solving Network Problems 801
Book 10: Dealing with Cybersecurity 815
Chapter 1: Securing Your Users 817
Chapter 2: Managing Firewalls and Virus Protection 827
Chapter 3: Dealing with Spam 847
Chapter 4: Managing Disaster Recovery and Business Continuity Planning 861
Chapter 5: Planning for Cybersecurity Incident Response 869
Chapter 6: Penetration Testing 883
Index 895