Atjaunināt sīkdatņu piekrišanu

E-grāmata: Networking For Dummies

3.70/5 (212 ratings by Goodreads)
  • Formāts: PDF+DRM
  • Izdošanas datums: 14-Jul-2020
  • Izdevniecība: For Dummies
  • Valoda: eng
  • ISBN-13: 9781119748670
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 24,41 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 14-Jul-2020
  • Izdevniecība: For Dummies
  • Valoda: eng
  • ISBN-13: 9781119748670
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Set up a secure network at home or the office 

Fully revised to cover Windows 10 and Windows Server 2019, this new edition of the trusted Networking For Dummies helps both beginning network administrators and home users to set up and maintain a network. Updated coverage of broadband and wireless technologies, as well as storage and back-up procedures, ensures that you’ll learn how to build a wired or wireless network, secure and optimize it, troubleshoot problems, and much more. 

From connecting to the Internet and setting up a wireless network to solving networking problems and backing up your data—this #1 bestselling guide covers it all.

  • Build a wired or wireless network
  • Secure and optimize your network
  • Set up a server and manage Windows user accounts
  • Use the cloud—safely 

Written by a seasoned technology author—and jam-packed with tons of helpful step-by-step instructions—this is the book network administrators and everyday computer users will turn to again and again.

Introduction 1(4)
About This Book
1(1)
Foolish Assumptions
2(1)
Icons Used in This Book
3(1)
Beyond the Book
3(1)
Where to Go from Here
4(1)
PART 1 GETTING STARTED WITH NETWORKING
5(68)
Chapter 1 Lets Network!
7(14)
Defining a Network
8(3)
Why Bother with a Network?
11(2)
Sharing files
11(1)
Sharing resources
11(1)
Sharing programs
12(1)
Sharing messages
12(1)
Servers and Clients
13(1)
Dedicated Servers and Peers
13(2)
What Makes a Network Tick?
15(1)
It's Not a Personal Computer Anymore!
16(1)
The Network Administrator
17(1)
What Have They Got That You Don't Got?
18(3)
Chapter 2 Configuring Windows and Mac Clients
21(16)
Configuring Windows Network Connections
22(5)
Joining a Windows Computer to a Domain
27(2)
Configuring Mac Network Settings
29(4)
Joining a Mac Computer to a Domain
33(4)
Chapter 3 Life on the Network
37(20)
Distinguishing between Local Resources and Network Resources
38(1)
What's in a Name?
38(2)
Logging on to the Network
40(2)
Understanding Shared Folders
42(1)
Four Good Uses for a Shared Folder
43(2)
Store files that everybody needs
43(1)
Store your own files
44(1)
Make a temporary resting place for files on their way to other users
44(1)
Back up your local hard drive
45(1)
Oh, the Network Places You'll Go
45(2)
Mapping Network Drives
47(3)
Using a Network Printer
50(5)
Adding a network printer
51(1)
Printing to a network printer
52(1)
Playing with the print queue
53(2)
Logging off the Network
55(2)
Chapter 4 More Ways to Use Your Network
57(16)
Sharing Your Stuff
57(1)
Enabling File and Printer Sharing
58(1)
Sharing a Folder
59(2)
Using the Public Folder
61(1)
Sharing a Printer
62(2)
Using Microsoft Office on a Network
64(4)
Accessing network files
64(1)
Using workgroup templates
65(2)
Networking an Access database
67(1)
Working with Offline Files
68(5)
PART 2 DESIGNING YOUR NETWORK
73(92)
Chapter 5 Planning a Network
75(12)
Making a Network Plan
75(1)
Being Purposeful
76(1)
Taking Stock
77(3)
What you need to know
77(2)
Programs that gather information for you
79(1)
To Dedicate or Not to Dedicate: That Is the Question
80(3)
File servers
81(1)
Print servers
81(1)
Web servers
82(1)
Mail servers
82(1)
Database servers
83(1)
Application servers
83(1)
License servers
83(1)
Choosing a Server Operating System
83(1)
Planning the Infrastructure
84(1)
Drawing Diagrams
84(3)
Chapter 6 Dealing with TCP/IP
87(24)
Understanding Binary
88(2)
Counting by ones
88(1)
Doing the logic thing
89(1)
Introducing IP Addresses
90(1)
Networks and hosts
90(1)
The dotted-decimal dance
91(1)
Classifying IP Addresses
91(3)
Class A addresses
92(1)
Class B addresses
93(1)
Class C addresses
93(1)
Subletting
94(4)
Subnets
95(1)
Subnet masks
96(1)
The great subnet roundup
97(1)
Private and public addresses
98(1)
Understanding Network Address Translation
98(1)
Configuring Your Network for DHCP
99(5)
Understanding DHCP
100(1)
DHCP servers
100(1)
Understanding scopes
101(1)
Feeling excluded?
102(1)
Reservations suggested
103(1)
How long to lease?
104(1)
Managing a Windows Server 2019 DHCP Server
104(1)
Configuring a Windows DHCP Client
105(1)
Using DNS
106(3)
Domains and domain names
106(2)
Fully qualified domain names
108(1)
Working with the Windows DNS Server
109(1)
Configuring a Windows DNS Client
110(1)
Chapter 7 Oh, What a Tangled Web We Weave: Cables and Switches
111(22)
What Is Ethernet?
112(2)
All about Cable
114(12)
Cable categories
116(1)
What's with the pairs?
117(1)
To shield or not to shield
117(1)
When to use plenum cable
118(1)
Sometimes solid, sometimes stranded
118(1)
Installation guidelines
119(1)
The tools you need
120(1)
Pinouts for twisted-pair cables
121(1)
RJ-45 connectors
122(2)
Crossover cables
124(1)
Wall jacks and patch panels
124(2)
Understanding Switches
126(4)
Comparing managed and unmanaged switches
126(2)
Daisy-chaining switches
128(1)
Stacking switches
128(1)
Looking at distribution switches and access switches
129(1)
Powering Up with Power over Ethernet
130(1)
Looking at Three Types of Network Rooms
131(2)
Chapter 8 Setting Up a Wireless Network
133(22)
Diving into Wireless Networking
134(1)
A Little High School Electronics
135(4)
Waves and frequencies
135(2)
Wavelength and antennas
137(1)
Spectrums and the FCC
137(2)
Eight-Oh-Two-Dot-Eleventy Something: Understanding Wireless Standards
139(1)
Home on the Range
140(1)
Using Wireless Network Adapters
141(1)
Setting Wireless Access Points
142(2)
Infrastructure mode
142(1)
Multifunction WAPs
143(1)
Roaming Capabilities
144(1)
Wireless bridging
144(1)
Ad-hoc networks
145(1)
Configuring a Wireless Access Point
145(2)
Basic configuration options
146(1)
DHCP configuration
146(1)
Connecting to a Wireless Network
147(2)
Paying Attention to Wireless Network Security
149(6)
Chapter 9 Connecting to the Internet
155(10)
Connecting to the Internet
155(4)
Connecting with cable or DSL
156(1)
Connecting with high-speed private lines
157(1)
Sharing an Internet connection
158(1)
Securing Your Connection with a Firewall
159(4)
Using a firewall
159(2)
Comparing residential gateways to firewall routers
161(1)
Looking at the built-in Windows firewall
161(2)
Providing a Backup Internet Connection
163(2)
PART 3 WORKING WITH SERVERS
165(86)
Chapter 10 Virtualizing Your Network
167(28)
Understanding Virtualization
167(2)
Understanding Hypervisors
169(2)
Understanding Virtual Disks
171(2)
Understanding Network Virtualization
173(1)
Looking at the Benefits of Virtualization
174(2)
Choosing Virtualization Hosts
176(1)
Understanding Windows Server 2019 Licensing
176(2)
Introducing Hyper-V
178(2)
Understanding the Hyper-V hypervisor
178(1)
Understanding virtual disks
179(1)
Enabling Hyper-V
180(1)
Getting Familiar with Hyper-V
181(1)
Creating a Virtual Switch
182(2)
Creating a Virtual Disk
184(4)
Creating a Virtual Machine
188(4)
Installing an Operating System
192(3)
Chapter 11 Setting Up a Windows Server
195(18)
Planning a Windows Server Installation
196(2)
Checking system requirements
196(1)
Reading the release notes
196(1)
Considering your licensing options
196(1)
Deciding your TCP/IP configuration
197(1)
Choosing workgroups or domains
197(1)
Running Setup
198(5)
Adding Server Roles and Features
203(5)
Creating a New Domain
208(5)
Chapter 12 Managing Windows User Accounts
213(18)
Understanding How Active Directory Is Organized
214(2)
Objects
214(1)
Domains
215(1)
Organizational units
215(1)
Trees
216(1)
Forests
216(1)
Understanding Windows User Accounts
216(1)
Local accounts versus domain accounts
216(1)
User account properties
217(1)
Creating a New User
217(3)
Setting User Properties
220(5)
Changing the user's contact information
220(1)
Setting account options
221(2)
Specifying logon hours
223(1)
Restricting access to certain computers
223(1)
Setting the user's profile information
224(1)
Resetting User Passwords
225(1)
Disabling and Enabling User Accounts
226(1)
Deleting a User
226(1)
Working with Groups
227(3)
Creating a group
227(1)
Adding a member to a group
228(2)
Creating a Logon Script
230(1)
Chapter 13 Managing Network Storage
231(20)
Understanding Disk Storage
231(6)
Hard disk drives
231(3)
Solid state drives to the rescue!
234(1)
It's a RAID!
234(2)
Three ways to attach disks to your servers
236(1)
Focusing on File Servers
237(3)
Understanding permissions
237(2)
Understanding shares
239(1)
Managing Your File Server
240(11)
Using the New Share Wizard
241(4)
Sharing a folder without the wizard
245(2)
Granting permissions
247(4)
PART 4 MANAGING YOUR NETWORK
251(66)
Chapter 14 Welcome to Network Management
253(10)
What a Network Administrator Does
254(1)
Choosing the Part-Time Administrator
255(1)
The Three "Ups" of Network Management
256(1)
Managing Network Users
257(1)
Acquiring Software Tools for Network Administrators
258(1)
Building a Library
259(1)
Pursuing Certification
260(1)
Helpful Bluffs and Excuses
261(2)
Chapter 15 Supporting Your Users
263(18)
Establishing the Help Desk's Charter
264(1)
Tracking Support Tickets
265(2)
Deciding How to Communicate with Users
267(1)
Using Remote Assistance
268(7)
Enabling Remote Assistance
269(1)
Inviting someone to help you via a Remote Assistance session
270(3)
Responding to a Remote Assistance invitation
273(2)
Creating a Knowledge Base
275(1)
Creating a Self-Service Help Portal
275(1)
Using Satisfaction Surveys
276(2)
Tracking Help Desk Performance
278(1)
Using Help Desk Management Software
279(2)
Chapter 16 Using Group Policy
281(12)
Understanding Group Policy
281(1)
Enabling Group Policy Management on Windows Server 2019
282(1)
Creating Group Policy Objects
283(6)
Filtering Group Policy Objects
289(3)
Forcing Group Policy Updates
292(1)
Chapter 17 Managing Software Deployment
293(12)
Understanding Software Licenses
294(3)
Using a License Server
297(1)
Deploying Network Software
298(4)
Deploying software manually
298(1)
Running Setup from a network share
299(1)
Installing silently
300(1)
Creating an administrative installation image
301(1)
Pushing out software with Group Policy
302(1)
Keeping Software Up to Date
302(3)
Chapter 18 Managing Mobile Devices
305(12)
The Many Types of Mobile Devices
306(1)
Considering Security for Mobile Devices
307(1)
Managing iOS Devices
308(6)
Understanding the iPhone
308(1)
Understanding the iPad
309(1)
Integrating iOS devices with Exchange
309(2)
Configuring an iOS device for Exchange email
311(3)
Managing Android Devices
314(3)
Looking at the Android OS
314(1)
Perusing Android's core applications
315(1)
Integrating Android with Exchange
316(1)
PART 5 SECURING YOUR NETWORK
317(68)
Chapter 19 Welcome to Cybersecurity Network
319(18)
Do You Need Security?
320(1)
The Three Pillars of Cybersecurity
321(1)
Two Approaches to Security
322(1)
Physical Security: Locking Your Doors
323(1)
Securing User Accounts
324(4)
Obfuscating your usernames
324(1)
Using passwords wisely
325(1)
Generating passwords For Dummies
326(2)
Secure the Administrator account
328(1)
Managing User Security
328(6)
User accounts
329(1)
Built-in accounts
330(1)
User rights
331(1)
Permissions (who gets what)
331(1)
Group therapy
332(1)
User profiles
333(1)
Logon scripts
334(1)
Securing the Human Firewall
334(3)
Chapter 20 Hardening Your Network
337(12)
Firewalls
337(2)
The Many Types of Firewalls
339(4)
Packet filtering
339(2)
Stateful packet inspection (SPI)
341(1)
Circuit-level gateway
342(1)
Application gateway
342(1)
Next-generation firewall
343(1)
Virus Protection
343(3)
What is a virus?
343(2)
Antivirus programs
345(1)
Safe computing
346(1)
Patching Things Up
346(3)
Chapter 21 Securing Your Email
349(12)
Defining Spam
350(1)
Sampling the Many Flavors of Spam
351(1)
Using Antispam Software
352(1)
Understanding Spam Filters
353(3)
Looking at Three Types of Antispam Software
356(3)
On-premises antispam
356(1)
Antispam appliances
357(1)
Cloud-based antispam services
358(1)
Minimizing Spam
359(2)
Chapter 22 Backing Up Your Data
361(16)
3-2-1: The Golden Rule of Backups
361(2)
How Often Should You Back Up Your Data?
363(1)
Choosing Where to Back Up Your Data
364(1)
Establishing Two Key Backup Objectives
365(1)
Backing Up to Tape
366(1)
Understanding Backup Software
367(1)
Examining File-Based Backups
368(3)
Full backups
369(1)
Copy backups
370(1)
Incremental backups
370(1)
Differential backups
371(1)
Backup and Virtualization
371(2)
Verifying Tape Reliability
373(1)
Keeping Backup Equipment Clean and Reliable
374(1)
Setting Backup Security
375(2)
Chapter 23 Planning for Disaster
377(8)
Assessing Different Types of Disasters
378(3)
Environmental disasters
379(1)
Deliberate disasters
379(1)
Disruption of services
380(1)
Equipment failure
380(1)
Other disasters
381(1)
Analyzing the Impact of a Disaster
381(1)
Developing a Business Continuity Plan
382(1)
Holding a Fire Drill
383(2)
PART 6 MORE WAYS TO NETWORK
385(34)
Chapter 24 Accommodating Remote Users
387(12)
Using Outlook Web App
388(1)
Using a Virtual Private Network
389(4)
Looking at VPN security
390(1)
Understanding VPN servers and clients
391(2)
Connecting with Remote Desktop Connection
393(6)
Enabling Remote Desktop Connection
394(1)
Connecting remotely
395(2)
Using keyboard shortcuts for Remote Desktop
397(2)
Chapter 25 Life in Cloud City
399(10)
Introducing Cloud Computing
400(1)
Looking at the Benefits of Cloud Computing
401(1)
Detailing the Drawbacks of Cloud Computing
402(1)
Examining Three Basic Kinds of Cloud Services
403(2)
Applications
404(1)
Platforms
404(1)
Infrastructure
405(1)
Public Clouds versus Private Clouds
405(1)
Introducing Some of the Major Cloud Providers
406(2)
Amazon
406(1)
Google
407(1)
Microsoft
407(1)
Getting into the Cloud
408(1)
Chapter 26 Going Hybrid
409(10)
What Is a Hybrid Cloud?
409(2)
What Are the Benefits of Hybrid Cloud?
411(2)
Elasticity
411(1)
Flexibility
412(1)
Agility
412(1)
Innovation
412(1)
Operational efficiency
412(1)
Integrating Identity
413(3)
Azure Active Directory
413(1)
Single sign-on
414(2)
Looking at Hybrid Cloud Virtualization Platforms
416(3)
PART 7 THE PART OF TENS
419(22)
Chapter 27 Ten Networking Commandments
421(6)
I Thou Shalt Back Up Thy Data Religiously
421(1)
II Thou Shalt Protect Thy Network from Infidels
422(1)
III Thou Shalt Train Up Thy Users in the Ways of Safe Computing
422(1)
IV Thou Shalt Keepeth Thy Network Drive Pure and Cleanse It of Old Files
423(1)
V Thou Shalt Not Tinker with Thine Network Configuration unless Thou Knowest What Thou Art Doing
423(1)
VI Thou Shalt Not Covet Thy Neighbor's Network
423(1)
VII Thou Shalt Not Take Down Thy Network without Proper Notification
424(1)
VIII Thou Shalt Keep an Adequate Supply of Spare Parts
424(1)
IX Thou Shalt Not Steal Thy Neighbor's Program without a License
424(1)
X Thou Shalt Write Down Thy Network Configuration upon Tablets of Stone
425(2)
Chapter 28 Ten Big Network Mistakes
427(8)
Skimping on Hardware
427(1)
Turning Off or Restarting a Server Computer While Users Are Logged On
428(1)
Deleting Important Files on the Server
429(1)
Copying a File from the Server, Changing It, and Then Copying It Back
429(1)
Sending Something to the Printer Again Just Because It Didn't Print the First Time
430(1)
Assuming That the Server Is Safely Backed Up
430(1)
Connecting to the Internet without Considering Security Issues
430(1)
Plugging in a Wireless Access Point without Asking
431(1)
Thinking You Can't Work Just Because the Network Is Down
431(1)
Running Out of Space on a Server
432(1)
Always Blaming the Network
433(2)
Chapter 29 Ten Things You Should Keep in Your Closet
435(6)
Duct Tape
435(1)
Tools
436(1)
Patch Cables
436(1)
Cable Ties and Velcro
436(1)
Twinkies
437(1)
Replacement Parts
437(1)
Cheap Network Switches
438(1)
The Complete Documentation of the Network on Tablets of Stone
438(1)
The Network Manuals and Disks
438(1)
Ten Copies of This Book
439(2)
Index 441
Doug Lowe is the bestselling author of Networking For Dummies and Networking All-in-One Desk Reference For Dummies. His 50+ books include more than 30 in the For Dummies series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages.