Atjaunināt sīkdatņu piekrišanu

Wiley Pathways Windows Network Administration, 1e with Project Manual Set [Mīkstie vāki]

  • Formāts: Paperback / softback, 931 pages, height x width x depth: 277x218x52 mm, weight: 1568 g
  • Izdošanas datums: 01-Mar-2007
  • Izdevniecība: John Wiley & Sons Inc
  • ISBN-10: 0470178035
  • ISBN-13: 9780470178034
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,85 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 931 pages, height x width x depth: 277x218x52 mm, weight: 1568 g
  • Izdošanas datums: 01-Mar-2007
  • Izdevniecība: John Wiley & Sons Inc
  • ISBN-10: 0470178035
  • ISBN-13: 9780470178034
Citas grāmatas par šo tēmu:
You can get there Where do you want to go? You might already be working in the information technology field and may be looking to expand your skills. You might be setting out on a new career path. Or, you might want to learn more about exciting opportunities in Windows network administration.



Wherever you want to go, Windows Network Administration will help you get there. Easy-to-read, practical, and up-to-date, this text not only helps you learn fundamental Windows network administration concepts, it also helps you master the core competencies and skills you need to succeed in the classroom and in the real world. The books brief, modular format and variety of built-in learning resources enable you to learn at your own pace and focus your studies.



With this book, you will be able to:









Understand networking from the ground up

Explore protocols and protocol suites, including TCP/IP, the most common protocol suite in use today

Implement and administer WINS, DNS, and DHCP

Troubleshoot name resolution and DHCP problems

Manage network access with group polices and permissions

Secure network communications with IPSec

Configure and troubleshoot routing and remote access

Master practical techniques you can use to fully support network users

Learn time-saving techniques and best practices that all administrators should know





Wiley Pathways helps you achieve your goals



Not every student is on the same path, but every student wants to succeed. The Information Technology series in the new Wiley Pathways imprint helps you achieve your goals. The books in this seriesIntroduction to Databases, Introduction to Programming Using Visual Basic, Introduction to Operating Systems, Networking Basics, Windows Network Administration, Network Security Fundamentals, and PC Hardware Essentialsoffer a coordinated information technology curriculum. Learn more at www.wiley.com/go/pathways
Understanding Networks
1(41)
Introduction
2(1)
The Importance of the OSI Model
2(12)
The OSI Model
2(1)
Understanding Protocol Stacks
3(1)
OSI Model Layers
3(9)
Communication Between Stacks
12(2)
Self-Check
14(1)
Understanding Network Protocols
14(8)
How Protocols Work
15(3)
Examining Common Protocol Suites
18(4)
Self-Check
22(1)
Network Components and Classifications
22(20)
Understanding Network Classifications
23(4)
Examining Network Media
27(3)
Examining Network Hardware
30(6)
Self-Check
36(1)
Summary
36(1)
Key Terms
37(1)
Summary Questions
38(2)
Applying This
Chapter
40(1)
You Try It
41(1)
The TCP/IP Suite
42(61)
Introduction
43(1)
Overview of TCP/IP
43(6)
Understanding the Internet
43(2)
TCP/IP Standards
45(2)
The TCP/IP Reference Model
47(2)
Self-Check
49(1)
Understanding IP Addressing
49(13)
Binary Numbering
49(3)
IP Addresses
52(9)
Self-Check
61(1)
Understanding Routing
62(6)
Understanding the Need for Routing
62(4)
Understanding Static Routing
66(1)
Understanding Dynamic Routing
67(1)
Self-Check
68(1)
TCP/IP Configuration
68(12)
Basic TCP/IP Configuration
68(5)
Advanced TCP/IP Configuration
73(5)
Configuring Bindings
78(2)
Self-Check
80(1)
Basic TCP/IP Troubleshooting
80(9)
Troubleshooting Methodology
80(2)
TCP/IP Troubleshooting Tools
82(6)
Self-Check
88(1)
Monitoring TCP/IP Traffic
89(14)
Understanding Network Monitor
89(1)
Using Network Monitor
90(5)
Self-Check
95(1)
Summary
95(1)
Key Terms
96(2)
Summary Questions
98(2)
Applying This
Chapter
100(2)
You Try It
102(1)
Implementing and Administering WINS
103(33)
Introduction
104(1)
Understanding NetBIOS Naming
104(5)
Understanding NetBIOS
104(1)
Browsing
105(1)
NetBIOS Name Resolution Methods
105(3)
Self-Check
108(1)
Understanding WINS
109(6)
How Wins Works
109(2)
Understanding WINS Replication
111(4)
Self-Check
115(1)
Configuring and Administering WINS
115(21)
Basic WINS Configuration
115(6)
Advanced WINS Configuration
121(5)
Monitoring and Administering WINS
126(4)
Self-Check
130(1)
Summary
130(1)
Key Terms
131(1)
Summary Questions
132(2)
Applying This
Chapter
134(1)
You Try It
135(1)
Implementing and Administering DNS
136(38)
Introduction
137(1)
Understanding DNS
137(12)
Understanding the Domain Name Space
138(2)
Understanding DNS Resolution
140(3)
Understanding the DNS Database
143(6)
Self-Check
149(1)
Configuring DNS
149(12)
Basic DNS Configuration
149(5)
Advanced DNS Configuration
154(7)
Self-Check
161(1)
Monitoring DNS
161(13)
Monitoring Events
161(3)
Using Debug Logs
164(2)
Self-Check
166(1)
Summary
166(1)
Key Terms
167(2)
Summary Questions
169(3)
Applying This
Chapter
172(1)
You Try It
173(1)
Troubleshooting Name Resolution
174(42)
Introduction
175(1)
Understanding Common Problems
175(6)
Common NetBIOS Name Resolution Problems
175(2)
Common DNS Resolution Problems
177(4)
Self-Check
181(1)
Troubleshooting using Command-Line Tools
181(9)
Using Ping, ipconfig, and nbstat
181(3)
Using nslookup
184(6)
Self-Check
190(1)
Troubleshooting using Protocol Analyzers
190(26)
Examining NetBIOS Name Resolution
191(6)
Examining DNS Name Resolution
197(13)
Self-Check
210(1)
Summary
210(1)
Key Terms
211(1)
Summary Questions
212(2)
Applying This
Chapter
214(1)
You Try It
215(1)
Implementing and Administering DHCP
216(35)
Introduction
217(1)
Understanding DHCP
217(9)
DHCP Overview
217(1)
How DHCP Works
218(7)
Self-Check
225(1)
Configuring and Adminitering DHCP
226(14)
Understanding DHCP Scopes
226(2)
Installing DHCP
228(1)
Basic DHCP Configuration
229(11)
Self-Check
240(1)
Advanced DHPC Configuration and Management
240(11)
DDNS Integration
240(3)
Building a Redundant DHCP Infrastructure
243(1)
Self-Check
244(1)
Summary
244(1)
Key Terms
245(1)
Summary Questions
246(3)
Applying This
Chapter
249(1)
You Try It
250(1)
Troubleshooting DHCP
251(25)
Introduction
252(1)
Understanding Common DHCP Problems
252(5)
DHCP Server Configuration Problems
252(2)
DHCP Router Configuration Problems
254(3)
Self-Check
257(1)
Advanced DHCP Monitoring, Management, and Troubleshooting
257(19)
DHCP Monitoring
258(4)
Advanced DHCP Management
262(1)
Using Protocol Analyzers to Troubleshoot DHCP
263(7)
Self-Check
270(1)
Summary
270(1)
Key Terms
271(1)
Summary Questions
272(2)
Applying This
Chapter
274(1)
You Try It
275(1)
Managing Security
276(55)
Introduction
277(1)
Understanding Users and Groups
277(5)
Overview of Active Directory
277(3)
Understanding Users and Groups
280(2)
Self-Check
282(1)
Administering Users and Groups
282(24)
Administering User Accounts
282(17)
Administering Groups
299(7)
Self-Check
306(1)
Understanding and Administering Security Settings
306(25)
Overview of Group Policy
307(2)
Understanding and Administering Local Computer Policy
309(5)
Understanding and Administering the Local Computer's System Policies
314(7)
Self-Check
321(1)
Summary
322(2)
Key Terms
324(2)
Summary Questions
326(2)
Applying This
Chapter
328(2)
You Try It
330(1)
Managing Permissions
331(25)
Introduction
332(1)
Understanding Permissions and Shares
332(6)
Understanding NTFS Permissions
332(3)
Understanding Shares and Share Permissions
335(3)
Self-Check
338(1)
Administering Permissions and Shares
338(18)
Administering Permissions
338(6)
Administering Shares
344(5)
Self-Check
349(1)
Summary
349(2)
Key Terms
351(1)
Summary Questions
352(2)
Applying This
Chapter
354(1)
You Try It
355(1)
Administering Routing and Remote Access
356(51)
Introduction
357(1)
RRAS Overview
357(10)
Understanding Dial-Up Networking
357(5)
Understanding Virtual Private Networking
362(5)
Self-Check
367(1)
Configuring Routing
367(13)
Enabling RRAS
368(1)
Configuring IP Routing
369(11)
Self-Check
380(1)
Configuring Remote Access
380(8)
General Configuration of the Remote Access Server
380(4)
Configuring VPN Access
384(4)
Self-Check
388(1)
Remote Access Security
388(19)
Configuring User Access
388(2)
Understanding Remote Access Policies
390(1)
Configuring Remote Access Policies
391(8)
Self-Check
399(1)
Summary
399(2)
Key Terms
401(1)
Summary Questions
402(2)
Applying This
Chapter
404(2)
You Try It
406(1)
Monitoring and Troubleshooting RRAS
407(17)
Introduction
408(1)
Monitoring RRAS
408(6)
Configuring Monitoring
408(4)
Examining Logs and Port Activity
412(1)
Self-Check
413(1)
Troubleshooting RRAS
414(10)
Troubleshooting Static Routing
414(1)
Troubleshooting Dial-Up Connectivity
415(2)
Troubleshooting VPN Connectivity
417(1)
Self-Check
418(1)
Summary
418(1)
Key Terms
419(1)
Summary Questions
420(1)
Applying This
Chapter
421(2)
You Try It
423(1)
Configuring and Troubleshooting IPsec
424(43)
Introduction
425(1)
Understanding IPsec
425(10)
IPsec Fundamentals
425(2)
IPsec in Windows Server 2003
427(1)
The IPsec Negotiation Process
428(2)
Security Filters
430(1)
Security Methods
431(1)
Security Filter Actions
431(1)
Security Policies
432(1)
IPsec Authentication
433(2)
Self-Check
435(1)
Configuring IPsec Policies
435(16)
Creating Local IPsec
435(1)
Creating IPsec via Group Policy
436(3)
Configuring IPsec Policies
439(5)
Managing Filter Lists and Actions
444(7)
Self-Check
451(1)
Monitoring and Troubleshooting IPsec
451(16)
Monitoring IPsec
451(7)
Troubleshooting IPsec
458(2)
Self-Check
460(1)
Summary
460(2)
Key Terms
462(1)
Summary Questions
463(2)
Applying This
Chapter
465(1)
You Try It
466(1)
Glossary 467(20)
Index 487
Steve Suehring (Stevens Point, Wisconsin) is currently a Systems Engineer at CoreComm, a 350,000-user Internet Provider. In addition to his other responsibilities, Steve maintains authentication infrastructure using MySQL as the database backend. Steve has built numerous applications with both the Oracle and MySQL databases. He is a Microsoft Certified Systems Engineer, Cisco Certified Design Associate, and Cisco Certified Network Professional. Steve has also written articles for Linux Magazine.



James Chellis, MCT, MCSE, is CEO of Comcourse, Inc., an online learning provider that delivers information technology courses through career colleges nationwide.



Matt Sheltz is a software engineer and systems administrator for Comcourse, Inc. and has more than a decade of experience writing bestselling training books and developing educational technologies.



Brian Hill has been working with personal computers since the days of the Atari 600XL, and has been networking computers since the days of bulletin boards and 300 baud modems. He has authored several books on networking, Cisco routing, and Windows operating systems. Brian currently works at Microsoft providing solutions to complex networking problems for enterprise customers.