Muutke küpsiste eelistusi

E-raamat: Accidental SysAdmin Handbook: A Primer for Early Level IT Professionals

  • Formaat: PDF+DRM
  • Ilmumisaeg: 01-Feb-2016
  • Kirjastus: APress
  • Keel: eng
  • ISBN-13: 9781484218174
  • Formaat - PDF+DRM
  • Hind: 67,91 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 01-Feb-2016
  • Kirjastus: APress
  • Keel: eng
  • ISBN-13: 9781484218174

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This handbook is designed to give new system administrators an understanding of concepts, processes and technologies that will aid in their professional development. 

While every information technology culture is specific to its parent organization, there are commonalities and system patterns that apply to all organizations and information technology flow functions. 

The Accidental SysAdmin Handbook, Second Edition looks at those commonalities and provides a general introduction to critical aspects associated with system administration. It further acts to provide definitions for common computer terms and acronyms.


What You'll Learn
  • How to plan and implement a home network
  • How to plan for a networked environment
  • How to work with Network Layer Architectures, Network Service Architectures and Network Support Plans
  • How to develop and implement a server hardware strategy
  • What are the differences between physical and virtual server environments
  • How to assess and work with data storage technologies and user data strategies
  • How to handle directory services and central account management
  • How to handle DNS, DHCP, IPv4 and IPv6
  • How to deploy workstations and printers
  • How to work with Antivirus and handle security management
  • How to deploy Intranets and other Internet support services and more

Audience

It is assumed that the reader has little to no experience in a professional information technology environment. 

Arvustused

Kralicek instead gives a thorough grounding on sysadmin tasks, networking technologies, and various servers and services . the higher-level overview presented in most chapters will be a useful introduction to essential areas for many people who have IT responsibility thrust upon them. this handbook could help you put your organisations IT in a saner and safer state, and save unnecessary problems. (The MagPi, Issue 47, July, 2016)

About the Author xiii
About the Technical Reviewer xv
Chapter 1 Introduction
1(10)
System Administrator Duties
1(4)
Task List
1(1)
Task Management Roles (Example)
2(1)
Operational Awareness
3(1)
Communication
3(1)
Research
4(1)
Training
5(1)
Leadership
5(1)
History in Brief
5(4)
General
5(1)
IT Timeline
6(1)
Personal Computing and Networking
7(2)
Summary
9(2)
Chapter 2 Home Networking
11(16)
Wired Networking
12(3)
Wired Network Pros
14(1)
Wired Network Cons
15(1)
Wireless Networking
15(3)
Wireless Security
18(1)
Internet Gateway
18(3)
Gaming
21(1)
VoIP
22(1)
Home Servers
23(2)
Backups vs. Archives
25(1)
Cloud Computing
25(1)
Summary
26(1)
Chapter 3 Planning a Networking Environment
27(16)
Pre-Site Inspection
27(1)
General Environment Considerations
28(2)
Power Distribution
30(1)
Uninterrupted Power Supply (UPS)
31(1)
Return on Investment
31(1)
Air Conditioning
31(3)
Rack Placement and Power Distribution
34(4)
Fire Defense
38(2)
Security Access
40(1)
Summary
40(3)
Chapter 4 Network Layer Architecture
43(18)
The OSI Model
43(17)
Physical Layer
44(4)
Data Link
48(5)
Network
53(3)
Transport
56(1)
Session
57(1)
Presentation
58(1)
Application
58(2)
Summary
60(1)
Chapter 5 Network Services Architecture
61(28)
Routing
62(6)
Network Security Plan
68(9)
Technical Security Mechanisms
69(1)
Operational Security
70(1)
DNS
71(5)
DHCP
76(1)
E-Mail Services
77(6)
E-mail Strategy -- Option 1
78(1)
E-mail Strategy -- Option 2
79(2)
E-mail Strategy -- Option Three
81(2)
Domain Services
83(2)
IT Services Administration
85(2)
Summary
87(2)
Chapter 6 Network Support Plan
89(20)
Hardware Services Plan
90(2)
Firmware/BIOS Maintenance
92(1)
Hardware Implementation
93(1)
User Services
93(14)
SLA
94(1)
OLA
94(1)
CMDB
95(1)
UA
95(1)
Workstation Deployment
95(3)
Printer Deployment
98(1)
File System Plan
99(1)
Mobile Devices
100(1)
Intranet Deployment
100(2)
Service Desk and User Support
102(5)
Summary
107(2)
Chapter 7 Server Hardware Strategy
109(12)
Vendors
111(2)
Extended Warrantees
112(1)
Server Hardware Support Library
113(1)
Online Vendor Inventory Support
113(1)
Redundancy Outside the Box
113(4)
Clustering
114(1)
Web Farms
115(1)
Standby Servers
116(1)
Footprint Strategy
117(2)
Blade Servers
117(1)
Traditional Servers
117(1)
Virtual Servers
118(1)
Operating Systems
118(1)
Hosting Applications
119(1)
Summary
119(2)
Chapter 8 Physical vs. Virtual Server Environments
121(14)
Physical
123(2)
Blade Server Solution
123(1)
Traditional Server Solution
124(1)
Virtual Solution
125(6)
The Unseen Network
126(2)
Hyper-V
128(1)
VMware
129(2)
Shared Storage
131(3)
Summary
134(1)
Chapter 9 Data Storage Technologies and User Data Strategy
135(20)
Local Workstation Hard Drives
136(1)
Roaming Profiles
137(2)
Folder Redirection
139(2)
Public Folders
141(1)
Folder Synchronization
142(3)
Thin Clients
145(1)
Mapped Drives
146(2)
Distributed File Systems
148(1)
Clustered File Servers
149(2)
Portal Storage Strategy
151(3)
Summary
154(1)
Chapter 10 Directory Services and Central Account Management
155(34)
Directory Replication
162(2)
Directory Architecture
164(2)
Accounts and Groups
166(1)
Groups
167(3)
Accounts
170(4)
User Accounts
170(2)
Computer Accounts
172(2)
Group Policy Objects
174(5)
Delegating Authority
179(7)
Summary
186(3)
Chapter 11 DNS, DHCP, IPv4, and IPv6
189(14)
DNS
189(5)
DHCP
194(1)
IPv4 and IPv6
195(6)
Supernet
196(3)
Subnetting Bits a
199(1)
Enumerating Subnetted Prefixes
200(1)
Summary
201(2)
Chapter 12 Deploying Workstations and Printers
203(16)
Deploying Workstations and Laptops
205(7)
Workstations
205(1)
Out of the Box
206(2)
Enterprise/Corporate Licensing
208(3)
Laptops
211(1)
Mobile Devices
212(1)
Workstation Lifecycle
212(3)
Deploying Printers
215(3)
Print Servers
215(2)
IP Printing
217(1)
Shared Printers
218(1)
Summary
218(1)
Chapter 13 Antivirus, Spyware, Windows Updates, Spam Protection, Security, and Disaster Recovery
219(14)
Antivirus
220(3)
Spyware
223(1)
Windows Updates
223(2)
Spam Protection
225(2)
Security
227(1)
Disaster Recovery
228(3)
Natural Disasters
229(1)
Ad Hoc Emergencies
229(2)
Summary
231(2)
Chapter 14 Intranet and Internet Support Services
233(12)
Intranet
233(9)
The System Administrator's Perspective
233(3)
The Content Manager's Perspective
236(2)
Department Sites
238(1)
Shared Planning Calendar
239(1)
Remote Applications
240(2)
Internet
242(2)
Marketing
243(1)
External Collaboration
243(1)
Summary
244(1)
Appendix A Checklist Templates 245(1)
Daily Check 245(1)
Network 245(1)
Servers 246(1)
Weekly Check 246(1)
Network 246(1)
Servers 247(1)
Monthly Check 247(1)
Network 247(1)
Servers 248(1)
Appendix B Network Environment Inspection Templatves 249(1)
Supporting Documentation Checklist 249(2)
Appendix C Electrical Circuits and Outlets 251(1)
Supporting Documentation Checklist 251(2)
Appendix D Uninterrupted Power Supply Maintenance 253(1)
Supporting Documentation Checklist 253(2)
Index 255
Eric A. Kralicek has worked in the field of computer technology for over two decades, specifically with computer networking since 1984. He has been employed in companies large and small, public and private, using a variety of network operating systems in mixed environments. As a networking professional he has written numerous internal documents that have guided other professionals in their use of technical applications both on and off networked systems. Eric has been employed by Digital Computer Corporation as a Senior Information Management Specialist, Compaq Computer Corporation as a Senior System Software Engineer, dot com companies as an Information Technology Manager, and educational institutions providing network management and system integration. In every instance he has provided both technical skills and training documentation. Eric has a bachelors of Science degree in Computer Networking from Regis University, Denver, CO. He is Microsoft ITIL and PRINCE II certified. Eric worked for the California State University system as a Network Analyst supporting administrative computer operations in a mixed network environment prior to working for NATO as an IT Engineer.