Muutke küpsiste eelistusi

Networking All-in-One For Dummies 8th edition [Pehme köide]

  • Formaat: Paperback / softback, 1056 pages, kõrgus x laius x paksus: 234x188x66 mm, kaal: 1452 g
  • Ilmumisaeg: 24-Jun-2021
  • Kirjastus: For Dummies
  • ISBN-10: 1119689015
  • ISBN-13: 9781119689010
Teised raamatud teemal:
  • Pehme köide
  • Hind: 59,94 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 1056 pages, kõrgus x laius x paksus: 234x188x66 mm, kaal: 1452 g
  • Ilmumisaeg: 24-Jun-2021
  • Kirjastus: For Dummies
  • ISBN-10: 1119689015
  • ISBN-13: 9781119689010
Teised raamatud teemal:
This eighth edition contains every bit of information that is necessary to set up a network and keep it functioning. Original.

Your ultimate one-stop networking reference  

Designed to replace that groaning shelf-load of dull networking books you’d otherwise have to buy and house, Networking All-in-One For Dummies covers all the basic and not-so-basic information you need to get a network up and running. It also helps you keep it running as it grows more complicated, develops bugs, and encounters all the fun sorts of trouble you expect from a complex system. Ideal both as a starter for newbie administrators and as a handy quick reference for pros, this book is built for speed, allowing you to get past all the basics—like installing and configuring hardware and software, planning your network design, and managing cloud services—so you can get on with what your network is actually intended to do.  

In a friendly, jargon-free style, Doug Lowe—an experienced IT Director and prolific tech author—covers the essential, up-to-date information for networking in systems such as Linux and Windows 10 and clues you in on best practices for security, mobile, and more. Each of the nine minibooks demystifies the basics of one key area of network management.   

  • Plan and administrate your network 
  • Implement virtualization 
  • Get your head around networking in the Cloud 
  • Lock down your security protocols  

The best thing about this book? You don’t have to read it all at once to get things done; once you’ve solved the specific issue at hand, you can put it down again and get on with your life. And the next time you need it, it’ll have you covered.  

Introduction 1(4)
About This Book
2(1)
Foolish Assumptions
3(1)
Icons Used in This Book
3(1)
Beyond the Book
4(1)
Where to Go from Here
4(1)
Book 1 Getting Started With Networking
5(84)
Chapter 1 Welcome to Networking
7(16)
Defining a Network
8(2)
Delving into Network Lingo
10(1)
Why Bother with a Network?
10(1)
Accessing the Internet
11(1)
Sharing files
11(1)
Sharing resources
11(1)
Sharing programs
12(1)
Servers and Clients
13(1)
Dedicated Servers and Peers
14(1)
What Makes a Network Tick?
15(1)
Putting the Pieces Together
16(2)
Networks Big and Small
18(1)
It's Not a Personal Computer Anymore!
18(2)
The Network Administrator
20(3)
Chapter 2 Network Infrastructure
23(16)
Introducing Infrastructure
24(1)
Understanding Network Protocols and Standards
25(1)
Recognizing Network Topology
26(1)
Bus topology
26(1)
Star topology
27(1)
Expanding stars
28(1)
Ring topology
29(1)
Mesh topology
29(1)
Considering Cable
30(1)
Twisted-pair cable
30(1)
RJ45 connectors
31(1)
Patch panels and patch cables
31(1)
Repeaters and hubs
32(1)
Switches
32(1)
Perusing Ports, Interfaces, and MAC Addresses
33(2)
Pondering Packets
35(2)
Contemplating Collisions
37(1)
Dealing with Broadcast Packets
38(1)
Examining Wireless Networks
38(1)
Chapter 3 Switches, Routers, and VLANs
39(16)
Understanding Switches
40(3)
Learning
43(1)
Forwarding
44(1)
Flooding
45(1)
Looking Deeper into Switches
46(1)
Collision domains
46(1)
Bridging
47(1)
SFP ports and uplinks
48(1)
Broadcast domains
49(1)
Managed and unmanaged switches
49(1)
Understanding Routers
50(2)
Network address translation
52(1)
Virtual private network
52(1)
Understanding VLANs
53(2)
Chapter 4 Cybersecurity
55(12)
But We're a Small Business --- Do We Need Security?
56(1)
The Two Pillars of Cybersecurity
57(1)
Prevention
57(2)
Recovery
59(2)
Cybersecurity Frameworks
61(1)
The NIST Cybersecurity Framework
62(5)
Chapter 5 Servers and Virtualization
67(12)
Understanding Network Operating Systems
67(1)
Network services
68(1)
File-sharing services
68(1)
Multitasking
69(1)
Directory services
69(1)
Security services
70(1)
What's Important in a Server
71(1)
Scalability
72(1)
Reliability
72(1)
Availability
72(1)
Service and support
72(1)
Components of a Server Computer
73(1)
Motherboard
73(1)
Processor
73(1)
Memory
74(1)
Hard drives
74(1)
Network interfaces
74(1)
Video
75(1)
Power supply
75(1)
Considering Server Form Factors
75(1)
Tower case
75(1)
Rack mount
75(1)
Blade servers
76(1)
Considering Virtualization
77(2)
Chapter 6 Cloud Computing
79(10)
Introducing Cloud Computing
79(1)
Looking at the Benefits of Cloud Computing
80(2)
Detailing the Drawbacks of Cloud Computing
82(1)
Examining Three Basic Kinds of Cloud Services
83(1)
Applications
83(1)
Platforms
84(1)
Infrastructure
84(1)
Public Clouds versus Private Clouds
85(1)
Introducing Some of the Major Cloud Providers
86(1)
Amazon
86(1)
Google
86(1)
Microsoft
87(1)
Getting Into the Cloud
87(2)
Book 2 Understanding Network Protocols
89(146)
Chapter 1 Network Protocols and Standards
91(24)
Understanding Protocols
91(2)
Understanding Standards
93(1)
Seeing the Seven Layers of the OSI Reference Model
94(1)
The physical layer
95(2)
The data link layer
97(1)
The network layer
98(3)
The transport layer
101(1)
The session layer
102(1)
The presentation layer
103(1)
The application layer
104(1)
Following a Packet through the Layers
104(1)
The Ethernet Protocol
105(2)
Standard Ethernet
107(1)
Fast Ethernet
108(1)
Gigabit Ethernet
108(1)
Beyond gigabit
108(1)
The TCP/IP Protocol Suite
109(1)
IP
110(1)
TCP
111(1)
UDP
111(2)
Other Protocols Worth Knowing About
113(2)
Chapter 2 TCP/IP and the Internet
115(8)
What Is the Internet?
115(2)
A Little Internet History
117(1)
TCP/IP Standards and RFCs
118(2)
The TCP/IP Protocol Framework
120(1)
Network interface layer
121(1)
Network layer
121(1)
Transport layer
122(1)
Application layer
122(1)
Chapter 3 IP Addresses
123(22)
Understanding Binary
123(1)
Counting by ones
123(3)
Doing the logic thing
126(1)
Working with the binary Windows Calculator
127(1)
Introducing IP Addresses
128(1)
Networks and hosts
129(1)
The dotted-decimal dance
129(1)
Classifying IP Addresses
130(2)
Class A addresses
132(1)
Class B addresses
133(1)
Class C addresses
133(1)
Subnetting
134(1)
Subnets
134(1)
Subnet masks
135(1)
Network prefix notation
136(1)
Default subnets
137(1)
The great subnet roundup
137(2)
IP block parties
139(1)
Private and public addresses
140(1)
Pondering Ports
140(2)
Understanding Network Address Translation
142(3)
Chapter 4 Routing
145(10)
Considering the Usefulness of Routers
146(1)
Connecting to the Internet
146(2)
Connecting remote locations
148(1)
Splitting up large networks
149(1)
Understanding Routing Tables
150(5)
Chapter 5 DHCP
155(18)
Understanding DHCP
155(1)
Configuration information provided by DHCP
156(1)
DHCP servers
156(1)
How DHCP actually works
157(1)
Understanding Scopes
158(1)
Scopes, subnets, and VLANs
159(1)
Feeling excluded?
160(1)
Reservations suggested
161(1)
How long to lease?
162(1)
Working with a DHCP Server
162(1)
Installing a Windows Server 2019 DHCP server
163(1)
Configuring a new scope
164(6)
How to Configure a Windows DHCP Client
170(2)
Automatic private IP addressing
172(1)
Renewing and releasing leases
172(1)
Chapter 6 DNS
173(34)
Understanding DNS Names
173(1)
Domains and domain names
174(2)
Fully qualified domain names
176(1)
Top-Level Domains
177(1)
Generic domains
178(1)
Geographic domains
178(2)
The Hosts File
180(4)
Understanding DNS Servers and Zones
184(1)
Zones
184(2)
Primary and secondary servers
186(1)
Root servers
187(3)
Caching
190(1)
Understanding DNS Queries
190(1)
A real-life DNS example
191(1)
Zone Files and Resource Records
192(2)
SOA records
194(1)
NS records
195(1)
A records
195(1)
CNAME records
196(1)
PTR records
197(1)
MX records
197(1)
Reverse Lookup Zones
198(1)
Working with the Windows DNS Server
199(1)
Creating a new zone
200(3)
Creating a new host record
203(1)
How to Configure a Windows DNS Client
204(3)
Chapter 7 TCP/IP Tools and Commands
207(28)
Using the arp Command
207(1)
Using the hostname Command
208(1)
Using the ipconfig Command
209(1)
Displaying basic IP configuration
209(1)
Displaying detailed configuration information
210(1)
Renewing an IP lease
211(1)
Releasing an IP lease
211(1)
Flushing the local DNS cache
212(1)
Using the nbtstat Command
212(1)
Using the netstat Command
213(1)
Displaying connections
213(1)
Displaying interface statistics
214(3)
Using the nslookup Command
217(1)
Looking up an IP address
217(1)
Using nslookup subcommands
218(1)
Displaying DNS records
219(2)
Locating the mail server for an email address
221(1)
Taking a ride through DNS-Land
221(3)
Using the pathping Command
224(2)
Using the ping Command
226(1)
Using the route Command
227(1)
Displaying the routing table
228(2)
Modifying the routing table
230(1)
Using the tracert Command
231(4)
Book 3 Planning A Network
235(96)
Chapter 1 Local Area Networks
237(16)
Making a Network Plan
237(1)
Being Purposeful
238(1)
Taking Stock
239(1)
What you need to know
239(2)
Programs that gather information for you
241(1)
Considering Cable
242(1)
Surmising Switches
243(3)
Planning the Network Topology
246(2)
Planning the TCP/IP Implementation
248(1)
Drawing Diagrams
249(1)
More Questions Your Network Plan Should Address
250(3)
Chapter 2 Wide Area Networks
253(14)
Connecting to the Internet
253(1)
Connecting with cable or DSL
254(1)
Connecting with T1 lines
255(1)
Connecting with fiber
256(1)
Connecting with a cellular network
257(1)
Choosing a Router
257(1)
Choosing a small office router
258(1)
Choosing an enterprise router
258(2)
Choosing a cellular router
260(1)
Securing Your Connection with a Firewall
260(2)
Providing Redundancy for Your Internet Connection
262(1)
Securing Connections to Remote Locations and Remote Users
263(1)
Connecting Remote Offices with an Ethernet Private Line
264(3)
Chapter 3 Server Architecture
267(10)
Deciding How Many Servers You Need
267(1)
Deciding Which Servers You Need
268(1)
Domain controllers
268(1)
DHCP servers
269(1)
Mail servers
269(1)
File servers
270(1)
Print servers
271(1)
Web servers
271(1)
Database servers
272(1)
Application servers
272(1)
Backup servers
272(1)
License servers
273(1)
Deployment servers
273(1)
Update servers
273(1)
Virtualization management platform
274(1)
Connecting Your Servers
274(3)
Chapter 4 Virtualization Architecture
277(12)
Understanding Virtualization
278(1)
Understanding Hypervisors
279(2)
Understanding Virtual Disks
281(3)
Understanding Network Virtualization
284(1)
Considering the Benefits of Virtualization
284(2)
Choosing Virtualization Hosts
286(1)
Understanding Windows Server 2019 Licensing
287(2)
Chapter 5 Storage Architecture
289(12)
Planning Disk Capacity
289(2)
Considering Disk Drive Types
291(1)
Hard disk drives
291(1)
Solid state drives
291(1)
Considering Drive Interfaces
292(1)
SATA
292(1)
SAS
293(1)
Considering RAID
294(1)
RAID 10
294(1)
RAID 5
295(2)
RAID 6
297(1)
Considering Attachment Types
297(1)
Direct attached storage
297(1)
Storage area networks
298(1)
Network attached storage
299(2)
Chapter 6 Backup Architecture
301(18)
Backup Basics
302(1)
Considering Three Basic Types of Backup
303(1)
Where to Back Up Your Data
304(1)
Backing Up to Tape
305(1)
Looking closer at LTO
305(1)
Hardware for tape backup
306(1)
A word about tape reliability
307(1)
About cleaning the heads
308(1)
Backing Up to NAS
309(1)
Using a Backup Appliance
309(1)
Understanding File-Based Backup
310(1)
Types of file-based backups
311(5)
Understanding Image-Based Backups and Virtualization
316(1)
Backup Security
316(3)
Chapter 7 Hyperconverged Infrastructure
319(12)
Considering the Headaches of Traditional IT Architecture
320(1)
Defining Hyperconverged Infrastructure
321(2)
Discerning Deduplication
323(1)
Understanding How Deduplication Works
324(2)
Considering Backup
326(2)
Digging into HCI Clusters
328(1)
Incorporating HCI Into Your Plan
329(2)
Book 4 Implementing A Network
331(64)
Chapter 1 Network Hardware
333(12)
Working with Cable
333(1)
Cable categories
333(1)
What's with the pairs?
334(1)
To shield or not to shield
335(1)
When to use plenum cable
335(1)
Sometimes solid, sometimes stranded
336(1)
Installation guidelines
336(1)
Getting the tools that you need
337(2)
Pinouts for twisted-pair cables
339(1)
Attaching RJ-45 connectors
340(1)
Wall jacks and patch panels
341(1)
Server rooms and distribution frames
342(1)
Installing Switches
343(2)
Chapter 2 Wireless Networks
345(20)
Installing a Wireless Access Point
345(1)
Configuring a Wireless Access Point
346(1)
Basic configuration options
346(1)
DHCP configuration
347(1)
Connecting to a Wireless Network
348(2)
Paying Attention to Wireless Network Security
350(1)
Understanding wireless security threats
350(4)
Securing your wireless network
354(5)
Troubleshooting a wireless network
359(6)
Chapter 3 Windows Clients
365(10)
Configuring Network Connections
365(6)
Joining a Domain
371(4)
Chapter 4 Mac Networking
375(8)
Basic Mac Network Settings
376(2)
Joining a Domain
378(3)
Connecting to a Share
381(2)
Chapter 5 Network Printers
383(6)
Configuring Network Printers
383(1)
Adding a network printer
384(2)
Accessing a network printer using a web interface
386(3)
Chapter 6 Virtual Private Networks
389(6)
Understanding VPN
389(2)
Looking at VPN Security
391(1)
Understanding VPN Servers and Clients
392(3)
Book 5 Implementing Virtualization
395(76)
Chapter 1 Hyper-V
397(20)
Understanding the Hyper-V Hypervisor
397(1)
Understanding Hyper-V Virtual Disks
398(1)
Enabling Hyper-V
399(1)
Getting Familiar with Hyper-V
400(2)
Creating a Virtual Switch
402(2)
Creating a Virtual Disk
404(4)
Creating a Virtual Machine
408(5)
Installing an Operating System
413(4)
Chapter 2 VMWare
417(12)
Looking at vSphere
417(1)
Getting Started with VMware Workstation Pro
418(2)
Creating a Virtual Machine
420(7)
Installing VMware Tools
427(2)
Chapter 3 Azure
429(16)
Looking at Azure Services
430(1)
Creating an Azure Account
431(1)
Examining the Azure Portal
432(1)
Creating a Windows Virtual Machine
433(7)
Managing an Azure Virtual Machine
440(2)
Connecting to an Azure Virtual Machine
442(3)
Chapter 4 Amazon Web Services
445(18)
Looking at What Amazon Web Services Can Do
446(1)
Creating an Amazon Web Services Account
447(1)
Examining the Amazon Web Services Console
448(2)
Creating a Windows Virtual Machine
450(8)
Managing an Amazon Web Services Virtual Machine
458(2)
Connecting to an Amazon Web Services Virtual Machine
460(3)
Chapter 5 Desktop Virtualization
463(8)
Introducing Desktop Virtualization
463(2)
Considering Two Approaches to Desktop Virtualization
465(1)
Looking at VMware's Horizon View
466(1)
Looking at Citrix XenApp
467(4)
Book 6 Implementing Windows Server 2019
471(138)
Chapter 1 Installing Windows Server 2019
473(16)
Planning a Windows Server Installation
473(1)
Checking system requirements
474(1)
Reading the release notes
474(1)
Deciding whether to upgrade or install
474(1)
Considering your licensing options
475(1)
Thinking about multiboot
475(1)
Planning your partitions
476(1)
Deciding your TCP/IP configuration
476(1)
Choosing workgroups or domains
477(1)
Before You Install
478(1)
Backing up
478(1)
Checking the event logs
478(1)
Applying updates
478(1)
Disconnecting UPS devices
478(1)
Running Setup
479(5)
Considering Your Next Steps
484(1)
Adding Server Roles and Features
484(5)
Chapter 2 Configuring Windows Server 2019
489(10)
Using the Administrator Account
489(1)
Using Remote Desktop Connection
490(1)
Enabling remote access
490(2)
Connecting remotely
492(1)
Using Microsoft Management Console
493(1)
Working with MMC
493(2)
Taking an overview of the MMC consoles
495(1)
Customizing MMC
496(3)
Chapter 3 Configuring Active Directory
499(12)
What Directories Do
499(1)
Remembering the Good OI' Days of NT Domains
500(1)
PDCs and BDCs
500(1)
Trusts
501(1)
NetBIOS names
501(1)
Active Directory to the Rescue
502(1)
Understanding How Active Directory Is Structured
502(1)
Objects
503(1)
Domains
503(1)
Organizational units
504(1)
Trees
505(1)
Forests
505(1)
Creating a New Domain
506(1)
Creating an Organizational Unit
507(4)
Chapter 4 Configuring User Accounts
511(22)
Understanding Windows User Accounts
511(1)
Local accounts versus domain accounts
512(1)
User account properties
512(1)
Creating a New User
512(4)
Setting User Properties
516(1)
Changing the user's contact information
517(1)
Setting account options
517(1)
Specifying logon hours
518(1)
Restricting access to certain computers
519(1)
Setting the user's profile information
520(1)
Resetting User Passwords
521(1)
Disabling and Enabling User Accounts
522(1)
Deleting a User
522(1)
Working with Groups
523(1)
Group types
523(1)
Group scope
524(1)
Default groups
525(1)
Creating a group
526(1)
Adding a member to a group
527(2)
Working with User Profiles
529(1)
Types of user profiles
529(1)
Roaming profiles
530(2)
Creating a Logon Script
532(1)
Chapter 5 Configuring a File Server
533(16)
Understanding Permissions
533(2)
Understanding Shares
535(1)
Considering Best Practices for Setting Up Shares
536(1)
Managing Your File Server
537(1)
Using the New Share Wizard
538(5)
Sharing a folder without the wizard
543(2)
Granting permissions
545(4)
Chapter 6 Using Group Policy
549(12)
Understanding Group Policy
549(1)
Enabling Group Policy Management on Windows Server 2019
550(1)
Creating Group Policy Objects
551(7)
Filtering Group Policy Objects
558(3)
Chapter 7 Typing Windows Commands
561(28)
Using a Command Window
562(1)
Opening and closing a command window
562(1)
Editing commands
563(1)
Using the Control menu
563(1)
Special Command Tricks
564(1)
Wildcards
564(1)
Chaining commands
565(1)
Redirection and piping
565(1)
Environment variables
566(2)
Batch files
568(1)
The EventCreate Command
569(1)
Net Commands
570(1)
The Net Accounts command
571(1)
The Net Computer command
572(1)
The Net Config command
572(1)
The Net Continue command
573(1)
The Net File command
573(1)
The Net Group command
574(2)
The Net Help command
576(1)
The Net Helpmsg command
576(1)
The Net Localgroup command
577(1)
The Net Pause command
578(1)
The Net Session command
579(1)
The Net Share command
579(2)
The Net Start command
581(1)
The Net Statistics command
581(1)
The Net Stop command
582(1)
The Net Time command
583(1)
The Net Use command
583(2)
The Net User command
585(1)
The Net View command
586(1)
The RunAs Command
587(2)
Chapter 8 Using PowerShell
589(20)
Using PowerShell
590(2)
Understanding PowerShell Commands
592(1)
Using Cmdlets
593(1)
Using Parameters
593(2)
Getting Help
595(2)
Using Aliases
597(2)
Using the Pipeline
599(4)
Using Providers
603(1)
Using Scripts
604(5)
Book 7 Administering Microsoft Office 365
609(58)
Chapter 1 Getting Started with Office 365 Administration
611(20)
Introducing Office 365
612(1)
Considering Office 365 Plans
613(2)
Understanding Tenants
615(1)
Creating an Office 365 Tenant
616(6)
Creating a New User
622(5)
Resetting a User's Password
627(1)
Disabling a User
628(3)
Chapter 2 Configuring Exchange Online
631(20)
Looking at Exchange Online Recipient Types
632(1)
Examining the Exchange Admin Center
633(3)
Managing Mailboxes
636(2)
Creating an email alias
638(1)
Delegating a mailbox
639(3)
Converting a standard mailbox to a shared mailbox
642(2)
Enabling or disabling mailbox apps
644(1)
Creating a forwarder
645(2)
Creating a Shared Mailbox
647(4)
Chapter 3 Administering Teams
651(16)
What Is Teams?
652(3)
A Brief Look at How Teams Works
655(1)
Microsoft 365 Group
656(1)
SharePoint
657(2)
OneDrive for Business
659(1)
Using the Teams Admin Center
660(1)
Managing Teams
661(6)
Book 8 Implementing Linux
667(134)
Chapter 1 Installing a Linux Server
669(14)
Planning a Linux Server Installation
669(1)
Checking system requirements
669(1)
Choosing a distribution
670(1)
Going virtual
671(1)
Deciding on your TCP/IP configuration
671(2)
Installing Fedora Server
673(10)
Chapter 2 Linux Administration
683(32)
On Again, Off Again
683(1)
Logging in
683(2)
Logging out
685(1)
Shutting down
685(1)
Wait, Where's the Desktop?
686(1)
Playing the Shell Game
686(1)
Getting into Virtual Consoles
687(1)
Using a Remote Console
688(1)
Enabling the root User
689(1)
Using the sudo Command
690(1)
Understanding the file system
691(1)
Looking at top-level directories
691(2)
Browsing the file system
693(1)
Using the RPM Package Manager
694(1)
Listing packages
695(1)
Installing packages
696(2)
Removing packages
698(1)
Updating packages
699(1)
Editing Text Files with Vi
700(1)
Starting vi
701(1)
Saving changes and quitting Vi
702(1)
Understanding Vi's operating modes
703(1)
Moving around in a file
704(1)
Inserting text
705(1)
Deleting text
705(1)
Changing text
705(1)
Copying and pasting text
706(1)
Repeating commands
707(1)
Other useful Vi commands
708(1)
Using Cockpit
708(3)
Managing User Accounts
711(4)
Chapter 3 Basic Linux Network Configuration
715(12)
Using Cockpit to Configure Network Interfaces
715(4)
Working with Network Configuration Files
719(1)
The Network file
720(1)
The ifcfg files
721(1)
The Hosts file
722(1)
The resolv.conf file
723(1)
Displaying Your Network Configuration with the ifconfig Command
723(4)
Chapter 4 Running DHCP and DNS
727(12)
Running a DHCP Server
727(1)
Installing DHCP
728(1)
Configuring DHCP
728(2)
Starting DHCP
730(1)
Running a DNS Server
731(1)
Installing BIND
731(1)
Editing BIND configuration files
731(1)
named.conf
731(3)
named.ca
734(2)
Zone files
736(1)
Restarting BIND
736(3)
Chapter 5 Doing the Samba Dance
739(8)
Understanding Samba
739(1)
* Installing Samba
740(1)
Starting and Stopping Samba
741(1)
Editing the smb.conf File
742(2)
Configuring global settings
744(1)
Creating a share
744(1)
Using the Samba Client
745(2)
Chapter 6 Running Apache
747(14)
Installing Apache
747(1)
Starting and Stopping Apache
748(2)
Opening the Firewall for Apache
750(2)
Confirming That Apache Is Running
752(1)
Looking at the httpd.config File
753(2)
Understanding Access Rules
755(3)
Configuring Virtual Hosts
758(3)
Chapter 7 Running Postfix
761(10)
Understanding Email
762(1)
Installing Postfix
763(1)
Modifying main.cf
763(2)
Using SpamAssassin
765(1)
Installing SpamAssassin
766(1)
Customizing SpamAssassin
767(1)
Block listing and friends listing email addresses
767(1)
Using the Mail Console Client
768(3)
Chapter 8 Linux Commands
771(30)
Command Shell Basics
771(1)
Getting to a shell
772(1)
Editing commands
772(1)
Wildcards
772(1)
Redirection and piping
773(1)
Environment variables
774(1)
Shell scripts
775(1)
Running a command with root-level privileges
775(1)
Directory- and File-Handling Commands
776(1)
The pwd command
776(1)
The cd command
776(1)
The mkdir command
777(1)
The rmdir command
777(1)
The Is command
777(2)
The cp command
779(1)
The rm command
780(1)
The mv command
780(1)
The touch command
781(1)
The cat command
782(1)
Commands for Working with Packages and Services
783(1)
The service command
783(2)
The yum and dnf commands
785(1)
Commands for Administering Users
785(1)
The useradd command
785(2)
The usermod command
787(1)
The userdel command
788(1)
The chage command
788(1)
The passwd command
788(1)
The newusers command
789(1)
The groupadd command
789(1)
The groupdel command
790(1)
The gpasswd command
790(1)
Commands for Managing Ownership and Permissions
791(1)
The chown command
791(1)
The chgrp command
792(1)
The chmod command
792(2)
Networking Commands
794(1)
The hostname command
794(1)
The ifconfig command
794(1)
The netstat command
795(2)
The ping command
797(1)
The route command
798(1)
The traceroute command
799(2)
Book 9 Managing A Network
801(88)
Chapter 1 Welcome to Network Administration
803(14)
Knowing What Network Administrators Do
804(1)
Choosing the Part-Time Administrator
805(1)
Establishing Routine Chores
806(1)
Managing Network Users
807(1)
Patching Up Your Operating System and Software
808(1)
Discovering Software Tools for Network Administrators
809(1)
Building a Library
810(1)
Getting Certified
811(1)
CompTIA
812(1)
Microsoft
813(1)
Cisco
813(1)
Gurus Need Gurus, Too
814(1)
Helpful Bluffs and Excuses
815(2)
Chapter 2 Managing Remotely
817(18)
Enabling Remote Desktop Connection
818(1)
Connecting Remotely
819(2)
Using Keyboard Shortcuts for Remote Desktop
821(1)
Configuring Remote Desktop Options
822(1)
Setting the Display options
823(1)
Setting the Local Resources options
824(1)
Setting the Experience options
825(1)
Setting the Advanced options
826(1)
Using Remote Assistance
827(1)
Enabling Remote Assistance
828(1)
Inviting Someone to Help You via a Remote Assistance Session
829(3)
Responding to a Remote Assistance Invitation
832(3)
Chapter 3 Managing Network Assets
835(12)
Introducing IT Asset Management
836(1)
Why Bother?
837(1)
Getting Organized
837(2)
What to Track
839(1)
Taking Pictures
840(1)
Picking a Number
840(1)
Making Labels
841(2)
Tracking Software
843(1)
Using Asset-Tracking Software
843(2)
Other Sources of Asset-Tracking Information
845(2)
Chapter 4 Solving Network Problems
847(16)
When Bad Things Happen to Good Computers
848(1)
Fixing Dead Computers
849(1)
Ways to Check a Network Connection
850(1)
A Bunch of Error Messages Just Flew By!
851(1)
Double-Checking Your Network Settings
852(1)
Time to Experiment
852(1)
Who's on First?
853(1)
Restarting a Client Computer
854(1)
Booting in Safe Mode
855(1)
Using System Restore
856(2)
Restarting Network Services
858(1)
Restarting a Network Server
859(1)
Looking at Event Logs
860(1)
Documenting Your Trials and Tribulations
861(2)
Chapter 5 Managing Software Deployment
863(12)
Understanding Software Licenses
864(3)
Using a License Server
867(1)
Options for Deploying Network Software
868(1)
Deploying software manually
868(1)
Running Setup from a network share
869(1)
Installing silently
870(1)
Creating an administrative installation image
871(1)
Pushing out software with group policy
872(1)
Keeping Software Up to Date
872(3)
Chapter 6 Managing Mobile Devices
875(14)
The Many Types of Mobile Devices
876(1)
Considering Security for Mobile Devices
877(1)
Managing iOS Devices
878(1)
Understanding the iPhone
878(1)
Understanding the iPad
879(1)
Integrating iOS devices with Exchange
879(6)
Managing Android Devices
885(1)
Looking at the Android OS
885(1)
Perusing Android's core applications
886(1)
Integrating Android with Exchange
887(2)
Book 10 Dealing with Cybersecurity
889(54)
Chapter 1 Securing Your Users
891(10)
Knowing the Difference between Authentication and Authorization
892(1)
Following Password Best Practices
892(3)
Securing the Administrator Account
895(1)
Understanding Multifactor Authentication
896(1)
Securing the Human Firewall
897(1)
Establishing cybersecurity policies
898(1)
Training
898(1)
Phish testing
899(2)
Chapter 2 Managing Firewalls and Virus Protection
901(20)
Firewalls
902(1)
The Many Types of Firewalls
903(1)
Packet filtering
903(2)
Stateful packet inspection (SPI)
905(1)
Circuit-level gateway
906(1)
Application gateway
906(1)
Firewall Best Practices
907(1)
The Built-In Windows Firewall
908(2)
Configuring Windows Defender Firewall with Group Policy
910(6)
Virus Protection
916(1)
What is a virus?
917(1)
Antivirus programs
918(2)
Safe computing
920(1)
Chapter 3 Dealing with Spam
921(14)
Defining Spam
922(1)
Sampling the Many Flavors of Spam
923(1)
Using Antispam Software
924(2)
Understanding Spam Filters
926(2)
Looking at Three Types of Antispam Software
928(1)
On-premises antispam
929(1)
Antispam appliances
930(1)
Cloud-based antispam services
931(1)
Minimizing Spam
932(3)
Chapter 4 Managing Disaster Recovery and Business Continuity Planning
935(8)
Assessing Different Types of Disasters
936(1)
Environmental disasters
937(1)
Deliberate disasters
937(1)
Disruption of services
938(1)
Equipment failure
938(1)
Other disasters
939(1)
Analyzing the Impact of a Disaster
939(1)
Developing a Business Continuity Plan
940(1)
Holding a Fire Drill
941(2)
APPENDIXES
943(32)
APPENDIX A Directory of Useful Websites
945(1)
Certification
945(1)
Hardware
946(1)
Home and Small-Business Networking
946(1)
Linux
947(1)
Magazines
947(1)
Microsoft
948(1)
Network Standards Organizations
948(1)
Reference
949(1)
TCP/IP and the Internet
949(1)
Wireless Networking
950(1)
Smartphones
951(2)
Appendix B Glossary
953(22)
Index 975
Doug Lowe is Information Technology Director for a civil engineering firm and a prolific technology ­author. He has been managing networks for more than 30 years and has written more than 50 technology guides, many in the For ­Dummies series.