top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Managing risk in information systems / / Darril Gibson
Managing risk in information systems / / Darril Gibson
Autore Gibson Darril
Edizione [Second edition.]
Pubbl/distr/stampa Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2015
Descrizione fisica 1 online resource (548 pages) : illustrations
Disciplina 005.8
Collana Jones & Bartlett Learning Information Systems Security & Assurance Series
Soggetto topico Computer security
Electronic information resources - Access control
ISBN 1-284-05596-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Pt. 1. Risk management business challenges -- Risk management fundamentals -- Managing risk : threats, vulnerabilities, and exploits -- Maintaining compliance -- Developing a risk management plan -- pt. 2. Mitigating risk -- Defining risk assessment approaches -- Performing a risk assessment -- Identifying assets and activities to be protected -- Identifying and analyzing threats, vulnerabilities, and exploits -- Identifying and analyzing risk mitigation security controls -- Planning risk mitigation throughout your organization -- Turning your risk assessment into a risk mitigation plan -- pt 3. Risk mitigation plans -- Mitigating risk with a business impact analysis -- Mitigating risk with a business continuity plan -- Mitigating risk with a disaster recovery plan -- Mitigating risk with a computer incident response team plan.
Record Nr. UNINA-9910165026703321
Gibson Darril  
Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microsoft Windows networking essentials [[electronic resource] /] / Darril Gibson
Microsoft Windows networking essentials [[electronic resource] /] / Darril Gibson
Autore Gibson Darril
Edizione [1st ed.]
Pubbl/distr/stampa San Francisco, : Wiley Pub., Inc., 2011
Descrizione fisica 1 online resource (370 p.)
Disciplina 004.6
Collana Serious skills
Soggetto topico Computer networks
Internetworking (Telecommunication)
Soggetto genere / forma Electronic books.
ISBN 1-283-37478-1
9786613374783
1-118-07716-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Microsoft Windows Networking Essentials; Acknowledgments; About the Author; Contents; Introduction; Chapter 1: Introduction to Networking; Comparing Logical and Physical Networks; Networking Home Computers; Networking Small Offices and Home Offices; Networking Large Offices; Networking Enterprises; Understanding Standards Organizations; The Essentials and Beyond; Chapter 2: Overview of Networking Components; Comparing Unicast, Broadcast, and Multicast Traffic; Understanding Network Hardware; Exploring Protocols and Services; Understanding Basic Topologies; The Essentials and Beyond
Chapter 3: Understanding the OSI ModelUnderstanding the OSI Model; Understanding the TCP/IP Model; Mapping Devices on the OSI and TCP Models; Mapping Protocols on the OSI and TCP/IP Models; The Essentials and Beyond; Chapter 4: Core TCP/IP Protocols; Understanding TCP and UDP; Exploring Common Protocols; Understanding Ports; The Essentials and Beyond; Chapter 5: Exploring IPv4; Exploring the Components of an IPv4 Address; Exploring an IPv4 Address in Binary; Subnetting IPv4 Addresses; Comparing Manual and Automatic Assignment of IPv4 Addresses; The Essentials and Beyond
Chapter 6: Exploring IPv6Exploring IPv6 Addresses; Exploring the Components of an IPv6 Address; Understanding the Dual IP Stack; Comparing Manual and Automatic Assignment of IPv6; The Essentials and Beyond; Chapter 7: Connecting Computers to a Network; Identifying Potential Problems with Connectivity; Exploring Cable Types and Their Characteristics; The Essentials and Beyond; Chapter 8: Networking Computers with Switches; Connecting Multiple Computers; Understanding Physical Ports; Comparing Hubs and Switches; Comparing Managed and Unmanaged Switches; Exploring Switch Speeds
Understanding Security OptionsThe Essentials and Beyond; Chapter 9: Connecting Networks with Routers; Connecting Multiple Networks; Routing Traffic on a Network; Identifying Transmission Speeds; Routing Software in Windows Server 2008; Understanding Other Routing Protocols; The Essentials and Beyond; Chapter 10: Resolving Names to IP Addresses; Exploring Types of Names Used in Networks; Exploring Types of Name Resolution; Identifying the Steps in Name Resolution; The Essentials and Beyond; Chapter 11: Understanding Network Security Zones; Understanding Risks on the Internet
Exploring an IntranetUnderstanding Firewalls; Identifying a Perimeter Network; Understanding Extranets; The Essentials and Beyond; Chapter 12: Understanding Wireless Networking; Exploring Basic Wireless Components; Comparing Networking Standards and Characteristics; Comparing Network Security Methods; Using Wireless Networks; Understanding Point-to-Point Wireless; The Essentials and Beyond; Chapter 13: Understanding Internet Access Methods and Wide Area Networks; Comparing Connectivity Methods Used in Homes and SOHOs; Comparing Connectivity Methods in Enterprises
Exploring Remote Access Services
Record Nr. UNINA-9910457526303321
Gibson Darril  
San Francisco, : Wiley Pub., Inc., 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microsoft Windows networking essentials [[electronic resource] /] / Darril Gibson
Microsoft Windows networking essentials [[electronic resource] /] / Darril Gibson
Autore Gibson Darril
Edizione [1st ed.]
Pubbl/distr/stampa San Francisco, : Wiley Pub., Inc., 2011
Descrizione fisica 1 online resource (370 p.)
Disciplina 004.6
Collana Serious skills
Soggetto topico Computer networks
Internetworking (Telecommunication)
ISBN 1-283-37478-1
9786613374783
1-118-07716-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Microsoft Windows Networking Essentials; Acknowledgments; About the Author; Contents; Introduction; Chapter 1: Introduction to Networking; Comparing Logical and Physical Networks; Networking Home Computers; Networking Small Offices and Home Offices; Networking Large Offices; Networking Enterprises; Understanding Standards Organizations; The Essentials and Beyond; Chapter 2: Overview of Networking Components; Comparing Unicast, Broadcast, and Multicast Traffic; Understanding Network Hardware; Exploring Protocols and Services; Understanding Basic Topologies; The Essentials and Beyond
Chapter 3: Understanding the OSI ModelUnderstanding the OSI Model; Understanding the TCP/IP Model; Mapping Devices on the OSI and TCP Models; Mapping Protocols on the OSI and TCP/IP Models; The Essentials and Beyond; Chapter 4: Core TCP/IP Protocols; Understanding TCP and UDP; Exploring Common Protocols; Understanding Ports; The Essentials and Beyond; Chapter 5: Exploring IPv4; Exploring the Components of an IPv4 Address; Exploring an IPv4 Address in Binary; Subnetting IPv4 Addresses; Comparing Manual and Automatic Assignment of IPv4 Addresses; The Essentials and Beyond
Chapter 6: Exploring IPv6Exploring IPv6 Addresses; Exploring the Components of an IPv6 Address; Understanding the Dual IP Stack; Comparing Manual and Automatic Assignment of IPv6; The Essentials and Beyond; Chapter 7: Connecting Computers to a Network; Identifying Potential Problems with Connectivity; Exploring Cable Types and Their Characteristics; The Essentials and Beyond; Chapter 8: Networking Computers with Switches; Connecting Multiple Computers; Understanding Physical Ports; Comparing Hubs and Switches; Comparing Managed and Unmanaged Switches; Exploring Switch Speeds
Understanding Security OptionsThe Essentials and Beyond; Chapter 9: Connecting Networks with Routers; Connecting Multiple Networks; Routing Traffic on a Network; Identifying Transmission Speeds; Routing Software in Windows Server 2008; Understanding Other Routing Protocols; The Essentials and Beyond; Chapter 10: Resolving Names to IP Addresses; Exploring Types of Names Used in Networks; Exploring Types of Name Resolution; Identifying the Steps in Name Resolution; The Essentials and Beyond; Chapter 11: Understanding Network Security Zones; Understanding Risks on the Internet
Exploring an IntranetUnderstanding Firewalls; Identifying a Perimeter Network; Understanding Extranets; The Essentials and Beyond; Chapter 12: Understanding Wireless Networking; Exploring Basic Wireless Components; Comparing Networking Standards and Characteristics; Comparing Network Security Methods; Using Wireless Networks; Understanding Point-to-Point Wireless; The Essentials and Beyond; Chapter 13: Understanding Internet Access Methods and Wide Area Networks; Comparing Connectivity Methods Used in Homes and SOHOs; Comparing Connectivity Methods in Enterprises
Exploring Remote Access Services
Record Nr. UNINA-9910781444503321
Gibson Darril  
San Francisco, : Wiley Pub., Inc., 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microsoft Windows networking essentials [[electronic resource] /] / Darril Gibson
Microsoft Windows networking essentials [[electronic resource] /] / Darril Gibson
Autore Gibson Darril
Edizione [1st ed.]
Pubbl/distr/stampa San Francisco, : Wiley Pub., Inc., 2011
Descrizione fisica 1 online resource (370 p.)
Disciplina 004.6
Collana Serious skills
Soggetto topico Computer networks
Internetworking (Telecommunication)
ISBN 1-283-37478-1
9786613374783
1-118-07716-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Microsoft Windows Networking Essentials; Acknowledgments; About the Author; Contents; Introduction; Chapter 1: Introduction to Networking; Comparing Logical and Physical Networks; Networking Home Computers; Networking Small Offices and Home Offices; Networking Large Offices; Networking Enterprises; Understanding Standards Organizations; The Essentials and Beyond; Chapter 2: Overview of Networking Components; Comparing Unicast, Broadcast, and Multicast Traffic; Understanding Network Hardware; Exploring Protocols and Services; Understanding Basic Topologies; The Essentials and Beyond
Chapter 3: Understanding the OSI ModelUnderstanding the OSI Model; Understanding the TCP/IP Model; Mapping Devices on the OSI and TCP Models; Mapping Protocols on the OSI and TCP/IP Models; The Essentials and Beyond; Chapter 4: Core TCP/IP Protocols; Understanding TCP and UDP; Exploring Common Protocols; Understanding Ports; The Essentials and Beyond; Chapter 5: Exploring IPv4; Exploring the Components of an IPv4 Address; Exploring an IPv4 Address in Binary; Subnetting IPv4 Addresses; Comparing Manual and Automatic Assignment of IPv4 Addresses; The Essentials and Beyond
Chapter 6: Exploring IPv6Exploring IPv6 Addresses; Exploring the Components of an IPv6 Address; Understanding the Dual IP Stack; Comparing Manual and Automatic Assignment of IPv6; The Essentials and Beyond; Chapter 7: Connecting Computers to a Network; Identifying Potential Problems with Connectivity; Exploring Cable Types and Their Characteristics; The Essentials and Beyond; Chapter 8: Networking Computers with Switches; Connecting Multiple Computers; Understanding Physical Ports; Comparing Hubs and Switches; Comparing Managed and Unmanaged Switches; Exploring Switch Speeds
Understanding Security OptionsThe Essentials and Beyond; Chapter 9: Connecting Networks with Routers; Connecting Multiple Networks; Routing Traffic on a Network; Identifying Transmission Speeds; Routing Software in Windows Server 2008; Understanding Other Routing Protocols; The Essentials and Beyond; Chapter 10: Resolving Names to IP Addresses; Exploring Types of Names Used in Networks; Exploring Types of Name Resolution; Identifying the Steps in Name Resolution; The Essentials and Beyond; Chapter 11: Understanding Network Security Zones; Understanding Risks on the Internet
Exploring an IntranetUnderstanding Firewalls; Identifying a Perimeter Network; Understanding Extranets; The Essentials and Beyond; Chapter 12: Understanding Wireless Networking; Exploring Basic Wireless Components; Comparing Networking Standards and Characteristics; Comparing Network Security Methods; Using Wireless Networks; Understanding Point-to-Point Wireless; The Essentials and Beyond; Chapter 13: Understanding Internet Access Methods and Wide Area Networks; Comparing Connectivity Methods Used in Homes and SOHOs; Comparing Connectivity Methods in Enterprises
Exploring Remote Access Services
Record Nr. UNINA-9910807178903321
Gibson Darril  
San Francisco, : Wiley Pub., Inc., 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson
Autore Gibson Darril
Pubbl/distr/stampa Hoboken, : Wiley, 2011
Descrizione fisica 1 online resource (374 p.)
Disciplina 005.8
621.3916076
Collana Sybex serious skills
Essentials (Indianapolis, Ind.)
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer networks -- Examinations -- Study guides
Computer security - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-283-17725-0
9786613177254
1-118-11454-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication
Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions
Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing
Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA
Chapter 6: Protecting Clients and Servers
Record Nr. UNINA-9910456690103321
Gibson Darril  
Hoboken, : Wiley, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson
Autore Gibson Darril
Pubbl/distr/stampa Hoboken, : Wiley, 2011
Descrizione fisica 1 online resource (374 p.)
Disciplina 005.8
621.3916076
Collana Sybex serious skills
Essentials (Indianapolis, Ind.)
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer networks -- Examinations -- Study guides
Computer security - Examinations
ISBN 1-283-17725-0
9786613177254
1-118-11454-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication
Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions
Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing
Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA
Chapter 6: Protecting Clients and Servers
Record Nr. UNINA-9910781479003321
Gibson Darril  
Hoboken, : Wiley, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson
Autore Gibson Darril
Pubbl/distr/stampa Hoboken, : Wiley, 2011
Descrizione fisica 1 online resource (374 p.)
Disciplina 005.8
621.3916076
Collana Sybex serious skills
Essentials (Indianapolis, Ind.)
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer networks -- Examinations -- Study guides
Computer security - Examinations
ISBN 1-283-17725-0
9786613177254
1-118-11454-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication
Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions
Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing
Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA
Chapter 6: Protecting Clients and Servers
Record Nr. UNINA-9910810340503321
Gibson Darril  
Hoboken, : Wiley, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Windows 7 desktop support and administration [[electronic resource] ] : real world skills for MCITP certification and beyond / / Darril Gibson
Windows 7 desktop support and administration [[electronic resource] ] : real world skills for MCITP certification and beyond / / Darril Gibson
Autore Gibson Darril
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, : Wiley Technology Pub., c2010
Descrizione fisica 1 online resource (674 p.)
Disciplina 005.4/46
Collana Sybex serious skills Windows 7 desktop support and administration
Soggetto topico Electronic data processing personnel - Certification
Microsoft software - Examinations
Soggetto genere / forma Electronic books.
ISBN 0-470-90081-4
1-282-70812-0
9786612708121
0-470-90079-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto MIcrosoft Windows 7 Desktop Support and Administration; Acknowledgments; About the Author; Contents at a Glance; Contents; Untitled; Table of Exercises; Introduction; Chapter 1: Planning for the Installation of Windows 7; Choosing a Windows 7 Edition; Local Installation; Designing User State Migration; Virtualization Considerations; Planning and Managing Client Licensing and Activation; Summary; Chapter Essentials; Chapter 2: Automating the Deployment of Windows 7; Understanding and Designing Images; Choosing a Deployment Strategy; Imaging with the Windows Automated Installation Kit
Deploying Images with Windows Deployment ServicesUsing the Microsoft Deployment Toolkit 2010; Summary; Chapter Essentials; Chapter 3: Using the Command Prompt and PowerShell; Using the Windows Command Prompt; Using Windows PowerShell and the PowerShell ISE; Summary; Chapter Essentials; Chapter 4: Managing the Life Cycle-Keeping Windows 7 Up to Date; Keeping Windows Up to Date; Choosing an Update Tool; Using MBSA for Security Audits; Using Windows Server Update Services; Summary; Chapter Essentials; Chapter 5: Maintaining and Troubleshooting Windows 7
Identifying and Resolving Performance IssuesUsing Windows RE; Managing Hardware in Windows 7; Troubleshooting Boot Issues; Summary; Chapter Essentials; Chapter 6: Configuring and Troubleshooting Application Issues; Installing and Configuring Software; Designing a Delivery Strategy; Designing a Deployment Strategy; Identifying and Resolving Software Failure Issues; Summary; Chapter Essentials; Chapter 7: Networking with Windows 7; Understanding Network Connectivity in an Enterprise; Resolving Names to IP Addresses; Using the Network and Sharing Center
Troubleshooting Network Connectivity ProblemsSummary; Chapter Essentials; Chapter 8: Accessing Resources on a Network; Accessing Network Resources; Understanding Permissions; Identifying and Resolving Network Printer Issues; Summary; Chapter Essentials; Chapter 9: Managing Windows 7 in a Domain; Joining a Domain; Authentication vs. Authorization; Identifying and Resolving Logon Issues; Understanding User Profiles; Anti-Malware Software; Summary; Chapter Essentials; Chapter 10: Managing Windows 7 with Group Policy; Group Policy and the GPMC; Group Policy Settings; Summary; Chapter Essentials
Chapter 11: Managing Security in Windows 7User Account Control; Security Policies; Designing BitLocker Support; Windows Firewall; Summary; Chapter Essentials; Chapter 12: Supporting Mobile Windows 7 Users; Configuring and Troubleshooting Wireless Connectivity; Troubleshooting Remote Access Issues; Understanding DirectAccess; Using BranchCache; Summary; Chapter Essentials; Chapter 13: Administering Internet Explorer; Managing Windows Internet Explorer Settings; Understanding Advanced Settings; Troubleshooting Internet Explorer Issues; Summary; Chapter Essentials
Appendix A: Objective Mapping to Chapter Titles
Record Nr. UNINA-9910458826403321
Gibson Darril  
Indianapolis, : Wiley Technology Pub., c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Windows 7 desktop support and administration [[electronic resource] ] : real world skills for MCITP certification and beyond / / Darril Gibson
Windows 7 desktop support and administration [[electronic resource] ] : real world skills for MCITP certification and beyond / / Darril Gibson
Autore Gibson Darril
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, : Wiley Technology Pub., c2010
Descrizione fisica 1 online resource (674 p.)
Disciplina 005.4/46
Collana Sybex serious skills Windows 7 desktop support and administration
Soggetto topico Electronic data processing personnel - Certification
Microsoft software - Examinations
ISBN 0-470-90081-4
1-282-70812-0
9786612708121
0-470-90079-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto MIcrosoft Windows 7 Desktop Support and Administration; Acknowledgments; About the Author; Contents at a Glance; Contents; Untitled; Table of Exercises; Introduction; Chapter 1: Planning for the Installation of Windows 7; Choosing a Windows 7 Edition; Local Installation; Designing User State Migration; Virtualization Considerations; Planning and Managing Client Licensing and Activation; Summary; Chapter Essentials; Chapter 2: Automating the Deployment of Windows 7; Understanding and Designing Images; Choosing a Deployment Strategy; Imaging with the Windows Automated Installation Kit
Deploying Images with Windows Deployment ServicesUsing the Microsoft Deployment Toolkit 2010; Summary; Chapter Essentials; Chapter 3: Using the Command Prompt and PowerShell; Using the Windows Command Prompt; Using Windows PowerShell and the PowerShell ISE; Summary; Chapter Essentials; Chapter 4: Managing the Life Cycle-Keeping Windows 7 Up to Date; Keeping Windows Up to Date; Choosing an Update Tool; Using MBSA for Security Audits; Using Windows Server Update Services; Summary; Chapter Essentials; Chapter 5: Maintaining and Troubleshooting Windows 7
Identifying and Resolving Performance IssuesUsing Windows RE; Managing Hardware in Windows 7; Troubleshooting Boot Issues; Summary; Chapter Essentials; Chapter 6: Configuring and Troubleshooting Application Issues; Installing and Configuring Software; Designing a Delivery Strategy; Designing a Deployment Strategy; Identifying and Resolving Software Failure Issues; Summary; Chapter Essentials; Chapter 7: Networking with Windows 7; Understanding Network Connectivity in an Enterprise; Resolving Names to IP Addresses; Using the Network and Sharing Center
Troubleshooting Network Connectivity ProblemsSummary; Chapter Essentials; Chapter 8: Accessing Resources on a Network; Accessing Network Resources; Understanding Permissions; Identifying and Resolving Network Printer Issues; Summary; Chapter Essentials; Chapter 9: Managing Windows 7 in a Domain; Joining a Domain; Authentication vs. Authorization; Identifying and Resolving Logon Issues; Understanding User Profiles; Anti-Malware Software; Summary; Chapter Essentials; Chapter 10: Managing Windows 7 with Group Policy; Group Policy and the GPMC; Group Policy Settings; Summary; Chapter Essentials
Chapter 11: Managing Security in Windows 7User Account Control; Security Policies; Designing BitLocker Support; Windows Firewall; Summary; Chapter Essentials; Chapter 12: Supporting Mobile Windows 7 Users; Configuring and Troubleshooting Wireless Connectivity; Troubleshooting Remote Access Issues; Understanding DirectAccess; Using BranchCache; Summary; Chapter Essentials; Chapter 13: Administering Internet Explorer; Managing Windows Internet Explorer Settings; Understanding Advanced Settings; Troubleshooting Internet Explorer Issues; Summary; Chapter Essentials
Appendix A: Objective Mapping to Chapter Titles
Record Nr. UNINA-9910784943203321
Gibson Darril  
Indianapolis, : Wiley Technology Pub., c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Windows 7 desktop support and administration [[electronic resource] ] : real world skills for MCITP certification and beyond / / Darril Gibson
Windows 7 desktop support and administration [[electronic resource] ] : real world skills for MCITP certification and beyond / / Darril Gibson
Autore Gibson Darril
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, : Wiley Technology Pub., c2010
Descrizione fisica 1 online resource (674 p.)
Disciplina 005.4/46
Collana Sybex serious skills Windows 7 desktop support and administration
Soggetto topico Electronic data processing personnel - Certification
Microsoft software - Examinations
ISBN 0-470-90081-4
1-282-70812-0
9786612708121
0-470-90079-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto MIcrosoft Windows 7 Desktop Support and Administration; Acknowledgments; About the Author; Contents at a Glance; Contents; Untitled; Table of Exercises; Introduction; Chapter 1: Planning for the Installation of Windows 7; Choosing a Windows 7 Edition; Local Installation; Designing User State Migration; Virtualization Considerations; Planning and Managing Client Licensing and Activation; Summary; Chapter Essentials; Chapter 2: Automating the Deployment of Windows 7; Understanding and Designing Images; Choosing a Deployment Strategy; Imaging with the Windows Automated Installation Kit
Deploying Images with Windows Deployment ServicesUsing the Microsoft Deployment Toolkit 2010; Summary; Chapter Essentials; Chapter 3: Using the Command Prompt and PowerShell; Using the Windows Command Prompt; Using Windows PowerShell and the PowerShell ISE; Summary; Chapter Essentials; Chapter 4: Managing the Life Cycle-Keeping Windows 7 Up to Date; Keeping Windows Up to Date; Choosing an Update Tool; Using MBSA for Security Audits; Using Windows Server Update Services; Summary; Chapter Essentials; Chapter 5: Maintaining and Troubleshooting Windows 7
Identifying and Resolving Performance IssuesUsing Windows RE; Managing Hardware in Windows 7; Troubleshooting Boot Issues; Summary; Chapter Essentials; Chapter 6: Configuring and Troubleshooting Application Issues; Installing and Configuring Software; Designing a Delivery Strategy; Designing a Deployment Strategy; Identifying and Resolving Software Failure Issues; Summary; Chapter Essentials; Chapter 7: Networking with Windows 7; Understanding Network Connectivity in an Enterprise; Resolving Names to IP Addresses; Using the Network and Sharing Center
Troubleshooting Network Connectivity ProblemsSummary; Chapter Essentials; Chapter 8: Accessing Resources on a Network; Accessing Network Resources; Understanding Permissions; Identifying and Resolving Network Printer Issues; Summary; Chapter Essentials; Chapter 9: Managing Windows 7 in a Domain; Joining a Domain; Authentication vs. Authorization; Identifying and Resolving Logon Issues; Understanding User Profiles; Anti-Malware Software; Summary; Chapter Essentials; Chapter 10: Managing Windows 7 with Group Policy; Group Policy and the GPMC; Group Policy Settings; Summary; Chapter Essentials
Chapter 11: Managing Security in Windows 7User Account Control; Security Policies; Designing BitLocker Support; Windows Firewall; Summary; Chapter Essentials; Chapter 12: Supporting Mobile Windows 7 Users; Configuring and Troubleshooting Wireless Connectivity; Troubleshooting Remote Access Issues; Understanding DirectAccess; Using BranchCache; Summary; Chapter Essentials; Chapter 13: Administering Internet Explorer; Managing Windows Internet Explorer Settings; Understanding Advanced Settings; Troubleshooting Internet Explorer Issues; Summary; Chapter Essentials
Appendix A: Objective Mapping to Chapter Titles
Record Nr. UNINA-9910816018403321
Gibson Darril  
Indianapolis, : Wiley Technology Pub., c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui