Managing risk in information systems / / Darril Gibson |
Autore | Gibson Darril |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2015 |
Descrizione fisica | 1 online resource (548 pages) : illustrations |
Disciplina | 005.8 |
Collana | Jones & Bartlett Learning Information Systems Security & Assurance Series |
Soggetto topico |
Computer security
Electronic information resources - Access control |
ISBN | 1-284-05596-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Pt. 1. Risk management business challenges -- Risk management fundamentals -- Managing risk : threats, vulnerabilities, and exploits -- Maintaining compliance -- Developing a risk management plan -- pt. 2. Mitigating risk -- Defining risk assessment approaches -- Performing a risk assessment -- Identifying assets and activities to be protected -- Identifying and analyzing threats, vulnerabilities, and exploits -- Identifying and analyzing risk mitigation security controls -- Planning risk mitigation throughout your organization -- Turning your risk assessment into a risk mitigation plan -- pt 3. Risk mitigation plans -- Mitigating risk with a business impact analysis -- Mitigating risk with a business continuity plan -- Mitigating risk with a disaster recovery plan -- Mitigating risk with a computer incident response team plan. |
Record Nr. | UNINA-9910165026703321 |
Gibson Darril | ||
Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Microsoft Windows networking essentials [[electronic resource] /] / Darril Gibson |
Autore | Gibson Darril |
Edizione | [1st ed.] |
Pubbl/distr/stampa | San Francisco, : Wiley Pub., Inc., 2011 |
Descrizione fisica | 1 online resource (370 p.) |
Disciplina | 004.6 |
Collana | Serious skills |
Soggetto topico |
Computer networks
Internetworking (Telecommunication) |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-37478-1
9786613374783 1-118-07716-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Microsoft Windows Networking Essentials; Acknowledgments; About the Author; Contents; Introduction; Chapter 1: Introduction to Networking; Comparing Logical and Physical Networks; Networking Home Computers; Networking Small Offices and Home Offices; Networking Large Offices; Networking Enterprises; Understanding Standards Organizations; The Essentials and Beyond; Chapter 2: Overview of Networking Components; Comparing Unicast, Broadcast, and Multicast Traffic; Understanding Network Hardware; Exploring Protocols and Services; Understanding Basic Topologies; The Essentials and Beyond
Chapter 3: Understanding the OSI ModelUnderstanding the OSI Model; Understanding the TCP/IP Model; Mapping Devices on the OSI and TCP Models; Mapping Protocols on the OSI and TCP/IP Models; The Essentials and Beyond; Chapter 4: Core TCP/IP Protocols; Understanding TCP and UDP; Exploring Common Protocols; Understanding Ports; The Essentials and Beyond; Chapter 5: Exploring IPv4; Exploring the Components of an IPv4 Address; Exploring an IPv4 Address in Binary; Subnetting IPv4 Addresses; Comparing Manual and Automatic Assignment of IPv4 Addresses; The Essentials and Beyond Chapter 6: Exploring IPv6Exploring IPv6 Addresses; Exploring the Components of an IPv6 Address; Understanding the Dual IP Stack; Comparing Manual and Automatic Assignment of IPv6; The Essentials and Beyond; Chapter 7: Connecting Computers to a Network; Identifying Potential Problems with Connectivity; Exploring Cable Types and Their Characteristics; The Essentials and Beyond; Chapter 8: Networking Computers with Switches; Connecting Multiple Computers; Understanding Physical Ports; Comparing Hubs and Switches; Comparing Managed and Unmanaged Switches; Exploring Switch Speeds Understanding Security OptionsThe Essentials and Beyond; Chapter 9: Connecting Networks with Routers; Connecting Multiple Networks; Routing Traffic on a Network; Identifying Transmission Speeds; Routing Software in Windows Server 2008; Understanding Other Routing Protocols; The Essentials and Beyond; Chapter 10: Resolving Names to IP Addresses; Exploring Types of Names Used in Networks; Exploring Types of Name Resolution; Identifying the Steps in Name Resolution; The Essentials and Beyond; Chapter 11: Understanding Network Security Zones; Understanding Risks on the Internet Exploring an IntranetUnderstanding Firewalls; Identifying a Perimeter Network; Understanding Extranets; The Essentials and Beyond; Chapter 12: Understanding Wireless Networking; Exploring Basic Wireless Components; Comparing Networking Standards and Characteristics; Comparing Network Security Methods; Using Wireless Networks; Understanding Point-to-Point Wireless; The Essentials and Beyond; Chapter 13: Understanding Internet Access Methods and Wide Area Networks; Comparing Connectivity Methods Used in Homes and SOHOs; Comparing Connectivity Methods in Enterprises Exploring Remote Access Services |
Record Nr. | UNINA-9910457526303321 |
Gibson Darril | ||
San Francisco, : Wiley Pub., Inc., 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Microsoft Windows networking essentials [[electronic resource] /] / Darril Gibson |
Autore | Gibson Darril |
Edizione | [1st ed.] |
Pubbl/distr/stampa | San Francisco, : Wiley Pub., Inc., 2011 |
Descrizione fisica | 1 online resource (370 p.) |
Disciplina | 004.6 |
Collana | Serious skills |
Soggetto topico |
Computer networks
Internetworking (Telecommunication) |
ISBN |
1-283-37478-1
9786613374783 1-118-07716-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Microsoft Windows Networking Essentials; Acknowledgments; About the Author; Contents; Introduction; Chapter 1: Introduction to Networking; Comparing Logical and Physical Networks; Networking Home Computers; Networking Small Offices and Home Offices; Networking Large Offices; Networking Enterprises; Understanding Standards Organizations; The Essentials and Beyond; Chapter 2: Overview of Networking Components; Comparing Unicast, Broadcast, and Multicast Traffic; Understanding Network Hardware; Exploring Protocols and Services; Understanding Basic Topologies; The Essentials and Beyond
Chapter 3: Understanding the OSI ModelUnderstanding the OSI Model; Understanding the TCP/IP Model; Mapping Devices on the OSI and TCP Models; Mapping Protocols on the OSI and TCP/IP Models; The Essentials and Beyond; Chapter 4: Core TCP/IP Protocols; Understanding TCP and UDP; Exploring Common Protocols; Understanding Ports; The Essentials and Beyond; Chapter 5: Exploring IPv4; Exploring the Components of an IPv4 Address; Exploring an IPv4 Address in Binary; Subnetting IPv4 Addresses; Comparing Manual and Automatic Assignment of IPv4 Addresses; The Essentials and Beyond Chapter 6: Exploring IPv6Exploring IPv6 Addresses; Exploring the Components of an IPv6 Address; Understanding the Dual IP Stack; Comparing Manual and Automatic Assignment of IPv6; The Essentials and Beyond; Chapter 7: Connecting Computers to a Network; Identifying Potential Problems with Connectivity; Exploring Cable Types and Their Characteristics; The Essentials and Beyond; Chapter 8: Networking Computers with Switches; Connecting Multiple Computers; Understanding Physical Ports; Comparing Hubs and Switches; Comparing Managed and Unmanaged Switches; Exploring Switch Speeds Understanding Security OptionsThe Essentials and Beyond; Chapter 9: Connecting Networks with Routers; Connecting Multiple Networks; Routing Traffic on a Network; Identifying Transmission Speeds; Routing Software in Windows Server 2008; Understanding Other Routing Protocols; The Essentials and Beyond; Chapter 10: Resolving Names to IP Addresses; Exploring Types of Names Used in Networks; Exploring Types of Name Resolution; Identifying the Steps in Name Resolution; The Essentials and Beyond; Chapter 11: Understanding Network Security Zones; Understanding Risks on the Internet Exploring an IntranetUnderstanding Firewalls; Identifying a Perimeter Network; Understanding Extranets; The Essentials and Beyond; Chapter 12: Understanding Wireless Networking; Exploring Basic Wireless Components; Comparing Networking Standards and Characteristics; Comparing Network Security Methods; Using Wireless Networks; Understanding Point-to-Point Wireless; The Essentials and Beyond; Chapter 13: Understanding Internet Access Methods and Wide Area Networks; Comparing Connectivity Methods Used in Homes and SOHOs; Comparing Connectivity Methods in Enterprises Exploring Remote Access Services |
Record Nr. | UNINA-9910781444503321 |
Gibson Darril | ||
San Francisco, : Wiley Pub., Inc., 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Microsoft Windows networking essentials / / Darril Gibson |
Autore | Gibson Darril |
Edizione | [1st ed.] |
Pubbl/distr/stampa | San Francisco, : Wiley Pub., Inc., 2011 |
Descrizione fisica | 1 online resource (370 p.) |
Disciplina | 004.6 |
Collana | Serious skills |
Soggetto topico |
Computer networks
Internetworking (Telecommunication) |
ISBN |
1-283-37478-1
9786613374783 1-118-07716-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Microsoft Windows Networking Essentials; Acknowledgments; About the Author; Contents; Introduction; Chapter 1: Introduction to Networking; Comparing Logical and Physical Networks; Networking Home Computers; Networking Small Offices and Home Offices; Networking Large Offices; Networking Enterprises; Understanding Standards Organizations; The Essentials and Beyond; Chapter 2: Overview of Networking Components; Comparing Unicast, Broadcast, and Multicast Traffic; Understanding Network Hardware; Exploring Protocols and Services; Understanding Basic Topologies; The Essentials and Beyond
Chapter 3: Understanding the OSI ModelUnderstanding the OSI Model; Understanding the TCP/IP Model; Mapping Devices on the OSI and TCP Models; Mapping Protocols on the OSI and TCP/IP Models; The Essentials and Beyond; Chapter 4: Core TCP/IP Protocols; Understanding TCP and UDP; Exploring Common Protocols; Understanding Ports; The Essentials and Beyond; Chapter 5: Exploring IPv4; Exploring the Components of an IPv4 Address; Exploring an IPv4 Address in Binary; Subnetting IPv4 Addresses; Comparing Manual and Automatic Assignment of IPv4 Addresses; The Essentials and Beyond Chapter 6: Exploring IPv6Exploring IPv6 Addresses; Exploring the Components of an IPv6 Address; Understanding the Dual IP Stack; Comparing Manual and Automatic Assignment of IPv6; The Essentials and Beyond; Chapter 7: Connecting Computers to a Network; Identifying Potential Problems with Connectivity; Exploring Cable Types and Their Characteristics; The Essentials and Beyond; Chapter 8: Networking Computers with Switches; Connecting Multiple Computers; Understanding Physical Ports; Comparing Hubs and Switches; Comparing Managed and Unmanaged Switches; Exploring Switch Speeds Understanding Security OptionsThe Essentials and Beyond; Chapter 9: Connecting Networks with Routers; Connecting Multiple Networks; Routing Traffic on a Network; Identifying Transmission Speeds; Routing Software in Windows Server 2008; Understanding Other Routing Protocols; The Essentials and Beyond; Chapter 10: Resolving Names to IP Addresses; Exploring Types of Names Used in Networks; Exploring Types of Name Resolution; Identifying the Steps in Name Resolution; The Essentials and Beyond; Chapter 11: Understanding Network Security Zones; Understanding Risks on the Internet Exploring an IntranetUnderstanding Firewalls; Identifying a Perimeter Network; Understanding Extranets; The Essentials and Beyond; Chapter 12: Understanding Wireless Networking; Exploring Basic Wireless Components; Comparing Networking Standards and Characteristics; Comparing Network Security Methods; Using Wireless Networks; Understanding Point-to-Point Wireless; The Essentials and Beyond; Chapter 13: Understanding Internet Access Methods and Wide Area Networks; Comparing Connectivity Methods Used in Homes and SOHOs; Comparing Connectivity Methods in Enterprises Exploring Remote Access Services |
Record Nr. | UNINA-9910807178903321 |
Gibson Darril | ||
San Francisco, : Wiley Pub., Inc., 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson |
Autore | Gibson Darril |
Pubbl/distr/stampa | Hoboken, : Wiley, 2011 |
Descrizione fisica | 1 online resource (374 p.) |
Disciplina |
005.8
621.3916076 |
Collana |
Sybex serious skills
Essentials (Indianapolis, Ind.) |
Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer networks -- Examinations -- Study guides Computer security - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-17725-0
9786613177254 1-118-11454-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA Chapter 6: Protecting Clients and Servers |
Record Nr. | UNINA-9910456690103321 |
Gibson Darril | ||
Hoboken, : Wiley, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson |
Autore | Gibson Darril |
Pubbl/distr/stampa | Hoboken, : Wiley, 2011 |
Descrizione fisica | 1 online resource (374 p.) |
Disciplina |
005.8
621.3916076 |
Collana |
Sybex serious skills
Essentials (Indianapolis, Ind.) |
Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer networks -- Examinations -- Study guides Computer security - Examinations |
ISBN |
1-283-17725-0
9786613177254 1-118-11454-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA Chapter 6: Protecting Clients and Servers |
Record Nr. | UNINA-9910781479003321 |
Gibson Darril | ||
Hoboken, : Wiley, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Microsoft Windows Security : Essentials / / Darril Gibson |
Autore | Gibson Darril |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Hoboken, : Wiley, 2011 |
Descrizione fisica | 1 online resource (374 p.) |
Disciplina |
005.8
621.3916076 |
Collana |
Sybex serious skills
Essentials (Indianapolis, Ind.) |
Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer networks -- Examinations -- Study guides Computer security - Examinations |
ISBN |
1-283-17725-0
9786613177254 1-118-11454-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA Chapter 6: Protecting Clients and Servers |
Record Nr. | UNINA-9910810340503321 |
Gibson Darril | ||
Hoboken, : Wiley, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Windows 7 desktop support and administration [[electronic resource] ] : real world skills for MCITP certification and beyond / / Darril Gibson |
Autore | Gibson Darril |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Indianapolis, : Wiley Technology Pub., c2010 |
Descrizione fisica | 1 online resource (674 p.) |
Disciplina | 005.4/46 |
Collana | Sybex serious skills Windows 7 desktop support and administration |
Soggetto topico |
Electronic data processing personnel - Certification
Microsoft software - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN |
0-470-90081-4
1-282-70812-0 9786612708121 0-470-90079-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
MIcrosoft Windows 7 Desktop Support and Administration; Acknowledgments; About the Author; Contents at a Glance; Contents; Untitled; Table of Exercises; Introduction; Chapter 1: Planning for the Installation of Windows 7; Choosing a Windows 7 Edition; Local Installation; Designing User State Migration; Virtualization Considerations; Planning and Managing Client Licensing and Activation; Summary; Chapter Essentials; Chapter 2: Automating the Deployment of Windows 7; Understanding and Designing Images; Choosing a Deployment Strategy; Imaging with the Windows Automated Installation Kit
Deploying Images with Windows Deployment ServicesUsing the Microsoft Deployment Toolkit 2010; Summary; Chapter Essentials; Chapter 3: Using the Command Prompt and PowerShell; Using the Windows Command Prompt; Using Windows PowerShell and the PowerShell ISE; Summary; Chapter Essentials; Chapter 4: Managing the Life Cycle-Keeping Windows 7 Up to Date; Keeping Windows Up to Date; Choosing an Update Tool; Using MBSA for Security Audits; Using Windows Server Update Services; Summary; Chapter Essentials; Chapter 5: Maintaining and Troubleshooting Windows 7 Identifying and Resolving Performance IssuesUsing Windows RE; Managing Hardware in Windows 7; Troubleshooting Boot Issues; Summary; Chapter Essentials; Chapter 6: Configuring and Troubleshooting Application Issues; Installing and Configuring Software; Designing a Delivery Strategy; Designing a Deployment Strategy; Identifying and Resolving Software Failure Issues; Summary; Chapter Essentials; Chapter 7: Networking with Windows 7; Understanding Network Connectivity in an Enterprise; Resolving Names to IP Addresses; Using the Network and Sharing Center Troubleshooting Network Connectivity ProblemsSummary; Chapter Essentials; Chapter 8: Accessing Resources on a Network; Accessing Network Resources; Understanding Permissions; Identifying and Resolving Network Printer Issues; Summary; Chapter Essentials; Chapter 9: Managing Windows 7 in a Domain; Joining a Domain; Authentication vs. Authorization; Identifying and Resolving Logon Issues; Understanding User Profiles; Anti-Malware Software; Summary; Chapter Essentials; Chapter 10: Managing Windows 7 with Group Policy; Group Policy and the GPMC; Group Policy Settings; Summary; Chapter Essentials Chapter 11: Managing Security in Windows 7User Account Control; Security Policies; Designing BitLocker Support; Windows Firewall; Summary; Chapter Essentials; Chapter 12: Supporting Mobile Windows 7 Users; Configuring and Troubleshooting Wireless Connectivity; Troubleshooting Remote Access Issues; Understanding DirectAccess; Using BranchCache; Summary; Chapter Essentials; Chapter 13: Administering Internet Explorer; Managing Windows Internet Explorer Settings; Understanding Advanced Settings; Troubleshooting Internet Explorer Issues; Summary; Chapter Essentials Appendix A: Objective Mapping to Chapter Titles |
Record Nr. | UNINA-9910458826403321 |
Gibson Darril | ||
Indianapolis, : Wiley Technology Pub., c2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Windows 7 desktop support and administration [[electronic resource] ] : real world skills for MCITP certification and beyond / / Darril Gibson |
Autore | Gibson Darril |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Indianapolis, : Wiley Technology Pub., c2010 |
Descrizione fisica | 1 online resource (674 p.) |
Disciplina | 005.4/46 |
Collana | Sybex serious skills Windows 7 desktop support and administration |
Soggetto topico |
Electronic data processing personnel - Certification
Microsoft software - Examinations |
ISBN |
0-470-90081-4
1-282-70812-0 9786612708121 0-470-90079-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
MIcrosoft Windows 7 Desktop Support and Administration; Acknowledgments; About the Author; Contents at a Glance; Contents; Untitled; Table of Exercises; Introduction; Chapter 1: Planning for the Installation of Windows 7; Choosing a Windows 7 Edition; Local Installation; Designing User State Migration; Virtualization Considerations; Planning and Managing Client Licensing and Activation; Summary; Chapter Essentials; Chapter 2: Automating the Deployment of Windows 7; Understanding and Designing Images; Choosing a Deployment Strategy; Imaging with the Windows Automated Installation Kit
Deploying Images with Windows Deployment ServicesUsing the Microsoft Deployment Toolkit 2010; Summary; Chapter Essentials; Chapter 3: Using the Command Prompt and PowerShell; Using the Windows Command Prompt; Using Windows PowerShell and the PowerShell ISE; Summary; Chapter Essentials; Chapter 4: Managing the Life Cycle-Keeping Windows 7 Up to Date; Keeping Windows Up to Date; Choosing an Update Tool; Using MBSA for Security Audits; Using Windows Server Update Services; Summary; Chapter Essentials; Chapter 5: Maintaining and Troubleshooting Windows 7 Identifying and Resolving Performance IssuesUsing Windows RE; Managing Hardware in Windows 7; Troubleshooting Boot Issues; Summary; Chapter Essentials; Chapter 6: Configuring and Troubleshooting Application Issues; Installing and Configuring Software; Designing a Delivery Strategy; Designing a Deployment Strategy; Identifying and Resolving Software Failure Issues; Summary; Chapter Essentials; Chapter 7: Networking with Windows 7; Understanding Network Connectivity in an Enterprise; Resolving Names to IP Addresses; Using the Network and Sharing Center Troubleshooting Network Connectivity ProblemsSummary; Chapter Essentials; Chapter 8: Accessing Resources on a Network; Accessing Network Resources; Understanding Permissions; Identifying and Resolving Network Printer Issues; Summary; Chapter Essentials; Chapter 9: Managing Windows 7 in a Domain; Joining a Domain; Authentication vs. Authorization; Identifying and Resolving Logon Issues; Understanding User Profiles; Anti-Malware Software; Summary; Chapter Essentials; Chapter 10: Managing Windows 7 with Group Policy; Group Policy and the GPMC; Group Policy Settings; Summary; Chapter Essentials Chapter 11: Managing Security in Windows 7User Account Control; Security Policies; Designing BitLocker Support; Windows Firewall; Summary; Chapter Essentials; Chapter 12: Supporting Mobile Windows 7 Users; Configuring and Troubleshooting Wireless Connectivity; Troubleshooting Remote Access Issues; Understanding DirectAccess; Using BranchCache; Summary; Chapter Essentials; Chapter 13: Administering Internet Explorer; Managing Windows Internet Explorer Settings; Understanding Advanced Settings; Troubleshooting Internet Explorer Issues; Summary; Chapter Essentials Appendix A: Objective Mapping to Chapter Titles |
Record Nr. | UNINA-9910784943203321 |
Gibson Darril | ||
Indianapolis, : Wiley Technology Pub., c2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Windows 7 desktop support and administration : real world skills for MCITP certification and beyond / / Darril Gibson |
Autore | Gibson Darril |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Indianapolis, : Wiley Technology Pub., c2010 |
Descrizione fisica | 1 online resource (674 p.) |
Disciplina | 005.4/46 |
Collana | Sybex serious skills Windows 7 desktop support and administration |
Soggetto topico |
Electronic data processing personnel - Certification
Microsoft software - Examinations |
ISBN |
0-470-90081-4
1-282-70812-0 9786612708121 0-470-90079-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
MIcrosoft Windows 7 Desktop Support and Administration; Acknowledgments; About the Author; Contents at a Glance; Contents; Untitled; Table of Exercises; Introduction; Chapter 1: Planning for the Installation of Windows 7; Choosing a Windows 7 Edition; Local Installation; Designing User State Migration; Virtualization Considerations; Planning and Managing Client Licensing and Activation; Summary; Chapter Essentials; Chapter 2: Automating the Deployment of Windows 7; Understanding and Designing Images; Choosing a Deployment Strategy; Imaging with the Windows Automated Installation Kit
Deploying Images with Windows Deployment ServicesUsing the Microsoft Deployment Toolkit 2010; Summary; Chapter Essentials; Chapter 3: Using the Command Prompt and PowerShell; Using the Windows Command Prompt; Using Windows PowerShell and the PowerShell ISE; Summary; Chapter Essentials; Chapter 4: Managing the Life Cycle-Keeping Windows 7 Up to Date; Keeping Windows Up to Date; Choosing an Update Tool; Using MBSA for Security Audits; Using Windows Server Update Services; Summary; Chapter Essentials; Chapter 5: Maintaining and Troubleshooting Windows 7 Identifying and Resolving Performance IssuesUsing Windows RE; Managing Hardware in Windows 7; Troubleshooting Boot Issues; Summary; Chapter Essentials; Chapter 6: Configuring and Troubleshooting Application Issues; Installing and Configuring Software; Designing a Delivery Strategy; Designing a Deployment Strategy; Identifying and Resolving Software Failure Issues; Summary; Chapter Essentials; Chapter 7: Networking with Windows 7; Understanding Network Connectivity in an Enterprise; Resolving Names to IP Addresses; Using the Network and Sharing Center Troubleshooting Network Connectivity ProblemsSummary; Chapter Essentials; Chapter 8: Accessing Resources on a Network; Accessing Network Resources; Understanding Permissions; Identifying and Resolving Network Printer Issues; Summary; Chapter Essentials; Chapter 9: Managing Windows 7 in a Domain; Joining a Domain; Authentication vs. Authorization; Identifying and Resolving Logon Issues; Understanding User Profiles; Anti-Malware Software; Summary; Chapter Essentials; Chapter 10: Managing Windows 7 with Group Policy; Group Policy and the GPMC; Group Policy Settings; Summary; Chapter Essentials Chapter 11: Managing Security in Windows 7User Account Control; Security Policies; Designing BitLocker Support; Windows Firewall; Summary; Chapter Essentials; Chapter 12: Supporting Mobile Windows 7 Users; Configuring and Troubleshooting Wireless Connectivity; Troubleshooting Remote Access Issues; Understanding DirectAccess; Using BranchCache; Summary; Chapter Essentials; Chapter 13: Administering Internet Explorer; Managing Windows Internet Explorer Settings; Understanding Advanced Settings; Troubleshooting Internet Explorer Issues; Summary; Chapter Essentials Appendix A: Objective Mapping to Chapter Titles |
Record Nr. | UNINA-9910816018403321 |
Gibson Darril | ||
Indianapolis, : Wiley Technology Pub., c2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|