top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
(ISC)2 CISSP certified information systems security professional : official study guide / / Mike Chapple, James M. Stewart, Darril Gibson
(ISC)2 CISSP certified information systems security professional : official study guide / / Mike Chapple, James M. Stewart, Darril Gibson
Autore Chapple Mike
Edizione [Eighth edition.]
Pubbl/distr/stampa Indianapolis, Indiana : , : Sybex, A Wiley Brand, , [2018]
Descrizione fisica 1 online resource (1,107 pages)
Disciplina 005.8
Soggetto topico Computer security - Examinations
Computer networks - Security measures - Examinations
ISBN 1-119-54956-6
1-119-47595-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security governance through principles and policies -- Personnel security and risk management concepts -- Business continuity planning -- Laws, regulations, and compliance -- Protecting security of assets -- Cryptography and symmetric key algorithms -- PKI and cryptographic applications -- Principles of security models, design and capabilities -- Security vulnerabilities, threats, and countermeasures -- Physical security requirements -- Secure network architecture and securing network components -- Secure communications and network attacks -- Managing identity and authentication -- Controlling and monitoring access -- Security assessment and testing -- Managing security operations -- Preventing and responding to incidents -- Disaster recovery planning -- Investigations and ethics -- Software development security -- Malicious code and application attacks -- Appendix A. Answers to review questions -- Appendix B. Answers to written labs.
Record Nr. UNINA-9910555053203321
Chapple Mike  
Indianapolis, Indiana : , : Sybex, A Wiley Brand, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
Autore Stewart James Michael
Edizione [6th ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley, 2012
Descrizione fisica 1 online resource (938 p.)
Disciplina 005.8
Altri autori (Persone) ChappleMike, M.S.
GibsonDarril
Collana SYBEX serious skills CISSP
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-280-77577-7
9786613686169
1-118-46389-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control
Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary
Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions
Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies
WAN Connection Technologies
Record Nr. UNINA-9910462659203321
Stewart James Michael  
Indianapolis, IN, : Wiley, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
Autore Stewart James Michael
Edizione [6th ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley, 2012
Descrizione fisica 1 online resource (938 p.)
Disciplina 005.8
Altri autori (Persone) ChappleMike, M.S.
GibsonDarril
Collana SYBEX serious skills CISSP
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
ISBN 1-280-77577-7
9786613686169
1-118-46389-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control
Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary
Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions
Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies
WAN Connection Technologies
Record Nr. UNINA-9910790357203321
Stewart James Michael  
Indianapolis, IN, : Wiley, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
CISSP : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
Autore Stewart James Michael
Edizione [6th ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley, 2012
Descrizione fisica 1 online resource (938 p.)
Disciplina 005.8
Altri autori (Persone) ChappleMike, M.S.
GibsonDarril
Collana SYBEX serious skills CISSP
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
ISBN 1-280-77577-7
9786613686169
1-118-46389-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control
Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary
Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions
Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies
WAN Connection Technologies
Altri titoli varianti Certified Information Systems Security Professional
Record Nr. UNINA-9910953957203321
Stewart James Michael  
Indianapolis, IN, : Wiley, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering Windows 7 deployment [[electronic resource] /] / Aidan Finn, Darril Gibson, Kenneth van Surksum
Mastering Windows 7 deployment [[electronic resource] /] / Aidan Finn, Darril Gibson, Kenneth van Surksum
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley, 2011
Descrizione fisica 1 online resource (506 p.)
Disciplina 005.4/46
Altri autori (Persone) FinnAidan <1974->
GibsonDarril
Van SurksumKenneth
Collana Sybex serious skills
Soggetto topico Operating systems (Computers)
Configuration management
Soggetto genere / forma Electronic books.
ISBN 1-118-06804-1
1-283-37458-7
9786613374585
1-118-06802-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mastering Windows 7 Deployment; Acknowledgments; About the Authors; About the Contributing Author; Contents; Introduction; Who Should Read This Book; What Is Covered in This Book; How to Contact the Authors; Chapter 1; Meet Windows 7; Windows 7 Hardware Requirements; Using the Microsoft Assessment and Planning Toolkit; Produce MAP Reports and Proposals; The Bottom Line; Chapter 2; Application Compatibility; The Application Compatibility Toolkit; Deploying XP Mode; The Bottom Line; Chapter 3; Choosing the Right Edition of Windows 7; Speaking the Language: Four Ways to Use Windows Setup
Windows Setup in DetailPerforming the Windows 7 Installation; The Last Step: Licensing and Activation; The Bottom Line; Chapter 4; Getting Familiar with Microsoft Images; Creating Your First Image; Using the Windows Automated Installation Kit; Creating Bootable WinPE Media; Preparing a System with Sysprep; Capturing an Image Using ImageX; Applying an Image Using ImageX; Customizing Images Using Deployment Image Servicing and Management; Using Windows System Image Manager; The Bottom Line; Chapter 5; Exploring User Data and Settings; Working with Windows Easy Transfer
Working with the User State Migration ToolThe Bottom Line; Chapter 6; Understanding WDS; Deploying WDS; Image Management; Modifying PXE Client Response Policy; The Bottom Line; Chapter 7; Employing the PXE Client; Creating a Customized Installation Image; Using Unattended Answer Files with WDS; Monitoring, Logging, and Troubleshooting WDS; The Bottom Line; Chapter 8; Using WDS to Name Machines; Manage Domain Membership Using WDS; Using WDS for Multicast Deployments; The Bottom Line; Chapter 9; Setting Up Your Deployment Server; Installing MDT 2010 Update 1
Creating and Populating a Deployment ShareDeploying Your First Image; The Bottom Line; Chapter 10; Customizing the Deployment Share; Operating System Properties; Application Properties; Driver Properties; Package Properties; Task Sequence Properties; Automating the MDT Deployment Wizard; The Bottom Line; Chapter 11; Discovering Selection Profiles; Creating a Linked Deployment Share; Deploying from DVD; Working with the MDT Database; The Bottom Line; Chapter 12; Understanding Configuration Manager; Installing Configuration Manager 2007; Preparing and Configuring Boot Images
Creating and Capturing a Reference ImageIdentifying and Targeting Machines for Rebuilding; Deploying Windows 7; Monitoring Deployment Progress; The Bottom Line; Chapter 13; Choosing the Right Volume License Key for Windows; Tracking Your Licenses with the Key Management Service; KMS and the Client; Tracking Your Licenses: The Volume Activation Management Tool; The Bottom Line; Appendix; The Bottom Line; Chapter 1: Does Your Hardware Measure Up?; Chapter 2: Evaluating Applications for Windows 7 Compatibility; Chapter 3: Installing Windows 7: Meet the Panther
Chapter 4: Cloning the Panther: Automating Windows 7 Installation
Record Nr. UNINA-9910461564603321
Indianapolis, Ind., : Wiley, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering Windows 7 deployment [[electronic resource] /] / Aidan Finn, Darril Gibson, Kenneth van Surksum
Mastering Windows 7 deployment [[electronic resource] /] / Aidan Finn, Darril Gibson, Kenneth van Surksum
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley, 2011
Descrizione fisica 1 online resource (506 p.)
Disciplina 005.4/46
Altri autori (Persone) FinnAidan <1974->
GibsonDarril
Van SurksumKenneth
Collana Sybex serious skills
Soggetto topico Operating systems (Computers)
Configuration management
ISBN 1-118-06804-1
1-283-37458-7
9786613374585
1-118-06802-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mastering Windows 7 Deployment; Acknowledgments; About the Authors; About the Contributing Author; Contents; Introduction; Who Should Read This Book; What Is Covered in This Book; How to Contact the Authors; Chapter 1; Meet Windows 7; Windows 7 Hardware Requirements; Using the Microsoft Assessment and Planning Toolkit; Produce MAP Reports and Proposals; The Bottom Line; Chapter 2; Application Compatibility; The Application Compatibility Toolkit; Deploying XP Mode; The Bottom Line; Chapter 3; Choosing the Right Edition of Windows 7; Speaking the Language: Four Ways to Use Windows Setup
Windows Setup in DetailPerforming the Windows 7 Installation; The Last Step: Licensing and Activation; The Bottom Line; Chapter 4; Getting Familiar with Microsoft Images; Creating Your First Image; Using the Windows Automated Installation Kit; Creating Bootable WinPE Media; Preparing a System with Sysprep; Capturing an Image Using ImageX; Applying an Image Using ImageX; Customizing Images Using Deployment Image Servicing and Management; Using Windows System Image Manager; The Bottom Line; Chapter 5; Exploring User Data and Settings; Working with Windows Easy Transfer
Working with the User State Migration ToolThe Bottom Line; Chapter 6; Understanding WDS; Deploying WDS; Image Management; Modifying PXE Client Response Policy; The Bottom Line; Chapter 7; Employing the PXE Client; Creating a Customized Installation Image; Using Unattended Answer Files with WDS; Monitoring, Logging, and Troubleshooting WDS; The Bottom Line; Chapter 8; Using WDS to Name Machines; Manage Domain Membership Using WDS; Using WDS for Multicast Deployments; The Bottom Line; Chapter 9; Setting Up Your Deployment Server; Installing MDT 2010 Update 1
Creating and Populating a Deployment ShareDeploying Your First Image; The Bottom Line; Chapter 10; Customizing the Deployment Share; Operating System Properties; Application Properties; Driver Properties; Package Properties; Task Sequence Properties; Automating the MDT Deployment Wizard; The Bottom Line; Chapter 11; Discovering Selection Profiles; Creating a Linked Deployment Share; Deploying from DVD; Working with the MDT Database; The Bottom Line; Chapter 12; Understanding Configuration Manager; Installing Configuration Manager 2007; Preparing and Configuring Boot Images
Creating and Capturing a Reference ImageIdentifying and Targeting Machines for Rebuilding; Deploying Windows 7; Monitoring Deployment Progress; The Bottom Line; Chapter 13; Choosing the Right Volume License Key for Windows; Tracking Your Licenses with the Key Management Service; KMS and the Client; Tracking Your Licenses: The Volume Activation Management Tool; The Bottom Line; Appendix; The Bottom Line; Chapter 1: Does Your Hardware Measure Up?; Chapter 2: Evaluating Applications for Windows 7 Compatibility; Chapter 3: Installing Windows 7: Meet the Panther
Chapter 4: Cloning the Panther: Automating Windows 7 Installation
Record Nr. UNINA-9910789721803321
Indianapolis, Ind., : Wiley, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering Windows server 2008 R2 [[electronic resource] /] / Mark Minasi, Darril Gibson, Byron Hynes
Mastering Windows server 2008 R2 [[electronic resource] /] / Mark Minasi, Darril Gibson, Byron Hynes
Autore Minasi Mark
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, IN, : Wiley Pub., 2010
Descrizione fisica 1 online resource (1491 p.)
Disciplina 005.4/476
005.4476
Altri autori (Persone) GibsonDarril
HynesByron
Soggetto topico Operating systems (Computers)
Soggetto genere / forma Electronic books.
ISBN 1-282-49106-7
9786612491061
0-470-61973-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mastering Windows Server 2008 R2; Acknowledgments; Contents at a Glance; Contents; Introduction; Who Is The Book For?; What's Inside?; Stay Up-to-Date with My Free Newsletter; For Help and Suggestions: Visit My Forum or Email Me; Chapter 1: What's New in Windows Server 2008 and 2008 R2; Server 2008 and R2 Goals; AD Changes; OS Changes Under the Hood; Networking Changes; New Setup Technologies; New Management Tools; File and Print Sharing; Web-Based Services; Chapter 2: Installing and Upgrading to Windows Server 2008 R2; What Has Changed Since 2000 and 2003?; Installing the Operating System
Using Server Manager to Configure Your ServersUpgrading Active Directory; Unattended Installations; Installing a Sample Server Network for This Book's Examples; The Bottom Line; Chapter 3: The New Server: Introduction to Server Core; What in the World Is Server Core?; Installing Server Core; Server Core Survival Guide; Initial Configurations for Server Core; Administering Server Core Remotely; Configuring Roles and Features; The Bottom Line; Chapter 4: Windows Server 2008 IPv4: What Has Changed?; TCP Then and Now; Improving Transaction Time with Autoscaling; Employing Policy-Based QoS
Sharing Files and Printers with SMB 2.0Alternatives for Network Performance; Wrapping Up the New and Improved TCP; The Bottom Line; Chapter 5: DNS and Naming in Server 2008 and Active Directory; Components of Microsoft's DNS; Understanding Active Directory's DNS; Supporting Internet-Based DNS Resolution; Administration and Troubleshooting with DNS Tools; The Bottom Line; Chapter 6: Creating the Simple AD: The One-Domain, One-Location AD; An Introduction to Active Directory Basics; A Single-Domain Forest; Adding a Second DC; Creating Organizational Units, Accounts, and Groups
Domain Maintenance TasksCreating Fine-Grained Password Policies; The Bottom Line; Chapter 7: Creating and Managing User Accounts; User Accounts; Group Management; Monday-Morning Admin Tasks; What's New in Windows Server 2008 R2 for User and Group Management; The Bottom Line; Chapter 8: Group Policy: AD's Gauntlet; Group Policy Concepts; Local Policies and Group Policy Objects; Creating GPOs; Group Policy Basics; Modifying Group Policy Default Behavior; Group Policy Application; Group Policy Setting Possibilities; The New and Improved GPMC; Troubleshooting Group Policies
A Closing Thought or Two on Group PolicyThe Bottom Line; Chapter 9: Active Directory Delegation; AD Delegation vs. NT Domains; Delegating Control Using Organizational Units; Advanced Delegation: Manually Setting Permissions; Finding Out Which Delegations Have Been Set, or Undelegating; The Bottom Line; Chapter 10: Files, Folders, and Shares; Understanding the File Services Role; Creating Shares; Managing Permissions; Connecting to Shares; File Server Resource Manager; Understanding SMB 2.0; Implementing BitLocker; Using Offline Files/Client-Side Caching; The Bottom Line
Chapter 11: Creating and Managing Shared Folders
Record Nr. UNINA-9910457248203321
Minasi Mark  
Indianapolis, IN, : Wiley Pub., 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering Windows server 2008 R2 [[electronic resource] /] / Mark Minasi, Darril Gibson, Byron Hynes
Mastering Windows server 2008 R2 [[electronic resource] /] / Mark Minasi, Darril Gibson, Byron Hynes
Autore Minasi Mark
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, IN, : Wiley Pub., 2010
Descrizione fisica 1 online resource (1491 p.)
Disciplina 005.4/476
005.4476
Altri autori (Persone) GibsonDarril
HynesByron
Soggetto topico Operating systems (Computers)
ISBN 0-470-61975-9
1-282-49106-7
9786612491061
0-470-61973-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mastering Windows Server 2008 R2; Acknowledgments; Contents at a Glance; Contents; Introduction; Who Is The Book For?; What's Inside?; Stay Up-to-Date with My Free Newsletter; For Help and Suggestions: Visit My Forum or Email Me; Chapter 1: What's New in Windows Server 2008 and 2008 R2; Server 2008 and R2 Goals; AD Changes; OS Changes Under the Hood; Networking Changes; New Setup Technologies; New Management Tools; File and Print Sharing; Web-Based Services; Chapter 2: Installing and Upgrading to Windows Server 2008 R2; What Has Changed Since 2000 and 2003?; Installing the Operating System
Using Server Manager to Configure Your ServersUpgrading Active Directory; Unattended Installations; Installing a Sample Server Network for This Book's Examples; The Bottom Line; Chapter 3: The New Server: Introduction to Server Core; What in the World Is Server Core?; Installing Server Core; Server Core Survival Guide; Initial Configurations for Server Core; Administering Server Core Remotely; Configuring Roles and Features; The Bottom Line; Chapter 4: Windows Server 2008 IPv4: What Has Changed?; TCP Then and Now; Improving Transaction Time with Autoscaling; Employing Policy-Based QoS
Sharing Files and Printers with SMB 2.0Alternatives for Network Performance; Wrapping Up the New and Improved TCP; The Bottom Line; Chapter 5: DNS and Naming in Server 2008 and Active Directory; Components of Microsoft's DNS; Understanding Active Directory's DNS; Supporting Internet-Based DNS Resolution; Administration and Troubleshooting with DNS Tools; The Bottom Line; Chapter 6: Creating the Simple AD: The One-Domain, One-Location AD; An Introduction to Active Directory Basics; A Single-Domain Forest; Adding a Second DC; Creating Organizational Units, Accounts, and Groups
Domain Maintenance TasksCreating Fine-Grained Password Policies; The Bottom Line; Chapter 7: Creating and Managing User Accounts; User Accounts; Group Management; Monday-Morning Admin Tasks; What's New in Windows Server 2008 R2 for User and Group Management; The Bottom Line; Chapter 8: Group Policy: AD's Gauntlet; Group Policy Concepts; Local Policies and Group Policy Objects; Creating GPOs; Group Policy Basics; Modifying Group Policy Default Behavior; Group Policy Application; Group Policy Setting Possibilities; The New and Improved GPMC; Troubleshooting Group Policies
A Closing Thought or Two on Group PolicyThe Bottom Line; Chapter 9: Active Directory Delegation; AD Delegation vs. NT Domains; Delegating Control Using Organizational Units; Advanced Delegation: Manually Setting Permissions; Finding Out Which Delegations Have Been Set, or Undelegating; The Bottom Line; Chapter 10: Files, Folders, and Shares; Understanding the File Services Role; Creating Shares; Managing Permissions; Connecting to Shares; File Server Resource Manager; Understanding SMB 2.0; Implementing BitLocker; Using Offline Files/Client-Side Caching; The Bottom Line
Chapter 11: Creating and Managing Shared Folders
Record Nr. UNINA-9910781053003321
Minasi Mark  
Indianapolis, IN, : Wiley Pub., 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui