(ISC)2 CISSP certified information systems security professional : official study guide / / Mike Chapple, James M. Stewart, Darril Gibson
| (ISC)2 CISSP certified information systems security professional : official study guide / / Mike Chapple, James M. Stewart, Darril Gibson |
| Autore | Chapple Mike |
| Edizione | [Eighth edition.] |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, A Wiley Brand, , [2018] |
| Descrizione fisica | 1 online resource (1,107 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security - Examinations
Computer networks - Security measures - Examinations |
| ISBN |
1-119-54956-6
1-119-47595-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Security governance through principles and policies -- Personnel security and risk management concepts -- Business continuity planning -- Laws, regulations, and compliance -- Protecting security of assets -- Cryptography and symmetric key algorithms -- PKI and cryptographic applications -- Principles of security models, design and capabilities -- Security vulnerabilities, threats, and countermeasures -- Physical security requirements -- Secure network architecture and securing network components -- Secure communications and network attacks -- Managing identity and authentication -- Controlling and monitoring access -- Security assessment and testing -- Managing security operations -- Preventing and responding to incidents -- Disaster recovery planning -- Investigations and ethics -- Software development security -- Malicious code and application attacks -- Appendix A. Answers to review questions -- Appendix B. Answers to written labs. |
| Record Nr. | UNINA-9910555053203321 |
Chapple Mike
|
||
| Indianapolis, Indiana : , : Sybex, A Wiley Brand, , [2018] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
| CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson |
| Autore | Stewart James Michael |
| Edizione | [6th ed.] |
| Pubbl/distr/stampa | Indianapolis, IN, : Wiley, 2012 |
| Descrizione fisica | 1 online resource (938 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
ChappleMike, M.S.
GibsonDarril |
| Collana | SYBEX serious skills CISSP |
| Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer security - Examinations |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-280-77577-7
9786613686169 1-118-46389-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies WAN Connection Technologies |
| Record Nr. | UNINA-9910462659203321 |
Stewart James Michael
|
||
| Indianapolis, IN, : Wiley, 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
| CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson |
| Autore | Stewart James Michael |
| Edizione | [6th ed.] |
| Pubbl/distr/stampa | Indianapolis, IN, : Wiley, 2012 |
| Descrizione fisica | 1 online resource (938 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
ChappleMike, M.S.
GibsonDarril |
| Collana | SYBEX serious skills CISSP |
| Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer security - Examinations |
| ISBN |
1-280-77577-7
9786613686169 1-118-46389-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies WAN Connection Technologies |
| Record Nr. | UNINA-9910790357203321 |
Stewart James Michael
|
||
| Indianapolis, IN, : Wiley, 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
CISSP : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
| CISSP : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson |
| Autore | Stewart James Michael |
| Edizione | [6th ed.] |
| Pubbl/distr/stampa | Indianapolis, IN, : Wiley, 2012 |
| Descrizione fisica | 1 online resource (938 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
ChappleMike, M.S.
GibsonDarril |
| Collana | SYBEX serious skills CISSP |
| Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer security - Examinations |
| ISBN |
1-280-77577-7
9786613686169 1-118-46389-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies WAN Connection Technologies |
| Altri titoli varianti | Certified Information Systems Security Professional |
| Record Nr. | UNINA-9910953957203321 |
Stewart James Michael
|
||
| Indianapolis, IN, : Wiley, 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Mastering Windows 7 deployment [[electronic resource] /] / Aidan Finn, Darril Gibson, Kenneth van Surksum
| Mastering Windows 7 deployment [[electronic resource] /] / Aidan Finn, Darril Gibson, Kenneth van Surksum |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, Ind., : Wiley, 2011 |
| Descrizione fisica | 1 online resource (506 p.) |
| Disciplina | 005.4/46 |
| Altri autori (Persone) |
FinnAidan <1974->
GibsonDarril Van SurksumKenneth |
| Collana | Sybex serious skills |
| Soggetto topico |
Operating systems (Computers)
Configuration management |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-118-06804-1
1-283-37458-7 9786613374585 1-118-06802-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Mastering Windows 7 Deployment; Acknowledgments; About the Authors; About the Contributing Author; Contents; Introduction; Who Should Read This Book; What Is Covered in This Book; How to Contact the Authors; Chapter 1; Meet Windows 7; Windows 7 Hardware Requirements; Using the Microsoft Assessment and Planning Toolkit; Produce MAP Reports and Proposals; The Bottom Line; Chapter 2; Application Compatibility; The Application Compatibility Toolkit; Deploying XP Mode; The Bottom Line; Chapter 3; Choosing the Right Edition of Windows 7; Speaking the Language: Four Ways to Use Windows Setup
Windows Setup in DetailPerforming the Windows 7 Installation; The Last Step: Licensing and Activation; The Bottom Line; Chapter 4; Getting Familiar with Microsoft Images; Creating Your First Image; Using the Windows Automated Installation Kit; Creating Bootable WinPE Media; Preparing a System with Sysprep; Capturing an Image Using ImageX; Applying an Image Using ImageX; Customizing Images Using Deployment Image Servicing and Management; Using Windows System Image Manager; The Bottom Line; Chapter 5; Exploring User Data and Settings; Working with Windows Easy Transfer Working with the User State Migration ToolThe Bottom Line; Chapter 6; Understanding WDS; Deploying WDS; Image Management; Modifying PXE Client Response Policy; The Bottom Line; Chapter 7; Employing the PXE Client; Creating a Customized Installation Image; Using Unattended Answer Files with WDS; Monitoring, Logging, and Troubleshooting WDS; The Bottom Line; Chapter 8; Using WDS to Name Machines; Manage Domain Membership Using WDS; Using WDS for Multicast Deployments; The Bottom Line; Chapter 9; Setting Up Your Deployment Server; Installing MDT 2010 Update 1 Creating and Populating a Deployment ShareDeploying Your First Image; The Bottom Line; Chapter 10; Customizing the Deployment Share; Operating System Properties; Application Properties; Driver Properties; Package Properties; Task Sequence Properties; Automating the MDT Deployment Wizard; The Bottom Line; Chapter 11; Discovering Selection Profiles; Creating a Linked Deployment Share; Deploying from DVD; Working with the MDT Database; The Bottom Line; Chapter 12; Understanding Configuration Manager; Installing Configuration Manager 2007; Preparing and Configuring Boot Images Creating and Capturing a Reference ImageIdentifying and Targeting Machines for Rebuilding; Deploying Windows 7; Monitoring Deployment Progress; The Bottom Line; Chapter 13; Choosing the Right Volume License Key for Windows; Tracking Your Licenses with the Key Management Service; KMS and the Client; Tracking Your Licenses: The Volume Activation Management Tool; The Bottom Line; Appendix; The Bottom Line; Chapter 1: Does Your Hardware Measure Up?; Chapter 2: Evaluating Applications for Windows 7 Compatibility; Chapter 3: Installing Windows 7: Meet the Panther Chapter 4: Cloning the Panther: Automating Windows 7 Installation |
| Record Nr. | UNINA-9910461564603321 |
| Indianapolis, Ind., : Wiley, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Mastering Windows 7 deployment [[electronic resource] /] / Aidan Finn, Darril Gibson, Kenneth van Surksum
| Mastering Windows 7 deployment [[electronic resource] /] / Aidan Finn, Darril Gibson, Kenneth van Surksum |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, Ind., : Wiley, 2011 |
| Descrizione fisica | 1 online resource (506 p.) |
| Disciplina | 005.4/46 |
| Altri autori (Persone) |
FinnAidan <1974->
GibsonDarril Van SurksumKenneth |
| Collana | Sybex serious skills |
| Soggetto topico |
Operating systems (Computers)
Configuration management |
| ISBN |
1-118-06804-1
1-283-37458-7 9786613374585 1-118-06802-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Mastering Windows 7 Deployment; Acknowledgments; About the Authors; About the Contributing Author; Contents; Introduction; Who Should Read This Book; What Is Covered in This Book; How to Contact the Authors; Chapter 1; Meet Windows 7; Windows 7 Hardware Requirements; Using the Microsoft Assessment and Planning Toolkit; Produce MAP Reports and Proposals; The Bottom Line; Chapter 2; Application Compatibility; The Application Compatibility Toolkit; Deploying XP Mode; The Bottom Line; Chapter 3; Choosing the Right Edition of Windows 7; Speaking the Language: Four Ways to Use Windows Setup
Windows Setup in DetailPerforming the Windows 7 Installation; The Last Step: Licensing and Activation; The Bottom Line; Chapter 4; Getting Familiar with Microsoft Images; Creating Your First Image; Using the Windows Automated Installation Kit; Creating Bootable WinPE Media; Preparing a System with Sysprep; Capturing an Image Using ImageX; Applying an Image Using ImageX; Customizing Images Using Deployment Image Servicing and Management; Using Windows System Image Manager; The Bottom Line; Chapter 5; Exploring User Data and Settings; Working with Windows Easy Transfer Working with the User State Migration ToolThe Bottom Line; Chapter 6; Understanding WDS; Deploying WDS; Image Management; Modifying PXE Client Response Policy; The Bottom Line; Chapter 7; Employing the PXE Client; Creating a Customized Installation Image; Using Unattended Answer Files with WDS; Monitoring, Logging, and Troubleshooting WDS; The Bottom Line; Chapter 8; Using WDS to Name Machines; Manage Domain Membership Using WDS; Using WDS for Multicast Deployments; The Bottom Line; Chapter 9; Setting Up Your Deployment Server; Installing MDT 2010 Update 1 Creating and Populating a Deployment ShareDeploying Your First Image; The Bottom Line; Chapter 10; Customizing the Deployment Share; Operating System Properties; Application Properties; Driver Properties; Package Properties; Task Sequence Properties; Automating the MDT Deployment Wizard; The Bottom Line; Chapter 11; Discovering Selection Profiles; Creating a Linked Deployment Share; Deploying from DVD; Working with the MDT Database; The Bottom Line; Chapter 12; Understanding Configuration Manager; Installing Configuration Manager 2007; Preparing and Configuring Boot Images Creating and Capturing a Reference ImageIdentifying and Targeting Machines for Rebuilding; Deploying Windows 7; Monitoring Deployment Progress; The Bottom Line; Chapter 13; Choosing the Right Volume License Key for Windows; Tracking Your Licenses with the Key Management Service; KMS and the Client; Tracking Your Licenses: The Volume Activation Management Tool; The Bottom Line; Appendix; The Bottom Line; Chapter 1: Does Your Hardware Measure Up?; Chapter 2: Evaluating Applications for Windows 7 Compatibility; Chapter 3: Installing Windows 7: Meet the Panther Chapter 4: Cloning the Panther: Automating Windows 7 Installation |
| Record Nr. | UNINA-9910789721803321 |
| Indianapolis, Ind., : Wiley, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Mastering Windows server 2008 R2 [[electronic resource] /] / Mark Minasi, Darril Gibson, Byron Hynes
| Mastering Windows server 2008 R2 [[electronic resource] /] / Mark Minasi, Darril Gibson, Byron Hynes |
| Autore | Minasi Mark |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, IN, : Wiley Pub., 2010 |
| Descrizione fisica | 1 online resource (1491 p.) |
| Disciplina |
005.4/476
005.4476 |
| Altri autori (Persone) |
GibsonDarril
HynesByron |
| Soggetto topico | Operating systems (Computers) |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-282-49106-7
9786612491061 0-470-61973-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Mastering Windows Server 2008 R2; Acknowledgments; Contents at a Glance; Contents; Introduction; Who Is The Book For?; What's Inside?; Stay Up-to-Date with My Free Newsletter; For Help and Suggestions: Visit My Forum or Email Me; Chapter 1: What's New in Windows Server 2008 and 2008 R2; Server 2008 and R2 Goals; AD Changes; OS Changes Under the Hood; Networking Changes; New Setup Technologies; New Management Tools; File and Print Sharing; Web-Based Services; Chapter 2: Installing and Upgrading to Windows Server 2008 R2; What Has Changed Since 2000 and 2003?; Installing the Operating System
Using Server Manager to Configure Your ServersUpgrading Active Directory; Unattended Installations; Installing a Sample Server Network for This Book's Examples; The Bottom Line; Chapter 3: The New Server: Introduction to Server Core; What in the World Is Server Core?; Installing Server Core; Server Core Survival Guide; Initial Configurations for Server Core; Administering Server Core Remotely; Configuring Roles and Features; The Bottom Line; Chapter 4: Windows Server 2008 IPv4: What Has Changed?; TCP Then and Now; Improving Transaction Time with Autoscaling; Employing Policy-Based QoS Sharing Files and Printers with SMB 2.0Alternatives for Network Performance; Wrapping Up the New and Improved TCP; The Bottom Line; Chapter 5: DNS and Naming in Server 2008 and Active Directory; Components of Microsoft's DNS; Understanding Active Directory's DNS; Supporting Internet-Based DNS Resolution; Administration and Troubleshooting with DNS Tools; The Bottom Line; Chapter 6: Creating the Simple AD: The One-Domain, One-Location AD; An Introduction to Active Directory Basics; A Single-Domain Forest; Adding a Second DC; Creating Organizational Units, Accounts, and Groups Domain Maintenance TasksCreating Fine-Grained Password Policies; The Bottom Line; Chapter 7: Creating and Managing User Accounts; User Accounts; Group Management; Monday-Morning Admin Tasks; What's New in Windows Server 2008 R2 for User and Group Management; The Bottom Line; Chapter 8: Group Policy: AD's Gauntlet; Group Policy Concepts; Local Policies and Group Policy Objects; Creating GPOs; Group Policy Basics; Modifying Group Policy Default Behavior; Group Policy Application; Group Policy Setting Possibilities; The New and Improved GPMC; Troubleshooting Group Policies A Closing Thought or Two on Group PolicyThe Bottom Line; Chapter 9: Active Directory Delegation; AD Delegation vs. NT Domains; Delegating Control Using Organizational Units; Advanced Delegation: Manually Setting Permissions; Finding Out Which Delegations Have Been Set, or Undelegating; The Bottom Line; Chapter 10: Files, Folders, and Shares; Understanding the File Services Role; Creating Shares; Managing Permissions; Connecting to Shares; File Server Resource Manager; Understanding SMB 2.0; Implementing BitLocker; Using Offline Files/Client-Side Caching; The Bottom Line Chapter 11: Creating and Managing Shared Folders |
| Record Nr. | UNINA-9910457248203321 |
Minasi Mark
|
||
| Indianapolis, IN, : Wiley Pub., 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Mastering Windows server 2008 R2 [[electronic resource] /] / Mark Minasi, Darril Gibson, Byron Hynes
| Mastering Windows server 2008 R2 [[electronic resource] /] / Mark Minasi, Darril Gibson, Byron Hynes |
| Autore | Minasi Mark |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, IN, : Wiley Pub., 2010 |
| Descrizione fisica | 1 online resource (1491 p.) |
| Disciplina |
005.4/476
005.4476 |
| Altri autori (Persone) |
GibsonDarril
HynesByron |
| Soggetto topico | Operating systems (Computers) |
| ISBN |
0-470-61975-9
1-282-49106-7 9786612491061 0-470-61973-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Mastering Windows Server 2008 R2; Acknowledgments; Contents at a Glance; Contents; Introduction; Who Is The Book For?; What's Inside?; Stay Up-to-Date with My Free Newsletter; For Help and Suggestions: Visit My Forum or Email Me; Chapter 1: What's New in Windows Server 2008 and 2008 R2; Server 2008 and R2 Goals; AD Changes; OS Changes Under the Hood; Networking Changes; New Setup Technologies; New Management Tools; File and Print Sharing; Web-Based Services; Chapter 2: Installing and Upgrading to Windows Server 2008 R2; What Has Changed Since 2000 and 2003?; Installing the Operating System
Using Server Manager to Configure Your ServersUpgrading Active Directory; Unattended Installations; Installing a Sample Server Network for This Book's Examples; The Bottom Line; Chapter 3: The New Server: Introduction to Server Core; What in the World Is Server Core?; Installing Server Core; Server Core Survival Guide; Initial Configurations for Server Core; Administering Server Core Remotely; Configuring Roles and Features; The Bottom Line; Chapter 4: Windows Server 2008 IPv4: What Has Changed?; TCP Then and Now; Improving Transaction Time with Autoscaling; Employing Policy-Based QoS Sharing Files and Printers with SMB 2.0Alternatives for Network Performance; Wrapping Up the New and Improved TCP; The Bottom Line; Chapter 5: DNS and Naming in Server 2008 and Active Directory; Components of Microsoft's DNS; Understanding Active Directory's DNS; Supporting Internet-Based DNS Resolution; Administration and Troubleshooting with DNS Tools; The Bottom Line; Chapter 6: Creating the Simple AD: The One-Domain, One-Location AD; An Introduction to Active Directory Basics; A Single-Domain Forest; Adding a Second DC; Creating Organizational Units, Accounts, and Groups Domain Maintenance TasksCreating Fine-Grained Password Policies; The Bottom Line; Chapter 7: Creating and Managing User Accounts; User Accounts; Group Management; Monday-Morning Admin Tasks; What's New in Windows Server 2008 R2 for User and Group Management; The Bottom Line; Chapter 8: Group Policy: AD's Gauntlet; Group Policy Concepts; Local Policies and Group Policy Objects; Creating GPOs; Group Policy Basics; Modifying Group Policy Default Behavior; Group Policy Application; Group Policy Setting Possibilities; The New and Improved GPMC; Troubleshooting Group Policies A Closing Thought or Two on Group PolicyThe Bottom Line; Chapter 9: Active Directory Delegation; AD Delegation vs. NT Domains; Delegating Control Using Organizational Units; Advanced Delegation: Manually Setting Permissions; Finding Out Which Delegations Have Been Set, or Undelegating; The Bottom Line; Chapter 10: Files, Folders, and Shares; Understanding the File Services Role; Creating Shares; Managing Permissions; Connecting to Shares; File Server Resource Manager; Understanding SMB 2.0; Implementing BitLocker; Using Offline Files/Client-Side Caching; The Bottom Line Chapter 11: Creating and Managing Shared Folders |
| Record Nr. | UNINA-9910781053003321 |
Minasi Mark
|
||
| Indianapolis, IN, : Wiley Pub., 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||