CWDP [[electronic resource] ] : certified wireless design professional official study / / Shawn M. Jackman ... [et al.]
| CWDP [[electronic resource] ] : certified wireless design professional official study / / Shawn M. Jackman ... [et al.] |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | San Francisco, : Sybex, 2011 |
| Descrizione fisica | 1 online resource (870 p.) |
| Disciplina | 621.384076 |
| Altri autori (Persone) | JackmanShawn M. <1974-> |
| Collana | Sybex Serious Skills |
| Soggetto topico |
Wireless LANs - Design and construction - Examinations
Telecommunications engineers - Certification |
| ISBN |
1-283-02727-5
9786613027276 1-118-04159-3 1-118-04161-5 |
| Classificazione | COM055000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
CWDPTM: Certified Wireless Design Professional Official Study Guide; Contents; Foreword; Introduction; Chapter 1: Gathering and Analyzing Requirements; Preparation and Planning; Meeting the Customer; Identify Key Decision Makers and Participants; Identify a High-Level Scope; Understand the Customer's Expertise; Gathering the Requirements; Business Requirements; Technical Requirements; Using a Customer's Existing Assets to Save Time and Money; Understanding the Deployment Environment; Constraints; Budget; Timeline; Politics; Guiding the Customer; Creating the Customer Requirements Document
Statement of WorkSummary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 2: Designing for Client Devices and Applications; General Client Design Factors; PHY Support; Radio Characteristics; MAC Feature Support; Configurability; Management Features; Common Client Device Form Factors; Laptop Computers; Tablets; Thin Clients; Handheld Computers; Application-Specific Devices; Smart Phones; In-Building Voice Devices; Video Devices; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: Designing for Applications; Understanding WLAN Applications Familiarizing Yourself with Application Protocols and BehaviorHandling Difficult Protocols; Real-Time Applications: Voice and Video; Location and Context Awareness; Guest Access; Understanding Business Drivers for Guest Access; Models for Guest Access; Network Design Approaches; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 4: Industry-Specific Design Considerations; Healthcare; Supporting Data, Voice, Guest, and Location Services; Build for Growth; High Availability; Aesthetics; Access Restrictions; Multifloor RF Propagation; Regulatory; Lead Walls Constant ConstructionOutdoor Access; Guest and Patient Internet Access; Retail; Warehouses and Industrial; Retail Branches; Food Franchises and Shopping Destinations; Education; Handling User Density; Lack of Standardization; Security Challenges; Other Verticals; Office Use; Hospitality; SOHO Remote Offices; Providing Wi-Fi Outside; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 5: Vendor and WLAN Architecture Selection; Consumer vs. Enterprise Equipment; Understanding Consumer Wi-Fi Devices; Understanding Enterprise Wi-Fi Devices The Difference Between Consumer and Enterprise ProductsManagement, Control, and Data Planes; Management Plane; Control Plane; Data Plane; Understanding How the Management, Control, and Data Planes Work Together; Architecture; Autonomous WLAN Architectures; Centralized WLAN Architectures; Distributed WLAN Architectures; Other WLAN Architectures; Important Architectural Distinctions; Additional Vendor Selection Considerations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 6: RF Communication Principles; Understanding Basics of RF Importance of RF Design to a Successful Network |
| Record Nr. | UNINA-9910785578603321 |
| San Francisco, : Sybex, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
CWDP : certified wireless design professional official study / / Shawn M. Jackman ... [et al.]
| CWDP : certified wireless design professional official study / / Shawn M. Jackman ... [et al.] |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | San Francisco, : Sybex, 2011 |
| Descrizione fisica | 1 online resource (870 p.) |
| Disciplina | 621.384076 |
| Altri autori (Persone) | JackmanShawn M. <1974-> |
| Collana | Sybex Serious Skills |
| Soggetto topico |
Wireless LANs - Design and construction - Examinations
Telecommunications engineers - Certification |
| ISBN |
9786613027276
9781283027274 1283027275 9781118041598 1118041593 9781118041611 1118041615 |
| Classificazione | COM055000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
CWDPTM: Certified Wireless Design Professional Official Study Guide; Contents; Foreword; Introduction; Chapter 1: Gathering and Analyzing Requirements; Preparation and Planning; Meeting the Customer; Identify Key Decision Makers and Participants; Identify a High-Level Scope; Understand the Customer's Expertise; Gathering the Requirements; Business Requirements; Technical Requirements; Using a Customer's Existing Assets to Save Time and Money; Understanding the Deployment Environment; Constraints; Budget; Timeline; Politics; Guiding the Customer; Creating the Customer Requirements Document
Statement of WorkSummary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 2: Designing for Client Devices and Applications; General Client Design Factors; PHY Support; Radio Characteristics; MAC Feature Support; Configurability; Management Features; Common Client Device Form Factors; Laptop Computers; Tablets; Thin Clients; Handheld Computers; Application-Specific Devices; Smart Phones; In-Building Voice Devices; Video Devices; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: Designing for Applications; Understanding WLAN Applications Familiarizing Yourself with Application Protocols and BehaviorHandling Difficult Protocols; Real-Time Applications: Voice and Video; Location and Context Awareness; Guest Access; Understanding Business Drivers for Guest Access; Models for Guest Access; Network Design Approaches; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 4: Industry-Specific Design Considerations; Healthcare; Supporting Data, Voice, Guest, and Location Services; Build for Growth; High Availability; Aesthetics; Access Restrictions; Multifloor RF Propagation; Regulatory; Lead Walls Constant ConstructionOutdoor Access; Guest and Patient Internet Access; Retail; Warehouses and Industrial; Retail Branches; Food Franchises and Shopping Destinations; Education; Handling User Density; Lack of Standardization; Security Challenges; Other Verticals; Office Use; Hospitality; SOHO Remote Offices; Providing Wi-Fi Outside; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 5: Vendor and WLAN Architecture Selection; Consumer vs. Enterprise Equipment; Understanding Consumer Wi-Fi Devices; Understanding Enterprise Wi-Fi Devices The Difference Between Consumer and Enterprise ProductsManagement, Control, and Data Planes; Management Plane; Control Plane; Data Plane; Understanding How the Management, Control, and Data Planes Work Together; Architecture; Autonomous WLAN Architectures; Centralized WLAN Architectures; Distributed WLAN Architectures; Other WLAN Architectures; Important Architectural Distinctions; Additional Vendor Selection Considerations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 6: RF Communication Principles; Understanding Basics of RF Importance of RF Design to a Successful Network |
| Altri titoli varianti | Certified wireless design professional official study guide |
| Record Nr. | UNINA-9910958066103321 |
| San Francisco, : Sybex, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security Administrator Street Smarts [[electronic resource] ] : A Real World Guide to CompTIA Security+ Skills
| Security Administrator Street Smarts [[electronic resource] ] : A Real World Guide to CompTIA Security+ Skills |
| Autore | Miller David R |
| Edizione | [3rd ed.] |
| Pubbl/distr/stampa | Hoboken, : Wiley, 2011 |
| Descrizione fisica | 1 online resource (625 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | GreggMichael |
| Collana |
Street smarts series
Sybex serious skills |
| Soggetto topico |
Computer networks --Security measures --Examinations --Study guides
Computer security --Examinations --Study guides Electronic data processing personnel --Certification Electronic data processing personnel - Certification Computer security - Examinations Computer networks - Examinations - Security measures Engineering & Applied Sciences Computer Science |
| ISBN |
1-283-17720-X
9786613177209 1-118-11358-6 |
| Classificazione | COM055000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
CompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of Task
ProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of Task ProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for Completion Task 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for Completion Phase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; Procedure Criteria for Completion |
| Record Nr. | UNINA-9910781478503321 |
Miller David R
|
||
| Hoboken, : Wiley, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security Administrator Street Smarts : A Real World Guide to CompTIA Security+ Skills
| Security Administrator Street Smarts : A Real World Guide to CompTIA Security+ Skills |
| Autore | Miller David R |
| Edizione | [3rd ed.] |
| Pubbl/distr/stampa | Hoboken, : Wiley, 2011 |
| Descrizione fisica | 1 online resource (625 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | GreggMichael |
| Collana |
Street smarts series
Sybex serious skills |
| Soggetto topico |
Computer networks --Security measures --Examinations --Study guides
Computer security --Examinations --Study guides Electronic data processing personnel --Certification Electronic data processing personnel - Certification Computer security - Examinations Computer networks - Examinations - Security measures Engineering & Applied Sciences Computer Science |
| ISBN |
1-283-17720-X
9786613177209 1-118-11358-6 |
| Classificazione | COM055000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
CompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of Task
ProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of Task ProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for Completion Task 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for Completion Phase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; Procedure Criteria for Completion |
| Record Nr. | UNINA-9910962195803321 |
Miller David R
|
||
| Hoboken, : Wiley, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||