Exam Insight For CompTIA Network+ Certification (Exam N10-002) [[electronic resource]]
| Exam Insight For CompTIA Network+ Certification (Exam N10-002) [[electronic resource]] |
| Autore | Houser Tcat |
| Pubbl/distr/stampa | Friendswood, : TotalRecall Publications, 2001 |
| Descrizione fisica | 1 online resource (556 p.) |
| Disciplina | 004.6/076 |
| Soggetto topico |
Computer networks -- Examinations -- Study guides
Computer technicians -- Certification Electronic books. -- local Electronic data processing personnel -- Certification Microsoft software -- Examinations -- Study guides |
| Soggetto genere / forma | Electronic books. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""About the Authors""; ""About the Book""; ""Table of Contents""; ""Acknowledgments""; ""Tcat Houser""; ""Helen O�Boyle""; ""How To Read This Book""; ""Humor""; ""Real-World Lessons""; ""Continued Support""; ""The Why of this Book""; ""Icon Alerts""; ""Historical""; ""Geek""; ""Future""; ""Real World""; ""Who is?""; ""Network+ 2002 Exam Specifics""; ""Exam Skills Measured and Weighting""; ""Introduction""; ""Welcome!""; ""Intended Audience""; ""Self-Study Students""; ""What is NETWORK+?""; ""What is the NETWORK+ test?""; ""About the Test""; ""Chapter 0000: Network Basics""
""Getting Ready - Questions""""Getting Ready - Answers""; ""I Concepts & Terms Required""; ""Definitions You Need To Know""; ""II What is a Network?""; ""III Network Types by Geographic Scope""; ""LAN""; ""LANs and Subnets""; ""MAN""; ""WAN""; ""IV VLANs Creating Virtual LAN's""; ""V Network Models for Resource Sharing""; ""Models in Networking""; ""Sneaker Net""; ""Peer-to-Peer Networks""; ""Client Server model""; ""Pop Quiz 0000.00""; ""VI Private VS Public Networks""; ""Classifying Networks by Infrastructure Sharing Type""; ""Private Networks""; ""Public Networks"" ""Virtual Private Networks""""VII Intranets, Extranets and Internets""; ""Internet""; ""Intranet""; ""Extranet""; ""VIII Network Topologies""; ""Topologies""; ""Mesh Network""; ""Star Network""; ""Bus Network""; ""Ring Network""; ""Pop Quiz 0000.01""; ""IX Broadband vs. Baseband Networks""; ""X Chapter 0000: Summary""; ""XI Test 0000: Success Questions""; ""Chapter 0001: LAN Cabling""; ""Getting Ready - Questions""; ""Getting Ready - Answers""; ""I Concepts & Terms Required""; ""Definitions You Need To Know""; ""II Connections""; ""III Legacy Cable / Physical Topologies"" ""IV Legacy Coax""""10 Base 5""; ""10 Base 2""; ""5-4-3 Rule""; ""Connecting Computers to a LAN Using Coax""; ""Termination""; ""Troubleshooting 10 Base2 and 10 Base5""; ""Loose or Missing Terminator""; ""Cable Break""; ""Jabbering Transceiver""; ""Broadcast Storm""; ""The wrong type of cable""; ""V Coax Cable New Developments""; ""Twisted Pair Background""; ""Major Types of Twisted Pair Cable""; ""Twisted Pair Cable Naming Conventions""; ""Pop Quiz 0001.00""; ""VI Twisted Pair Technologies""; ""Can I tell twisted pair cables apart by looking at them?"" ""Can I substitute one lookalike cable for another?""""How do I know which to use?""; ""Twisted Pair cabling standards""; ""10xBase-T Family""; ""VGAnyLan""; ""1000BaseTX: The Latest UTP Ethernet Standard""; ""Troubleshooting 10nBaseTx""; ""Cable Break""; ""Wrong Type of Cable""; ""Bad Connector""; ""Pop Quiz 0001.01""; ""VII Fiber-optics""; ""Got Fiber?""; ""Installation""; ""Single Mode/MultiMode Fiber""; ""Fiber-Optic Based Ethernet Cable standards""; ""Fiber-Optic Connectors""; ""VIII Wireless Networking""; ""Deciphering the alphabet soup of 802.11x""; ""Begin with b"" ""What happened to a?"" |
| Record Nr. | UNINA-9910450192703321 |
Houser Tcat
|
||
| Friendswood, : TotalRecall Publications, 2001 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
ExamInsight For CompTIA Network+ Certification (Examination N10-002)
| ExamInsight For CompTIA Network+ Certification (Examination N10-002) |
| Autore | Catura-Houser Tim |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Friendswood, : TotalRecall Publications, 2001 |
| Descrizione fisica | 1 online resource (556 p.) |
| Disciplina | 004.6/076 |
| Soggetto topico |
Computer networks -- Examinations -- Study guides
Computer technicians -- Certification Electronic books. -- local Electronic data processing personnel -- Certification Microsoft software -- Examinations -- Study guides |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""About the Authors""; ""About the Book""; ""Table of Contents""; ""Acknowledgments""; ""Tcat Houser""; ""Helen O�Boyle""; ""How To Read This Book""; ""Humor""; ""Real-World Lessons""; ""Continued Support""; ""The Why of this Book""; ""Icon Alerts""; ""Historical""; ""Geek""; ""Future""; ""Real World""; ""Who is?""; ""Network+ 2002 Exam Specifics""; ""Exam Skills Measured and Weighting""; ""Introduction""; ""Welcome!""; ""Intended Audience""; ""Self-Study Students""; ""What is NETWORK+?""; ""What is the NETWORK+ test?""; ""About the Test""; ""Chapter 0000: Network Basics""
""Getting Ready - Questions""""Getting Ready - Answers""; ""I Concepts & Terms Required""; ""Definitions You Need To Know""; ""II What is a Network?""; ""III Network Types by Geographic Scope""; ""LAN""; ""LANs and Subnets""; ""MAN""; ""WAN""; ""IV VLANs Creating Virtual LAN's""; ""V Network Models for Resource Sharing""; ""Models in Networking""; ""Sneaker Net""; ""Peer-to-Peer Networks""; ""Client Server model""; ""Pop Quiz 0000.00""; ""VI Private VS Public Networks""; ""Classifying Networks by Infrastructure Sharing Type""; ""Private Networks""; ""Public Networks"" ""Virtual Private Networks""""VII Intranets, Extranets and Internets""; ""Internet""; ""Intranet""; ""Extranet""; ""VIII Network Topologies""; ""Topologies""; ""Mesh Network""; ""Star Network""; ""Bus Network""; ""Ring Network""; ""Pop Quiz 0000.01""; ""IX Broadband vs. Baseband Networks""; ""X Chapter 0000: Summary""; ""XI Test 0000: Success Questions""; ""Chapter 0001: LAN Cabling""; ""Getting Ready - Questions""; ""Getting Ready - Answers""; ""I Concepts & Terms Required""; ""Definitions You Need To Know""; ""II Connections""; ""III Legacy Cable / Physical Topologies"" ""IV Legacy Coax""""10 Base 5""; ""10 Base 2""; ""5-4-3 Rule""; ""Connecting Computers to a LAN Using Coax""; ""Termination""; ""Troubleshooting 10 Base2 and 10 Base5""; ""Loose or Missing Terminator""; ""Cable Break""; ""Jabbering Transceiver""; ""Broadcast Storm""; ""The wrong type of cable""; ""V Coax Cable New Developments""; ""Twisted Pair Background""; ""Major Types of Twisted Pair Cable""; ""Twisted Pair Cable Naming Conventions""; ""Pop Quiz 0001.00""; ""VI Twisted Pair Technologies""; ""Can I tell twisted pair cables apart by looking at them?"" ""Can I substitute one lookalike cable for another?""""How do I know which to use?""; ""Twisted Pair cabling standards""; ""10xBase-T Family""; ""VGAnyLan""; ""1000BaseTX: The Latest UTP Ethernet Standard""; ""Troubleshooting 10nBaseTx""; ""Cable Break""; ""Wrong Type of Cable""; ""Bad Connector""; ""Pop Quiz 0001.01""; ""VII Fiber-optics""; ""Got Fiber?""; ""Installation""; ""Single Mode/MultiMode Fiber""; ""Fiber-Optic Based Ethernet Cable standards""; ""Fiber-Optic Connectors""; ""VIII Wireless Networking""; ""Deciphering the alphabet soup of 802.11x""; ""Begin with b"" ""What happened to a?"" |
| Altri titoli varianti |
ExamInsight For CompTIA Network+ Certification (Exam N10-002)
Exam Insight For CompTIA Network+ Certification (Examination N10-002) Exam Insight For CompTIA Network+ Certification (Exam N10-002) |
| Record Nr. | UNINA-9910974517903321 |
Catura-Houser Tim
|
||
| Friendswood, : TotalRecall Publications, 2001 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
ExamInsight For CompTIA Network+ Certification (Examination N10-002) [[electronic resource]]
| ExamInsight For CompTIA Network+ Certification (Examination N10-002) [[electronic resource]] |
| Autore | Houser Tcat |
| Pubbl/distr/stampa | Friendswood, : TotalRecall Publications, 2001 |
| Descrizione fisica | 1 online resource (556 p.) |
| Disciplina | 004.6/076 |
| Soggetto topico |
Computer networks -- Examinations -- Study guides
Computer technicians -- Certification Electronic books. -- local Electronic data processing personnel -- Certification Microsoft software -- Examinations -- Study guides |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""About the Authors""; ""About the Book""; ""Table of Contents""; ""Acknowledgments""; ""Tcat Houser""; ""Helen O�Boyle""; ""How To Read This Book""; ""Humor""; ""Real-World Lessons""; ""Continued Support""; ""The Why of this Book""; ""Icon Alerts""; ""Historical""; ""Geek""; ""Future""; ""Real World""; ""Who is?""; ""Network+ 2002 Exam Specifics""; ""Exam Skills Measured and Weighting""; ""Introduction""; ""Welcome!""; ""Intended Audience""; ""Self-Study Students""; ""What is NETWORK+?""; ""What is the NETWORK+ test?""; ""About the Test""; ""Chapter 0000: Network Basics""
""Getting Ready - Questions""""Getting Ready - Answers""; ""I Concepts & Terms Required""; ""Definitions You Need To Know""; ""II What is a Network?""; ""III Network Types by Geographic Scope""; ""LAN""; ""LANs and Subnets""; ""MAN""; ""WAN""; ""IV VLANs Creating Virtual LAN's""; ""V Network Models for Resource Sharing""; ""Models in Networking""; ""Sneaker Net""; ""Peer-to-Peer Networks""; ""Client Server model""; ""Pop Quiz 0000.00""; ""VI Private VS Public Networks""; ""Classifying Networks by Infrastructure Sharing Type""; ""Private Networks""; ""Public Networks"" ""Virtual Private Networks""""VII Intranets, Extranets and Internets""; ""Internet""; ""Intranet""; ""Extranet""; ""VIII Network Topologies""; ""Topologies""; ""Mesh Network""; ""Star Network""; ""Bus Network""; ""Ring Network""; ""Pop Quiz 0000.01""; ""IX Broadband vs. Baseband Networks""; ""X Chapter 0000: Summary""; ""XI Test 0000: Success Questions""; ""Chapter 0001: LAN Cabling""; ""Getting Ready - Questions""; ""Getting Ready - Answers""; ""I Concepts & Terms Required""; ""Definitions You Need To Know""; ""II Connections""; ""III Legacy Cable / Physical Topologies"" ""IV Legacy Coax""""10 Base 5""; ""10 Base 2""; ""5-4-3 Rule""; ""Connecting Computers to a LAN Using Coax""; ""Termination""; ""Troubleshooting 10 Base2 and 10 Base5""; ""Loose or Missing Terminator""; ""Cable Break""; ""Jabbering Transceiver""; ""Broadcast Storm""; ""The wrong type of cable""; ""V Coax Cable New Developments""; ""Twisted Pair Background""; ""Major Types of Twisted Pair Cable""; ""Twisted Pair Cable Naming Conventions""; ""Pop Quiz 0001.00""; ""VI Twisted Pair Technologies""; ""Can I tell twisted pair cables apart by looking at them?"" ""Can I substitute one lookalike cable for another?""""How do I know which to use?""; ""Twisted Pair cabling standards""; ""10xBase-T Family""; ""VGAnyLan""; ""1000BaseTX: The Latest UTP Ethernet Standard""; ""Troubleshooting 10nBaseTx""; ""Cable Break""; ""Wrong Type of Cable""; ""Bad Connector""; ""Pop Quiz 0001.01""; ""VII Fiber-optics""; ""Got Fiber?""; ""Installation""; ""Single Mode/MultiMode Fiber""; ""Fiber-Optic Based Ethernet Cable standards""; ""Fiber-Optic Connectors""; ""VIII Wireless Networking""; ""Deciphering the alphabet soup of 802.11x""; ""Begin with b"" ""What happened to a?"" |
| Altri titoli varianti |
ExamInsight For CompTIA Network+ Certification (Exam N10-002)
Exam Insight For CompTIA Network+ Certification (Examination N10-002) Exam Insight For CompTIA Network+ Certification (Exam N10-002) |
| Record Nr. | UNINA-9910777088603321 |
Houser Tcat
|
||
| Friendswood, : TotalRecall Publications, 2001 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
ExamWise CompTIA Network+ Certification (Exam N10-002)
| ExamWise CompTIA Network+ Certification (Exam N10-002) |
| Autore | Catura-Houser Tim |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Friendswood, : TotalRecall Publications, 2001 |
| Descrizione fisica | 1 online resource (528 p.) |
| Disciplina | 004.6/076 |
| Soggetto topico |
Computer networks -- Examinations -- Study guides
Computer technicians -- Certification -- Study guides Computer technicians -- Certification Electronic books. -- local Electronic data processing personnel -- Certification -- Study guides Electronic data processing personnel -- Certification Microsoft software -- Examinations -- Study guides Engineering & Applied Sciences Computer Science |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""ExamWise For Exam N10-002""; ""About the Authors""; ""About the Book""; ""Table of Contents""; ""Chapter 0000: Media & Topologies""; ""Chapter 0001: Protocols and Standards""; ""Chapter 0010: Network Implementation""; ""Chapter 0010 Network Support""; ""Chapter 0000: Media & Topologies""; ""Domain 1.0 - Media and Topologies � 20%""; ""Chapter 0001: Protocols and Standards""; ""Domain 2.0 � Protocols and Standards � 25%""; ""Chapter 0010: Network Implementation""; ""Domain 3.0 Network Implementation � 23%""; ""Chapter 0011: Network Support""
""Domain 4.0 Network Support � 32%""""Money Back Book Guarantee""; ""N10-002 Free Practice Exam Online"" |
| Record Nr. | UNINA-9910954121903321 |
Catura-Houser Tim
|
||
| Friendswood, : TotalRecall Publications, 2001 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
ExamWise CompTIA Network+ Certification (Exam N10-002) [[electronic resource]]
| ExamWise CompTIA Network+ Certification (Exam N10-002) [[electronic resource]] |
| Autore | Houser Tcat |
| Pubbl/distr/stampa | Friendswood, : TotalRecall Publications, 2001 |
| Descrizione fisica | 1 online resource (528 p.) |
| Disciplina | 004.6/076 |
| Soggetto topico |
Computer networks -- Examinations -- Study guides
Computer technicians -- Certification -- Study guides Computer technicians -- Certification Electronic books. -- local Electronic data processing personnel -- Certification -- Study guides Electronic data processing personnel -- Certification Microsoft software -- Examinations -- Study guides Engineering & Applied Sciences Computer Science |
| Soggetto genere / forma | Electronic books. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""ExamWise For Exam N10-002""; ""About the Authors""; ""About the Book""; ""Table of Contents""; ""Chapter 0000: Media & Topologies""; ""Chapter 0001: Protocols and Standards""; ""Chapter 0010: Network Implementation""; ""Chapter 0010 Network Support""; ""Chapter 0000: Media & Topologies""; ""Domain 1.0 - Media and Topologies � 20%""; ""Chapter 0001: Protocols and Standards""; ""Domain 2.0 � Protocols and Standards � 25%""; ""Chapter 0010: Network Implementation""; ""Domain 3.0 Network Implementation � 23%""; ""Chapter 0011: Network Support""
""Domain 4.0 Network Support � 32%""""Money Back Book Guarantee""; ""N10-002 Free Practice Exam Online"" |
| Record Nr. | UNINA-9910450198003321 |
Houser Tcat
|
||
| Friendswood, : TotalRecall Publications, 2001 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
ExamWise CompTIA Network+ Certification (Exam N10-002) [[electronic resource]]
| ExamWise CompTIA Network+ Certification (Exam N10-002) [[electronic resource]] |
| Autore | Houser Tcat |
| Pubbl/distr/stampa | Friendswood, : TotalRecall Publications, 2001 |
| Descrizione fisica | 1 online resource (528 p.) |
| Disciplina | 004.6/076 |
| Soggetto topico |
Computer networks -- Examinations -- Study guides
Computer technicians -- Certification -- Study guides Computer technicians -- Certification Electronic books. -- local Electronic data processing personnel -- Certification -- Study guides Electronic data processing personnel -- Certification Microsoft software -- Examinations -- Study guides Engineering & Applied Sciences Computer Science |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""ExamWise For Exam N10-002""; ""About the Authors""; ""About the Book""; ""Table of Contents""; ""Chapter 0000: Media & Topologies""; ""Chapter 0001: Protocols and Standards""; ""Chapter 0010: Network Implementation""; ""Chapter 0010 Network Support""; ""Chapter 0000: Media & Topologies""; ""Domain 1.0 - Media and Topologies � 20%""; ""Chapter 0001: Protocols and Standards""; ""Domain 2.0 � Protocols and Standards � 25%""; ""Chapter 0010: Network Implementation""; ""Domain 3.0 Network Implementation � 23%""; ""Chapter 0011: Network Support""
""Domain 4.0 Network Support � 32%""""Money Back Book Guarantee""; ""N10-002 Free Practice Exam Online"" |
| Record Nr. | UNINA-9910777088803321 |
Houser Tcat
|
||
| Friendswood, : TotalRecall Publications, 2001 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson
| Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson |
| Autore | Gibson Darril |
| Pubbl/distr/stampa | Hoboken, : Wiley, 2011 |
| Descrizione fisica | 1 online resource (374 p.) |
| Disciplina |
005.8
621.3916076 |
| Collana |
Sybex serious skills
Essentials (Indianapolis, Ind.) |
| Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer networks -- Examinations -- Study guides Computer security - Examinations |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-283-17725-0
9786613177254 1-118-11454-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA Chapter 6: Protecting Clients and Servers |
| Record Nr. | UNINA-9910456690103321 |
Gibson Darril
|
||
| Hoboken, : Wiley, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson
| Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson |
| Autore | Gibson Darril |
| Pubbl/distr/stampa | Hoboken, : Wiley, 2011 |
| Descrizione fisica | 1 online resource (374 p.) |
| Disciplina |
005.8
621.3916076 |
| Collana |
Sybex serious skills
Essentials (Indianapolis, Ind.) |
| Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer networks -- Examinations -- Study guides Computer security - Examinations |
| ISBN |
1-283-17725-0
9786613177254 1-118-11454-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA Chapter 6: Protecting Clients and Servers |
| Record Nr. | UNINA-9910781479003321 |
Gibson Darril
|
||
| Hoboken, : Wiley, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Microsoft Windows Security : Essentials / / Darril Gibson
| Microsoft Windows Security : Essentials / / Darril Gibson |
| Autore | Gibson Darril |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Hoboken, : Wiley, 2011 |
| Descrizione fisica | 1 online resource (374 p.) |
| Disciplina |
005.8
621.3916076 |
| Collana |
Sybex serious skills
Essentials (Indianapolis, Ind.) |
| Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer networks -- Examinations -- Study guides Computer security - Examinations |
| ISBN |
1-283-17725-0
9786613177254 1-118-11454-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA Chapter 6: Protecting Clients and Servers |
| Record Nr. | UNINA-9910963392403321 |
Gibson Darril
|
||
| Hoboken, : Wiley, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||