Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Table of Contents Introduction
About This Book Foolish Assumptions Icons Used in This Book Beyond the Book Where to Go from Here
Book 1: Networking Basics
Chapter 1: Welcome to Networking
Defining a Network Why Bother with a Network? Servers and Clients Dedicated Servers and Peers What Makes a Network Tick? Networks Big and Small It’s Not a Personal Computer Anymore! Understanding Network Topology The Network Administrator
Chapter 2: Network Infrastructure
Introducing Infrastructure Introducing Network Protocols and Standards Understanding Cable Infrastructure Understanding Ports, Interfaces, and MAC Addresses Understanding Packets Understanding Collisions Understanding Broadcast Packets Understanding Wireless Networks
Chapter 3: Switches, Routers, and VLANs
Understanding Switches Looking Deeper into Switches Understanding Routers Understanding VLANs
Chapter 4: Servers and Virtualization
Understanding Network Operating Systems What’s Important in a Server Components of a Server Computer Considering Server Form Factors Considering Virtualization
Chapter 5: Cloud Computing
Introducing Cloud Computing Looking at the Benefits of Cloud Computing Detailing the Drawbacks of Cloud Computing Examining Three Basic Kinds of Cloud Services Public Clouds versus Private Clouds Introducing Some of the Major Cloud Providers Getting Into the Cloud
Book 2: Understanding Network Protocols
Chapter 1: Network Protocols and Standards
Understanding Protocols Understanding Standards Seeing the Seven Layers of the OSI Reference Model Following a Packet through the Layers The Ethernet Protocol The TCP/IP Protocol Suite Other Protocols Worth Knowing About
Chapter 2: TCP/IP and the Internet
What Is the Internet? A Little Internet History TCP/IP Standards and RFCs The TCP/IP Protocol Framework
Chapter 3: IP Addresses
Understanding Binary Introducing IP Addresses Classifying IP Addresses Subnetting Network Address Translation
Chapter 4: Routing
Considering the Usefulness of Routers Understanding Routing Tables
Chapter 5: DHCP
Understanding DHCP Understanding Scopes Working with a DHCP Server How to Configure a Windows DHCP Client
Chapter 6: DNS
Understanding DNS Names Top-Level Domains The Hosts File Understanding DNS Servers and Zones Understanding DNS Queries Zone Files and Resource Records Reverse Lookup Zones Working with the Windows DNS Server How to Configure a Windows DNS Client
Chapter 7: TCP/IP Tools and Commands
Using the arp Command Using the hostname Command Using the ipconfig Command Using the nbtstat Command Using the netstat Command Using the nslookup Command Using the pathping Command Using the ping Command Using the route Command Using the tracert Command
Book 3: Planning a Network
Chapter 1: Local Area Networks
Making a Network Plan Being Purposeful Taking Stock Considering Cable Surmising Switches Planning the Network Topology Planning the TCP/IP Implementation Drawing Diagrams More Questions Your Network Plan Should Address
Chapter 2: Wide Area Networks
Connecting to the Internet Choosing a Router Securing Your Connection with a Firewall Providing Redundancy for Your Internet Connection Securing Connections to Remote Locations and Users
Chapter 3: Server Architecture
Deciding How Many Servers You Need Deciding Which Servers You Need Connecting Your Servers
Chapter 4: Virtualization Architecture
Understanding Virtualization Understanding Hypervisors Understanding Virtual Disks Understanding Network Virtualization Considering the Benefits of Virtualization Choosing Virtualization Hosts Understanding Windows Server 2016 Licensing
Chapter 5: Storage Architecture
Considering Disk Space Considering Disk Drive Types Considering Drive Interfaces Considering RAID Considering Attachment Types
Book 4: Implementing a Network
Chapter 1: Network Hardware
Working with Cable Installing Switches Daisy-Chaining Switches
Chapter 2: Wireless Networks
Installing a Wireless Access Point Configuring a Wireless Access Point Connecting to a Wireless Network Paying Attention to Wireless Network Security
Chapter 3: Windows Clients
Configuring Network Connections Joining a Domain
Chapter 4: Mac Networking
Basic Mac Network Settings Joining a Domain Connecting to a Share
Chapter 5: Network Printers
Configuring Network Printers
Chapter 6: Virtual Private Networks
Understanding VPN Looking at VPN Security Understanding VPN Servers and Clients
Book 5: Implementing Virtualization
Chapter 1: Hyper-V
Understanding the Hyper-V Hypervisor Understanding Hyper-V Virtual Disks Enabling Hyper-V Getting Familiar with Hyper-V Creating a Virtual Switch Creating a Virtual Disk Creating a Virtual Machine Installing an Operating System
Chapter 2: VMware
Looking at vSphere Getting Started with VMware Player Creating a Virtual Machine Installing VMware Tools
Chapter 3: Azure
Looking at Azure Services Creating an Azure Account Examining the Azure Portal Creating a Windows Virtual Machine Managing an Azure Virtual Machine Connecting to an Azure Virtual Machine
Chapter 4: Amazon Web Services
Looking at What Amazon Web Services Can Do Creating an Amazon Web Services Account Examining the Amazon Web Services Console Creating a Windows Virtual Machine Managing an Amazon Web Services Virtual Machine Connecting to an Amazon Web Services Virtual Machine
Chapter 5: Desktop Virtualization
Introducing Desktop Virtualization Considering Two Approaches to Desktop Virtualization Looking at VMware’s Horizon View Looking at Citrix XenApp
Book 6: Implementing Windows Server 2016
Chapter 1: Installing Windows Server 2016
Planning a Windows Server Installation Before You Install … Running Setup Adding Server Roles and Features
Chapter 2: Configuring Windows Server 2016
Using the Administrator Account Using Remote Desktop Connection Using Microsoft Management Console Customizing MMC
Chapter 3: Configuring Active Directory
What Directories Do Remembering the Good Ol’ Days of NT Domains Active Directory to the Rescue Understanding How Active Directory Is Structured Creating a New Domain Creating an Organizational Unit
Chapter 4: Configuring User Accounts
Understanding Windows User Accounts Creating a New User Setting User Properties Resetting User Passwords Disabling and Enabling User Accounts Deleting a User Working with Groups Working with User Profiles Creating a Logon Script
Chapter 5: Configuring a File Server
Understanding Permissions Understanding Shares Managing Your File Server
Chapter 6: Using Group Policy
Understanding Group Policy Enabling Group Policy Management on Windows Server 2016 Creating Group Policy Objects Filtering Group Policy Objects
Chapter 7: Configuring Internet Information Services
Installing IIS Understanding the Default Website Creating Websites
Chapter 8: Configuring Exchange Server 2016
Creating a Mailbox Managing Mailboxes Configuring Outlook for Exchange Viewing Another Mailbox
Chapter 9: Configuring SQL Server 2014
What Is a Database? What Is a Relational Database? What Is SQL? Using SQL Server 2014 Management Studio Creating a New Database Creating Tables Editing Tables Working with Queries Working with Scripts
Chapter 10: Windows Commands
Using a Command Window Special Command Tricks The EventCreate Command Net Commands The RunAs Command
Chapter 11: Using PowerShell
Using PowerShell Understanding PowerShell Commands Using Cmdlets Using Parameters Getting Help Using Aliases Using the Pipeline Using Providers Using Scripts
Book 7: Implementing Linux
Chapter 1: Installing a Linux Server
Planning a Linux Server Installation Installing Fedora 26
Chapter 2: Configuring Linux
Linux: It Isn’t Windows On Again, Off Again Using GNOME Getting to a Command Shell Enabling the SUDO Command Managing User Accounts
Chapter 3: Basic Linux Network Configuration
Using the Network Configuration Program Restarting Your Network Working with Network Configuration Files Displaying Your Network Configuration with the ifconfig Command
Chapter 4: Running DHCP and DNS
Running a DHCP Server Running a DNS Server
Chapter 5: Doing the Samba Dance
Understanding Samba Installing Samba Starting and Stopping Samba Editing the smb.conf File Using the Samba Client
Chapter 6: Running Apache
Installing Apache Starting and Stopping Apache Confirming That Apache Is Running Using the HTTP Configuration Tool Allowing or Restricting Access to an Apache Server Configuring Virtual Hosts Manually Editing Apache’s Configuration Files Creating Web Pages
Chapter 7: Running Sendmail
Understanding Email Installing Sendmail Modifying sendmail.mc Using SpamAssassin Using the Mail Console Client Using Evolution
Chapter 8: Linux Commands
Command Shell Basics Directory- and File-Handling Commands Commands for Working with Packages and Services Commands for Administering Users Commands for Managing Ownership and Permissions Networking Commands
Book 8: Managing a Network
Chapter 1: Welcome to Network Administration
Knowing What Network Administrators Do Choosing the Part-Time Administrator Establishing Routine Chores Managing Network Users Patching Up Your Operating System and Software Discovering Software Tools for Network Administrators Building a Library Getting Certified Gurus Need Gurus, Too Helpful Bluffs and Excuses
Chapter 2: Managing Remotely
Enabling Remote Desktop Connection Connecting Remotely Using Keyboard Shortcuts for Remote Desktop Configuring Remote Desktop Options Using Remote Assistance Enabling Remote Assistance Inviting Someone to Help You via a Remote Assistance Session Responding to a Remote Assistance Invitation
Chapter 3: Managing Network Assets
Introducing IT Asset Management Why Bother? Getting Organized What to Track Taking Pictures Picking a Number Making Labels Tracking Software Using Asset-Tracking Software Other Sources of Asset-Tracking Information
Chapter 4: Managing the Help Desk
Establishing the Help Desk’s Charter Tracking Support Tickets Deciding How to Communicate with Users Providing Remote Support Creating a Knowledge Base Creating a Self-Service Help Portal Using Satisfaction Surveys Tracking Help-Desk Performance Using Help-Desk Management Software
Chapter 5: Solving Network Problems
When Bad Things Happen to Good Computers Fixing Dead Computers Ways to Check a Network Connection A Bunch of Error Messages Just Flew By! Double-Checking Your Network Settings Time to Experiment Who’s on First? Restarting a Client Computer Booting in Safe Mode Using System Restore Restarting Network Services Restarting a Network Server Looking at Event Logs Documenting Your Trials and Tribulations
Chapter 6: Managing Software Deployment
Understanding Software Licenses Using a License Server Options for Deploying Network Software Keeping Software Up to Date
Chapter 7: Managing Email Retention
Why Email Ends Up Everywhere Creating a Retention Policy Configuring Exchange Retention Policies Planning for a Litigation Hold Using the Exchange Journaling Feature Using Exchange Online Archiving
Chapter 8: Managing Mobile Devices
The Many Types of Mobile Devices Considering Security for Mobile Devices Managing iOS Devices Managing Android Devices
Book 9: Managing Cybersecurity
Chapter 1: Welcome to Cybersecurity
But We’re a Small Business … Do We Need Security? The Two Pillars of Cybersecurity Considering Two Basic Approaches to Security Physical Security: Locking Your Doors Securing User Accounts Securing the Human Firewall
Chapter 2: Managing Firewalls and Virus Protection
Firewalls The Many Types of Firewalls The Built-In Windows Firewall Virus Protection Using Windows Action Center
Chapter 3: Managing Spam
Defining Spam Sampling the Many Flavors of Spam Using Antispam Software Understanding Spam Filters Looking at Three Types of Antispam Software Minimizing Spam
Chapter 4: Managing Backups
Backing Up Your Data Where to Back Up Your Data Backing Up to Tape Backup Software Types of Backups Local versus Network Backups How Many Sets of Backups Should You Keep? A Word about Tape Reliability About Cleaning the Heads Backup and Virtualization Backup Security
Chapter 5: Managing Disaster Recovery and Business Continuity Planning
Assessing Different Types of Disasters Analyzing the Impact of a Disaster Developing a Business Continuity Plan Holding a Fire Drill
Appendix A: Directory of Useful Websites Appendix B: Glossary About the Author Advertisement Page Connect with Dummies Index End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion