Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Table of Contents
Introduction
About This Book
Foolish Assumptions
Icons Used in This Book
Beyond the Book
Where to Go from Here
Book 1: Networking Basics
Chapter 1: Welcome to Networking
Defining a Network
Why Bother with a Network?
Servers and Clients
Dedicated Servers and Peers
What Makes a Network Tick?
Networks Big and Small
It’s Not a Personal Computer Anymore!
Understanding Network Topology
The Network Administrator
Chapter 2: Network Infrastructure
Introducing Infrastructure
Introducing Network Protocols and Standards
Understanding Cable Infrastructure
Understanding Ports, Interfaces, and MAC Addresses
Understanding Packets
Understanding Collisions
Understanding Broadcast Packets
Understanding Wireless Networks
Chapter 3: Switches, Routers, and VLANs
Understanding Switches
Looking Deeper into Switches
Understanding Routers
Understanding VLANs
Chapter 4: Servers and Virtualization
Understanding Network Operating Systems
What’s Important in a Server
Components of a Server Computer
Considering Server Form Factors
Considering Virtualization
Chapter 5: Cloud Computing
Introducing Cloud Computing
Looking at the Benefits of Cloud Computing
Detailing the Drawbacks of Cloud Computing
Examining Three Basic Kinds of Cloud Services
Public Clouds versus Private Clouds
Introducing Some of the Major Cloud Providers
Getting Into the Cloud
Book 2: Understanding Network Protocols
Chapter 1: Network Protocols and Standards
Understanding Protocols
Understanding Standards
Seeing the Seven Layers of the OSI Reference Model
Following a Packet through the Layers
The Ethernet Protocol
The TCP/IP Protocol Suite
Other Protocols Worth Knowing About
Chapter 2: TCP/IP and the Internet
What Is the Internet?
A Little Internet History
TCP/IP Standards and RFCs
The TCP/IP Protocol Framework
Chapter 3: IP Addresses
Understanding Binary
Introducing IP Addresses
Classifying IP Addresses
Subnetting
Network Address Translation
Chapter 4: Routing
Considering the Usefulness of Routers
Understanding Routing Tables
Chapter 5: DHCP
Understanding DHCP
Understanding Scopes
Working with a DHCP Server
How to Configure a Windows DHCP Client
Chapter 6: DNS
Understanding DNS Names
Top-Level Domains
The Hosts File
Understanding DNS Servers and Zones
Understanding DNS Queries
Zone Files and Resource Records
Reverse Lookup Zones
Working with the Windows DNS Server
How to Configure a Windows DNS Client
Chapter 7: TCP/IP Tools and Commands
Using the arp Command
Using the hostname Command
Using the ipconfig Command
Using the nbtstat Command
Using the netstat Command
Using the nslookup Command
Using the pathping Command
Using the ping Command
Using the route Command
Using the tracert Command
Book 3: Planning a Network
Chapter 1: Local Area Networks
Making a Network Plan
Being Purposeful
Taking Stock
Considering Cable
Surmising Switches
Planning the Network Topology
Planning the TCP/IP Implementation
Drawing Diagrams
More Questions Your Network Plan Should Address
Chapter 2: Wide Area Networks
Connecting to the Internet
Choosing a Router
Securing Your Connection with a Firewall
Providing Redundancy for Your Internet Connection
Securing Connections to Remote Locations and Users
Chapter 3: Server Architecture
Deciding How Many Servers You Need
Deciding Which Servers You Need
Connecting Your Servers
Chapter 4: Virtualization Architecture
Understanding Virtualization
Understanding Hypervisors
Understanding Virtual Disks
Understanding Network Virtualization
Considering the Benefits of Virtualization
Choosing Virtualization Hosts
Understanding Windows Server 2016 Licensing
Chapter 5: Storage Architecture
Considering Disk Space
Considering Disk Drive Types
Considering Drive Interfaces
Considering RAID
Considering Attachment Types
Book 4: Implementing a Network
Chapter 1: Network Hardware
Working with Cable
Installing Switches
Daisy-Chaining Switches
Chapter 2: Wireless Networks
Installing a Wireless Access Point
Configuring a Wireless Access Point
Connecting to a Wireless Network
Paying Attention to Wireless Network Security
Chapter 3: Windows Clients
Configuring Network Connections
Joining a Domain
Chapter 4: Mac Networking
Basic Mac Network Settings
Joining a Domain
Connecting to a Share
Chapter 5: Network Printers
Configuring Network Printers
Chapter 6: Virtual Private Networks
Understanding VPN
Looking at VPN Security
Understanding VPN Servers and Clients
Book 5: Implementing Virtualization
Chapter 1: Hyper-V
Understanding the Hyper-V Hypervisor
Understanding Hyper-V Virtual Disks
Enabling Hyper-V
Getting Familiar with Hyper-V
Creating a Virtual Switch
Creating a Virtual Disk
Creating a Virtual Machine
Installing an Operating System
Chapter 2: VMware
Looking at vSphere
Getting Started with VMware Player
Creating a Virtual Machine
Installing VMware Tools
Chapter 3: Azure
Looking at Azure Services
Creating an Azure Account
Examining the Azure Portal
Creating a Windows Virtual Machine
Managing an Azure Virtual Machine
Connecting to an Azure Virtual Machine
Chapter 4: Amazon Web Services
Looking at What Amazon Web Services Can Do
Creating an Amazon Web Services Account
Examining the Amazon Web Services Console
Creating a Windows Virtual Machine
Managing an Amazon Web Services Virtual Machine
Connecting to an Amazon Web Services Virtual Machine
Chapter 5: Desktop Virtualization
Introducing Desktop Virtualization
Considering Two Approaches to Desktop Virtualization
Looking at VMware’s Horizon View
Looking at Citrix XenApp
Book 6: Implementing Windows Server 2016
Chapter 1: Installing Windows Server 2016
Planning a Windows Server Installation
Before You Install …
Running Setup
Adding Server Roles and Features
Chapter 2: Configuring Windows Server 2016
Using the Administrator Account
Using Remote Desktop Connection
Using Microsoft Management Console
Customizing MMC
Chapter 3: Configuring Active Directory
What Directories Do
Remembering the Good Ol’ Days of NT Domains
Active Directory to the Rescue
Understanding How Active Directory Is Structured
Creating a New Domain
Creating an Organizational Unit
Chapter 4: Configuring User Accounts
Understanding Windows User Accounts
Creating a New User
Setting User Properties
Resetting User Passwords
Disabling and Enabling User Accounts
Deleting a User
Working with Groups
Working with User Profiles
Creating a Logon Script
Chapter 5: Configuring a File Server
Understanding Permissions
Understanding Shares
Managing Your File Server
Chapter 6: Using Group Policy
Understanding Group Policy
Enabling Group Policy Management on Windows Server 2016
Creating Group Policy Objects
Filtering Group Policy Objects
Chapter 7: Configuring Internet Information Services
Installing IIS
Understanding the Default Website
Creating Websites
Chapter 8: Configuring Exchange Server 2016
Creating a Mailbox
Managing Mailboxes
Configuring Outlook for Exchange
Viewing Another Mailbox
Chapter 9: Configuring SQL Server 2014
What Is a Database?
What Is a Relational Database?
What Is SQL?
Using SQL Server 2014 Management Studio
Creating a New Database
Creating Tables
Editing Tables
Working with Queries
Working with Scripts
Chapter 10: Windows Commands
Using a Command Window
Special Command Tricks
The EventCreate Command
Net Commands
The RunAs Command
Chapter 11: Using PowerShell
Using PowerShell
Understanding PowerShell Commands
Using Cmdlets
Using Parameters
Getting Help
Using Aliases
Using the Pipeline
Using Providers
Using Scripts
Book 7: Implementing Linux
Chapter 1: Installing a Linux Server
Planning a Linux Server Installation
Installing Fedora 26
Chapter 2: Configuring Linux
Linux: It Isn’t Windows
On Again, Off Again
Using GNOME
Getting to a Command Shell
Enabling the SUDO Command
Managing User Accounts
Chapter 3: Basic Linux Network Configuration
Using the Network Configuration Program
Restarting Your Network
Working with Network Configuration Files
Displaying Your Network Configuration with the ifconfig Command
Chapter 4: Running DHCP and DNS
Running a DHCP Server
Running a DNS Server
Chapter 5: Doing the Samba Dance
Understanding Samba
Installing Samba
Starting and Stopping Samba
Editing the smb.conf File
Using the Samba Client
Chapter 6: Running Apache
Installing Apache
Starting and Stopping Apache
Confirming That Apache Is Running
Using the HTTP Configuration Tool
Allowing or Restricting Access to an Apache Server
Configuring Virtual Hosts
Manually Editing Apache’s Configuration Files
Creating Web Pages
Chapter 7: Running Sendmail
Understanding Email
Installing Sendmail
Modifying sendmail.mc
Using SpamAssassin
Using the Mail Console Client
Using Evolution
Chapter 8: Linux Commands
Command Shell Basics
Directory- and File-Handling Commands
Commands for Working with Packages and Services
Commands for Administering Users
Commands for Managing Ownership and Permissions
Networking Commands
Book 8: Managing a Network
Chapter 1: Welcome to Network Administration
Knowing What Network Administrators Do
Choosing the Part-Time Administrator
Establishing Routine Chores
Managing Network Users
Patching Up Your Operating System and Software
Discovering Software Tools for Network Administrators
Building a Library
Getting Certified
Gurus Need Gurus, Too
Helpful Bluffs and Excuses
Chapter 2: Managing Remotely
Enabling Remote Desktop Connection
Connecting Remotely
Using Keyboard Shortcuts for Remote Desktop
Configuring Remote Desktop Options
Using Remote Assistance
Enabling Remote Assistance
Inviting Someone to Help You via a Remote Assistance Session
Responding to a Remote Assistance Invitation
Chapter 3: Managing Network Assets
Introducing IT Asset Management
Why Bother?
Getting Organized
What to Track
Taking Pictures
Picking a Number
Making Labels
Tracking Software
Using Asset-Tracking Software
Other Sources of Asset-Tracking Information
Chapter 4: Managing the Help Desk
Establishing the Help Desk’s Charter
Tracking Support Tickets
Deciding How to Communicate with Users
Providing Remote Support
Creating a Knowledge Base
Creating a Self-Service Help Portal
Using Satisfaction Surveys
Tracking Help-Desk Performance
Using Help-Desk Management Software
Chapter 5: Solving Network Problems
When Bad Things Happen to Good Computers
Fixing Dead Computers
Ways to Check a Network Connection
A Bunch of Error Messages Just Flew By!
Double-Checking Your Network Settings
Time to Experiment
Who’s on First?
Restarting a Client Computer
Booting in Safe Mode
Using System Restore
Restarting Network Services
Restarting a Network Server
Looking at Event Logs
Documenting Your Trials and Tribulations
Chapter 6: Managing Software Deployment
Understanding Software Licenses
Using a License Server
Options for Deploying Network Software
Keeping Software Up to Date
Chapter 7: Managing Email Retention
Why Email Ends Up Everywhere
Creating a Retention Policy
Configuring Exchange Retention Policies
Planning for a Litigation Hold
Using the Exchange Journaling Feature
Using Exchange Online Archiving
Chapter 8: Managing Mobile Devices
The Many Types of Mobile Devices
Considering Security for Mobile Devices
Managing iOS Devices
Managing Android Devices
Book 9: Managing Cybersecurity
Chapter 1: Welcome to Cybersecurity
But We’re a Small Business … Do We Need Security?
The Two Pillars of Cybersecurity
Considering Two Basic Approaches to Security
Physical Security: Locking Your Doors
Securing User Accounts
Securing the Human Firewall
Chapter 2: Managing Firewalls and Virus Protection
Firewalls
The Many Types of Firewalls
The Built-In Windows Firewall
Virus Protection
Using Windows Action Center
Chapter 3: Managing Spam
Defining Spam
Sampling the Many Flavors of Spam
Using Antispam Software
Understanding Spam Filters
Looking at Three Types of Antispam Software
Minimizing Spam
Chapter 4: Managing Backups
Backing Up Your Data
Where to Back Up Your Data
Backing Up to Tape
Backup Software
Types of Backups
Local versus Network Backups
How Many Sets of Backups Should You Keep?
A Word about Tape Reliability
About Cleaning the Heads
Backup and Virtualization
Backup Security
Chapter 5: Managing Disaster Recovery and Business Continuity Planning
Assessing Different Types of Disasters
Analyzing the Impact of a Disaster
Developing a Business Continuity Plan
Holding a Fire Drill
Appendix A: Directory of Useful Websites
Appendix B: Glossary
About the Author
Advertisement Page
Connect with Dummies
Index
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →