Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Table of Contents Introduction
About This Book Foolish Assumptions Icons Used in This Book Beyond the Book Where to Go from Here
Part 1: Getting Started with Networking
Chapter 1: Let’s Network!
Defining a Network Why Bother with a Network? Servers and Clients Dedicated Servers and Peers What Makes a Network Tick? It’s Not a Personal Computer Anymore! The Network Administrator What Have They Got That You Don’t Got?
Chapter 2: Life on the Network
Distinguishing between Local Resources and Network Resources What’s in a Name? Logging On to the Network Understanding Shared Folders Four Good Uses for a Shared Folder Oh, the Network Places You’ll Go Mapping Network Drives Using a Network Printer Logging Off the Network
Chapter 3: More Ways to Use Your Network
Sharing Your Stuff Sharing a Folder Using the Public Folder Sharing a Printer Using Microsoft Office on a Network Working with Offline Files
Part 2: Setting Up a Network
Chapter 4: Planning a Network
Making a Network Plan Being Purposeful Taking Stock To Dedicate or Not to Dedicate: That Is the Question Choosing a Server Operating System Planning the Infrastructure Drawing Diagrams
Chapter 5: Dealing with TCP/IP
Understanding Binary Introducing IP Addresses Classifying IP Addresses Subnetting Understanding Network Address Translation Configuring Your Network for DHCP Managing a Windows Server 2016 DHCP Server Configuring a Windows DHCP Client Using DNS Working with the Windows DNS Server Configuring a Windows DNS Client
Chapter 6: Oh, What a Tangled Web We Weave: Cables, Switches, and Routers
What Is Ethernet? All about Cable Working with Switches Daisy-Chaining Switches Using a Router
Chapter 7: Configuring Windows Clients
Configuring Network Connections Joining a Domain
Chapter 8: Connecting Your Network to the Internet
Connecting to the Internet Securing Your Connection with a Firewall
Chapter 9: Setting Up a Wireless Network
Diving into Wireless Networking A Little High School Electronics Eight-Oh-Two-Dot-Eleventy Something?: Understanding Wireless Standards Home on the Range Using Wireless Network Adapters Setting Wireless Access Points Roaming Capabilities Configuring a Wireless Access Point Connecting to a Wireless Network Paying Attention to Wireless Network Security
Chapter 10: Virtual Networking
Understanding Virtualization Understanding Hypervisors Understanding Virtual Disks Understanding Network Virtualization Looking at the Benefits of Virtualization Introducing Hyper-V Enabling Hyper-V Getting Familiar with Hyper-V Creating a Virtual Switch Creating a Virtual Disk Creating a Virtual Machine Installing an Operating System
Part 3: Working with Servers
Chapter 11: Setting Up a Server
Server Operating System Features The Many Ways to Install a Network Operating System Gathering Your Stuff Making Informed Decisions Final Preparations Installing a Server Operating System Configuring Your Server
Chapter 12: Managing Windows User Accounts
Understanding Windows User Accounts Creating a New User Setting User Properties Resetting User Passwords Disabling and Enabling User Accounts Deleting a User Working with Groups Creating a Logon Script
Chapter 13: Managing Network Storage
Understanding Network Storage Understanding Permissions Understanding Shares Managing Your File Server
Chapter 14: Managing Exchange Server 2016
Creating a Mailbox Managing Mailboxes Configuring Outlook for Exchange
Chapter 15: Creating an Intranet
Defining an Intranet Identifying Intranet Uses Setting Up an Intranet Setting Up an IIS Web Server Understanding the Default Website Creating Websites
Part 4: Managing and Protecting Your Network
Chapter 16: Welcome to Network Management
What a Network Administrator Does Choosing the Part-Time Administrator The Three “Ups” of Network Management Managing Network Users Acquiring Software Tools for Network Administrators Building a Library Pursuing Certification Helpful Bluffs and Excuses
Chapter 17: Solving Network Problems
When Bad Things Happen to Good Computers Fixing Dead Computers Ways to Check a Network Connection A Bunch of Error Messages Just Flew By! Double-Checking Your Network Settings Using a Windows Troubleshooter Time to Experiment Who’s on First? Restarting a Client Computer Booting in Safe Mode Using System Restore Restarting Network Services Restarting a Network Server Looking at Event Logs Documenting Your Trials and Tribulations
Chapter 18: Backing Up Your Data
Backing Up Your Data Choosing Where to Back Up Your Data Backing Up to Tape Understanding Backup Software Comparing Types of Backups Choosing between Local and Network Backups Deciding How Many Sets of Backups to Keep Verifying Tape Reliability Keeping Backup Equipment Clean and Reliable Setting Backup Security
Chapter 19: Securing Your Network
Do You Need Security? Two Approaches to Security Physical Security: Locking Your Doors Securing User Accounts Managing User Security Securing Your Users
Chapter 20: Hardening Your Network
Firewalls The Many Types of Firewalls The Built-In Windows Firewall Virus Protection Patching Things Up
Chapter 21: Network Performance Anxiety
Why Administrators Hate Performance Problems What Exactly Is a Bottleneck? The Five Most Common Network Bottlenecks Tune Your Network the Compulsive Way Monitoring Network Performance More Performance Tips
Part 5: More Ways to Network
Chapter 22: Life in Cloud City
Introducing Cloud Computing Looking at the Benefits of Cloud Computing Detailing the Drawbacks of Cloud Computing Examining Three Basic Kinds of Cloud Services Public Clouds versus Private Clouds Introducing Some of the Major Cloud Providers Getting Into the Cloud
Chapter 23: Managing Mobile Devices
The Many Types of Mobile Devices Considering Security for Mobile Devices Managing iOS Devices Managing Android Devices
Chapter 24: Connecting from Home
Using Outlook Web App Using a Virtual Private Network
Part 6: Networking Beyond Windows
Chapter 25: Networking with Linux
Comparing Linux with Windows Choosing a Linux Distribution Installing Linux On Again, Off Again Using GNOME Getting to a Command Shell Enabling the SUDO Command Managing User Accounts Network Configuration Doing the Samba Dance
Chapter 26: Mac Networking
Basic Mac Network Settings Joining a Domain Connecting to a Share
Part 7: The Part of Tens
Chapter 27: Ten Networking Commandments
I. Thou Shalt Back Up Thy Hard Drive Religiously II. Thou Shalt Protect Thy Network from Infidels III. Thou Shalt Keepeth Thy Network Drive Pure and Cleanse It of Old Files IV. Thou Shalt Not Tinker with Thine Network Configuration Unless Thou Knowest What Thou Art Doing V. Thou Shalt Not Covet Thy Neighbor’s Network VI. Thou Shalt Schedule Downtime before Working upon Thy Network VII. Thou Shalt Keep an Adequate Supply of Spare Parts VIII. Thou Shalt Not Steal Thy Neighbor’s Program without a License IX. Thou Shalt Train Thy Users in the Ways of the Network X. Thou Shalt Write Down Thy Network Configuration upon Tablets of Stone
Chapter 28: Ten Big Network Mistakes
Skimping on Hardware Turning Off or Restarting a Server Computer While Users Are Logged On Deleting Important Files on the Server Copying a File from the Server, Changing It, and Then Copying It Back Sending Something to the Printer Again Just Because It Didn’t Print the First Time Assuming That the Server Is Safely Backed Up Connecting to the Internet without Considering Security Issues Plugging In a Wireless Access Point without Asking Thinking You Can’t Work Just Because the Network Is Down Running Out of Space on a Server Always Blaming the Network
Chapter 29: Ten Things You Should Keep in Your Closet
Duct Tape Tools Patch Cables Cable Ties Twinkies Replacement Parts Cheap Network Switches The Complete Documentation of the Network on Tablets of Stone The Network Manuals and Disks Ten Copies of This Book
About the Author Connect with Dummies End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion