Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Table of Contents Introduction
About This Book Foolish Assumptions Icons Used in This Book Beyond the Book Where to Go from Here
Book I: Planning a Network
Chapter 1: Understanding Networks
Defining a Network Comparing Clients and Servers Understanding Dedicated Servers and Peers Seeing Networks Big and Small Looking Closer at Servers
Chapter 2: Planning a Network
Making a Network Plan Being Purposeful Taking Stock To Dedicate or Not to Dedicate: That Is the Question Considering Server Roles Choosing a Server Operating System Considering Cable Surmising Switches Planning the Network Topology Planning the TCP/IP Implementation Drawing Diagrams More Questions Your Network Plan Should Address
Chapter 3: Installing Network Hardware
Working with Cable Installing Switches Daisy-Chaining Switches
Chapter 4: Setting Up a Server
The Many Ways to Install a Server Operating System Gathering Your Stuff Making Informed Decisions Final Preparations Installing a Server operating system Configuring Your Server
Chapter 5: Configuring Windows Clients
Configuring Network Connections Joining a Domain
Chapter 6: Mac Networking
Basic Mac Network Settings Joining a Domain Connecting to a Share
Chapter 7: Configuring Other Network Features
Configuring Network Printers Mapping Network Drives
Chapter 8: Setting Up a Wireless Network
Diving into Wireless Networking A Little High School Electronics Eight-Oh-Two-Dot-Eleventy Something? (Or, Understanding Wireless Standards) Home on the Range Wireless Network Adapters Wireless Access Points Roaming Configuring a Wireless Access Point Connecting to a Wireless Network Paying Attention to Wireless Network Security
Book II: Network Administration
Chapter 1: Help Wanted: Job Description for a Network Administrator
Knowing What Network Administrators Do Choosing the Part-Time Administrator Establishing Routine Chores Managing Network Users Patching Up Your Operating System and Software Discovering Software Tools for Network Administrators Building a Library Getting Certified Gurus Need Gurus, Too Helpful Bluffs and Excuses
Chapter 2: Security 101
Do You Need Security? Considering Two Approaches to Security Physical Security: Locking Your Doors Securing User Accounts Hardening Your Network Securing Your Users
Chapter 3: Managing User Accounts
Exploring What User Accounts Consist Of Looking at Built-In Accounts Assigning User Rights Controlling User Access with Permissions (Who Gets What) Assigning Permissions to Groups Understanding User Profiles Automating Tasks with Logon Scripts
Chapter 4: Firewalls and Virus Protection
Firewalls The Many Types of Firewalls The Built-In Windows Firewall Virus Protection Using Windows Action Center
Chapter 5: Blocking Spam
Defining Spam Sampling the Many Flavors of Spam Using Antispam Software Understanding Spam Filters Looking at Three Types of Antispam Software Minimizing Spam
Chapter 6: Managing Network Software
Understanding Software Licenses Using a License Server Options for Deploying Network Software Keeping Software Up to Date
Chapter 7: Solving Network Problems
When Bad Things Happen to Good Computers Fixing Dead Computers Ways to Check a Network Connection A Bunch of Error Messages Just Flew By! Double-Checking Your Network Settings Using the Windows Networking Troubleshooter Time to Experiment Who’s on First? Restarting a Client Computer Booting in Safe Mode Using System Restore Restarting Network Services Restarting a Network Server Looking at Event Logs Documenting Your Trials and Tribulations
Chapter 8: Backing Up Your Data
Backing Up Your Data Where to Back Up Your Data Backing Up to Tape Backup Software Types of Backups Local versus Network Backups How Many Sets of Backups Should You Keep? A Word about Tape Reliability About Cleaning the Heads Backup Security
Chapter 9: Disaster Recovery and Business Continuity Planning
Assessing Different Types of Disasters Analyzing the Impact of a Disaster Developing a Business Continuity Plan Holding a Fire Drill
Book III: Protocols
Chapter 1: Understanding Network Protocols and Standards
Understanding Protocols Understanding Standards Seeing the Seven Layers of the OSI Reference Model Following a Packet through the Layers The Ethernet Protocol The TCP/IP Protocol Suite Other Protocols Worth Knowing About
Chapter 2: Introduction to TCP/IP and the Internet
What Is the Internet? A Little Internet History TCP/IP Standards and RFCs The TCP/IP Protocol Framework
Chapter 3: Understanding IP Addresses
Understanding Binary Introducing IP Addresses Classifying IP Addresses Subnetting Network Address Translation
Chapter 4: Using DHCP
Understanding DHCP Understanding Scopes Working with a DHCP Server How to Configure a Windows DHCP Client
Chapter 5: Using DNS
Understanding DNS Names Top-Level Domains The Hosts File Understanding DNS Servers and Zones Understanding DNS Queries Zone Files and Resource Records Reverse Lookup Zones Working with the Windows DNS Server How to Configure a Windows DNS Client
Chapter 6: Using FTP
Discovering FTP Configuring an FTP Server Accessing an FTP Site with a Browser Using an FTP Command Line Client FTP Command and Subcommand Reference
Chapter 7: TCP/IP Tools and Commands
Using the arp Command Using the hostname Command Using the ipconfig Command Using the nbtstat Command Using the netstat Command Using the nslookup Command Using the pathping Command Using the ping Command Using the route Command Using the tracert Command
Book IV: Going Virtual
Chapter 1: Introducing Virtualization
Understanding Virtualization Understanding Hypervisors Understanding Virtual Disks Understanding Network Virtualization Considering the Benefits of Virtualization
Chapter 2: Working with Hyper-V
Understanding the Hyper-V Hypervisor Understanding Hyper-V Virtual Disks Enabling Hyper-V Getting Familiar with Hyper-V Creating a Virtual Switch Creating a Virtual Disk Creating a Virtual Machine Installing an Operating System
Chapter 3: Working with VMware
Looking at vSphere Getting Started with VMware Player Creating a Virtual Machine Installing VMware Tools
Chapter 4: Virtualizing Your Desktops
Introducing Desktop Virtualization Considering Two Approaches to Desktop Virtualization Looking at VMware’s Horizon View Looking at Citrix XenApp
Book V: Remote Networking
Chapter 1: Managing Mobile Devices
The Many Types of Mobile Devices Considering Security for Mobile Devices Managing iOS Devices Managing Android Devices
Chapter 2: Working with VPN for Remote Access
Understanding VPN Looking at VPN Security Understanding VPN Servers and Clients
Chapter 3: Using Remote Desktop Access
Enabling Remote Desktop Connection Connecting Remotely Using Keyboard Shortcuts for Remote Desktop Configuring Remote Desktop Options
Chapter 4: Using Remote Assistance
Enabling Remote Assistance Inviting Someone to Help You via a Remote Assistance Session Responding to a Remote Assistance Invitation
Book VI: Cloud Networking
Chapter 1: Cloudy with a Chance of Gigabytes
Introducing Cloud Computing Looking at the Benefits of Cloud Computing Detailing the Drawbacks of Cloud Computing Examining Three Basic Kinds of Cloud Services Public Clouds versus Private Clouds Introducing Some of the Major Cloud Providers Getting into the Cloud
Chapter 2: Using Essential Cloud Services
Sharing Files in the Cloud Hosting Meetings in the Cloud Creating a Company Social Network
Chapter 3: Administering Office 365
Looking at the Features Provided by Office 365 Using the Admin Center Creating a New User Editing a User Account Considering Other Important Administrative Tasks
Chapter 4: Using SharePoint Online
What Is SharePoint? Connecting to SharePoint Online Adding a Part Adding and Removing Announcements Adding Apps
Book VII: Windows Server 2016 Reference
Chapter 1: Installing and Configuring Windows Server 2016
Planning a Windows Server Installation Before You Install … Running Setup Adding Server Roles and Features
Chapter 2: Managing Windows Server 2016
Using the Administrator Account Using Remote Desktop Connection Using Microsoft Management Console Customizing MMC
Chapter 3: Dealing with Active Directory
What Directories Do Remembering the Good Ol’ Days of NT Domains Active Directory to the Rescue Understanding How Active Directory Is Structured Creating a New Domain Creating an Organizational Unit
Chapter 4: Managing Windows User Accounts
Understanding Windows User Accounts Creating a New User Setting User Properties Resetting User Passwords Disabling and Enabling User Accounts Deleting a User Working with Groups Working with User Profiles Creating a Logon Script
Chapter 5: Managing a File Server
Understanding Permissions Understanding Shares Managing Your File Server
Chapter 6: Using Group Policy
Understanding Group Policy Enabling Group Policy Management on Windows Server 2016 Creating Group Policy Objects Filtering Group Policy Objects
Chapter 7: Troubleshooting
Working with the Event Viewer Monitoring Performance Using the Computer Management Console Working with Services
Chapter 8: Windows Commands
Using a Command Window Special Command Tricks The EventCreate Command Net Commands The RunAs Command
Book VIII: Using Other Windows Servers
Chapter 1: Using Internet Information Services
Installing IIS Understanding the Default Website Creating Websites
Chapter 2: Managing Exchange Server 2016
Creating a Mailbox Managing Mailboxes Configuring Outlook for Exchange Viewing Another Mailbox
Chapter 3: Using SQL Server 2014
What Is a Database? What Is a Relational Database? What Is SQL? Using SQL Server 2014 Management Studio Creating a New Database Creating Tables Editing Tables Working with Queries Working with Scripts
Book IX: Managing Linux Systems
Chapter 1: Installing a Linux Server
Planning a Linux Server Installation Installing Fedora 22
Chapter 2: Getting Used to Linux
Linux: It Isn’t Windows On Again, Off Again Using GNOME Getting to a Command Shell Enabling the SUDO Command Managing User Accounts
Chapter 3: Basic Linux Network Configuration
Using the Network Configuration Program Restarting Your Network Working with Network Configuration Files Displaying Your Network Configuration with the ifconfig Command
Chapter 4: Running DHCP and DNS
Running a DHCP Server Running a DNS Server
Chapter 5: Doing the Samba Dance
Understanding Samba Installing Samba Starting and Stopping Samba Using the Samba Server Configuration Tool Editing the smb.conf File Using the Samba Client
Chapter 6: Running Apache
Installing Apache Starting and Stopping Apache Confirming That Apache Is Running Using the HTTP Configuration Tool Allowing or Restricting Access to an Apache Server Configuring Virtual Hosts Manually Editing Apache’s Configuration Files Creating Web Pages
Chapter 7: Running Sendmail
Understanding Email Installing Sendmail Modifying sendmail.mc Using SpamAssassin Using the Mail Console Client Using Evolution
Chapter 8: Running FTP
Installing vsftpd Starting the vsftpd Service Configuring FTP
Chapter 9: Linux Commands
Command Shell Basics Directory- and File-Handling Commands Commands for Working with Packages and Services Commands for Administering Users Commands for Managing Ownership and Permissions Networking Commands
Appendix A: Directory of Useful Websites
Certification Hardware Home and Small-Business Networking Linux Magazines Microsoft Network Standards Organizations Reference Search TCP/IP and the Internet Wireless Networking Smartphones
Appendix B: Glossary About the Author Cheat Sheet Advertisement Page Connect with Dummies End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion