Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Zacker C., Steven A. — MCSE Self-Paced Training Kit (Exam 70-293): Planning and Maintaining a Microsoft® Windows Server™ 2003 Network Infrastructure
Zacker C., Steven A. — MCSE Self-Paced Training Kit (Exam 70-293): Planning and Maintaining a Microsoft® Windows Server™ 2003 Network Infrastructure



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: MCSE Self-Paced Training Kit (Exam 70-293): Planning and Maintaining a Microsoft® Windows Server™ 2003 Network Infrastructure

Авторы: Zacker C., Steven A.

Аннотация:

Get in-depth exam preparation for the updated Exam 70-293, a core MCSA/MCSE exam for Windows Server 2003and build real-world job skills. Includes case studies, troubleshooting labs, and more.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: Second Edition

Год издания: 2006

Количество страниц: 1024

Добавлена в каталог: 22.10.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
SCSI, case scenario      2nd
SCSI, Questions and Answers      
SCSI, server clusters using      2nd
SCSI, servers and      
SCW (Security Configuration Wizard)      
SCW, components of      
SCW, converting SCW security policies into GPOs      
SCW, creating security policies      
SCW, deploying      
SCW, deploying security templates      2nd
SCW, planning secure baseline installation      
SCW, practice exercise deploying SCW security policies      
SCW, Questions and Answers      
SCW, review      
secedit.exe      2nd
secondary zones, DNS      2nd
Secret key encryption      
secure baseline installation      [See baseline planning
secure dynamic updates, DNS servers      
Secure Hash Algorithm 1 (SHA1)      2nd
Secure Server (Require Security) IPSec policy      
Secure Server (Require Security) IPSec policy, defined      
Secure Server (Require Security) IPSec policy, overview of      
Secure Server (Require Security) IPSec policy, Questions and Answers      2nd 3rd 4th 5th 6th 7th
Secure Sockets Layer (SSL)      
Securedc.inf security template      
Securews.inf security template      
Securing Windows 2000 Server (Microsoft Corporation)      
Security      
security association (SA)      2nd
Security Configuration and Analysis snap-in      
Security Configuration and Analysis snap-in, changing security settings      
Security Configuration and Analysis snap-in, deploying security templates      
Security Configuration and Analysis snap-in, overview of      
Security Configuration and Analysis snap-in, practice exercise using      
Security Configuration and Analysis snap-in, Questions and Answers      2nd
Security Configuration and Analysis snap-in, system analysis      2nd
Security Configuration Wizard      [See SCW (Security Configuration Wizard)]
security configurations      
security configurations, administration methods      [See administration network]
security configurations, deploying      
security configurations, deploying, case scenario      2nd
security configurations, deploying, exam highlights      
security configurations, deploying, overview of      
security configurations, deploying, Questions and Answers      
security configurations, deploying, review      
security configurations, deploying, security template deployment      [See security templates deploying]
security configurations, deploying, security templates      [See security templates]
security configurations, deploying, testing      [See testing configuration settings]
security configurations, deploying, troubleshooting lab      2nd
security configurations, further reading      
security configurations, tested skills/suggested practices      
security infrastructure design      
security infrastructure design, case scenario      2nd
security infrastructure design, certificate publication      
security infrastructure design, exam highlights      
security infrastructure design, framework      2nd
security infrastructure design, further reading      
security infrastructure design, network administration      [See network administration]
security infrastructure design, overview of      
security infrastructure design, PKI      
security infrastructure design, Questions and Answers      
security infrastructure design, review      
security infrastructure design, secure baseline installation and      
security infrastructure design, tested skills/suggested practices      
security infrastructure design, troubleshooting lab      2nd
security infrastructure design, update infrastructure      [See security update infrastructure]
security infrastructure design, wireless networks      [See wireless networks securing]
Security logs, Event Viewer      2nd
security planning      
security planning, high-level      
security planning, infrastructure design      
security planning, review      2nd
security planning, security design team      
security planning, security life cycles      
security policies      
security policies, converting SCW security policies into GPOs      
security policies, creating SCW security policies      
security policies, practice exercise deploying SCW security policies      
security settings      
security settings, account policies      
security settings, Active Directory permissions      
security settings, audit policies      
security settings, file system permissions      
security settings, practice exercise creating share permissions      
security settings, practice exercise modifying account policies      
security settings, practice exercise modifying file permissions      
security settings, registry permissions      
security settings, review      2nd
security settings, Security Configuration Wizard      
security settings, share permissions      
Security Template snap-in      
Security Template snap-in, practice exercise using      
Security Template snap-in, working with security templates      
security templates      
security templates, console for      
security templates, defined      2nd
security templates, deploying      
security templates, deploying, group policies for      
security templates, deploying, overview of      
security templates, deploying, practice exercise using Security Analysis snap-in      
security templates, deploying, review      
security templates, deploying, secedit.exe for deploying      
security templates, deploying, Security Configuration and Analysis snap-in      
security templates, deploying, Security Configuration Wizard (SCW) for      
security templates, functions of      
security templates, modifying existing template      
security templates, overview of      
security templates, practice exercise using Security Template snap-in      
security templates, predefined      
security templates, review      
security update infrastructure      
security update infrastructure, downloading and installing MBSA      
security update infrastructure, Microsoft Baseline Security Analyzer and      
security update infrastructure, network update      
security update infrastructure, review      2nd
security update infrastructure, security analysis with MBSA      
security update infrastructure, software update and      
security update infrastructure, Software Update Services      
security update infrastructure, testing updates      
security update infrastructure, Windows Server Update Services      
security update infrastructure, Windows Update      
Security, certificates      
security, configuring for member servers      
security, design team      
security, DNS      [See DNS security]
security, higher-level CAs      
security, implementation      
security, Internet connectivity      [See Internet access security]
security, IPSec      [See IPSec (IP Security)]
security, life cycles      2nd
security, NAT/proxy servers and      
security, network infrastructure and      
security, Network Monitor and      
security, ongoing management      
security, operating systems and      2nd
security, registered addresses and      
security, remote access requirements      
security, remote access users      
security, server      [See servers role-based]
security, wireless networks and      
sequence numbers      2nd
Sequenced Packet Exchange (SPX)      
Server (Request Security) IPSec policy      
Server (Request Security) IPSec policy, defined      
Server (Request Security) IPSec policy, overview of      
Server (Request Security) IPSec policy, Questions and Answers      2nd 3rd
server clusters      
server clusters, application deployment      
server clusters, backup and recovery strategy      
server clusters, bottlenecks      
server clusters, case scenario      2nd
server clusters, creating      
server clusters, deployment design      
server clusters, exam highlights      
server clusters, failover policies      
server clusters, further reading      
server clusters, geographically dispersed      
server clusters, hardware configuration      2nd
server clusters, implementing      
server clusters, lesson review      
server clusters, overview of      
server clusters, planning      
server clusters, practice exercise      
server clusters, properties      
server clusters, Questions and Answers      2nd 3rd
server clusters, quorum model selection      
server clusters, tested skills/suggested practices      
server maintenance      
server maintenance, backups      [See backups]
server maintenance, case scenario      2nd
server maintenance, exam highlights      
server maintenance, monitoring network servers      [See servers monitoring]
server maintenance, monitoring network traffic      [See network traffic monitoring]
server maintenance, Questions and Answers      
server maintenance, troubleshooting lab      2nd
Servers      
servers, baseline for member servers      [See baseline member
Servers, DNS      [See DNS servers]
servers, hardening      [See hardening servers]
servers, hardware specifications      
servers, locating network resources      
servers, monitoring      
servers, monitoring, DHCP      
servers, monitoring, DNS      
servers, monitoring, exam highlights      
servers, monitoring, keeping services running      
servers, monitoring, lesson review      
servers, monitoring, locating system bottlenecks      
servers, monitoring, practice exercise      
servers, monitoring, Questions and Answers      
servers, monitoring, RRAS      
servers, monitoring, WINS      
servers, operating systems      
servers, role-based      
servers, role-based, application servers      
servers, role-based, configuring security for      
servers, role-based, domain controllers      
servers, role-based, file and print servers      
servers, role-based, infrastructure servers      
servers, role-based, planning security for      
servers, role-based, practice exercise modifying GPO for Domain Controller container      
servers, role-based, Questions and Answers      2nd 3rd
servers, role-based, review      
servers, roles      2nd
servers, troubleshooting lab      2nd
servers, WINS      [See WINS servers]
Service Location (SRV)      
service packs      
service packs, software update and      
service packs, Windows Server 2003 SP1      
service-dependent filtering      
Services      
Services console      
Services file      
services, configuring for member servers      
services, domain controllers      
services, planning secure baseline installation      
services, Windows Server 2003      
session layer, OSI reference model      
Setup Security.inf      
SHA1 (Secure Hash Algorithm 1)      2nd
share permissions      
share permissions, practice exercise creating      
Shared key authentication      
Shared Key authentication, defined      
Shared Key authentication, Questions and Answers      2nd
Shared Key authentication, wireless networks      
Shiva Password Authentication Protocol (SPAP)      2nd
shutdown      
shutdown, security options for member servers      
shutdown, user rights and      
signatures, digital      2nd
single-instance applications      2nd
single-node clusters      2nd
single-quorum device clusters      
sites, multiple GPOs and      
Small Computer System Interface      [See SCSI (Small Computer System Interface)]
smart cards      
smart cards, designing PKI for      
smart cards, enterprise CAs required by      
smart cards, overview of      
smart cards, Questions and Answers      2nd 3rd
SMS (Systems Management Server)      
Software      
Software Update Services      [See SUS (Software Update Services)]
software, backup      2nd
software, certificates encountered when downloading      
software, clustering and      
software, configuration testing      
software, digital signatures and      
software, IP address and subnet calculation      
software, routers      
software, update practices      
Source Port field, TCP/UDP headers      2nd 3rd
SPAP (Shiva Password Authentication Protocol)      2nd
special identities      2nd
Spoofing      2nd 3rd
SPX (Sequenced Packet Exchange)      
SRV (Service Location)      
SSL (Secure Sockets Layer)      
stand-alone CAs      
stand-alone CAs, enterprise CAs compared to      
stand-alone CAs, manual certificate enrollment      
stand-alone CAs, overview of      2nd
stand-alone CAs, Questions and Answers      2nd 3rd 4th 5th
standards, wireless      
star topology      
star topology, UTP and      
star topology, WAN topologies      
stateful applications      2nd [See also server clusters]
stateful packet inspection      2nd
stateless applications      2nd
static NAT      2nd
Static routing      
static routing, compared with dynamic routing      
static routing, defined      
static routing, overview of      
static routing, troubleshooting      
storage area networks (SANs)      2nd
storage subsystem      
storage subsystem, bottlenecks      
storage subsystem, monitoring performance      
storage subsystem, Questions and Answers      
stub zones, DNS      
subdomains      [See also domains DNS]
subdomains, combining internal/external domains      
subdomains, creating      
subdomains, DNS      
subdomains, planning name resolution strategy      
subnet masks      
subnet masks, calculating      
subnet masks, case scenario      2nd
subnet masks, exam highlights      
subnet masks, IP address classes      
subnet masks, lesson review      
subnet masks, obtaining      
subnet masks, overview of      
subnet masks, practice exercise      2nd
subnet masks, Questions and Answers      
1 2 3 4 5 6 7 8 9 10
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте