دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: شبکه سازی ویرایش: 12 نویسندگان: Doug Lowe سری: For Dummies ISBN (شابک) : 1119648505, 9781119648505 ناشر: Wiley سال نشر: 2020 تعداد صفحات: 483 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 17 مگابایت
کلمات کلیدی مربوط به کتاب شبکه های ساختگی: لینوکس، رایانش ابری، macOS، مایکروسافت آفیس، مجازیسازی، پشتیبانگیری، بهترین روشها، امنیت شبکه، شبکههای بیسیم، تشخیص هرزنامه، مایکروسافت ویندوز، شبکه، فیلتر کردن بستهها، اترنت، TCP/IP، توپولوژی شبکه، پاسخ اضطراری، DHCP، آدرس شبکه ترجمه، فایروال، Hyper-V، مدیریت کاربر، امنیت فیزیکی، ایمیل، ذخیره سازی شبکه، مدیریت شبکه، ابر ترکیبی
در صورت تبدیل فایل کتاب Networking For Dummies به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب شبکه های ساختگی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
یک شبکه امن در خانه یا محل کار راه اندازی کنید این نسخه جدید از Networking For Dummies که به طور کامل برای پوشش ویندوز 10 و ویندوز سرور 2019 بازبینی شده است، به مدیران شبکه و کاربران خانگی کمک میکند تا یک شبکه را راهاندازی و نگهداری کنند. پوشش به روز شده فناوری های پهن باند و بی سیم، و همچنین روش های ذخیره سازی و پشتیبان گیری، تضمین می کند که نحوه ایجاد یک شبکه سیمی یا بی سیم، ایمن سازی و بهینه سازی آن، عیب یابی مشکلات و موارد دیگر را تضمین می کند. از اتصال به اینترنت و راهاندازی یک شبکه بیسیم گرفته تا حل مشکلات شبکه و پشتیبانگیری از دادههای خود - این راهنمای پرفروش شماره 1 همه را پوشش میدهد. • یک شبکه سیمی یا بی سیم بسازید • شبکه خود را ایمن و بهینه کنید • یک سرور راه اندازی کنید و حساب های کاربری ویندوز را مدیریت کنید • با خیال راحت از ابر استفاده کنید نوشته شده توسط یک نویسنده باتجربه فناوری - و پر از دستورالعمل های گام به گام مفید - این کتابی است که مدیران شبکه و کاربران روزمره رایانه بارها و بارها به آن مراجعه می کنند.
Set up a secure network at home or the office Fully revised to cover Windows 10 and Windows Server 2019, this new edition of the trusted Networking For Dummies helps both beginning network administrators and home users to set up and maintain a network. Updated coverage of broadband and wireless technologies, as well as storage and back-up procedures, ensures that you’ll learn how to build a wired or wireless network, secure and optimize it, troubleshoot problems, and much more. From connecting to the Internet and setting up a wireless network to solving networking problems and backing up your data―this #1 bestselling guide covers it all. • Build a wired or wireless network • Secure and optimize your network • Set up a server and manage Windows user accounts • Use the cloud―safely Written by a seasoned technology author―and jam-packed with tons of helpful step-by-step instructions―this is the book network administrators and everyday computer users will turn to again and again.
Title Page Copyright Page Table of Contents Introduction About This Book Foolish Assumptions Icons Used in This Book Beyond the Book Where to Go from Here Part 1 Getting Started with Networking Chapter 1 Let’s Network! Defining a Network Why Bother with a Network? Sharing files Sharing resources Sharing programs Sharing messages Servers and Clients Dedicated Servers and Peers What Makes a Network Tick? It’s Not a Personal Computer Anymore! The Network Administrator What Have They Got That You Don’t Got? Chapter 2 Configuring Windows and Mac Clients Configuring Windows Network Connections Joining a Windows Computer to a Domain Configuring Mac Network Settings Joining a Mac Computer to a Domain Chapter 3 Life on the Network Distinguishing between Local Resources and Network Resources What’s in a Name? Logging on to the Network Understanding Shared Folders Four Good Uses for a Shared Folder Store files that everybody needs Store your own files Make a temporary resting place for files on their way to other users Back up your local hard drive Oh, the Network Places You’ll Go Mapping Network Drives Using a Network Printer Adding a network printer Printing to a network printer Playing with the print queue Logging off the Network Chapter 4 More Ways to Use Your Network Sharing Your Stuff Enabling File and Printer Sharing Sharing a Folder Using the Public Folder Sharing a Printer Using Microsoft Office on a Network Accessing network files Using workgroup templates Networking an Access database Working with Offline Files Part 2 Designing Your Network Chapter 5 Planning a Network Making a Network Plan Being Purposeful Taking Stock What you need to know Programs that gather information for you To Dedicate or Not to Dedicate: That Is the Question File servers Print servers Web servers Mail servers Database servers Application servers License servers Choosing a Server Operating System Planning the Infrastructure Drawing Diagrams Chapter 6 Dealing with TCP/IP Understanding Binary Counting by ones Doing the logic thing Introducing IP Addresses Networks and hosts The dotted-decimal dance Classifying IP Addresses Class A addresses Class B addresses Class C addresses Subnetting Subnets Subnet masks The great subnet roundup Private and public addresses Understanding Network Address Translation Configuring Your Network for DHCP Understanding DHCP DHCP servers Understanding scopes Feeling excluded? Reservations suggested How long to lease? Managing a Windows Server 2019 DHCP Server Configuring a Windows DHCP Client Using DNS Domains and domain names Fully qualified domain names Working with the Windows DNS Server Configuring a Windows DNS Client Chapter 7 Oh, What a Tangled Web We Weave: Cables and Switches What Is Ethernet? All about Cable Cable categories What’s with the pairs? To shield or not to shield When to use plenum cable Sometimes solid, sometimes stranded Installation guidelines The tools you need Pinouts for twisted-pair cables RJ-45 connectors Crossover cables Wall jacks and patch panels Understanding Switches Comparing managed and unmanaged switches Daisy-chaining switches Stacking switches Looking at distribution switches and access switches Powering Up with Power over Ethernet Looking at Three Types of Network Rooms Chapter 8 Setting Up a Wireless Network Diving into Wireless Networking A Little High School Electronics Waves and frequencies Wavelength and antennas Spectrums and the FCC Eight-Oh-Two-Dot-Eleventy Something: Understanding Wireless Standards Home on the Range Using Wireless Network Adapters Setting Wireless Access Points Infrastructure mode Multifunction WAPs Roaming Capabilities Wireless bridging Ad-hoc networks Configuring a Wireless Access Point Basic configuration options DHCP configuration Connecting to a Wireless Network Paying Attention to Wireless Network Security Chapter 9 Connecting to the Internet Connecting to the Internet Connecting with cable or DSL Connecting with high-speed private lines Sharing an Internet connection Securing Your Connection with a Firewall Using a firewall Comparing residential gateways to firewall routers Looking at the built-in Windows firewall Providing a Backup Internet Connection Part 3 Working with Servers Chapter 10 Virtualizing Your Network Understanding Virtualization Understanding Hypervisors Understanding Virtual Disks Understanding Network Virtualization Looking at the Benefits of Virtualization Choosing Virtualization Hosts Understanding Windows Server 2019 Licensing Introducing Hyper-V Understanding the Hyper-V hypervisor Understanding virtual disks Enabling Hyper-V Getting Familiar with Hyper-V Creating a Virtual Switch Creating a Virtual Disk Creating a Virtual Machine Installing an Operating System Chapter 11 Setting Up a Windows Server Planning a Windows Server Installation Checking system requirements Reading the release notes Considering your licensing options Deciding your TCP/IP configuration Choosing workgroups or domains Running Setup Adding Server Roles and Features Creating a New Domain Chapter 12 Managing Windows User Accounts Understanding How Active Directory Is Organized Objects Domains Organizational units Trees Forests Understanding Windows User Accounts Local accounts versus domain accounts User account properties Creating a New User Setting User Properties Changing the user’s contact information Setting account options Specifying logon hours Restricting access to certain computers Setting the user’s profile information Resetting User Passwords Disabling and Enabling User Accounts Deleting a User Working with Groups Creating a group Adding a member to a group Creating a Logon Script Chapter 13 Managing Network Storage Understanding Disk Storage Hard disk drives Solid state drives to the rescue! It’s a RAID! Three ways to attach disks to your servers Focusing on File Servers Understanding permissions Understanding shares Managing Your File Server Using the New Share Wizard Sharing a folder without the wizard Granting permissions Part 4 Managing Your Network Chapter 14 Welcome to Network Management What a Network Administrator Does Choosing the Part-Time Administrator The Three “Ups” of Network Management Managing Network Users Acquiring Software Tools for Network Administrators Building a Library Pursuing Certification Helpful Bluffs and Excuses Chapter 15 Supporting Your Users Establishing the Help Desk’s Charter Tracking Support Tickets Deciding How to Communicate with Users Using Remote Assistance Enabling Remote Assistance Inviting someone to help you via a Remote Assistance session Responding to a Remote Assistance invitation Creating a Knowledge Base Creating a Self-Service Help Portal Using Satisfaction Surveys Tracking Help Desk Performance Using Help Desk Management Software Chapter 16 Using Group Policy Understanding Group Policy Enabling Group Policy Management on Windows Server 2019 Creating Group Policy Objects Filtering Group Policy Objects Forcing Group Policy Updates Chapter 17 Managing Software Deployment Understanding Software Licenses Using a License Server Deploying Network Software Deploying software manually Running Setup from a network share Installing silently Creating an administrative installation image Pushing out software with Group Policy Keeping Software Up to Date Chapter 18 Managing Mobile Devices The Many Types of Mobile Devices Considering Security for Mobile Devices Managing iOS Devices Understanding the iPhone Understanding the iPad Integrating iOS devices with Exchange Configuring an iOS device for Exchange email Managing Android Devices Looking at the Android OS Perusing Android’s core applications Integrating Android with Exchange Part 5 Securing Your Network Chapter 19 Welcome to Cybersecurity Network Do You Need Security? The Three Pillars of Cybersecurity Two Approaches to Security Physical Security: Locking Your Doors Securing User Accounts Obfuscating your usernames Using passwords wisely Generating passwords For Dummies Secure the Administrator account Managing User Security User accounts Built-in accounts User rights Permissions (who gets what) Group therapy User profiles Logon scripts Securing the Human Firewall Chapter 20 Hardening Your Network Firewalls The Many Types of Firewalls Packet filtering Stateful packet inspection (SPI) Circuit-level gateway Application gateway Next-generation firewall Virus Protection What is a virus? Antivirus programs Safe computing Patching Things Up Chapter 21 Securing Your Email Defining Spam Sampling the Many Flavors of Spam Using Antispam Software Understanding Spam Filters Looking at Three Types of Antispam Software On-premises antispam Antispam appliances Cloud-based antispam services Minimizing Spam Chapter 22 Backing Up Your Data 3-2-1: The Golden Rule of Backups How Often Should You Back Up Your Data? Choosing Where to Back Up Your Data Establishing Two Key Backup Objectives Backing Up to Tape Understanding Backup Software Examining File-Based Backups Full backups Copy backups Incremental backups Differential backups Backup and Virtualization Verifying Tape Reliability Keeping Backup Equipment Clean and Reliable Setting Backup Security Chapter 23 Planning for Disaster Assessing Different Types of Disasters Environmental disasters Deliberate disasters Disruption of services Equipment failure Other disasters Analyzing the Impact of a Disaster Developing a Business Continuity Plan Holding a Fire Drill Part 6 More Ways to Network Chapter 24 Accommodating Remote Users Using Outlook Web App Using a Virtual Private Network Looking at VPN security Understanding VPN servers and clients Connecting with Remote Desktop Connection Enabling Remote Desktop Connection Connecting remotely Using keyboard shortcuts for Remote Desktop Chapter 25 Life in Cloud City Introducing Cloud Computing Looking at the Benefits of Cloud Computing Detailing the Drawbacks of Cloud Computing Examining Three Basic Kinds of Cloud Services Applications Platforms Infrastructure Public Clouds versus Private Clouds Introducing Some of the Major Cloud Providers Amazon Google Microsoft Getting into the Cloud Chapter 26 Going Hybrid What Is a Hybrid Cloud? What Are the Benefits of Hybrid Cloud? Elasticity Flexibility Agility Innovation Operational efficiency Integrating Identity Azure Active Directory Single sign-on Looking at Hybrid Cloud Virtualization Platforms Part 7 The Part of Tens Chapter 27 Ten Networking Commandments I. Thou Shalt Back Up Thy Data Religiously II. Thou Shalt Protect Thy Network from Infidels III. Thou Shalt Train Up Thy Users in the Ways of Safe Computing IV. Thou Shalt Keepeth Thy Network Drive Pure and Cleanse It of Old Files V. Thou Shalt Not Tinker with Thine Network Configuration unless Thou Knowest What Thou Art Doing VI. Thou Shalt Not Covet Thy Neighbor’s Network VII. Thou Shalt Not Take Down Thy Network without Proper Notification VIII. Thou Shalt Keep an Adequate Supply of Spare Parts IX. Thou Shalt Not Steal Thy Neighbor’s Program without a License X. Thou Shalt Write Down Thy Network Configuration upon Tablets of Stone Chapter 28 Ten Big Network Mistakes Skimping on Hardware Turning Off or Restarting a Server Computer While Users Are Logged On Deleting Important Files on the Server Copying a File from the Server, Changing It, and Then Copying It Back Sending Something to the Printer Again Just Because It Didn’t Print the First Time Assuming That the Server Is Safely Backed Up Connecting to the Internet without Considering Security Issues Plugging in a Wireless Access Point without Asking Thinking You Can’t Work Just Because the Network Is Down Running Out of Space on a Server Always Blaming the Network Chapter 29 Ten Things You Should Keep in Your Closet Duct Tape Tools Patch Cables Cable Ties and Velcro Twinkies Replacement Parts Cheap Network Switches The Complete Documentation of the Network on Tablets of Stone The Network Manuals and Disks Ten Copies of This Book Index EULA