دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Orin Thomas, John Policelli, Ian McLean, J.C. Mackin, Paul Mancuso سری: ISBN (شابک) : 2008927270 ناشر: Grandmasters سال نشر: 2008 تعداد صفحات: [603] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 10 Mb
در صورت تبدیل فایل کتاب Windows Server Enterprise Administration. Self-Paced Training Kit به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب Windows Server Enterprise Administration. کیت آموزش خودگام نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Contents at a Glance Table of Contents Acknowledgements Introduction Lab Setup Instructions Hardware Requirements Preparing the Computer Running Windows Server 2008 Enterprise Preparing the Computer Running Windows Vista Using the CD How to Install the Practice Tests How to Use the Practice Tests How to Uninstall the Practice Tests Microsoft Certified Professional Program Technical Support Chapter 1: Planning Name Resolution and Internet Protocol Addressing Before You Begin Lesson 1: Planning Name Resolution Planning Windows Server 2008 DNS Using New DNS Features and Enhancements Planning a DNS Infrastructure Lesson Summary Lesson Review Lesson 2: Planning Internet Protocol Addressing Analyzing the IPv6 Address Structure Investigating the Advantages of IPv6 Implementing IPv4-to-IPv6 Compatibility Planning an IPv4-to-IPv6 Transition Strategy Using IPv6 Tools Configuring Clients Through DHCPv6 Planning an IPv6 Network Lesson Summary Lesson Review Chapter Review Chapter Summary Case Scenarios Case Scenario 1: Configuring DNS Case Scenario 2: Implementing IPv6 Connectivity Suggested Practices Configure DNS Configure IPv6 Connectivity Take a Practice Test Chapter 2: Designing Active Directory Domain Services Before You Begin Lesson 1: Designing AD DS Forests and Domains Designing the Forest Structure Designing the Domain Structure Designing Functional Levels Designing the Schema Designing Trusts to Optimize Intra-Forest Authentication Lesson Summary Lesson Review Lesson 2: Designing the AD DS Physical Topology Designing the Site Structure Designing Replication Designing the Placement of Domain Controllers Designing Printer Location Policies Lesson Summary Lesson Review Chapter Review Chapter Summary Case Scenarios Case Scenario 1: Designing the AD DS Forest Case Scenario 2: Designing AD DS Sites Case Scenario 3: Designing the Placement of Domain Controllers Suggested Practices Implement Forests, Domains, and the Physical Topology Watch a Webcast Read a White Paper Take a Practice Test Chapter 3: Planning Migrations, Trusts, and Interoperability Before You Begin Lesson 1: Planning for Migration, Upgrade, and Restructuring Migration Paths Upgrading an Existing Domain to Windows Server 2008 Cross-Forest Authentication Lesson Summary Lesson Review Lesson 2: Planning for Interoperability Planning AD FS Microsoft Identity Lifecycle Manager 2007 Feature Pack 1 Planning for UNIX Interoperability Lesson Summary Lesson Review Chapter Review Chapter Summary Case Scenario Case Scenario: Phasing Out a UNIX-Based Computer at Tailspin Toys Suggested Practices Plan for Domain or Forest Migration, Upgrade, and Restructuring Plan for Interoperability Take a Practice Test Chapter 4: Designing Active Directory Administration and Group Policy Strategy Before You Begin Lesson 1: Designing the Active Directory Administrative Model Delegating Active Directory Administration Using Group Strategy to Delegate Management Tasks Planning to Audit AD DS and Group Policy Compliance Planning Organizational Structure Lesson Summary Lesson Review Lesson 2: Designing Enterprise-Level Group Policy Strategy Planning a Group Policy Hierarchy Controlling Device Installation Planning Authentication and Authorization Lesson Summary Lesson Review Chapter Review Chapter Summary Case Scenarios Case Scenario 1: Designing a Delegation Strategy Case Scenario 2: Planning Authentication and Authorization Suggested Practices Designing the Active Directory Administrative Model Designing Enterprise-Level Group Policy Strategy Take a Practice Test Chapter 5: Designing a Network Access Strategy Before You Begin Lesson 1: Perimeter Networks and Remote Access Strategies Designing the Perimeter Network Deploying Strategic Services in the Perimeter Network Designing a Remote Access Strategy Designing a RADIUS Solution for Remote Access Lesson Summary Lesson Review Lesson 2: Network Access Policy and Server and Domain Isolation Network Access Protection Overview Considerations for NAP Enforcement Planning NAP IPsec Enforcement Planning NAP VPN Enforcement Planning NAP 802.1x Enforcement Planning NAP DHCP Enforcement Domain and Server Isolation Lesson Summary Lesson Review Chapter Review Chapter Summary Case Scenario Case Scenario: Designing a NAP Solution for a Large Enterprise Suggested Practices Implement VPNs, RADIUS Solution, and NAP Enforcement Watch a Webcast Read a White Paper Take a Practice Test Chapter 6: Design a Branch Office Deployment Before You Begin Lesson 1: Branch Office Deployment Branch Office Services Branch Office Communications Considerations Lesson Summary Lesson Review Lesson 2: Branch Office Server Security Overview of Security for the Branch Office Securing Windows Server 2008 in the Branch Office Security Overview for the Information System in the Branch Office Securing Windows Server 2008 in the Branch Office Lesson Summary Lesson Review Chapter Review Chapter Summary Case Scenarios Case Scenario 1: Contoso Trucking Case Scenario 2: Contoso Trucking, Part 2 Case Scenario 3: Contoso Trucking, Part 3 Suggested Practices Branch Office Deployment Read a White Paper Take a Practice Test Chapter 7: Planning Terminal Services and Application Deployment Before You Begin Lesson 1: Planning a Terminal Services Deployment Planning a Terminal Services Deployment Terminal Services Licensing Deploying Applications Using Terminal Services Web Access Planning the Deployment of Applications by Using RemoteApp Planning the Deployment of Terminal Server Farms Planning the Deployment of Terminal Services Gateway Servers Lesson Summary Lesson Review Lesson 2: Planning Application Deployment Planning the Deployment of Applications by Using Group Policy Planning Application Deployment with System Center Essentials Planning the Deployment of Applications by Using SCCM 2007 Lesson Summary Lesson Review Chapter Review Chapter Summary Case Scenario Case Scenario: Planning a Terminal Services Strategy for Wingtip Toys Suggested Practices Provision Applications Take a Practice Test Chapter 8: Server and Application Virtualization Before You Begin Lesson 1: Planning Operating System Virtualization Virtual Server 2005 R2 Hyper-V Managing Virtualized Servers Candidates for Virtualization Planning for Server Consolidation Lesson Summary Lesson Review Lesson 2: Planning Application Virtualization Microsoft SoftGrid Application Virtualization Lesson Summary Lesson Review Chapter Review Chapter Summary Case Scenario Case Scenario: Tailspin Toys Server Consolidation Suggested Practices Windows Server Virtualization Plan Application Virtualization Take a Practice Test Chapter 9: Planning and Designing a Public Key Infrastructure Before You Begin Lesson 1: Identifying PKI Requirements Reviewing PKI Concepts Identifying PKI-Enabled Applications Identifying Certificate Requirements Reviewing the Company Security Policy Assessing Business Requirements Assessing External Requirements Assessing Active Directory Requirements Assessing Certificate Template Requirements Lesson Summary Lesson Review Lesson 2: Designing the CA Hierarchy Planning the CA Infrastructure Lesson Summary Lesson Review Lesson 3: Creating a Certificate Management Plan Selecting a Certificate Enrollment Method Creating a CA Renewal Strategy Defining a Revocation Policy Lesson Summary Lesson Review Chapter Review Chapter Summary Case Scenario Case Scenario: Planning a PKI Suggested Practices Watch a Webcast Read a White Paper Take a Practice Test Chapter 10: Designing Solutions for Data Sharing, Data Security, and Business Continuity Before You Begin Lesson 1: Planning for Data Sharing and Collaboration Planning a DFS Deployment DFS Namespaces Advanced Settings and Features DFS Replication Advanced Settings and Features Overview of the DFS Design Process Planning a SharePoint Infrastructure Lesson Summary Lesson Review Lesson 2: Choosing Data Security Solutions Protecting Volume Data with BitLocker Choosing a BitLocker Authentication Mode BitLocker Security Design Considerations Planning for EFS Using AD RMS Lesson Summary Lesson Review Lesson 3: Planning for System Recoverability and Availability Planning AD DS Maintenance and Recovery Procedures Seizing Operations Master Roles Using Network Load Balancing to Support High-Usage Servers Using Failover Clusters to Maintain High Availability Lesson Summary Lesson Review Chapter Review Chapter Summary Case Scenario Case Scenario: Designing Solutions for Sharing, Security, and Availability Suggested Practices Watch a Webcast Read a White Paper Take a Practice Test Chapter 11: Designing Software Update Infrastructure and Managing Compliance Before You Begin Lesson 1: Designing a Software Update Infrastructure Microsoft Update as a Software Update Solution Windows Server Update Services as a Software Update Solution System Center Essentials 2007 System Center Configuration Manager 2007 Lesson Summary Lesson Review Lesson 2: Managing Software Update Compliance Microsoft Baseline Security Analyzer SCCM 2007 Compliance and Reporting Planning and Deploying Security Baselines Lesson Summary Lesson Review Chapter Review Chapter Summary Case Scenarios Case Scenario 1: Deploying WSUS 3.0 SP1 at Fabrikam, Inc. Case Scenario 2: Security Policies at Coho Vineyard and Coho Winery Suggested Practices Designing for Software Updates and Compliance Management Take a Practice Test Chapter 1: Lesson Review Answers Lesson 1 Lesson 2 Chapter 1: Case Scenario Answers Case Scenario 1: Configuring DNS Case Scenario 2: Implementing IPv6 Connectivity Chapter 2: Lesson Review Answers Lesson 1 Lesson 2 Chapter 2: Case Scenario Answers Case Scenario 1: Designing the AD DS Forest Case Scenario 2: Designing AD DS Sites Case Scenario 3: Designing the Placement of Domain Controllers Chapter 3: Lesson Review Answers Lesson 1 Lesson 2 Chapter 3: Case Scenario Answers Case Scenario: Phasing Out a UNIX-Based Computer at Tailspin Toys Chapter 4: Lesson Review Answers Lesson 1 Lesson 2 Chapter 4: Case Scenario Answers Case Scenario 1: Designing a Delegation Strategy Case Scenario 2: Planning Authentication and Authorization Chapter 5: Lesson Review Answers Lesson 1 Lesson 2 Chapter 5: Case Scenario Answers Case Scenario: Designing a NAP Solution for a Large Enterprise Chapter 6: Lesson Review Answers Lesson 1 Lesson 2 Chapter 6: Case Scenario Answers Case Scenario 1: Contoso Trucking Case Scenario 2: Contoso Trucking, Part 2 Case Scenario 3: Contoso Trucking, Part 3 Chapter 7: Lesson Review Answers Lesson 1 Lesson 2 Chapter 7: Case Scenario Answers Case Scenario: Planning a Terminal Services Strategy for Wingtip Toys Chapter 8: Lesson Review Answers Lesson 1 Lesson 2 Chapter 8: Case Scenario Answers Case Scenario 1: Tailspin Toys Server Consolidation Chapter 9: Lesson Review Answers Lesson 1 Lesson 2 Lesson 3 Chapter 9: Case Scenario Answers Case Scenario: Planning a PKI Chapter 10: Lesson Review Answers Lesson 1 Lesson 2 Lesson 3 Chapter 10: Case Scenario Answers Case Scenario: Designing Solutions for Sharing, Security, and Availability Chapter 11: Lesson Review Answers Lesson 1 Lesson 2 Chapter 11: Case Scenario Answers Case Scenario 1: Deploying WSUS 3.0 SP1 at Fabrikam, Inc. Case Scenario 2: Security Policies at Coho Vineyard and Coho Winery System Requirements Hardware Requirements Software Requirements