Networking All-in-One For Dummies. Doug LoweЧитать онлайн книгу.
Building a Library Getting Certified Gurus Need Gurus, Too Helpful Bluffs and Excuses Chapter 2: Managing Remotely Enabling Remote Desktop Connection Connecting Remotely Using Keyboard Shortcuts for Remote Desktop Configuring Remote Desktop Options Using Remote Assistance Enabling Remote Assistance Inviting Someone to Help You via a Remote Assistance Session Responding to a Remote Assistance Invitation Chapter 3: Managing Network Assets Introducing IT Asset Management Why Bother? Getting Organized What to Track Taking Pictures Picking a Number Making Labels Tracking Software Using Asset-Tracking Software Other Sources of Asset-Tracking Information Chapter 4: Solving Network Problems When Bad Things Happen to Good Computers Fixing Dead Computers Ways to Check a Network Connection A Bunch of Error Messages Just Flew By! Double-Checking Your Network Settings Time to Experiment Who’s on First? Restarting a Client Computer Booting in Safe Mode Using System Restore Restarting Network Services Restarting a Network Server Looking at Event Logs Documenting Your Trials and Tribulations Chapter 5: Managing Software Deployment Understanding Software Licenses Using a License Server Options for Deploying Network Software Keeping Software Up to Date Chapter 6: Managing Mobile Devices The Many Types of Mobile Devices Considering Security for Mobile Devices Managing iOS Devices Managing Android Devices
14 Book 10: Dealing with Cybersecurity Chapter 1: Securing Your Users Knowing the Difference between Authentication and Authorization Following Password Best Practices Securing the Administrator Account Understanding Multifactor Authentication Securing the Human Firewall Chapter 2: Managing Firewalls and Virus Protection Firewalls The Many Types of Firewalls Firewall Best Practices The Built-In Windows Firewall Configuring Windows Defender Firewall with Group Policy Virus Protection Chapter 3: Dealing with Spam Defining Spam Sampling the Many Flavors of Spam Using Antispam Software Understanding Spam Filters Looking at Three Types of Antispam Software Minimizing Spam Chapter 4: Managing Disaster Recovery and Business Continuity Planning Assessing Different Types of Disasters Analyzing the Impact of a Disaster Developing a Business Continuity Plan Holding a Fire Drill