ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Networking For Dummies

دانلود کتاب شبکه های ساختگی

Networking For Dummies

مشخصات کتاب

Networking For Dummies

دسته بندی: شبکه سازی
ویرایش: 12 
نویسندگان:   
سری: For Dummies 
ISBN (شابک) : 1119648505, 9781119648505 
ناشر: Wiley 
سال نشر: 2020 
تعداد صفحات: 483 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 17 مگابایت 

قیمت کتاب (تومان) : 38,000



کلمات کلیدی مربوط به کتاب شبکه های ساختگی: لینوکس، رایانش ابری، macOS، مایکروسافت آفیس، مجازی‌سازی، پشتیبان‌گیری، بهترین روش‌ها، امنیت شبکه، شبکه‌های بی‌سیم، تشخیص هرزنامه، مایکروسافت ویندوز، شبکه، فیلتر کردن بسته‌ها، اترنت، TCP/IP، توپولوژی شبکه، پاسخ اضطراری، DHCP، آدرس شبکه ترجمه، فایروال، Hyper-V، مدیریت کاربر، امنیت فیزیکی، ایمیل، ذخیره سازی شبکه، مدیریت شبکه، ابر ترکیبی



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Networking For Dummies به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب شبکه های ساختگی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب شبکه های ساختگی

یک شبکه امن در خانه یا محل کار راه اندازی کنید این نسخه جدید از Networking For Dummies که به طور کامل برای پوشش ویندوز 10 و ویندوز سرور 2019 بازبینی شده است، به مدیران شبکه و کاربران خانگی کمک می‌کند تا یک شبکه را راه‌اندازی و نگهداری کنند. پوشش به روز شده فناوری های پهن باند و بی سیم، و همچنین روش های ذخیره سازی و پشتیبان گیری، تضمین می کند که نحوه ایجاد یک شبکه سیمی یا بی سیم، ایمن سازی و بهینه سازی آن، عیب یابی مشکلات و موارد دیگر را تضمین می کند. از اتصال به اینترنت و راه‌اندازی یک شبکه بی‌سیم گرفته تا حل مشکلات شبکه و پشتیبان‌گیری از داده‌های خود - این راهنمای پرفروش شماره 1 همه را پوشش می‌دهد. • یک شبکه سیمی یا بی سیم بسازید • شبکه خود را ایمن و بهینه کنید • یک سرور راه اندازی کنید و حساب های کاربری ویندوز را مدیریت کنید • با خیال راحت از ابر استفاده کنید نوشته شده توسط یک نویسنده باتجربه فناوری - و پر از دستورالعمل های گام به گام مفید - این کتابی است که مدیران شبکه و کاربران روزمره رایانه بارها و بارها به آن مراجعه می کنند.


توضیحاتی درمورد کتاب به خارجی

Set up a secure network at home or the office Fully revised to cover Windows 10 and Windows Server 2019, this new edition of the trusted Networking For Dummies helps both beginning network administrators and home users to set up and maintain a network. Updated coverage of broadband and wireless technologies, as well as storage and back-up procedures, ensures that you’ll learn how to build a wired or wireless network, secure and optimize it, troubleshoot problems, and much more. From connecting to the Internet and setting up a wireless network to solving networking problems and backing up your data―this #1 bestselling guide covers it all. • Build a wired or wireless network • Secure and optimize your network • Set up a server and manage Windows user accounts • Use the cloud―safely Written by a seasoned technology author―and jam-packed with tons of helpful step-by-step instructions―this is the book network administrators and everyday computer users will turn to again and again.



فهرست مطالب

Title Page
Copyright Page
Table of Contents
Introduction
	About This Book
	Foolish Assumptions
	Icons Used in This Book
	Beyond the Book
	Where to Go from Here
Part 1 Getting Started with Networking
	Chapter 1 Let’s Network!
		Defining a Network
		Why Bother with a Network?
			Sharing files
			Sharing resources
			Sharing programs
			Sharing messages
		Servers and Clients
		Dedicated Servers and Peers
		What Makes a Network Tick?
		It’s Not a Personal Computer Anymore!
		The Network Administrator
		What Have They Got That You Don’t Got?
	Chapter 2 Configuring Windows and Mac Clients
		Configuring Windows Network Connections
		Joining a Windows Computer to a Domain
		Configuring Mac Network Settings
		Joining a Mac Computer to a Domain
	Chapter 3 Life on the Network
		Distinguishing between Local Resources and Network Resources
		What’s in a Name?
		Logging on to the Network
		Understanding Shared Folders
		Four Good Uses for a Shared Folder
			Store files that everybody needs
			Store your own files
			Make a temporary resting place for files on their way to other users
			Back up your local hard drive
		Oh, the Network Places You’ll Go
		Mapping Network Drives
		Using a Network Printer
			Adding a network printer
			Printing to a network printer
			Playing with the print queue
		Logging off the Network
	Chapter 4 More Ways to Use Your Network
		Sharing Your Stuff
		Enabling File and Printer Sharing
		Sharing a Folder
		Using the Public Folder
		Sharing a Printer
		Using Microsoft Office on a Network
			Accessing network files
			Using workgroup templates
			Networking an Access database
		Working with Offline Files
Part 2 Designing Your Network
	Chapter 5 Planning a Network
		Making a Network Plan
		Being Purposeful
		Taking Stock
			What you need to know
			Programs that gather information for you
		To Dedicate or Not to Dedicate: That Is the Question
			File servers
			Print servers
			Web servers
			Mail servers
			Database servers
			Application servers
			License servers
		Choosing a Server Operating System
		Planning the Infrastructure
		Drawing Diagrams
	Chapter 6 Dealing with TCP/IP
		Understanding Binary
			Counting by ones
			Doing the logic thing
		Introducing IP Addresses
			Networks and hosts
			The dotted-decimal dance
		Classifying IP Addresses
			Class A addresses
			Class B addresses
			Class C addresses
		Subnetting
			Subnets
			Subnet masks
			The great subnet roundup
			Private and public addresses
		Understanding Network Address Translation
		Configuring Your Network for DHCP
			Understanding DHCP
			DHCP servers
			Understanding scopes
			Feeling excluded?
			Reservations suggested
			How long to lease?
		Managing a Windows Server 2019 DHCP Server
		Configuring a Windows DHCP Client
		Using DNS
			Domains and domain names
			Fully qualified domain names
		Working with the Windows DNS Server
		Configuring a Windows DNS Client
	Chapter 7 Oh, What a Tangled Web We Weave: Cables and Switches
		What Is Ethernet?
		All about Cable
			Cable categories
			What’s with the pairs?
			To shield or not to shield
			When to use plenum cable
			Sometimes solid, sometimes stranded
			Installation guidelines
			The tools you need
			Pinouts for twisted-pair cables
			RJ-45 connectors
			Crossover cables
			Wall jacks and patch panels
		Understanding Switches
			Comparing managed and unmanaged switches
			Daisy-chaining switches
			Stacking switches
			Looking at distribution switches and access switches
		Powering Up with Power over Ethernet
		Looking at Three Types of Network Rooms
	Chapter 8 Setting Up a Wireless Network
		Diving into Wireless Networking
		A Little High School Electronics
			Waves and frequencies
			Wavelength and antennas
			Spectrums and the FCC
		Eight-Oh-Two-Dot-Eleventy Something: Understanding Wireless Standards
		Home on the Range
		Using Wireless Network Adapters
		Setting Wireless Access Points
			Infrastructure mode
			Multifunction WAPs
		Roaming Capabilities
			Wireless bridging
			Ad-hoc networks
		Configuring a Wireless Access Point
			Basic configuration options
			DHCP configuration
		Connecting to a Wireless Network
		Paying Attention to Wireless Network Security
	Chapter 9 Connecting to the Internet
		Connecting to the Internet
			Connecting with cable or DSL
			Connecting with high-speed private lines
			Sharing an Internet connection
		Securing Your Connection with a Firewall
			Using a firewall
			Comparing residential gateways to firewall routers
			Looking at the built-in Windows firewall
		Providing a Backup Internet Connection
Part 3 Working with Servers
	Chapter 10 Virtualizing Your Network
		Understanding Virtualization
		Understanding Hypervisors
		Understanding Virtual Disks
		Understanding Network Virtualization
		Looking at the Benefits of Virtualization
		Choosing Virtualization Hosts
		Understanding Windows Server 2019 Licensing
		Introducing Hyper-V
			Understanding the Hyper-V hypervisor
			Understanding virtual disks
		Enabling Hyper-V
		Getting Familiar with Hyper-V
		Creating a Virtual Switch
		Creating a Virtual Disk
		Creating a Virtual Machine
		Installing an Operating System
	Chapter 11 Setting Up a Windows Server
		Planning a Windows Server Installation
			Checking system requirements
			Reading the release notes
			Considering your licensing options
			Deciding your TCP/IP configuration
			Choosing workgroups or domains
		Running Setup
		Adding Server Roles and Features
		Creating a New Domain
	Chapter 12 Managing Windows User Accounts
		Understanding How Active Directory Is Organized
			Objects
			Domains
			Organizational units
			Trees
			Forests
		Understanding Windows User Accounts
			Local accounts versus domain accounts
			User account properties
		Creating a New User
		Setting User Properties
			Changing the user’s contact information
			Setting account options
			Specifying logon hours
			Restricting access to certain computers
			Setting the user’s profile information
		Resetting User Passwords
		Disabling and Enabling User Accounts
		Deleting a User
		Working with Groups
			Creating a group
			Adding a member to a group
		Creating a Logon Script
	Chapter 13 Managing Network Storage
		Understanding Disk Storage
			Hard disk drives
			Solid state drives to the rescue!
			It’s a RAID!
			Three ways to attach disks to your servers
		Focusing on File Servers
			Understanding permissions
			Understanding shares
		Managing Your File Server
			Using the New Share Wizard
			Sharing a folder without the wizard
			Granting permissions
Part 4 Managing Your Network
	Chapter 14 Welcome to Network Management
		What a Network Administrator Does
		Choosing the Part-Time Administrator
		The Three “Ups” of Network Management
		Managing Network Users
		Acquiring Software Tools for Network Administrators
		Building a Library
		Pursuing Certification
		Helpful Bluffs and Excuses
	Chapter 15 Supporting Your Users
		Establishing the Help Desk’s Charter
		Tracking Support Tickets
		Deciding How to Communicate with Users
		Using Remote Assistance
			Enabling Remote Assistance
			Inviting someone to help you via a Remote Assistance session
			Responding to a Remote Assistance invitation
		Creating a Knowledge Base
		Creating a Self-Service Help Portal
		Using Satisfaction Surveys
		Tracking Help Desk Performance
		Using Help Desk Management Software
	Chapter 16 Using Group Policy
		Understanding Group Policy
		Enabling Group Policy Management on Windows Server 2019
		Creating Group Policy Objects
		Filtering Group Policy Objects
		Forcing Group Policy Updates
	Chapter 17 Managing Software Deployment
		Understanding Software Licenses
		Using a License Server
		Deploying Network Software
			Deploying software manually
			Running Setup from a network share
			Installing silently
			Creating an administrative installation image
			Pushing out software with Group Policy
		Keeping Software Up to Date
	Chapter 18 Managing Mobile Devices
		The Many Types of Mobile Devices
		Considering Security for Mobile Devices
		Managing iOS Devices
			Understanding the iPhone
			Understanding the iPad
			Integrating iOS devices with Exchange
			Configuring an iOS device for Exchange email
		Managing Android Devices
			Looking at the Android OS
			Perusing Android’s core applications
			Integrating Android with Exchange
Part 5 Securing Your Network
	Chapter 19 Welcome to Cybersecurity Network
		Do You Need Security?
		The Three Pillars of Cybersecurity
		Two Approaches to Security
		Physical Security: Locking Your Doors
		Securing User Accounts
			Obfuscating your usernames
			Using passwords wisely
			Generating passwords For Dummies
			Secure the Administrator account
		Managing User Security
			User accounts
			Built-in accounts
			User rights
			Permissions (who gets what)
			Group therapy
			User profiles
			Logon scripts
		Securing the Human Firewall
	Chapter 20 Hardening Your Network
		Firewalls
		The Many Types of Firewalls
			Packet filtering
			Stateful packet inspection (SPI)
			Circuit-level gateway
			Application gateway
			Next-generation firewall
		Virus Protection
			What is a virus?
			Antivirus programs
			Safe computing
		Patching Things Up
	Chapter 21 Securing Your Email
		Defining Spam
		Sampling the Many Flavors of Spam
		Using Antispam Software
		Understanding Spam Filters
		Looking at Three Types of Antispam Software
			On-premises antispam
			Antispam appliances
			Cloud-based antispam services
		Minimizing Spam
	Chapter 22 Backing Up Your Data
		3-2-1: The Golden Rule of Backups
		How Often Should You Back Up Your Data?
		Choosing Where to Back Up Your Data
		Establishing Two Key Backup Objectives
		Backing Up to Tape
		Understanding Backup Software
		Examining File-Based Backups
			Full backups
			Copy backups
			Incremental backups
			Differential backups
		Backup and Virtualization
		Verifying Tape Reliability
		Keeping Backup Equipment Clean and Reliable
		Setting Backup Security
	Chapter 23 Planning for Disaster
		Assessing Different Types of Disasters
			Environmental disasters
			Deliberate disasters
			Disruption of services
			Equipment failure
			Other disasters
		Analyzing the Impact of a Disaster
		Developing a Business Continuity Plan
		Holding a Fire Drill
Part 6 More Ways to Network
	Chapter 24 Accommodating Remote Users
		Using Outlook Web App
		Using a Virtual Private Network
			Looking at VPN security
			Understanding VPN servers and clients
		Connecting with Remote Desktop Connection
			Enabling Remote Desktop Connection
			Connecting remotely
			Using keyboard shortcuts for Remote Desktop
	Chapter 25 Life in Cloud City
		Introducing Cloud Computing
		Looking at the Benefits of Cloud Computing
		Detailing the Drawbacks of Cloud Computing
		Examining Three Basic Kinds of Cloud Services
			Applications
			Platforms
			Infrastructure
		Public Clouds versus Private Clouds
		Introducing Some of the Major Cloud Providers
			Amazon
			Google
			Microsoft
		Getting into the Cloud
	Chapter 26 Going Hybrid
		What Is a Hybrid Cloud?
		What Are the Benefits of Hybrid Cloud?
			Elasticity
			Flexibility
			Agility
			Innovation
			Operational efficiency
		Integrating Identity
			Azure Active Directory
			Single sign-on
		Looking at Hybrid Cloud Virtualization Platforms
Part 7 The Part of Tens
	Chapter 27 Ten Networking Commandments
		I. Thou Shalt Back Up Thy Data Religiously
		II. Thou Shalt Protect Thy Network from Infidels
		III. Thou Shalt Train Up Thy Users in the Ways of Safe Computing
		IV. Thou Shalt Keepeth Thy Network Drive Pure and Cleanse It of Old Files
		V. Thou Shalt Not Tinker with Thine Network Configuration unless Thou Knowest What Thou Art Doing
		VI. Thou Shalt Not Covet Thy Neighbor’s Network
		VII. Thou Shalt Not Take Down Thy Network without Proper Notification
		VIII. Thou Shalt Keep an Adequate Supply of Spare Parts
		IX. Thou Shalt Not Steal Thy Neighbor’s Program without a License
		X. Thou Shalt Write Down Thy Network Configuration upon Tablets of Stone
	Chapter 28 Ten Big Network Mistakes
		Skimping on Hardware
		Turning Off or Restarting a Server Computer While Users Are Logged On
		Deleting Important Files on the Server
		Copying a File from the Server, Changing It, and Then Copying It Back
		Sending Something to the Printer Again Just Because It Didn’t Print the First Time
		Assuming That the Server Is Safely Backed Up
		Connecting to the Internet without Considering Security Issues
		Plugging in a Wireless Access Point without Asking
		Thinking You Can’t Work Just Because the Network Is Down
		Running Out of Space on a Server
		Always Blaming the Network
	Chapter 29 Ten Things You Should Keep in Your Closet
		Duct Tape
		Tools
		Patch Cables
		Cable Ties and Velcro
		Twinkies
		Replacement Parts
		Cheap Network Switches
		The Complete Documentation of the Network on Tablets of Stone
		The Network Manuals and Disks
		Ten Copies of This Book
Index
EULA




نظرات کاربران