MCSA Windows Server 2016 Study Guide Exam 70-741 – Networking with Windows Server 2016

فهرست مطالب کتاب MCSA Windows Server 2016:

Introduction

Chapter 1: Configuring TCP/IP

Chapter 2: Configuring DNS

Chapter 3: Configuring DHCP

Chapter 4: Implement IP Address Management

Chapter 5: Configuring Network Access

Chapter 6: Understanding File Services

Chapter 7: Configuring High Availability

Chapter 8: Implementing Software Defined Networking

MCSA Windows Server 2016 Study Guide Exam 70-742

فهرست مطالب کتاب MCSA Windows Server 2016:

Introduction

Chapter 1: Installing Active Directory

Chapter 2: Administer Active Directory

Chapter 3: Maintaining Active Directory

Chapter 4: Implementing GPOs

Chapter 5: Understanding Certificates

Chapter 6: Configure Access and Information Protection Solutions

Microsoft Forefront Threat Management Gateway (TMG) Administrator’s Companion

فهرست مطالب Microsoft Forefront Threat Management Gateway (TMG) Administrator’s Companion:

Introduction

Part I A New Era for the Microsoft Firewall

Chapter 1 What’s New in TMG

Chapter 2 What Are the Differences Between TMG and UAG?

Part II Planning for TMG

Chapter 3 System Requirements

Chapter 4 Analyzing Network Requirements

Chapter 5 Choosing the Right Network Topology

Chapter 6 Migrating to TMG

Chapter 7 Choosing a TMG Client Type

Part III Implementing a TMG Deployment

Chapter 8 Installing TMG

Chapter 9 Troubleshooting TMG Setup

Chapter 10 Exploring the TMG Console

Part IV TMG as Your Firewall

Chapter 11 Configuring TMG Networks

Chapter 12 Understanding Access Rules

Chapter 13 Configuring Load-Balancing Capabilities

Chapter 14 Network Inspection System

Part V TMG as Your Caching Proxy

Chapter 15 Web Proxy Auto Discovery for TMG

Chapter 16 Caching Concepts and Configuration

Part VI TMG Client Protection

Chapter 17 Malware Inspection

Chapter 18 URL Filtering

Chapter 19 Enhancing E-Mail Protection

Chapter 20 HTTP and HTTPS Inspection

Part VII TMG Publishing Scenarios

Chapter 21 Understanding Publishing Concepts

Chapter 22 Publishing Servers

Chapter 23 Publishing Microsoft Office SharePoint Server

Chapter 24 Publishing Exchange Server

Part VIII Remote Access

Chapter 25 Understanding Remote Access

Chapter 26 Implementing Dial-in Client VPN

Chapter 27 Implementing Site-to-Site VPN

Part IX Logging and Reporting

Chapter 28 Logging

Chapter 29 Enhanced NAT

Chapter 30 Scripting TMG

Part X Troubleshooting

Chapter 31 Mastering the Art of Troubleshooting

Chapter 32 Exploring HTTP Protocol

Chapter 33 Using Network Monitor 3 for Troubleshooting TMG

Microsoft® Exchange Server 2010 UNLEASHED

فهرست مطالب کتاب Microsoft® Exchange Server 2010 UNLEASHED:

Introduction

Part I: Microsoft Exchange Server 2010 Overview

1 Exchange Server 2010 Technology Primer

2 Planning, Prototyping, Migrating, and Deploying Exchange Server 2010

Part II: Planning and Designing an Exchange Server 2010 Environment

3 Understanding Core Exchange Server 2010 Design Plans

4 Architecting an Enterprise-Level Exchange Server Environment

5 Integrating Exchange Server 2010 in a Non-Windows Environment

6 Understanding Network Services and Active Directory Domain

Controller Placement for Exchange Server 2010

Part III: Implementing Exchange Server 2010 Services

7 Installing Exchange Server 2010

8 Implementing Edge Services for an Exchange Server

2010 Environment

9 Using Windows PowerShell in an Exchange Server 2010 Environment

Part IV: Securing an Exchange Server 2010 Environment

10 Client-Level Secured Messaging

11 Server and Transport-Level Security

12 Integrating Certificate-Based Public Key Infrastructure (PKI) in

Exchange Server 2010

13 Securing Exchange Server 2010 with ISA Server

14 Understanding Exchange Server Policy Enforcement Security

Part V: Migrations and Coexistence with Exchange Server 2010

15 Migrating from Active Directory 2000/2003 to Active Directory 2008

16 Transitioning from Exchange Server 2003/2007 to Exchange

Server 2010

17 Implementing Client Access and Hub Transport Servers

Part VI: Exchange Server 2010 Administration and Management

18 Administering an Exchange Server 2010 Environment

19 Exchange Server 2010 Management and Maintenance Practices

20 Using Operations Manager to Monitor Exchange Server 2010

21 Remote Administration of Exchange Server 2010 Servers

22 Documenting an Exchange Server 2010 Environment

Part VII: Unified Communications in an Exchange Server 2010 Environment

23 Designing and Implementing Mobility in Exchange Server 2010

24 Designing and Configuring Unified Messaging in Exchange

Server 2010

25 Collaborating Within an Exchange Server Environment Using

Microsoft Office SharePoint Server 2007

26 Integrating Office Communications Server 2007 in an Exchange

Server 2010 Environment

Part VIII: Client Access to Exchange Server 2010

27 Getting the Most Out of the Microsoft Outlook Client

28 Leveraging the Capabilities of the Outlook Web App (OWA) Client

29 Using Non-Windows Systems to Access Exchange Server 2010

30 Deploying the Client for Microsoft Exchange Server 2010

Part IX: Data Protection and Disaster Recovery of Exchange Server

31 Database Availability Group Replication in Exchange Server

32 Backing Up the Exchange Server 2010 Environment

33 Recovering from a Disaster in an Exchange Server

2010 Environment

Part X: Optimizing Exchange Server 2010 Environments

34 Optimizing an Exchange Server 2010 Environment

35 Designing and Optimizing Storage in an Exchange Server

2010 Environment

Network Design Cookbook – 2nd Edition

فهرست مطالب کتاب Network Design Cookbook – 2nd Edition:

Start Here

Introduction

Design Process

Design PODs

Example

Frameworks

Solutions

Services

Attributes

Networking with MikroTik MTCNA Study Guide

فهرست مطالب کتاب Networking with MikroTik MTCNA Study Guide:

1 MikroTik

2 RouterOS Software

3 Defaults

4 Accessing the Router

5 Configuring RouterOS

6 Managing Users

7 Interfaces

8 Addresses

9 Routing

10 VPNs and Tunnels

11 Queues

12 Firewalls

13 NAT

14 Wireless Networks

15 Wireless Security

16 Troubleshooting Tools

17 RouterOS Monitoring

18 The Dude

ntroducing Windows Server 2016 Technical Preview

فهرست مطالب کتاب Windows Server 2016 Technical Preview:

Introduction

Chapter 1: The software-defined datacenter

Chapter 2: Compute

Chapter 3: Storage

Chapter 4: Networking

Chapter 5: Security

Chapter 6: App Plat

Chapter 7: Systems management

Penetration Testing Fundamentals A Hands-On Guide to Reliable Security Audits

فهرست مطالب:

Introduction

1 Introduction to Penetration Testing

2 Standards

3 Cryptography

4 Reconnaissance

5 Malware

6 Hacking Windows

7 Web Hacking

8 Vulnerability Scanning

9 Introduction to Linux

10 Linux Hacking

11 Introduction to Kali Linux

12 General Hacking Techniques

13 Introduction to Metasploit

14 More with Metasploit

15 Introduction to Scripting with Ruby

16 Write Your Own Metasploit Exploits with Ruby

17 General Hacking Knowledge

18 Additional Pen Testing Topics

19 A Sample Pen Test Project

Appendix A: Answers to Chapter Multiple Choice Questions

Index Index

Pro SQL Server 2019 Administration

فهرست مطالب کتاب Pro SQL Server 2019 Administration:

Chapter 2: GUI Installation

Chapter 3: Server Core Installation

Chapter 4: Installation on Heterogeneous Operating Systems

Chapter 5: Configuring the Instance

Chapter 6: Database Configuration

Chapter 7: Table Optimizations

Chapter 8: Indexes and Statistics

Chapter 9: Database Consistency

Chapter 10: SQL Server Security Mode

Chapter 11: Encryption

Chapter 12: Backups and Restores

Chapter 13: High Availability and Disaster Recovery Concepts

Chapter 14: Implementing Always On Availability Groups

Chapter 15: Implementing Log Shipping

Chapter 16: Scaling Workloads

Chapter 17: SQL Server Metadata

Chapter 18: Locking and Blocking

Chapter 19: Extended Events

Chapter 20: Query Store

Chapter 21: Distributed Replay

Chapter 22: Automating Maintenance Routines

Chapter 23: Policy-Based Management

Chapter 24: Resource Governor

The Lean Mindset: Ask the Right Questions

فهرست مطالب کتاب The Lean Mindset:

Preface

About the Authors

Introduction

Chapter 1 — The Purpose of Business

Chapter 2 — Energized Workers

Chapter 3 — Delighted Customers

Chapter 4 — Genuine Efficiency

Chapter 5 — Breakthrough Innovation

Epilogue

References

Index

The Linux Programming Interface A Linux and UNIX System Programming Handbook

فهرست مطالب کتاب The Linux Programming Interface:

Preface

Chapter 1: History and Standards

Chapter 2: Fundamental Concepts .

Chapter 3: System Programming Concepts.

Chapter 4: File I/O: The Universal I/O Model

Chapter 5: File I/O: Further Details

Chapter 6: Processes

Chapter 7: Memory Allocation.

Chapter 8: Users and Groups

Chapter 9: Process Credentials

Chapter 10: Time.

Chapter 11: System Limits and Options

Chapter 12: System and Process Information

Chapter 13: File I/O Buffering.

Chapter 14: File Systems

Chapter 15: File Attributes

Chapter 16: Extended Attributes

Chapter 17: Access Control Lists

Chapter 18: Directories and Links

Chapter 19: Monitoring File Events

viii Brief Contents

Chapter 20: Signals: Fundamental Concepts

Chapter 21: Signals: Signal Handlers

Chapter 22: Signals: Advanced Features

Chapter 23: Timers and Sleeping

Chapter 24: Process Creation

Chapter 25: Process Termination

Chapter 26: Monitoring Child Processes

Chapter 27: Program Execution.

Chapter 28: Process Creation and Program Execution in More Detail.

Chapter 29: Threads: Introduction

Chapter 30: Threads: Thread Synchronization

Chapter 31: Threads: Thread Safety and Per-Thread Storage

Chapter 32: Threads: Thread Cancellation.

Chapter 33: Threads: Further Details

Chapter 34: Process Groups, Sessions, and Job Control

Chapter 35: Process Priorities and Scheduling

Chapter 36: Process Resources

Chapter 37: Daemons

Chapter 38: Writing Secure Privileged Programs

Chapter 39: Capabilities

Chapter 40: Login Accounting

Chapter 41: Fundamentals of Shared Libraries

Chapter 42: Advanced Features of Shared Libraries

Chapter 43: Interprocess Communication Overview

Chapter 44: Pipes and FIFOs

Chapter 45: Introduction to System V IPC

Chapter 46: System V Message Queues

Brief Contents ix

Chapter 47: System V Semaphores

Chapter 48: System V Shared Memory

Chapter 49: Memory Mappings

Chapter 50: Virtual Memory Operations

Chapter 51: Introduction to POSIX IPC.

Chapter 52: POSIX Message Queues

Chapter 53: POSIX Semaphores

Chapter 54: POSIX Shared Memory

Chapter 55: File Locking.

Chapter 56: Sockets: Introduction

Chapter 57: Sockets: UNIX Domain

Chapter 58: Sockets: Fundamentals of TCP/IP Networks

Chapter 59: Sockets: Internet Domains

Chapter 60: Sockets: Server Design

Chapter 61: Sockets: Advanced Topics

Chapter 62: Terminals

Chapter 63: Alternative I/O Models

Chapter 64: Pseudoterminals

Appendix A: Tracing System Calls

Appendix B: Parsing Command-Line Options

Appendix C: Casting the NULL Pointer

Appendix D: Kernel Configuration

Appendix E: Further Sources of Information

Appendix F: Solutions to Selected Exercises

Bibliography

Index

The LISP Network Evolution to the Next-Generation of Data Networks

فهرست مطالب کتاب The LISP Network:

Chapter 1: LISP and the Future of Networking

Chapter 2: LISP Architecture

Chapter 3: Data Center Trends

Chapter 4: The Wide­Area Network: Bringing Traffic from Access to the Data Center

Chapter 5: Mega­Scale Access Networks: LISP, User Access, and the Internet of Things

Chapter 6: Security

Chapter 7: LISP and the Next­Generation Mobile Network