MCSA Windows Server 2016 Study Guide Exam 70-741 – Networking with Windows Server 2016
فهرست مطالب کتاب MCSA Windows Server 2016:
Introduction
Chapter 1: Configuring TCP/IP
Chapter 2: Configuring DNS
Chapter 3: Configuring DHCP
Chapter 4: Implement IP Address Management
Chapter 5: Configuring Network Access
Chapter 6: Understanding File Services
Chapter 7: Configuring High Availability
Chapter 8: Implementing Software Defined Networking
MCSA Windows Server 2016 Study Guide Exam 70-742
فهرست مطالب کتاب MCSA Windows Server 2016:
Introduction
Chapter 1: Installing Active Directory
Chapter 2: Administer Active Directory
Chapter 3: Maintaining Active Directory
Chapter 4: Implementing GPOs
Chapter 5: Understanding Certificates
Chapter 6: Configure Access and Information Protection Solutions
Microsoft Forefront Threat Management Gateway (TMG) Administrator’s Companion
فهرست مطالب Microsoft Forefront Threat Management Gateway (TMG) Administrator’s Companion:
Introduction
Part I A New Era for the Microsoft Firewall
Chapter 1 What’s New in TMG
Chapter 2 What Are the Differences Between TMG and UAG?
Part II Planning for TMG
Chapter 3 System Requirements
Chapter 4 Analyzing Network Requirements
Chapter 5 Choosing the Right Network Topology
Chapter 6 Migrating to TMG
Chapter 7 Choosing a TMG Client Type
Part III Implementing a TMG Deployment
Chapter 8 Installing TMG
Chapter 9 Troubleshooting TMG Setup
Chapter 10 Exploring the TMG Console
Part IV TMG as Your Firewall
Chapter 11 Configuring TMG Networks
Chapter 12 Understanding Access Rules
Chapter 13 Configuring Load-Balancing Capabilities
Chapter 14 Network Inspection System
Part V TMG as Your Caching Proxy
Chapter 15 Web Proxy Auto Discovery for TMG
Chapter 16 Caching Concepts and Configuration
Part VI TMG Client Protection
Chapter 17 Malware Inspection
Chapter 18 URL Filtering
Chapter 19 Enhancing E-Mail Protection
Chapter 20 HTTP and HTTPS Inspection
Part VII TMG Publishing Scenarios
Chapter 21 Understanding Publishing Concepts
Chapter 22 Publishing Servers
Chapter 23 Publishing Microsoft Office SharePoint Server
Chapter 24 Publishing Exchange Server
Part VIII Remote Access
Chapter 25 Understanding Remote Access
Chapter 26 Implementing Dial-in Client VPN
Chapter 27 Implementing Site-to-Site VPN
Part IX Logging and Reporting
Chapter 28 Logging
Chapter 29 Enhanced NAT
Chapter 30 Scripting TMG
Part X Troubleshooting
Chapter 31 Mastering the Art of Troubleshooting
Chapter 32 Exploring HTTP Protocol
Chapter 33 Using Network Monitor 3 for Troubleshooting TMG
Microsoft® Exchange Server 2010 UNLEASHED
فهرست مطالب کتاب Microsoft® Exchange Server 2010 UNLEASHED:
Introduction
Part I: Microsoft Exchange Server 2010 Overview
1 Exchange Server 2010 Technology Primer
2 Planning, Prototyping, Migrating, and Deploying Exchange Server 2010
Part II: Planning and Designing an Exchange Server 2010 Environment
3 Understanding Core Exchange Server 2010 Design Plans
4 Architecting an Enterprise-Level Exchange Server Environment
5 Integrating Exchange Server 2010 in a Non-Windows Environment
6 Understanding Network Services and Active Directory Domain
Controller Placement for Exchange Server 2010
Part III: Implementing Exchange Server 2010 Services
7 Installing Exchange Server 2010
8 Implementing Edge Services for an Exchange Server
2010 Environment
9 Using Windows PowerShell in an Exchange Server 2010 Environment
Part IV: Securing an Exchange Server 2010 Environment
10 Client-Level Secured Messaging
11 Server and Transport-Level Security
12 Integrating Certificate-Based Public Key Infrastructure (PKI) in
Exchange Server 2010
13 Securing Exchange Server 2010 with ISA Server
14 Understanding Exchange Server Policy Enforcement Security
Part V: Migrations and Coexistence with Exchange Server 2010
15 Migrating from Active Directory 2000/2003 to Active Directory 2008
16 Transitioning from Exchange Server 2003/2007 to Exchange
Server 2010
17 Implementing Client Access and Hub Transport Servers
Part VI: Exchange Server 2010 Administration and Management
18 Administering an Exchange Server 2010 Environment
19 Exchange Server 2010 Management and Maintenance Practices
20 Using Operations Manager to Monitor Exchange Server 2010
21 Remote Administration of Exchange Server 2010 Servers
22 Documenting an Exchange Server 2010 Environment
Part VII: Unified Communications in an Exchange Server 2010 Environment
23 Designing and Implementing Mobility in Exchange Server 2010
24 Designing and Configuring Unified Messaging in Exchange
Server 2010
25 Collaborating Within an Exchange Server Environment Using
Microsoft Office SharePoint Server 2007
26 Integrating Office Communications Server 2007 in an Exchange
Server 2010 Environment
Part VIII: Client Access to Exchange Server 2010
27 Getting the Most Out of the Microsoft Outlook Client
28 Leveraging the Capabilities of the Outlook Web App (OWA) Client
29 Using Non-Windows Systems to Access Exchange Server 2010
30 Deploying the Client for Microsoft Exchange Server 2010
Part IX: Data Protection and Disaster Recovery of Exchange Server
31 Database Availability Group Replication in Exchange Server
32 Backing Up the Exchange Server 2010 Environment
33 Recovering from a Disaster in an Exchange Server
2010 Environment
Part X: Optimizing Exchange Server 2010 Environments
34 Optimizing an Exchange Server 2010 Environment
35 Designing and Optimizing Storage in an Exchange Server
2010 Environment
Network Design Cookbook – 2nd Edition
فهرست مطالب کتاب Network Design Cookbook – 2nd Edition:
Start Here
Introduction
Design Process
Design PODs
Example
Frameworks
Solutions
Services
Attributes
Networking with MikroTik MTCNA Study Guide
فهرست مطالب کتاب Networking with MikroTik MTCNA Study Guide:
1 MikroTik
2 RouterOS Software
3 Defaults
4 Accessing the Router
5 Configuring RouterOS
6 Managing Users
7 Interfaces
8 Addresses
9 Routing
10 VPNs and Tunnels
11 Queues
12 Firewalls
13 NAT
14 Wireless Networks
15 Wireless Security
16 Troubleshooting Tools
17 RouterOS Monitoring
18 The Dude
ntroducing Windows Server 2016 Technical Preview
فهرست مطالب کتاب Windows Server 2016 Technical Preview:
Introduction
Chapter 1: The software-defined datacenter
Chapter 2: Compute
Chapter 3: Storage
Chapter 4: Networking
Chapter 5: Security
Chapter 6: App Plat
Chapter 7: Systems management
Penetration Testing Fundamentals A Hands-On Guide to Reliable Security Audits
فهرست مطالب:
Introduction
1 Introduction to Penetration Testing
2 Standards
3 Cryptography
4 Reconnaissance
5 Malware
6 Hacking Windows
7 Web Hacking
8 Vulnerability Scanning
9 Introduction to Linux
10 Linux Hacking
11 Introduction to Kali Linux
12 General Hacking Techniques
13 Introduction to Metasploit
14 More with Metasploit
15 Introduction to Scripting with Ruby
16 Write Your Own Metasploit Exploits with Ruby
17 General Hacking Knowledge
18 Additional Pen Testing Topics
19 A Sample Pen Test Project
Appendix A: Answers to Chapter Multiple Choice Questions
Index Index
Pro SQL Server 2019 Administration
فهرست مطالب کتاب Pro SQL Server 2019 Administration:
Chapter 2: GUI Installation
Chapter 3: Server Core Installation
Chapter 4: Installation on Heterogeneous Operating Systems
Chapter 5: Configuring the Instance
Chapter 6: Database Configuration
Chapter 7: Table Optimizations
Chapter 8: Indexes and Statistics
Chapter 9: Database Consistency
Chapter 10: SQL Server Security Mode
Chapter 11: Encryption
Chapter 12: Backups and Restores
Chapter 13: High Availability and Disaster Recovery Concepts
Chapter 14: Implementing Always On Availability Groups
Chapter 15: Implementing Log Shipping
Chapter 16: Scaling Workloads
Chapter 17: SQL Server Metadata
Chapter 18: Locking and Blocking
Chapter 19: Extended Events
Chapter 20: Query Store
Chapter 21: Distributed Replay
Chapter 22: Automating Maintenance Routines
Chapter 23: Policy-Based Management
Chapter 24: Resource Governor
The Lean Mindset: Ask the Right Questions
فهرست مطالب کتاب The Lean Mindset:
Preface
About the Authors
Introduction
Chapter 1 — The Purpose of Business
Chapter 2 — Energized Workers
Chapter 3 — Delighted Customers
Chapter 4 — Genuine Efficiency
Chapter 5 — Breakthrough Innovation
Epilogue
References
Index
The Linux Programming Interface A Linux and UNIX System Programming Handbook
فهرست مطالب کتاب The Linux Programming Interface:
Preface
Chapter 1: History and Standards
Chapter 2: Fundamental Concepts .
Chapter 3: System Programming Concepts.
Chapter 4: File I/O: The Universal I/O Model
Chapter 5: File I/O: Further Details
Chapter 6: Processes
Chapter 7: Memory Allocation.
Chapter 8: Users and Groups
Chapter 9: Process Credentials
Chapter 10: Time.
Chapter 11: System Limits and Options
Chapter 12: System and Process Information
Chapter 13: File I/O Buffering.
Chapter 14: File Systems
Chapter 15: File Attributes
Chapter 16: Extended Attributes
Chapter 17: Access Control Lists
Chapter 18: Directories and Links
Chapter 19: Monitoring File Events
viii Brief Contents
Chapter 20: Signals: Fundamental Concepts
Chapter 21: Signals: Signal Handlers
Chapter 22: Signals: Advanced Features
Chapter 23: Timers and Sleeping
Chapter 24: Process Creation
Chapter 25: Process Termination
Chapter 26: Monitoring Child Processes
Chapter 27: Program Execution.
Chapter 28: Process Creation and Program Execution in More Detail.
Chapter 29: Threads: Introduction
Chapter 30: Threads: Thread Synchronization
Chapter 31: Threads: Thread Safety and Per-Thread Storage
Chapter 32: Threads: Thread Cancellation.
Chapter 33: Threads: Further Details
Chapter 34: Process Groups, Sessions, and Job Control
Chapter 35: Process Priorities and Scheduling
Chapter 36: Process Resources
Chapter 37: Daemons
Chapter 38: Writing Secure Privileged Programs
Chapter 39: Capabilities
Chapter 40: Login Accounting
Chapter 41: Fundamentals of Shared Libraries
Chapter 42: Advanced Features of Shared Libraries
Chapter 43: Interprocess Communication Overview
Chapter 44: Pipes and FIFOs
Chapter 45: Introduction to System V IPC
Chapter 46: System V Message Queues
Brief Contents ix
Chapter 47: System V Semaphores
Chapter 48: System V Shared Memory
Chapter 49: Memory Mappings
Chapter 50: Virtual Memory Operations
Chapter 51: Introduction to POSIX IPC.
Chapter 52: POSIX Message Queues
Chapter 53: POSIX Semaphores
Chapter 54: POSIX Shared Memory
Chapter 55: File Locking.
Chapter 56: Sockets: Introduction
Chapter 57: Sockets: UNIX Domain
Chapter 58: Sockets: Fundamentals of TCP/IP Networks
Chapter 59: Sockets: Internet Domains
Chapter 60: Sockets: Server Design
Chapter 61: Sockets: Advanced Topics
Chapter 62: Terminals
Chapter 63: Alternative I/O Models
Chapter 64: Pseudoterminals
Appendix A: Tracing System Calls
Appendix B: Parsing Command-Line Options
Appendix C: Casting the NULL Pointer
Appendix D: Kernel Configuration
Appendix E: Further Sources of Information
Appendix F: Solutions to Selected Exercises
Bibliography
Index
The LISP Network Evolution to the Next-Generation of Data Networks
فهرست مطالب کتاب The LISP Network:
Chapter 1: LISP and the Future of Networking
Chapter 2: LISP Architecture
Chapter 3: Data Center Trends
Chapter 4: The WideArea Network: Bringing Traffic from Access to the Data Center
Chapter 5: MegaScale Access Networks: LISP, User Access, and the Internet of Things
Chapter 6: Security
Chapter 7: LISP and the NextGeneration Mobile Network