Networking All-in-One For Dummies. Doug Lowe
Чтение книги онлайн.
Читать онлайн книгу Networking All-in-One For Dummies - Doug Lowe страница 7
15 Book 11: Appendixes Appendix A: Directory of Useful Websites Certification Hardware Home and Small-Business Networking Linux Magazines Microsoft Network Standards Organizations Reference TCP/IP and the Internet Wireless Networking Smartphones Appendix B: Glossary
16 Index
List of Tables
1 Book 1 Chapter 4TABLE 4-1 The Functions and Categories of the NIST Framework Core
2 Book 2 Chapter 1TABLE 1-1 The Seven Layers of the OSI Model
3 Book 2 Chapter 2TABLE 2-1 Maturity Levels for Internet Standards Track RFCs xxxTABLE 2-2 RFCs for Key Internet Standards
4 Book 2 Chapter 3TABLE 3-1 Powers of TwoTABLE 3-2 Logical Operations for Binary ValuesTABLE 3-3 IP Address ClassesTABLE 3-4 The Default Subnet MasksTABLE 3-5 Private Address SpacesTABLE 3-6 Well-Known Ports
5 Book 2 Chapter 6TABLE 6-1 The Original Seven Top-Level DomainsTABLE 6-2 The New Seven Top-Level DomainsTABLE 6-3 Geographic Top-Level Domains with More Than 200 SubdomainsTABLE 6-4 Location of the Hosts FileTABLE 6-5 The 13 Root ServersTABLE 6-6 Common Resource Record TypesTABLE 6-7 RDATA Fields for an SOA Record
6 Book 2 Chapter 7TABLE 7-1 nbtstat
Command SwitchesTABLE 7-2 The Most Commonly Used nslookup
Subcommands
7 Book 3 Chapter 2TABLE 2-1 ASA 5500-X Models
8 Book 3 Chapter 6TABLE 6-1 LTO Tape GenerationsTABLE 6-2 How Backup Types Use the Archive Bit
9 Book 4 Chapter 1TABLE 1-1 Twisted-Pair Cable CategoriesTABLE 1-2 Pin Connections for Twisted-Pair Cable
10 Book 4 Chapter 2TABLE 2-1 Common Default SSID Values
11 Book 6 Chapter 1TABLE 1-1 Minimum Hardware Requirements for Windows Server 2019 (Standard Editio...
12 Book 6 Chapter 4TABLE 4-1 Default Groups Located in the Builtin ContainerTABLE 4-2 Default Groups Located in the Users Container
13 Book 6 Chapter 5TABLE 5-1 File and Folder PermissionsTABLE 5-2 Special PermissionsTABLE 5-3 Special Shares
14 Book 6 Chapter 7TABLE 7-1 Environment VariablesTABLE 7-2 The Options Parameters
15 Book 6 Chapter 8TABLE 8-1 PowerShell Common Parameters
16 Book 7 Chapter 1TABLE 1-1 Small Business Plans for Microsoft 365TABLE 1-2 Enterprise Plans for Microsoft 365
17 Book 8 Chapter 2TABLE 2-1 Top-Level Directories in a Linux File SystemTABLE 2-2 Commands to Save and ExitTABLE 2-3 Commands for Moving the CursorTABLE 2-4 Commands for Inserting TextTABLE 2-5 Commands for Deleting TextTABLE 2-6 Commands for Changing TextTABLE 2-7 Commands for Yanking (Copying) and Putting (Pasting)TABLE 2-8 Other Commands
18 Book 8 Chapter 3TABLE 3-1 Linux Network Configuration Files
19 Book 8 Chapter 4TABLE 4-1 Common Resource Record Types
20 Book 8 Chapter 5TABLE 5-1 Commonly Used smbclient Commands
21 Book 8 Chapter 7TABLE 7-1 Mail Commands
22 Book 8 Chapter 8TABLE 8-1 Environment VariablesTABLE 8-2 Common Linux Services
23 Book 9 Chapter 1TABLE 1-1 TCP/IP Diagnostic Commands
24 Book 9 Chapter 2TABLE 2-1 Keyboard Shortcuts for Remote Desktop
25 Book 9 Chapter 4TABLE 4-1 Key Windows Services
26 Book 9 Chapter 5TABLE 5-1 Microsoft Volume License Plans
27 Book 10 Chapter 2TABLE 2-1 Some Well-Known TCP/IP Ports
List of Illustrations
1 Book 1 Chapter 1FIGURE 1-1: A typical network.FIGURE 1-2: A network with a wireless router and a switch.FIGURE 1-3: A network with a separate firewall router, switch, and WAP.
2 Book 1 Chapter 2FIGURE 2-1: Bus topology.FIGURE 2-2: Star topology.FIGURE 2-3: Ring topology.FIGURE 2-4: Mesh topology.
3 Book 1 Chapter 3FIGURE 3-1: A hub repeats all incoming data on all its ports.FIGURE 3-2: Unlike a hub, a switch knows where to send its data.FIGURE 3-3: Two IP networks connected by a router.FIGURE 3-4: Connecting offices with a VPN tunnel.
4 Book 1 Chapter 5FIGURE 5-1: Managing Active Directory Users and Computers.
5 Book 2 Chapter 7FIGURE 1-1: The Properties dialog box for a network adapter.FIGURE 1-2: Display the MAC address of a network adapter.FIGURE 1-3: Find network information from System Information.FIGURE