[ 收藏 ] [ 简体中文 ]  
臺灣貨到付款、ATM、超商、信用卡PAYPAL付款,4-7個工作日送達,999元臺幣免運費   在線留言 商品價格為新臺幣 
首頁 電影 連續劇 音樂 圖書 女裝 男裝 童裝 內衣 百貨家居 包包 女鞋 男鞋 童鞋 計算機周邊

商品搜索

 类 别:
 关键字:
    

商品分类

  •  管理

     一般管理学
     市场/营销
     会计
     金融/投资
     经管音像
     电子商务
     创业企业与企业家
     生产与运作管理
     商务沟通
     战略管理
     商业史传
     MBA
     管理信息系统
     工具书
     外文原版/影印版
     管理类职称考试
     WTO
     英文原版书-管理
  •  投资理财

     证券/股票
     投资指南
     理财技巧
     女性理财
     期货
     基金
     黄金投资
     外汇
     彩票
     保险
     购房置业
     纳税
     英文原版书-投资理财
  •  经济

     经济学理论
     经济通俗读物
     中国经济
     国际经济
     各部门经济
     经济史
     财政税收
     区域经济
     统计 审计
     贸易政策
     保险
     经济数学
     各流派经济学说
     经济法
     工具书
     通货膨胀
     财税外贸保险类考试
     英文原版书-经济
  •  社会科学

     语言文字
     社会学
     文化人类学/人口学
     新闻传播出版
     社会科学总论
     图书馆学/档案学
     经典名家作品集
     教育
     英文原版书-社会科学
  •  哲学

     哲学知识读物
     中国古代哲学
     世界哲学
     哲学与人生
     周易
     哲学理论
     伦理学
     哲学史
     美学
     中国近现代哲学
     逻辑学
     儒家
     道家
     思维科学
     马克思主义哲学
     经典作品及研究
     科学哲学
     教育哲学
     语言哲学
     比较哲学
  •  宗教

  •  心理学

  •  古籍

     经部  史类  子部  集部  古籍管理  古籍工具书  四库全书  古籍善本影音本  中国藏书
  •  文化

     文化评述  文化随笔  文化理论  传统文化  世界各国文化  文化史  地域文化  神秘文化  文化研究  民俗文化  文化产业  民族文化  书的起源/书店  非物质文化遗产  文化事业  文化交流  比较文化学
  •  历史

     历史普及读物
     中国史
     世界史
     文物考古
     史家名著
     历史地理
     史料典籍
     历史随笔
     逸闻野史
     地方史志
     史学理论
     民族史
     专业史
     英文原版书-历史
     口述史
  •  传记

  •  文学

  •  艺术

     摄影
     绘画
     小人书/连环画
     书法/篆刻
     艺术设计
     影视/媒体艺术
     音乐
     艺术理论
     收藏/鉴赏
     建筑艺术
     工艺美术
     世界各国艺术概况
     民间艺术
     雕塑
     戏剧艺术/舞台艺术
     艺术舞蹈
     艺术类考试
     人体艺术
     英文原版书-艺术
  •  青春文学

  •  文学

     中国现当代随笔
     文集
     中国古诗词
     外国随笔
     文学理论
     纪实文学
     文学评论与鉴赏
     中国现当代诗歌
     外国诗歌
     名家作品
     民间文学
     戏剧
     中国古代随笔
     文学类考试
     英文原版书-文学
  •  法律

     小说
     世界名著
     作品集
     中国古典小说
     四大名著
     中国当代小说
     外国小说
     科幻小说
     侦探/悬疑/推理
     情感
     魔幻小说
     社会
     武侠
     惊悚/恐怖
     历史
     影视小说
     官场小说
     职场小说
     中国近现代小说
     财经
     军事
  •  童书

  •  成功/励志

  •  政治

  •  军事

  •  科普读物

  •  计算机/网络

     程序设计
     移动开发
     人工智能
     办公软件
     数据库
     操作系统/系统开发
     网络与数据通信
     CAD CAM CAE
     计算机理论
     行业软件及应用
     项目管理 IT人文
     计算机考试认证
     图形处理 图形图像多媒体
     信息安全
     硬件
     项目管理IT人文
     网络与数据通信
     软件工程
     家庭与办公室用书
  •  建筑

     执业资格考试用书  室内设计/装潢装修  标准/规范  建筑科学  建筑外观设计  建筑施工与监理  城乡规划/市政工程  园林景观/环境艺术  工程经济与管理  建筑史与建筑文化  建筑教材/教辅  英文原版书-建筑
  •  医学

     中医
     内科学
     其他临床医学
     外科学
     药学
     医技学
     妇产科学
     临床医学理论
     护理学
     基础医学
     预防医学/卫生学
     儿科学
     医学/药学考试
     医院管理
     其他医学读物
     医学工具书
  •  自然科学

     数学
     生物科学
     物理学
     天文学
     地球科学
     力学
     科技史
     化学
     总论
     自然科学类考试
     英文原版书-自然科学
  •  工业技术

     环境科学
     电子通信
     机械/仪表工业
     汽车与交通运输
     电工技术
     轻工业/手工业
     化学工业
     能源与动力工程
     航空/航天
     水利工程
     金属学与金属工艺
     一般工业技术
     原子能技术
     安全科学
     冶金工业
     矿业工程
     工具书/标准
     石油/天然气工业
     原版书
     武器工业
     英文原版书-工业技
  •  农业/林业

     园艺  植物保护  畜牧/狩猎/蚕/蜂  林业  动物医学  农作物  农学(农艺学)  水产/渔业  农业工程  农业基础科学  农林音像
  •  外语

  •  考试

  •  教材

  •  工具书

  •  中小学用书

  •  中小学教科书

  •  动漫/幽默

  •  烹饪/美食

  •  时尚/美妆

  •  旅游/地图

  •  家庭/家居

  •  亲子/家教

  •  两性关系

  •  育儿/早教

  •  保健/养生

  •  体育/运动

  •  手工/DIY

  •  休闲/爱好

  •  英文原版书

  •  港台图书

  •  研究生
     工学
     公共课
     经济管理
     理学
     农学
     文法类
     医学

  •  音乐
     音乐理论

     声乐  通俗音乐  音乐欣赏  钢琴  二胡  小提琴
  • MCSE Windows 2000 Designing 考試指南(1CD)
    該商品所屬分類:計算機/網絡 -> 計算機考試認證
    【市場價】
    436-632
    【優惠價】
    273-395
    【作者】  
    【所屬類別】 圖書  考試  計算機考試  微軟認證圖書  計算機/網絡  計算機考試認證  微軟認證 
    【出版社】電子工業出版社 
    【ISBN】9787505370180
    【折扣說明】一次購物滿999元台幣免運費+贈品
    一次購物滿2000元台幣95折+免運費+贈品
    一次購物滿3000元台幣92折+免運費+贈品
    一次購物滿4000元台幣88折+免運費+贈品
    【本期贈品】①優質無紡布環保袋,做工棒!②品牌簽字筆 ③品牌手帕紙巾
    版本正版全新電子版PDF檔
    您已选择: 正版全新
    溫馨提示:如果有多種選項,請先選擇再點擊加入購物車。
    *. 電子圖書價格是0.69折,例如了得網價格是100元,電子書pdf的價格則是69元。
    *. 購買電子書不支持貨到付款,購買時選擇atm或者超商、PayPal付款。付款後1-24小時內通過郵件傳輸給您。
    *. 如果收到的電子書不滿意,可以聯絡我們退款。謝謝。
    內容介紹


    是否套裝:否
    國際標準書號ISBN:9787505370180
    叢書名:專業認證考試叢書

    作者:美
    出版社:電子工業出版社
    出版時間:2002年02月 


        
        
    "

    內容簡介
    本書是美國著名的出版商McGraw-Hill出版的暢銷認證繫列叢書All-in-One中的一本。本書包含現行的MCSE Windows 2000 Designing核心考試的全部內容,即Directory Services Infrastructure、Network Infrastructure和Network Security三門Designing(設計)考試。作者在本書中提供了極具洞察力的專家經驗,每一章都包括詳細的考試目標、實踐問題和實用練習,詳細講述了Windows的安裝、配置和故障排除等方面的內容,光盤中包含大量原汁原味的考試試題、測試引擎和專題講座視頻片斷。本書適合MCSE認證考試的備考者使用。
    目錄
    Introduction 1
    PartⅠ Exam 70-219: Designing a Microsoft Windows 2000
    Directory Services Infrastructure 9
    Chapter 1 Defining Directory Services 10
    Common Understanding of Directory Services 10
    Directory Services and Meta-Information 12
    History and Types of Directory Services 12
    Predicting the Future: Meta-Directories 14
    Active Directory from the Top Down 15
    Forests 15
    Trees 16
    Domains 16
    Organizational Units 17
    Lower-Level Objects 17
    Data and Attributes 19
    Sites 19
    Directory Services in Different Versions of Windows 19
    Top Reasons to Implement Windows 2000 and Active Directory 21
    Top Reasons to Implement Windows 2000 21
    Top Reasons to Implement Active Directory 26
    Chapter Review 31
    Questions 31
    Answers 31
    Key Skill Sets 31
    Key Terms 31
    Chapter 2 Analyzing Business Requirements 33
    Analyzing the Existing and Planned Business Models 34
    Analyzing the Company Model and the Geographical Scope 34
    Analyzing Company Processes 41
    Management 43
    Company Organization 44
    Vendor, Partner, and Customer Relationships 46
    Acquisition Plans 46
    Analyzing Factors That Influence Company Strategies 47
    Identifying Company Priorities 47
    Identifying the Projected Growth and Growth Strategy 48
    Identifying Relevant Laws and Regulations 48
    Identifying the Company誷 Tolerance for Risk 48
    Identifying the Total Cost of Operations 48
    Chapter Review 49
    Questions 49
    Answers 49
    Key Skill Sets 49
    Key Terms 49
    Chapter 3 Analyzing Technical Requirements 50
    Evaluating Existing and Planned Technical Environment 51
    Analyzing Company Size and User and Resource Distribution 51
    Assessing Available Connectivity 53
    Assessing Net Available Bandwidth 55
    Analyzing Performance Requirements 56
    Analyzing Data- and System-Access Patterns 56
    Analyzing Network Roles and Responsibilities 57
    Analyzing Security Considerations 58
    Analyzing the Impact of Active Directory 59
    Assessing Existing Systems and Applications 59
    Identifying Existing and Planned Upgrades and Rollouts 59
    Analyzing the Technical Support Structure 59
    Analyzing Existing and Planned Network and Systems Management 60
    Analyzing the Business Requirements for Client-Desktop Management 61
    Chapter Review 62
    Questions 62
    Answers 63
    Key Skill Sets 63
    Key Terms 63
    Chapter 4 Designing a Directory Service Architecture 64
    Designing an Active Directory Forest and Domain 65
    Designing a Forest and Schema Structure 66
    Designing a Domain Structure 69
    Analyzing and Optimizing Trust Relationships 69
    Designing an Active Directory Naming Strategy 71
    Establishing the Scope of the Active Directory 72
    Designing the Namespace 73
    Planning DNS Strategy 74
    Designing and Planning Organization Units 75
    Developing an OU Delegation Plan 77
    Planning Group Policy Object Management 78
    Planning Policy Management for Client Computers 80
    Planning for Coexistence 80
    Designing an Active Directory Site Topology 81
    Designing a Replication Strategy 81
    Defining Site Boundaries 83
    Designing a Schema Modification Policy 83
    Designing an Active Directory Implementation Plan 85
    Single-Domain Windows NT System 85
    Single-Master-Domain Windows NT System 85
    Multiple-Master-Domain Windows NT System 86
    Complete-Trust-Domain Windows NT System 86
    A New Windows 2000 Domain 87
    Chapter Review 87
    Questions 88
    Answers 88
    Key Skill Sets 88
    Key Terms 89
    Chapter 5 Designing Your Service Locations 90
    Designing the Placement of Operations Masters 91
    Understanding the Roles of Operations Masters 91
    Schema Master 91
    Domain Naming Master 93
    Primary Domain Controller Emulator 93
    Infrastructure Master 94
    Relative Identifier Master 94
    Role Placement 94
    Permissions 95
    Role Changing 95
    Disaster Recovery 96
    Designing the Placement of Global Catalog Servers 96
    Global Catalog Servers 97
    Global Catalog Server Placement Considerations 97
    Designing the Placement of Domain Controller Servers 98
    DNS Zone Planning 101
    DNS Lookup Zones 102
    DNS Zone Types 102
    Where, Oh Where Should My DNS Go? 103
    Designing the Placement of DNS Servers 103
    Design 1 104
    Design 2 105
    Design 3 105
    Design 4 105
    Next Steps 105
    Chapter Review 106
    Questions 106
    Answers 106
    Key Skill Sets 107
    Key Terms 107
    PartⅡ Exam 70-220: Designing Security for a Microsoft
    Windows 2000 109
    Chapter 6 Introduction to Security 110
    Intruder Perspectives 110
    The Business Case 111
    Technical Tangents of Networking and Security 112
    User and Group Account Management 112
    Machine Security 113
    Network and Communication Security 113
    Public Key Infrastructure (PKI) 116
    The Security Life Cycle 117
    Discovery 117
    Design 117
    Testing 117
    Deployment 117
    Evaluation 118
    Final Steps-Feedback 118
    Chapter Review 119
    Questions 119
    Answers 119
    Key Skill Sets 119
    Key Terms 120
    Chapter 7 Analyzing Business and Technical Requirements 121
    Defining Security in the Enterprise 122
    Evaluating Business Factors That Affect Security Planning 123
    Analyzing the Existing and Planned Business Models 124
    Analyzing Business Factors That Influence Company Strategies 125
    Evaluating Your Technology Options in Security Planning 129
    Analyzing the Physical and Information-Security Models 130
    Understanding the Logical Layout of Services and Applications 133
    Understanding the People Factor in Security Planning 136
    Analyzing Business and Security Requirements for the End User 137
    Analyzing Network Roles and Responsibilities 137
    Evaluating Specific Security Vulnerabilities 139
    Lack of IT Staff Education 139
    Ineffective, Incomplete, or Missing Corporate Security Policies 140
    User Education 141
    Proactive Anti-Hacking Measures 142
    Disaster-Recovery Plan 143
    Security Hotspots 144
    Catywhompus Construction Updates 145
    Chapter Review 145
    Questions 146
    Answers 146
    Key Skill Sets 147
    Key Terms 147
    Additional Resources and Information 147
    Chapter 8 Analyzing Security Requirements 149
    Assessing Your Current Environment 149
    Vulnerabilities 150
    Creating a Baseline 153
    Developing a Security Policy 155
    Authenticating All User Access to System Resources 156
    Applying Appropriate Access Control to All Resources 158
    Establishing Appropriate Trust Relationships Between Multiple Domains 160
    Enabling Data Protection for Sensitive Data 161
    Setting Uniform Security Policies 161
    Deploying Secure Applications 167
    Managing Security Administration 168
    Implementing Your Security Policy 168
    Chapter Review 172
    Questions 172
    Answers 173
    Key Skill Sets 173
    Key Terms 174
    Chapter 9 Designing a Windows 2000 Security Solution 175
    Windows 2000 Security Policies 176
    Audit Policies 176
    Delegation of Authority 184
    Policy Inheritance 189
    Encrypting File System (EFS) 192
    Design an Authentication Strategy 196
    Authentication Methods 196
    Security Group Strategy 203
    Design a Public Key Infrastructure 204
    Certificate Authority Hierarchies 204
    Certificate Server Roles 205
    Managing Certificates 208
    Third-Party Certificate Authorities 212
    Design Windows 2000 Network Services Security 214
    DNS Security 214
    Remote Installation Services (RIS) Security 215
    SNMP Security 220
    Terminal Services Security 223
    Chapter Review 229
    Questions 229
    Answers 230
    Key Skill Sets 230
    Key Terms 231
    Chapter 10 Designing a Security Solution for Access Between Networks 232
    Accessing the Internet 232
    Proxy Server 233
    Firewall 233
    Gateway 234
    Internet Connection Server 234
    Common Internet File System (CIFS) 236
    IP Security (IPSec) 238
    Windows 2000誷 Default IPSec Policies 239
    Policy Configuration 240
    Testing Your IPSec Configuration 249
    Virtual Private Networks (VPNs) 249
    The VPN Server 251
    Installing a VPN Client 256
    Lab Exercise 10.15: Install a VPN Client 256
    Remote Access Service 258
    Remote Access Authorization 262
    Chapter Review 267
    Questions 267
    Answers 268
    Key Skill Sets 268
    Key Terms 268
    Chapter 11 Designing Security for Communication Channels 269
    Common Communication Channel Attacks 270
    Designing a Signing Solution with the Server Message Block Protocol 272
    SMB Signing Implementation 272
    Designing IP Layer Security 273
    Selecting IPSec Mode 274
    Planning IPSec Protocol Usage 275
    Using Predefined IPSec Policies 276
    IPSec Implementation Components 278
    Designing an IPSec Management Strategy 280
    Defining Security Levels 280
    Designing Negotiation Policies 281
    Designing Security Policies and Policy Management 283
    Designing IPSec Encryption 285
    Designing IPSec Filters 285
    IPSec Best Practices 286
    Verifying IPSec Communications 287
    Chapter Review 289
    Questions 289
    Answers 290
    Key Skill Sets 290
    Key Terms 291
    PartⅢ Exam 70-221: Designing a Microsoft Windows 2000 Network Infrastructure 294
    Chapter 12 Overview of Designing a Network Infrastructure 294
    Windows 2000 Networking Services Design Overview 294
    The Networking Services Deployment Cycle 297
    Designing the Networking Services 298
    Testing the Design 299
    Implementing the Design 299
    Managing the Network Services 300
    Microsoft Windows 2000 Networking Services 300
    Lab Exercise 12.1: Developing a Design Approach 301
    The Network Foundation 302
    Base Protocol Support-TCP/IP 303
    Automated Client Configuration-DHCP 303
    Resolving Host Names-DNS 304
    Lab Exercise 12.2: Solving a Name Resolution Design Problem 305
    Resolving NetBIOS Names-WINS 305
    Designing Internet Connectivity 306
    Network Address Translation-NAT 306
    Microsoft Internet Security and Acceleration Server 307
    Designing Routing and Remote-Access Connectivity 307
    Remote Access 308
    RADIUS and IAS 308
    IP Routing 308
    Putting It All Together: Integrating the Network Services Infrastructure 309
    Creating Performance Monitor Log Files 310
    Defining the Network Design Attributes 315
    Chapter Review 316
    Questions 316
    Answers 317
    Key Skill Sets 317
    Key Terms 317
    Chapter 13 Analyzing Business and Technical Requirements 318
    Analyzing the Business 319
    Analyzing the Geographical Scope and Existing and Planned Business Models 320
    Analyzing Company Processes 323
    Analyzing the Existing and Planned Organizational Structures 326
    Analyzing Factors That Influence Company Strategies 329
    Analyzing the IT Management Structure 332
    Business Requirements Analysis Checklist 337
    Evaluating the Company誷 Technical Requirements 337
    Documenting the Existing Infrastructure Design 338
    Analyzing Client Computer Access Requirements 345
    Analyzing the Existing Disaster-Recovery Strategy 346
    Directions 349
    Business Background 349
    Current System 350
    IT Management Sample Interviews 350
    Envisioned System 351
    Case Study Questions: BTI Analysis 353
    Chapter Review 353
    Questions 354
    Answers 354
    Key Skill Sets 355
    Key Terms 355
    Chapter 14 Designing a Network Infrastructure Using TCP/IP 356
    TCP/IP Background 357
    TCP/IP Protocol Suite 358
    TCP/IP Standards 358
    TCP/IP Protocol Architecture 359
    Key TCP/IP Design Considerations 361
    Windows 2000 TCP/IP Features 362
    Windows 2000 TCP/IP Services 362
    Designing a Functional TCP/IP Solution 363
    IP Addressing Review 363
    Private Network IP Addressing 366
    Subnet Requirements 368
    IP Configuration Approaches 369
    TCP/IP Design for Improving Availability 370
    TCP/IP Design for Improving Performance 371
    Optimizing IP Subnetting 371
    Optimizing Traffic on an IP Network 373
    Using QoS Mechanisms 374
    TCP/IP Security Solutions 376
    Packet Filtering Techniques 377
    Data Encryption Design 377
    IPSec Encryption Algorithms 378
    IPSec Authentication Protocols 378
    IPSec Internet Key Exchange 379
    Chapter Review 384
    Questions 384
    Answers 385
    Key Skill Sets 385
    Key Terms 385
    Chapter 15 Designing an Automated IP Configuration Solution Using DHCP 387
    Key DHCP Features 388
    Management Features 389
    Enhanced Monitoring and Statistical Reporting 389
    DNS and WINS Integration 389
    Rogue DHCP Server Detection 390
    User-Specific and Vendor-Specific Option Support 390
    DHCP Server Clustering 390
    Multicast IP Address Allocation 391
    DHCP Client Support 391
    Automatic Client Configuration 391
    Local Storage 391
    BOOTP Client Support 392
    Combining DHCP with Other Services 392
    Active Directory Integration 392
    Dynamic Updates in the DNS Namespace 392
    Routing and Remote Access Integration 393
    DHCP Design Choices 394
    Functional Aspects of Designing a DHCP Solution 394
    Using DHCP Servers on the Network 395
    Configuring and Selecting TCP/IP Options on the Network 395
    Providing IP Configuration Management to BOOTP and Non-Microsoft Clients 396
    DHCP Sample Design for a Single Subnet LAN 397
    DHCP Example Design for a Large Enterprise Network 398
    DHCP Example Design for a Routed Network 398
    Relay Agent Deployment 399
    DHCP and Routing and Remote Access 400
    DHCP Server Placement 400
    Creating a DHCP Solution to Ensure Service Availability 401
    Distributed Scope Solution 401
    Clustering Solution 402
    Creating a DHCP Solution to Enhance Performance 402
    Increasing Performance of Individual DHCP Servers 402
    Increasing Performance by Adding DHCP Servers 405
    Designing a Secure DHCP Solution 405
    Preventing Unauthorized Windows 2000 Servers 405
    Security Risks Using DHCP in DMZ Networks 406
    Directions 407
    Scenario 407
    Design Requirements and Constraints 407
    Envisioned System 407
    Availability 408
    Performance 408
    Security 408
    Proposed System 409
    Chief Technology Officer誷 Comments 409
    Case Study Questions 409
    Chapter Review 411
    Questions 411
    Answers 412
    Key Skill Sets 413
    Key Terms 413
    Chapter 16 Creating a DNS Name-Resolution Design 414
    The Domain Name System Solution 415
    New Features in the Windows 2000 Implementation of DNS 415
    Resolution Improvements 416
    Key Components of DNS 417
    DNS Resolution Process 418
    Resource Load-Sharing Control 419
    Collecting Information for the DNS Design Decisions 421
    Creating a Functional Windows 2000 DNS Strategy 421
    DNS Zones and Zone Types 421
    DNS Server Placement and Zone Type Considerations 425
    Integrating DNS and WINS 427
    Integrating with BIND and Windows NT 4.0 DNS Servers 428
    Internet Access Considerations 434
    Existing Namespace Integration Issues 435
    Hands-On Section Exercises 435
    Availability Considerations in Windows 2000 DNS Designs 436
    Optimization Strategies in Windows 2000 DNS Designs 437
    Server Capacity Optimization 437
    Monitoring Server Performance 438
    Query Resolution Optimization 441
    Reducing the Impact of Server-to-Server Traffic on the Network 442
    Security Strategies in DNS Designs 443
    Secured Dynamic Update 443
    Controlling Update Access to Zones 443
    DNS Dynamic Updates from DHCP and Windows 2000 444
    DNS Zone Replication 444
    DNS in Screened Subnets 444
    Hands-On Section Exercises 444
    Chapter Review 452
    Questions 452
    Answers 452
    Key Skill Sets 453
    Key Terms 453
    Chapter 17 Designing with WINS Services and DFS 454
    The Microsoft WINS Solution 454
    WINS Background 455
    NetBIOS Name Resolution 456
    Creating a WINS Design 460
    Initial WINS Design Steps 460
    Designing a Functional WINS Solution 461
    Enhancing WINS Availability 467
    Optimizing WINS Performance 469
    Securing a WINS Solution 471
    Designing a Distributed File System (DFS) Strategy 472
    DFS Architecture 473
    DFS Platform Compatibility 473
    DFS Features 473
    Key DFS Terms 475
    Placing a DFS Root 475
    DFS Root Replica Strategy for High Availability 476
    Chapter Review 482
    Questions 482
    Answers 484
    Key Skill Sets 484
    Key Terms 484
    Chapter 18 Designing Internet and Extranet Connectivity Solutions 485
    Firewalls 486
    Common Firewall Technologies 488
    Firewall Placement 491
    Demilitarized Zones or Screened Subnets 491
    Routing and Remote Access 491
    Windows 2000 Network Address Translation 492
    Designing a Functional NAT Solution 493
    Designing for NAT Availability and Performance 495
    NAT Security Considerations 495
    Outbound Internet Traffic 496
    Inbound Internet Traffic 496
    VPNs and Network Address Translators 496
    Internet Connection Sharing 496
    Web Caching with a Proxy Server 497
    What Does a Proxy Server Do? 497
    Protecting the Network 497
    Microsoft Proxy Server 498
    Designing a Functional Proxy Server Solution 499
    Designing for Proxy Server Availability and Performance 500
    Proxy Server Security Considerations 501
    Comparing Internet-Connection Sharing Solutions 502
    Scenario 503
    Case Study Question 503
    Chapter Review 504
    Questions 504
    Answers 505
    Key Skill Sets 506
    Key Terms 506
    Chapter 19 Designing a Wide Area Network Infrastructure 507
    Connecting Private Networks Using RRAS 508
    Installing and Configuring RRAS 509
    Routing for Connectivity Between Private Networks 515
    Designing a Functional Routing Solution 517
    Securing Private Network Connections 525
    Optimizing a Router Design for Availability and Performance 526
    RRAS Solutions Using Demand-Dial Routing 526
    Designing Remote-User Connectivity 526
    Designing a VPN Strategy 527
    Designing Remote-Access Dial-Up Solutions 529
    Designing a Dial-Up or VPN Solution in a Routed Network 529
    Performance and Availability Design Considerations 529
    Security Considerations 530
    VPN Best Practices 531
    Dial-Up Best Practices 532
    Designing a Remote-Access Solution Using RADIUS 533
    Integrating Authentication with RADIUS 534
    Why Use IAS? 536
    Designing a Functional RADIUS Solution 536
    RADIUS Fault-Tolerance and Performance Solutions 536
    Security Considerations for RADIUS 537
    Chapter Review 539
    Questions 539
    Answers 540
    Key Skill Sets 541
    Key Terms 541
    Chapter 20 Designing a Management and Implementation
    Strategy for Windows 2000 Networking 543
    Network Services Management Strategies 543
    Identifying Management Processes 544
    Monitoring the Network Services Status 545
    Analyzing the Information 549
    Reactive and Proactive Response Strategies 550
    Combining Networking Services 550
    Benefits of Combining Networking Services 550
    Constraints on Combining Networking Services 550
    Security Issues Related to Combining Services 551
    Combining Networking Services That Are Cluster-Aware 551
    Optimizing Performance by Combining Services 552
    Chapter Review 553
    Questions 553
    Answers 554
    Key Skill Sets 554
    Key Terms 555
    PartⅣ Bringing It All Together 557
    Chapter 21 The Holistic Windows 2000 Design Process 558
    Building Blocks 558
    Active DirectoryActive Directory 558
    Security 559
    Network Infrastructure 559
    Common Elements 559
    Next Steps-Life as an MCSE 560
    Chapter Review 561
    PartⅤ Appendixes 563
    Appendixes A More Case Study Analyses and Questions 564
    Four Case Studies for Analysis 564
    Exam Questions on the Topics Presented in this Book 586
    Encrypting File System (Six Questions) 586
    Auditing (Three Questions) 588
    Public Key Infrastructure (11 Questions) 589
    Internet Protocol Security (Six Questions) 594
    Active Directory Services (27 Questions) 597
    Appendixes B MCSE Certification Specifics 606
    Microsoft誷 New Certification Track 606
    Your Commitment to Getting Certified 607
    Role of Real-World Experience 608
    Opportunities for MCSEs 608
    Compensation 609
    Ongoing Certification Requirements 611
    Life as an MCSE Professional 611
    Work 612
    Continuing Education 612
    Conferences 612
    User Groups 612
    Certification Exam Objectives 612
    Exam 70-210: Installing, Configuring, and Administering
    Microsoft Windows 2000 Professional 613
    Exam 70-215: Installing, Configuring, and Administering
    Microsoft Windows 2000 Server 615
    Exam 70-216: Implementing and Administering a Microsoft
    Windows 2000 Network Infrastructure 617
    Exam 70-217: Implementing and Administering a Microsoft
    Windows 2000 Directory Services Infrastructure 620
    Exam 70-219: Designing a Microsoft Windows 2000 Directory
    Services Infrastructure 622
    Exam 70-220: Designing Security for a Microsoft Windows 2000 Network 623
    Exam 70-221: Designing a Microsoft Windows 2000 Network Infrastructure 625
    Appendixes C Case Study Analysis Approach 629
    Case Study Method 629
    Management Value 630
    How to Approach a Case 631


     
    網友評論  我們期待著您對此商品發表評論
     
    相關商品
    在線留言 商品價格為新臺幣
    關於我們 送貨時間 安全付款 會員登入 加入會員 我的帳戶 網站聯盟
    DVD 連續劇 Copyright © 2024, Digital 了得網 Co., Ltd.
    返回頂部