Networking For Dummies 7th Edition By Doug Lowe

Network Security For Dummies Pdf

Download Free Networking For Dummies 7th Edition Pdf

Introduction: Network Security For Dummies Pdf

Network Security For Dummies Pdf 7th Edition, One day the Network Thugs barge into your office and shove a gun in your face. “Don’t move until we’ve hooked you up to the network!” one of them says while the other one connects one end of a suspicious-looking cable to the back of your computer and shoves the other end into a hole in the wall. “It’s done,” they say as they start to leave. “Now . . . don’t you say nuttin’ to nobody . . . or we’ll be back!”
If this has happened to you, you’ll appreciate the chapters in this part. They provide a gentle introduction to computer networks written especially for the reluctant network
What if you don’t have a network yet, and you’re the one who’s supposed to do the installing? Then the chapters in this part clue you into what a network is all about. That way, you’re prepared for the (unfortunately more technical) chapters contained in Parts II and beyond.

Network Security For Dummies Pdf gets a bad rap in the movies. In the Terminator movies, a Network Security For Dummies Pdf of the future called Skynet takes over the planet, builds deadly terminator robots, and sends them back through time to kill everyone unfortunate enough to have the name, Sarah Connor. In The Matrix movies, a vast and powerful computer network enslaves humans and keeps them trapped in a simulation of the real world. And in one of Matthew Broderick’s first movies, War Games, a computer whiz kid nearly starts World War III by connecting to a Defense Department network and playing a game called Global Thermonuclear War.
Fear not. These bad networks exist only in the dreams of science-fiction writers. Real-world networks are much calmer and predictable. They don’t think for themselves, they can’t evolve into something you don’t want them to be, and they won’t hurt you even if your name is Sarah Connor.
Now that you’re over your fear of networks, you’re ready to breeze through this chapter. It’s a gentle, even superficial, introduction to Network Security For Dummies Pdf, with a slant toward the concepts that can help you use a computer that’s attached to a network. This chapter goes easy on the details; the really detailed and boring stuff comes later.

Networking For Dummies 7th Edition By Doug Lowe Chapters and Sections

Table Of Contents For Network Security For Dummies Pdf

About This Book
How to Use This Book
What You Don’t Need to Read
Foolish Assumptions
How This Book Is Organized
Part I: Getting Started with Networking
Part II: Building Your Own Network
Part III: Network Management For Dummies
Part IV: Network Operating Systems
Part V: TCP/IP and the Internet
Part VI: The Part of Tens
Icons Used in This Book
Where to Go from Here

Part I: Getting Started with Networking
Chapter 1: Networks Will Not Take Over the World, and Other

Network Basics: Network Security For Dummies Pdf
What Is a Network?
Why Bother?
Servers and Clients
Dedicated Servers and Peers
The NOS Choice
What Makes a Network Tick?
It’s Not a Personal Computer Anymore!
The Network Manager
What Have They Got That You Don’t Got?

Chapter 2: Life on the Network

Distinguishing between Local Resources and Network Resources
What’s in a Name?
Logging On to the Network: Network Security For Dummies Pdf
Understanding Shared Folders
Oh, the Network Places You’ll Go
Mapping Network Drives

Four Good Uses for a Shared Folder
Use it to store files that everybody needs
Use it to store your own files
Use it as a pit stop for files on their way to other users
Use it to back up your local hard drive
Using a Network Printer
Logging Off the Network: Network Security For Dummies Pdf

Chapter 3: Using a Network Printer

What’s So Special about Network Printing?
A printer in every port
Printer configuration
Spooling and the print queue
What is a print job?
Adding a Network Printer
Using a Network Printer
Playing with the Print Queue
Using Windows Print Queue Tricks
What to Do When the Printer Jams

Chapter 4: Sharing Your Files and Printers

Enabling File and Printer Sharing
Sharing a Hard Drive or Folder
Sharing a Printer

Chapter 5: Mr. McFeeley’s Guide to E-mail

E-mail and Why It’s So Cool
Sending and receiving e-mail
Understanding the mail server
Microsoft Outlook
Sending e-mail
Reading your e-mail
Dealing with attachments
E-mail Etiquette

Chapter 6: Using Microsoft Office on a Network

Installing Office on a Network — Some Options
Accessing Network Files: Network Security For Dummies Pdf
Using Workgroup Templates
Networking an Access Database

Part II: Building Your Own Network
Chapter 7: The Bad News: You Have to Plan Ahead

Making a Network Plan
Being Purposeful
Taking Stock
What you need to know
Programs that gather information for you
To Dedicate, or Not to Dedicate: That Is the Question
Types of Servers
File servers
Print servers
Web servers
Mail servers
Database servers
Choosing a Server Operating System
Planning the Infrastructure
Drawing Diagrams
Sample Network Plans
Building a small network: California Sport Surface, Inc.
Connecting two networks: Creative Course Development, Inc.
Improving network performance: DCH Accounting

Chapter 8: Understanding Network Operating Systems

Network Operating System Features
Network support
File-sharing services
Directory services
Security services
Microsoft’s Server Operating Systems
Windows NT 4 Server
Windows 2000 Server
Windows Server 2003
Novell NetWare
NetWare versions
NetWare 6 features
NetWare 6.5
Other Server Operating Systems
Apple Mac OS X Server
Peer-to-Peer Networking with Windows
Advantages of peer-to-peer networks
Drawbacks of peer-to-peer networks
Networking with Windows XP
Older Windows versions

Chapter 9: Oh, What a Tangled Web We Weave: Cables

Adapters, and Other Stuff
What Is Ethernet?
All About Cable
Cable categories
What’s with the pairs?
To shield or not to shield
When to use plenum cable
Sometimes solid, sometimes stranded
Installation guidelines
Getting the tools that you need
Pinouts for twisted-pair cables
Attaching RJ-45 connectors
Crossover cables
Wall jacks and patch panels
Hubs and Switches
Hubs or switches?
Working with hubs and switches
Daisy-chaining hubs or switches
Network Interface Cards
Picking a network interface card
Installing a network card
Other Network Devices

Chapter 10: Setting Up a Wireless Network

Diving into Wireless Networking
A Little High-School Electronics
Waves and frequencies
Wavelength and antennas
Getting a spectrum via the FCC
Eight-Oh-Two-Dot-Eleventy Something? (Or, Understanding
Wireless Standards)
Home on the Range
Wireless Network Adapters
Wireless Access Points
Infrastructure mode
Multifunction WAPs
Wireless bridging
Ad-hoc Networks
Configuring a Wireless Access Point
Securing a Wireless Network
Understanding wireless security threats
Securing your wireless network

Chapter 11: Configuring Client Computers

Configuring Network Connections
Configuring Client Computer Identification
Configuring Network Logon
Configuring Wireless Networking

Part III: Network Management For Dummies
Chapter 12: Help Wanted: Job Description for a Network

What Network Administrators Do
The Part-Time Administrator
Documenting the Network
Routine Chores
Managing Network Users
Patching Things Up
Software Tools for Network Administrators
Building a Library

Chapter 13: Big Brother’s Guide to Network Security

Do You Need Security?
Two Approaches to Security
Physical Security: Locking Your Doors
Securing User Accounts
Obfuscating your usernames
Using passwords wisely
Generating Passwords For Dummies
Securing the Administrator account
Managing User Security
User accounts
Built-in accounts
User rights
Permissions (who gets what)
Group therapy
User profiles
Logon scripts
Hardening Your Network
Using a firewall
Disabling unnecessary services
Patching your servers
Securing Your Users

Chapter 14: If I Could Save Time in a Bottleneck: Optimizing

Your Network’s Performance
Why Administrators Hate Performance Problems
What Exactly Is a Bottleneck?
The Five Most Common Network Bottlenecks
The hardware inside your servers
The server’s configuration options
Servers that do too much
Malfunctioning components
The network infrastructure
Tuning Your Network the Compulsive Way
Monitoring Network Performance
More Performance Tips

Chapter 15: How to Sleep Well at Night (Or, Backing Up Your

Network Data)
Planning for Disaster
Backing Up Your Data
All About Tapes and Tape Drives
Backup Software
Types of Backups
Normal backups
Copy backups
Daily backups
Incremental backups
Differential backups
Local versus Network Backups
How Many Sets of Backups Should You Keep?
A Word About Tape Reliability
About Cleaning the Heads
Backup Security

Chapter 16: Major Annoyances

Contending with Virus Threats
What is a virus?
Antivirus programs
Safe computing
Dealing with Dysfunctional E-mail
The dreaded nondelivery report
Viewing the mail server’s error logs
How to view message headers
How to deal with spam
Help! I’ve been blacklisted!

Chapter 17: Network Troubleshooting

When Bad Things Happen to Good Computers
How to Fix Dead Computers
Ways to Check a Network Connection
A Bunch of Error Messages Just Flew By!
Double-Checking Your Network Settings
Using the Windows Networking Troubleshooter
Time to Experiment
Who’s on First?
How to Restart a Client Computer
Restarting Network Services
How to Restart a Network Server
Looking at Event Logs
Documenting Your Trials and Tribulations

Chapter 18: How to Stay on Top of Your Network and Keep the
Users Off Your Back

Training Your Users
Organizing a Library
Keeping Up with the Computer Industry
The Guru Needs a Guru, Too
Helpful Bluffs and Excuses

Part IV: Network Operating Systems
Chapter 19: Windows Server 2003

Installing and Configuring Windows Server 2003
Planning for installation
Before You Install
Running Setup
Completing the installation
Managing User Accounts
Understanding Windows User Accounts
Creating a New User
Setting user properties
Resetting user passwords
Deleting a User
Working with groups
Managing a File Server
Understanding permissions
Understanding shares
Configuring the file-server role
Sharing a folder from the File Server Manager
Granting permissions
Using the Event Viewer
Using the Computer Management Console
Working with services

Chapter 20: NetWare 6 and 6.5

Planning a NetWare Installation
Installing NetWare
Installing Client Software
Looking at Novell’s Administration Tools
Web Manager
eDirectory Administration
Remote Manager
Managing NetWare Users
Understanding User Accounts
The admin object
Creating a new user
Resetting user passwords
Creating NetWare Login Scripts
Understanding login scripts
Creating login scripts
Working with login-script commands

Chapter 21: Using a Linux Server

Comparing Linux with Windows
Choosing a Linux Distribution
Installing Linux
On Again, Off Again
Logging on
Logging off
Shutting down
Getting to a Command Shell
Managing User Accounts
Network Configuration
Using the Red Hat Network Configuration program
Restarting your network
Doing the Samba Dance
Understanding Samba
Installing Samba
Starting and stopping Samba
Using the Red Hat Samba Server Configuration tool

Chapter 22: Macintosh Networking

What You Need to Know to Hook Up a Macintosh Network
AppleTalk and Open Transport
Mac OS X Server
What You Need to Know to Use a Macintosh Network
Configuring a Mac for networking
Accessing a network printer
Sharing files with other users
Accessing shared files
What You Need to Know to Network Macintoshes with PCs
Part V: TCP/IP and the Internet

Chapter 23: Connecting Your Network to the Internet

Connecting to the Internet
Dial-up connections
Connecting with cable or DSL
Connecting with high-speed private lines: T1 and T3
Sharing an Internet connection
Securing Your Connection with a Firewall
Using a firewall
The built-in firewall in Windows XP

Chapter 24: Understanding IP Addresses

Understanding Binary
Counting by ones
Doing the logic thing
Introducing IP Addresses
Networks and hosts
The dotted-decimal dance
Classifying IP addresses
Class A addresses
Class B addresses
Class C addresses
Subnet masks
The great subnet roundup
IP block parties
Private and public addresses
Network Address Translation

Chapter 25: Configuring Your Network for DHCP

Understanding DHCP
Configuration information provided by DHCP
DHCP servers
Understanding Scopes
Feeling excluded?
Reservations suggested
How long to lease?
Managing a Windows Server 2003 DHCP Server
Setting up a DHCP server
Managing a DHCP server
How to Configure a Windows DHCP Client
Renewing and Releasing Leases

Part VI: The Part of Tens
Chapter 26: Ten Big Network Mistakes

Skimping on Cable
Turning Off or Restarting a Server Computer While Users Are
Logged On
Deleting Important Files on the Server
Copying a File from the Server, Changing It, and Then Copying It Back
Sending Something to the Printer Again Just Because It Didn’t Print the First Time
Unplugging a Cable While the Computer Is On
Assuming That the Server Is Safely Backed Up
Connecting to the Internet without Considering Security Issues
Plugging in a Wireless Access Point without Asking
Thinking You Can’t Work Just Because the Network Is Down
Always Blaming the Network

Chapter 27: Ten Networking Commandments

I. Thou Shalt Back Up Thy Hard Drive Religiously
II. Thou Shalt Protect Thy Network from Infidels
III. Thou Shalt Keepeth Thy Network Drive Pure and Cleanse It of Old Files
IV. Thou Shalt Not Tinker with Thine Network Configuration Unless Thou Knowest What Thou Art Doing
V. Thou Shalt Not Covet Thy Neighbor’s Network
VI. Thou Shalt Schedule Downtime before Working upon Thy Network
VII. Thou Shalt Keep an Adequate Supply of Spare Parts
VIII. Thou Shalt Not Steal Thy Neighbor’s Program without a License
IX. Thou Shalt Train Thy Users in the Ways of the Network
X. Thou Shalt Write Down Thy Network Configuration upon Tablets of Stone
xx Networking For Dummies, 7th Edition

Chapter 28: Ten Things You Should Keep in Your Closet

Duct Tape
Extra Cable
Extra Connectors
Patch Cables
Extra Network Cards
The Complete Documentation of the Network on Tablets of Stone
The Network Manuals and Disks
Ten Copies of This Book

Chapter 29: Ten Network Gizmos Only Big Networks Need

Managed Switches
It’s a RAID!
Server Farms
Gigabit Ethernet
Storage Area Networks
Protocol Analyzer

Chapter 30: Ten Layers of the OSI Model

Layer 1: The Physical Layer
Layer 2: The Data Link Layer
Layer 3: The Network Layer
Layer 4: The Transport Layer
Layer 4a: The Lemon-Pudding Layer
Layer 5: The Session Layer
Layer 6: The Presentation Layer
Layer 7: The Application Layer

Download Now

Note: If you have any question about Download Free Network Security For Dummies Pdf Then you can comment it.

Related Posts:

Be the first to comment

Leave a Reply

Your email address will not be published.