9780807746493

Technology on a Shoestring : A Survival Guide for Educators and Other Professionals

by
  • ISBN13:

    9780807746493

  • ISBN10:

    0807746495

  • Format: Paperback
  • Copyright: 2006-07-30
  • Publisher: Teachers College Pr

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $25.95 Save up to $3.89
  • Rent Book $22.06
    Add to Cart Free Shipping

    TERM
    PRICE
    DUE

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

Taking care of technology on a budget is perhaps the hardest job one is expected to do, especially with no training. Many technical coordinators came to hold their positions simply because they were the first ones in their school or organization to own a computer. Sound familiar? Well, help is on the way. This book is a simple, easy-to-follow guide that steers you through the complicated and often confusing world of operating systems, viruses, websites, and troubleshooting. Book jacket.

Author Biography

Thane B. Terrill is Adjunct Associate Professor of computing and education at Teachers College, Columbia University and Director of Information Services at the Baha'i International Community's United Nations Office

Table of Contents

Introduction 1(64)
1. What Is a Network?
3(10)
Recognizing the Impact of Technology
3(1)
The Basic Elements of a Computer Network
4(1)
How Things Communicate
5(2)
Essential Network Components
7(5)
DHCP (Dynamic Host Configuration Protocol)
12(1)
2. Network Architectures
13(8)
Bottlenecks
13(1)
Peer-to-Peer Network Architecture
14(1)
Server-Based Networks
15(6)
3. Operating Systems
21(8)
Putting the Horse Before the Cart
21(1)
Picking the Right Operating System
22(1)
The Big Three
23(2)
OS Comparison Chart
25(2)
The Browser as Operating System
27(2)
4. Network Design Attack Plan
29(5)
Lay of the Land
29(1)
Avoiding Surprise
30(1)
Leading Your Ragtag Army
31(1)
Thinking Outside the Box
32(2)
5. Special Operations
34(12)
Computer Labs
34(2)
Library Computers
36(2)
Administrative Offices
38(3)
Movable Computer Carts
41(1)
Multimedia Centers
42(4)
6. Network Infrastructure: Tying It All Together
46(7)
Design Considerations
46(2)
Cable Types
48(1)
Installation
48(2)
Over-Build to Have Enough
50(1)
Patch Panels
50(2)
Hubs and Switches
52(1)
7. Dealing with Vendors
53(3)
Vendor Bias
53(1)
Bidding
53(1)
Consultants
54(1)
Saving Money
55(1)
8. Multi-Function vs. Single-Function Servers
56(3)
Multi-Function Servers
56(1)
Single-Function Servers
56(1)
Finding a Balance
57(2)
9. Security Overview
59(6)
Risk Assessment
59(1)
Patches and Fixes
60(1)
Encryption
61(1)
Strong Passwords
62(1)
Hardening the Operating System
63(1)
Defense in Depth
64(1)
10. Viruses and Spyware 65(6)
Viruses
65(2)
Types of Viruses
67(1)
Methods of Infection
68(1)
Avoiding Viruses
69(1)
Antivirus Scanning Techniques
69(1)
Virus Definitions
70(1)
11. Lurking Dangers 71(4)
File Sharing: Sharing More Than You Know
71(1)
Telephones
72(1)
Disposing of Old Computers
72(1)
Trash
72(1)
Wireless Networks
73(1)
Physical Security
73(2)
12. Hoaxes and Spam 75(5)
Phishing
77(1)
Hoaxes
77(3)
13. Firewalls 80(4)
Shortcomings of Firewalls
80(1)
Firewall Types
81(1)
Network Address Translation (NAT) 82DHCP
82(1)
Firewall Testing
83(1)
14. Backup Strategies 84(5)
What Is a Backup?
84(1)
What Should You Back Up?
84(1)
Strategies for Backing Up
85(1)
Backup Devices
85(2)
When to Back Up
87(1)
Real-Time Backups
87(2)
15. When Things Go Wrong 89(5)
Get Offline
89(1)
Have I Been Compromised?
89(1)
Virus Infections
90(1)
Computers That Won't Boot
91(1)
Rolling Back Your Data
92(1)
Recovering Data
92(1)
Rebuilding a System
92(2)
16. Email and IM 94(2)
Email
94(1)
Instant Messaging
94(2)
17. Disk Imaging 96(2)
Potential Uses of Disk Imaging
96(1)
Some Concerns with Using Disk Imaging
97(1)
18. Recovering from a Disaster 98(2)
Disaster Plans
98(2)
19. Websites 100(8)
Web Advantages
100(1)
Web Design
101(1)
Understanding the Lingo
102(2)
Building a Major Website
104(1)
Web Security
105(1)
Domain Names
106(2)
20. Blogs and Wikis 108(2)
Blogs
108(1)
Wikis
109(1)
21. Fixing Problems 110(5)
Identifying Problems
110(1)
Process of Elimination
111(1)
Getting Technical Support
112(2)
Volunteer Brigade
114(1)
22. Remote Connections 115(7)
Remote Control Software
115(1)
VPNs
116(1)
Security Issues
117(1)
Possible Privacy Issues with Remote Control
117(2)
Foundations of the Internet
119(1)
Internet Structure
119(1)
History of the Internet
119(1)
Internet Standards to Know
120(2)
23. Working with People 122(4)
Managing Change
122(1)
Vendors
123(1)
The Customer Is Always Right
124(1)
Public Assistance
125(1)
24. Maintaining Your Own Sanity 126(3)
Over-Commitment
126(1)
Setting Expectations
126(1)
Setting Priorities
127(1)
Survive and Prosper
127(1)
Remember Who You Are
128(1)
Index 129(7)
About the Author 136

Rewards Program

Write a Review