rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780471296218

The Complete Network Administration Survival Guide

by
  • ISBN13:

    9780471296218

  • ISBN10:

    047129621X

  • Edition: 1st
  • Format: Paperback
  • Copyright: 1999-04-01
  • Publisher: WILEY JOHN & SONS INC
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99
We're Sorry.
No Options Available at This Time.

Summary

"Sue Plumley has taken the full breadth of network administration and drilled down into the detail that's always left out of network operating system vendor manuals. . It's a work of art." -Tom Henderson, Principal Researcher, ExtremeLabs, Inc. Network Administration Survival Guide If you manage a network computing infrastructure, your life just got easier. Each of this book's twelve incisive sections functions like a mini-manual on a different aspect of the network administrator's job. Each features step-by-step guidelines, task lists, and instructive real world examples. Each is backed up by a quick reference appendix that's packed with valuable technical information. An indispensable guide to problem diagnosis and resolution, plus a ready reference for administrators who want to expand their skill set. Network Administration Survival Guide tells you exactly what you need to know about: * Managing applications * Configuring and managing network printers * Configuring and managing Internet clients * Establishing network policies * Expanding your network * Managing remote access * Outsourcing * Network maintenance * Managing intranets and extranets * Setting up and maintaining security Wiley Computer Publishing. Timely. Practical. Reliable. Visit our Web site at www.wiley.com/compbooks/

Author Biography

Sue Plumley is the founder of Humble Opinions, a consulting group that installs and troubleshoots Novell and microsoft networks. She is also the author of more than 50 books on software and operating systems.

Table of Contents

ACKNOWLEDGMENTS XXIII(2)
INTRODUCTION XXV
NETWORK ADMINISTRATION STRATEGIES 1(206)
BOOK ONE ORGANIZATION AND PLANNING 3(68)
Introduction to Book One 3(2)
CHAPTER 1 PRELIMINARY GROUNDWORK
5(14)
Determining Needs
5(9)
Taking Inventory
6(2)
Organizing the Inventory
8(6)
Preparing for Deployment of the Network
14(5)
Server and Network Preparation
14(1)
Client Preparation
15(1)
During the Deployment
16(3)
CHAPTER 2 NETWORK FOUNDATIONS
19(12)
Networking Types
19(4)
Sidebar: LAN, WAN, or Other?
20(1)
Mainframe or Minicomputer
20(1)
Peer-to-Peer Networking
21(1)
Client/Server Networking
21(2)
Choosing a Network Operating System
23(8)
Sidebar: Enterprise Networking
24(1)
Defining an NOS
25(1)
Microsoft's NT Server
26(2)
Novell's NetWare
28(1)
Banyan VINES
29(1)
Other Network Operating Systems
29(2)
CHAPTER 3 PLANNING NETWORK STRATEGIES
31(12)
Forming Networking Goals
31(5)
Defining the Network's Uses
32(1)
Outlining Goals
33(3)
Naming Conventions
36(3)
Site and Server Names
36(1)
File and Directory Names
37(2)
Usernames
39(1)
Defining and Organizing Users
39(4)
Organizing Users
39(1)
Defining Users
40(1)
Sidebar: Rights and Permissions
41(2)
CHAPTER 4 NETWORKING TECHNOLOGIES
43(16)
Networking Hardware
43(8)
Network Interface Cards
43(2)
Hubs, Switches, Bridges, and Routers
45(4)
Sidebar: Which to Use?
49(1)
Cabling
49(2)
Sidebar: Backbones
51(1)
Networking Software
51(4)
Drivers
52(1)
Protocols
52(2)
Sidebar: The TCP/IP Protocol Stack
54(1)
Final Considerations
55(4)
Sidebar: Some Basic Recommendations
56(3)
CHAPTER 5 POLICIES AND PROCEDURES
59(12)
Preparing Policies
59(4)
Planning Policies
60(1)
Security during Planning Stages
60(1)
Networking Policies after Implementation
61(2)
Administrative Help
63(4)
Help with Administrative Duties
64(2)
Form a Help Desk
66(1)
Consider Outsourcing
66(1)
People Preparation
67(4)
People in Charge
67(1)
Managers
68(1)
Users
68(3)
BOOK TWO SERVER MANAGEMENT 71(56)
Introduction to Book Two 71(2)
CHAPTER 1 PRELIMINARY GROUNDWORK
73(12)
Planning Servers
73(6)
Services
74(1)
Number of Servers
75(4)
Choosing a Network Operating System
79(6)
NOS Necessities
81(1)
Integrating Network Operating Systems
81(1)
Sidebar: Common Server Operating Environment
82(1)
Sidebar: NT, Novell, and LAN Manager
83(2)
CHAPTER 2 TERMINOLOGY AND TECHNOLOGY
85(14)
Types of Servers
85(8)
Authentication Server
86(1)
File Server
86(1)
Sidebar: Fault Tolerance
87(1)
Application Server
88(1)
Database Servers
89(1)
Web Server
89(1)
Proxy Server
90(1)
Groupware Server
91(1)
Print Servers
92(1)
Fax Server
92(1)
Server Suites
93(6)
Microsoft BackOffice Server Suite
93(2)
Novell Products
95(1)
Netscape SuiteSpot
96(1)
Solaris Internet Server Suite
96(3)
CHAPTER 3 PLANNING SERVER STRATEGIES
99(8)
Centralized Processing
99(4)
Why Centralize?
100(1)
Why Consolidate?
101(2)
Setting Up a Server Room
103(4)
Server Room Contents
103(1)
Telecommunications Closet Contents
104(1)
Server Room Goals
105(2)
CHAPTER 4 SERVER PREPARATIONS
107(12)
Hardware Suggestions
107(7)
Processors
108(1)
Sidebar: Processor Scalability
109(1)
Memory
110(1)
Disk Subsystem Optimization
110(1)
Hard Drives
110(1)
Network Interface Cards
111(1)
Upgrading Servers
111(1)
Redundancy
112(1)
Sidebar: Network Maps and Documentation
112(2)
Bottlenecks
114(5)
Causes of Bottlenecks
114(1)
Examples of Bottlenecks
114(1)
Sidebar: Windows NT's Pagefile.sys
115(1)
Alleviating Bottlenecks
116(3)
CHAPTER 5 ADMINISTRATION
119(8)
Planning the Deployment
120(1)
Getting Help
120(1)
Preparing File and Directory Structure
120(1)
Defining Policies
121(1)
Ordering NOS and Applications
122(1)
Ordering the Server
122(1)
Preparing the Site
122(1)
Collecting Information
123(1)
Installing and Configuring the Server
124(1)
Setting Up Client Computers
124(1)
Testing the Server
125(2)
BOOK THREE APPLICATION MANAGEMENT 127(40)
Introduction to Book Three 127(2)
CHAPTER 1 PRELIMINARY GROUNDWORK
129(8)
Location of Program Files
129(4)
Workstation or Server
130(1)
Client/Server Applications
130(2)
Advantages and Disadvantages
132(1)
Application Issues
133(4)
Planning Considerations
133(2)
Questions to Ask
135(1)
Before Installation
136(1)
CHAPTER 2 PLANNING NETWORK STRATEGIES
137(10)
Network Resource Planning
137(4)
Network and Server Issues
138(1)
Workstation Issues
139(2)
Miscellaneous Strategies
141(6)
Licensing Software
141(1)
Naming Conventions
142(1)
Security and Policies
142(1)
Installation of Applications
143(1)
Administrator's Duties
144(3)
CHAPTER 3 NETWORK APPLICATIONS
147(20)
Database Management Applications
147(4)
DBMS Components
148(1)
Database Management Guidelines
149(1)
Sidebar: SCRIPTING
150(1)
SQL Server
150(1)
Sidebar: Database Development System
151(1)
Oracle
151(1)
Groupware
151(9)
Is Groupware for You?
152(1)
Sidebar: Bandwidth Solutions
153(1)
Groupware Components
153(5)
Microsoft Exchange Server
158(1)
Lotus Notes/Domino
158(2)
Internet Applications
160(3)
Client Browsers
160(1)
Sidebar: Email and Scheduling
161(1)
Web Server Applications
161(1)
Commercial Applications
162(1)
Proxy Server Applications
163(1)
Vertical Applications
163(1)
Accounting Applications
164(2)
Suites
166(1)
BOOK FOUR MANAGING PRINTERS 167(40)
Introduction to Book Four 167(2)
CHAPTER 1 TERMINOLOGY AND TECHNOLOGY
169(10)
Printer Technologies
170(6)
Selecting Printers
170(1)
Sidebar: What to Look for in a Color Laser Printer
171(2)
Printer Drivers
173(1)
Sidebar: Data Types
174(1)
Printer Languages
175(1)
Sidebar: PostScript Printing
175(1)
Network Printing
176(3)
Sidebar: Spooling and Redirection
177(1)
Parallel or Serial Printers
177(1)
Protocols
178(1)
CHAPTER 2 PLANNING NETWORK STRATEGIES
179(8)
Using Print Servers
179(5)
Advantages of Using a Print Server
180(1)
What to Look for in a Print Server
181(1)
Network Printing Methods
181(2)
Printing Pools
183(1)
Print Management Software
184(1)
NOS Print Management
184(1)
Third-Party Print Management Applications
184(1)
Determining Needs
185(2)
CHAPTER 3 SERVER AND NETWORK PREPARATIONS
187(10)
Server Preparations
187(4)
Print Server Preparations
187(3)
Ports and Cabling
190(1)
Network Preparations
191(3)
Ports
191(1)
Protocols and Adapter Cards
191(1)
Internet Printing
192(1)
Clients
193(1)
Policies and Security
194(3)
Policies
194(1)
Security
195(2)
CHAPTER 4 TROUBLESHOOTING AND OPTIMIZATION
197(10)
Troubleshooting Printer Problems
197(7)
General Troubleshooting
197(2)
Sidebar: Paper Storage
199(1)
Troubleshooting Laser Printers
199(2)
Sidebar: Laser Paper Specifications
201(2)
Troubleshooting Dot Matrix Printers
203(1)
Other Print Problems
203(1)
Optimizing Network Printing Performance
204(3)
Preventative Maintenance
204(1)
Improving Print Speed
205(2)
CLIENT MANAGEMENT 207(194)
BOOK FIVE CONFIGURING NETWORK CLIENTS 209(72)
Introduction to Book Five 209(2)
CHAPTER 1 PRELIMINARY GROUNDWORK
211(6)
Determining Needs
211(6)
Administration Needs
212(1)
User Needs
212(2)
People Needs
214(1)
Desktop Costs
215(2)
CHAPTER 2 CLIENT OPERATING SYSTEMS
217(14)
Client Operating Systems Introduction
217(5)
History of the PC Client Operating System
218(2)
Requirements of a Client Operating System
220(2)
Client Operating Systems in Detail
222(9)
DOS-Based and Windows 3.x
223(1)
Windows 32-Bit Operating Systems
223(3)
OS/2 Warp
226(1)
Macintosh
227(1)
Sidebar: Macintosh Open Transport
228(1)
XWindows
228(3)
CHAPTER 3 PLANNING STRATEGIES
231(16)
Personal Computers
231(4)
Windows 95/98
232(1)
Windows NT Workstation and OS/2 Warp
232(1)
Sidebar: Plug-and-Play Devices
233(1)
Macintosh
234(1)
Linux
234(1)
Network Computers
235(3)
Types of Network Computers
236(1)
Advantages
236(1)
Sidebar: Thin Clients on the Internet
237(1)
Disadvantages
237(1)
Workstation Configuration
238(9)
Client Software
238(2)
Protocols
240(2)
Sidebar: NetBIOS
242(1)
Sidebar: IPX/SPX and UNIX
243(2)
Network Interface Cards
245(2)
CHAPTER 4 NETWORK AND SERVER PREPARATION
247(10)
Centralized Control
247(3)
Advantages
248(1)
Disadvantages
248(1)
Steps to Deployment
248(1)
Software Distribution
249(1)
Sidebar: Asset Management
250(1)
Planning Network Access
250(7)
User Accounts
251(1)
Sidebar: Creating User Accounts
252(1)
Sidebar: User Logons
253(1)
Control Considerations
254(1)
Client Management
255(2)
CHAPTER 5 INTEGRATED NETWORKING
257(10)
NetWare and Windows NT
258(2)
NetWare Side
258(1)
NT Side
259(1)
NOSs and IBM Mainframes/AS/400s
260(2)
Windows NT
261(1)
Novell NetWare
262(1)
Macintosh Clients
262(2)
NT
263(1)
NetWare
263(1)
Linux
264(1)
UNIX
264(3)
NetWare
265(1)
NT
265(2)
CHAPTER 6 USER PREPARATION AND HELP
267(14)
Training
267(3)
Getting Started
268(1)
Cross-Training
268(1)
Types of Training
269(1)
Morale
270(2)
Developing a Team Attitude
270(1)
Keeping Your People Happy
271(1)
Help Desk
272(4)
Setting Up a Help Desk
273(2)
Self-Help Support Systems
275(1)
Policies and Procedures
276(5)
Policy Guidelines
276(2)
Possible Procedures
278(3)
BOOK SIX CONFIGURING INTERNET CLIENTS 281(60)
Introduction to Book Six 281(2)
CHAPTER 1 PRELIMINARY GROUNDWORK
283(14)
Using the Internet in Business
283(5)
Advantages
284(3)
Disadvantages
287(1)
What Can You Do with the Internet?
288(6)
Email
289(1)
Transferring Files
289(1)
Real-Time Conferences and Meetings
289(1)
Web-Based Calendaring
290(1)
Sidebar: Internet Telephony
291(1)
Increase Business
291(1)
Virtual Private Networks
292(2)
Planning Strategies
294(3)
CHAPTER 2 TERMINOLOGY AND TECHNOLOGY
297(12)
Dial-Up or High-Speed Connections?
297(3)
Sidebar: Phone Lines versus High-Speed Lines
298(1)
Dial-Up
298(1)
High-Speed Lines
299(1)
Sidebar: Connecting a NetWare LAN to the Internet
300(1)
Service Providers
300(3)
ISP Services
300(1)
Sidebar: LAN-Connected Minis
301(1)
Finding an ISP
302(1)
Internet Addressing
303(2)
IP Address
304(1)
Subnet Masks
305(1)
Default Gateway
305(1)
Intranets
305(4)
Requirements for an Intranet
306(1)
Making the Most of an Intranet
307(2)
CHAPTER 3 HARDWARE AND CONNECTIONS
309(10)
Connections
309(6)
Modems
311(1)
Sidebar: Modem Protocols
312(1)
DSL Modems
312(1)
ISDN
313(1)
Sidebar: Cable Modems
313(1)
Frame Relay
314(1)
T1, Fractional T1, and T3 Lines
314(1)
Sidebar: SMDS and ATM
315(1)
Sidebar: Which Lines to Use
315(1)
Client Issues
315(4)
Client Hardware
315(1)
Client Operating Systems
316(1)
Client Network Configuration
316(3)
CHAPTER 4 SOFTWARE AND CONFIGURATION
319(14)
Internet Browsers
319(3)
Internet Explorer
320(1)
Netscape Navigator and Communicator
321(1)
NCSA Mosaic
322(1)
Email Applications
322(2)
Internet Mail, Outlook Express
322(1)
Netscape Messenger
323(1)
Eudora
324(1)
Other Applications
324(1)
Common Configuration Details
325(3)
Account Information
325(1)
Email Account
326(1)
News
327(1)
Sidebar: Common Port Numbers
328(1)
Configuring the Client
328(5)
Windows 95/98
329(1)
Windows NT 4.0
329(1)
NT 3.51
330(1)
Macintosh
330(1)
Sidebar: Login Scripts
331(2)
CHAPTER 5 TRAINING, SECURITY, AND POLICIES
333(8)
Training
333(1)
Sidebar: Outsourcing Training
334(1)
Security
334(2)
Passwords
334(1)
Email Security
335(1)
Policies and Guidelines
336(5)
Internet Policy Suggestions
336(1)
Email Policies
337(1)
Security Policies
338(1)
Internet Guidelines and Information
339(2)
BOOK SEVEN MANAGING REMOTE ACCESS 341(60)
Introduction to Book Seven 341(2)
CHAPTER 1 PRELIMINARY GROUNDWORK
343(12)
Defining Remote Networking
344(7)
Remote Access Solutions
344(4)
Types of Remote Users
348(1)
Sidebar: Remote Access Activities
349(1)
Advantages of Remote Access
349(1)
Disadvantages of Remote Access
350(1)
Providing for Remote Users
351(4)
Supplying the Virtual Office
351(1)
Tips for Remote Users
352(3)
CHAPTER 2 TERMINOLOGY AND TECHNOLOGY
355(12)
Modems for Remote Access
355(5)
28.8 and 33.6 Modems
356(1)
56Kbps Technology
356(1)
ISDN Modems
356(1)
xDSL
357(1)
Cable Modems
358(1)
Sidebar: Types of DSL Service Offerings
358(1)
Sidebar: Dial-Up Services Example
359(1)
Sidebar: Modem Guidelines
360(1)
Remote Connections
360(2)
Frame Relay
360(1)
ISDN
361(1)
X.25 Technology
361(1)
Fractional T1, T1
362(1)
Understanding Virtual Private Networks
362(2)
Remote Access Protocols
362(1)
Advantages of the VPN
363(1)
Security
364(3)
Authentication
365(1)
Miscellaneous Security Issues
366(1)
CHAPTER 3 PLANNING STRATEGIES
367(12)
Planning for Remote Access
367(4)
User Considerations
368(1)
Network and Connection Issues
369(1)
Installation and Management Considerations
370(1)
Avoiding Bottlenecks
370(1)
VPNs--Internet Remote Access
371(4)
Defining a VPN
372(1)
Sidebar: Tunneling
372(1)
Security and Authentication
373(1)
VPN Management
374(1)
Dial-Up or VPN?
374(1)
Security
375(4)
Miscellaneous Issues
376(1)
More on Passwords
377(2)
CHAPTER 4 CLIENT, SERVER, AND NETWORK PREPARATIONS
379(14)
Network Equipment
380(7)
RAS Servers and Equipment
380(2)
Sidebar: Server Operating System--Windows NT Server
382(1)
Modem Pools
382(1)
ISDN Modems
383(1)
xDSL
383(1)
CSU/DSU
384(1)
Routers and Bridges
384(1)
Sidebar: Data Compression
385(2)
Multiplexors and Multichannels
387(1)
Client Computers
387(1)
Hand-Helds
387(1)
Notebooks and Desktops
388(1)
Client Operating Systems
388(5)
Sidebar: Portable Computers and PCMCIA
389(1)
Windows 95/98
389(1)
Windows NT Workstation
390(1)
Novell NetWare
390(1)
Sidebar: Login Scripts
391(1)
Apple Remote Access
392(1)
CHAPTER 5 POLICIES AND PROCEDURES
393(8)
Task Lists
393(2)
Administrator's To-Do List
394(1)
Remote User's To-Do List
394(1)
Remote Access Policies
395(3)
Defining Remote Access Users
396(1)
Legal Issues
396(1)
Other Issues
397(1)
Security Policies for Telecommuters
398(3)
Developing a Policy
398(1)
Sample Policies
399(2)
EXPANDING THE NETWORK 401(114)
BOOK EIGHT THE INTERNET, INTRANETS, AND EXTRANETS 403(84)
Introduction to Book Eight 403(2)
CHAPTER 1 PRELIMINARY GROUNDWORK
405(10)
About the Internet
405(5)
Legal Issues
406(1)
Ethics and Netiquette
406(1)
Sidebar: Web Site Legalities
407(1)
The Future of the Internet
408(2)
Advantages and Disadvantages of Using the Internet
410(5)
Advantages
411(1)
Sidebar: The Internet and Your Business
412(1)
Disadvantages
413(2)
CHAPTER 2 TERMINOLOGY AND TECHNOLOGY
415(10)
Basic Terminology
415(3)
HTML and HTTP
415(1)
Secure Protocols
416(1)
URL
416(1)
Internet Services
417(1)
CGI--Common Gateway Interface
418(1)
TCP/IP Basics
418(7)
TCP and IP
418(1)
IP Addressing
419(1)
Sidebar: Binary Format
420(1)
Assigning Network IDs
421(1)
Subnets
422(1)
Sidebar: Implementing Subnetting
422(1)
IP Routing
423(1)
Sidebar: Java and ActiveX
423(2)
CHAPTER 3 PLANNING NETWORK STRATEGIES
425(8)
Planning Internet Uses
425(4)
Business Advantages of the Internet
425(1)
Internet Services
426(3)
Internet Service Providers
429(2)
Which Services Do You Want?
429(1)
Questions to Ask
429(1)
Web Server Questions
430(1)
Internet Access Task List
431(2)
CHAPTER 4 PREPARATIONS AND HARDWARE
433(10)
Connections and Access Devices
433(6)
Sidebar: Internet Gateways
434(1)
Dedicated or Dial-Up?
434(1)
Modems and Phone Lines
434(1)
ISDN Modems and Lines
435(1)
xDSL
436(1)
Sidebar: X.25
436(1)
Frame Relay
436(1)
Fractional T1, T1
437(1)
T3
437(1)
ATM
437(1)
Sidebar: Broadband Access
438(1)
Security Devices
439(4)
Proxy Servers
439(1)
Firewalls
440(1)
Sidebar: Firewall Requirements
441(2)
CHAPTER 5 SECURITY AND POLICIES
443(8)
Security for Your LAN
444(2)
LAN Passwords
444(1)
Outside Passwords
445(1)
Policies and Procedures
446(5)
Security Policies
446(1)
Email Policies
447(1)
Web Policies
448(1)
Procedures
449(2)
CHAPTER 6 INTRANETS AND EXTRANETS
451(16)
Intranets
452(6)
Advantages and Disadvantages of Intranets
452(1)
Preparing for the Intranet
453(1)
Managing an Intranet
454(1)
Creating Content
455(1)
Sidebar: FrontPage
456(1)
Intranet Technology
457(1)
Extranets
458(9)
Extranets as an Extended Intranet
458(1)
Advantages and Disadvantages
459(1)
Security and Extranets
460(1)
Security Goals for Extranets
461(1)
Virtual Private Networks
461(2)
Secure Sockets Layer
463(1)
ISP Security
464(3)
CHAPTER 7 RUNNING A WEB SERVER
467(20)
Getting Ready for the Commercial Web
468(3)
Planning and Preparation
468(1)
Extranet Management
469(1)
Commerce Servers
469(1)
Preparing to Secure a Web Site
470(1)
E-Commerce
471(1)
The Business of Running a Web Server
471(2)
Credit on the Net
471(1)
Common Internet Business Mistakes
472(1)
Web Site Management
472(1)
Sidebar: PINGing as Troublshooting
473(1)
Preparing to Run a Web Server
473(9)
Web Server Requirements
474(1)
Domain Name
474(1)
Content
475(1)
Web Certification and Training
475(1)
Sidebar: HTML Language
476(2)
Sidebar: Major Web Certifications
478(1)
Web Site Performance
479(2)
Web Server Search Engines
481(1)
Web Server Packages
482(5)
Netscape SuiteSpot
482(1)
Sidebar: Robots, Spiders, and Ants
483(1)
UNIX Web Servers
484(1)
Microsoft's BackOffice
484(1)
Microsoft Internet Information Server
485(1)
Sidebar: Claris Internet Solutions
485(2)
BOOK NINE OUTSOURCING 487(28)
Introduction to Book Nine 487(2)
CHAPTER 1 PRELIMINARY GROUNDWORK
489(6)
Advantages and Disadvantages
490(2)
Advantages of Outsourcing
490(1)
Disadvantages of Outsourcing
491(1)
Outsourcing Now and in the Future
492(3)
What's Hot in Outsourcing
492(1)
What the Future Holds
493(2)
CHAPTER 2 PLANNING AND PREPARATIONS
495(10)
When to Outsource
496(1)
Finding an Outsourcer
497(1)
Working with the Outsourcer
498(1)
Employee Support
499(2)
Sidebar: Service Level Agreements
500(1)
Contracts
501(4)
Items to Check or Add
501(2)
Before Signing
503(1)
Renegotiating Outsourcing Contracts
503(2)
CHAPTER 3 TYPES OF OUTSOURCERS
505(10)
Network Services
506(1)
Internet Services
507(2)
Remote Access
509(1)
Sidebar: Layer 2 and/or 3 Tunnelling
510(1)
Outsourcing Your Intranet
510(2)
Enterprise WAN Outsourcing
512(1)
Migration Outsourcing
512(3)
NETWORK MAINTENANCE 515(132)
BOOK TEN BACKING UP THE SYSTEM 517(52)
Introduction to Book Ten 517(2)
CHAPTER 1 PRELIMINARY GROUNDWORK
519(6)
General Backup Information
519(3)
Local or Centralized?
520(2)
Time and Resources
522(1)
Advantages and Disasters
522(3)
Advantages of Backing Up
523(1)
Disasters
523(2)
CHAPTER 2 TERMINOLOGY AND TECHNOLOGY
525(12)
Fault Tolerance and Redundancy
525(6)
Basic Protection
526(1)
RAID
527(2)
Mirrored Server(s)
529(2)
Types of Backups
531(2)
Full Backups
532(1)
Incremental Backups
532(1)
Differential Backups
533(1)
Copying Files
533(1)
Online Services and Backup Security
533(4)
Data Encryption
535(1)
Additional Security
536(1)
CHAPTER 3 PLANNING STRATEGIES
537(12)
Backup Information and Requirements
538(4)
Backup Log Information
538(2)
System Disk
540(1)
Application Disks
541(1)
Files to Back Up
541(1)
Sidebar: Windows NT Server Registry
542(1)
Backup Strategy
542(2)
Server and/or Client Backups?
543(1)
Creating Your Own Strategy
543(1)
Other Backup Issues
544(1)
Scheduling
544(3)
Sidebar: Rotation and Scheduling Examples
546(1)
Documenting Backups
547(2)
CHAPTER 4 PREPARATIONS, HARDWARE, AND SOFTWARE
549(10)
Backup Devices
549(3)
Tape Drives
552(3)
Tape Information and Advice
553(1)
Sidebar: Data Compression
554(1)
Backup Standards
554(1)
Backup Software
555(1)
Testing and Restoring Backups
556(3)
Testing Backups
556(1)
Restoring Backups
557(2)
CHAPTER 5 POLICIES AND DISASTER RECOVERY
559(10)
Backup Policies
559(2)
Start with Questions
560(1)
Policy Statements
560(1)
Disaster Recovery
561(8)
Problems with Making a Plan
562(1)
Forming a Plan
563(1)
Writing the Plan
564(1)
Disaster Recovery Policies
565(1)
Sidebar: Protecting Hardware Components
565(1)
Sample Topics for the Plan
566(3)
BOOK ELEVEN NETWORK SECURITY 569(54)
Introduction to Book Eleven 569(2)
CHAPTER 1 PRELIMINARY GROUNDWORK
571(12)
Advantages and Disadvantages of Network Security
572(1)
Advantages
572(1)
Disadvantages
573(1)
Assessing Your Risks
573(2)
Risk Categories
574(1)
Finding Solutions
574(1)
Security Hotspots
575(8)
Internal Network Security
575(3)
Sidebar: C2 Security Compliance
578(1)
External Security
578(3)
Sidebar: Packet Sniffing, IP Spoofing, and Cryptography
581(2)
CHAPTER 2 PLANNING NETWORK STRATEGIES
583(10)
System Administration
583(3)
User Administration
584(1)
Server Administration
584(1)
Resource Administration
585(1)
Physical Security
586(3)
General Protection
586(1)
Server Room Security
587(1)
Sidebar: IBM Legacy Systems Security
588(1)
Network Auditing
589(4)
Preparing to Audit
589(1)
Sidebar: NOS Auditing
590(1)
Network Analysis Tools
590(3)
CHAPTER 3 PREPARATIONS THROUGH POLICIES
593(14)
Policies
594(10)
Server Room
594(1)
Administrators' Policies
594(2)
Record Keeping
596(1)
Downtime Policy
596(1)
Routine Preventative Maintenance
597(1)
Backups
597(1)
Fault Tolerance
598(1)
Disaster Recovery
598(1)
Application Security
598(2)
User Policies
600(1)
Remote Access
601(1)
Internet Policies
602(2)
Inappropriate Usage
604(1)
Procedures
604(3)
CHAPTER 4 INTERNET SECURITY
607(16)
Threats to Your System
607(2)
Hackers/Crackers
608(1)
Internal Users
608(1)
Protecting Your System
609(2)
Making a Plan
610(1)
Implementing the Plan
610(1)
From Routers to Firewalls
611(4)
Routers
611(1)
Sidebar: Routing Tables and Stateful Inspection
612(1)
Proxy Servers/Application Gateways
612(1)
Firewalls
613(2)
Miscellaneous Security Issues
615(8)
E-Commerce Security
615(1)
Spam and Cookies
616(1)
Email Security
617(1)
Web Server Placement
617(4)
Detecting Network Intruders
621(2)
BOOK TWELVE OPTIMIZING THE NETWORK 623(24)
Introduction to Book Twelve 623(2)
CHAPTER 1 PRELIMINARY GROUNDWORK
625(8)
Preventative Maintenance
625(2)
First Steps
626(1)
Final Steps
626(1)
Network Resource Planning
627(3)
Performance Management Software
628(1)
Planning Network Optimization
629(1)
Implementation
629(1)
Steps to Optimization
630(3)
Optimization Team
631(1)
Implementing Solutions
631(2)
CHAPTER 2 PLANNING STRATEGIES
633(14)
System Improvement Advice
633(10)
Processors and Boards
634(1)
Memory
635(1)
Disk Subsystem Optimization
636(1)
RAID
636(5)
Multiple Network Cards on the Server
641(1)
Miscellaneous Optimizing Options
642(1)
Bandwidth Issues
643(4)
Bridges
643(1)
NICs
644(1)
Sidebar: Boosting Web Server Bandwidth
644(1)
Optimizing Bandwidth
645(1)
Finding Bandwidth Bottlenecks
646(1)
AFTERWORD 647(2)
REFERENCE MATERIALS 649(2)
APPENDIX A NETWORK MAPS AND MODELS 651(24)
APPENDIX B TROUBLESHOOTING 675(14)
APPENDIX C TASK LISTS 719(16)
APPENDIX D IP ADDRESSING 735(26)
APPENDIX E TECHNOLOGIES AND HARDWARE 761(60)
APPENDIX F ACRONYMS 821(8)
APPENDIX G NETWORK OPERATING SYSTEMS 829(12)
INDEX 841

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program