Windows NT TCP/IP Network Administration
Title | Windows NT TCP/IP Network Administration PDF eBook |
Author | Craig Hunt |
Publisher | "O'Reilly Media, Inc." |
Pages | 518 |
Release | 1998 |
Genre | Computers |
ISBN | 9781565923775 |
Windows NT TCP/IP Network Administrationis a complete guide to setting up and running a TCP/IP network on Windows NT. Windows NT and TCP/IP have long had a close association, and this is the first book to focus exclusively on NT networking with TCP/IP. It starts with the fundamentals--what the protocols do and how they work, how addresses and routing move data through the network, and how to set up your network connection. Beyond that, all the important networking services provided as part of Windows NT-- including IIS, RRAS, DNS, WINS, and DHCP--are presented in detail. This book is the NT administrator's indispensable guide. Contents include: Overview Delivering the data Network services Getting started Installing and configuring NT TCP/IP Using Dynamic Host Configuration Protocol Using Windows Internet Name Service Using Domain Name Service Configuring Email Service Using Microsoft routing Using Remote Access Service Troubleshooting TCP/IP Network Security Internet Information Server Appendixes on the TCP/IP commands, PPP script language reference, and DNS resource records
Computer Security
Title | Computer Security PDF eBook |
Author | John S. Potts |
Publisher | Nova Publishers |
Pages | 158 |
Release | 2002 |
Genre | Computers |
ISBN | 9781590335215 |
We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research and academic institutions devote a considerable amount of time and effort to the study of information systems and computer security. Anyone with access to a computer needs to be aware of the developing trends and growth of computer security. To that end, this book presents a comprehensive and carefully selected bibliography of the literature most relevant to understanding computer security. Following the bibliography section, continued access is provided via author, title, and subject indexes. With such a format, this book serves as an important guide and reference tool in the defence of our computerised culture.
Maximum Security
Title | Maximum Security PDF eBook |
Author | Anonymous |
Publisher | Sams Publishing |
Pages | 981 |
Release | 2003 |
Genre | Computers |
ISBN | 0672324598 |
Security issues are at an all-time high. This volume provides updated, comprehensive, platform-by-platform coverage of security issues, and includes to-the-point descriptions of techniques hackers use to penetrate systems. This book provides information for security administrators interested in computer and network security and provides techniques to protect their systems.
The SQL Server 7.0 Handbook
Title | The SQL Server 7.0 Handbook PDF eBook |
Author | Ken England |
Publisher | Digital Press |
Pages | 468 |
Release | 1999-07-20 |
Genre | Computers |
ISBN | 9781555582012 |
Let the experts help you work smarter with the new SQL Server. The SQL Server 7.0 Handbook concisely and authoritatively explains how to design, implement, administer, and tune Microsoft's powerful new database management system for Windows NT. Readers will learn all major SQL Server 7.0 capabilities, especially its new scalability, decision support, performance, and replication features. The authors, recognized SQL Server authorities, including a former SQL Server product manager, explain how to use the database with other critical Microsoft data management technologies and products, including Microsoft Transaction Server and Active Data Objects (ADO). No other book will enable database administrators, designers, programmers, and IT managers to master SQL Server 7.0 more thoroughly or quickly. Computer professionals studying for Microsoft Certified Professional (MCSE) qualifications will find this book essential reading. Learn major new SQL Server 7.0 scalability and replication features Optimize and secure SQL Server 7.0 Develop data warehouses with SQL Server 7.0 decision support capabilities and OLAP Services
MCSE Supporting and Maintaining a Windows NT Server 4.0 Network
Title | MCSE Supporting and Maintaining a Windows NT Server 4.0 Network PDF eBook |
Author | Dennis Maione |
Publisher | Que Publishing |
Pages | 762 |
Release | 2001 |
Genre | Computers |
ISBN | 9780735711570 |
The leading certification product covering one of the hottest MCSE 2000 electives. This book not only prepares the reader for the exam, it provides them with the real-world ability to support and maintain networks that use Microsoft Windows NT Server 4.0 as a primary operating system in a mixed network. The book maps to the actual exam objectives, providing readers with an excellent study tool that is thorough, accurate, and reader-friendly.
Information Assurance
Title | Information Assurance PDF eBook |
Author | Andrew Blyth |
Publisher | Springer Science & Business Media |
Pages | 335 |
Release | 2013-04-17 |
Genre | Computers |
ISBN | 144713706X |
When you first hear the term Information Assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth this is the Holy Grail that all organisations that value their information should strive to achieve, but which few even understand. Information Assurance is a term that has recently come into common use. When talking with old timers in IT (or at least those that are over 35 years old), you will hear them talking about information security, a term that has survived since the birth of the computer. In the more recent past, the term Information Warfare was coined to describe the measures that need to be taken to defend and attack information. This term, however, has military connotations - after all, warfare is normally their domain. Shortly after the term came into regular use, it was applied to a variety of situations encapsulated by Winn Schwartau as the three classes of Information Warfare: Class 1- Personal Information Warfare. Class 2 - Corporate Information Warfare. Class 3 - Global Information Warfare. Political sensitivities lead to "warfare" being replaced by "operations", a much more "politically correct" word. Unfortunately, "operations" also has an offensive connotation and is still the terminology of the military and governments.
The .NET Developer's Guide to Windows Security
Title | The .NET Developer's Guide to Windows Security PDF eBook |
Author | Keith Brown |
Publisher | Addison-Wesley Professional |
Pages | 412 |
Release | 2004 |
Genre | Computers |
ISBN |
Author Keith Brown crystallizes his application security expertise into 75 short, specific guidelines geared toward .NET programmers who want to develop secure Windows applications that run on Windows Server 2003, Windows XP, and Windows 2000.