Search Results - configuration file
Suggested Topics within your search.
Suggested Topics within your search.
- Operating systems (Computers) 8
- Computer networks 3
- Security measures 3
- Certification 2
- Client/server computing 2
- Computer security 2
- Examinations 2
- Asynchronous transfer mode 1
- Authoring programs 1
- Computer graphics 1
- Computer science 1
- Computer-aided design 1
- Computers 1
- Data protection 1
- Electronic data personnel 1
- Electronic data processing personnel 1
- Engineering models 1
- Internet 1
- Internetworking (Telecommunication) 1
- Microsoft windows (computer file) 1
- Networks 1
- Operating systems 1
- Operating systems (computers) 1
- SCO software 1
- Web publishing 1
- Web sites 1
- World Wide Web 1
- design 1
- examinations 1
- study and teaching 1
-
1
-
2
MCSA guide to installing and configuring Microsoft Windows Server 2012/R2, exam 70-410
Published 2015Table of Contents: “…Introductory Windows Server 2012/R2 --Installing Windows Server 2012/R2 -- Local and remote server management -- Configuring server storage -- File and printer services -- Introductory active directory -- Managing OUs and active directory accounts -- Configuring group policies -- Configuring TCP/IP -- Configuring DNS -- Configuring dynamic host configuration protocol -- Configuring virtualization with Hyper-V -- MCSA exam 70-410 objectives…”
Book -
3
MCSA guide to configuring advanced Microsoft Windows server 2012/R2 services, exam 70-412
Published 2016Table of Contents: “…Advanced DHCP and DNS Configuration -- 4. Configuring Advanced File and Storage Solutions -- 5. …”
Book -
4
-
5
Microsoft Windows 7 unleashed
Published 2010Table of Contents: “…Customizing Windows Explorer -- Customizing Internet Explorer -- Customizing the file system -- Customizing startup and shutdown -- Customizing the start menu and taskbar -- Tuning Windows 7's performance -- Maintaining your Windows 7 system -- Controlling Windows 7 with control panel -- Policing Windows 7 with group policies -- Configuring the Microsoft management console -- Controlling services -- Tweaking the Windows 7 registry -- Controlling Windows 7 from the command line -- Securing Windows 7 -- Configuring Internet Explorer security -- Implementing email security -- Securing the file system -- Setting up user security -- Implementing network security -- Tightening wireless network security -- Troubleshooting and recovering from problems -- Troubleshooting devices -- Troubleshooting startup -- Troubleshooting networking -- Setting up a small network -- Accessing and using your network -- Making remote network connections -- Turning Windows 7 into a web server -- Adding Macs to your Windows 7 network -- Scripting Windows 7 with WSH -- Scripting Windows with PowerShell -- Windows 7 keyboard shortcuts -- Understanding TCP/IP…”
Book -
6
SCO companion the essential guide for users and system administrators
Published 1996Table of Contents: “…The Operating System and Its Environment -- 6. Filesystems and Files -- 7. Starting and Stopping the System -- 8. …”
Book -
7
-
8
MCSA guide to administering Microsoft Windows Server 2012/R2, Exam 70-411
Published 2015Table of Contents: “…Deploying Windows Server -- Windows Server Update Services -- Advanced File Services Configuration -- Server Monitoring and Auditing -- Remote Access Configuration -- Network Policy Configuration -- Domain Controller and Active Directory Management -- User and Service Account Configuration -- Group Policy Settings and Preferences -- Managing Group Policies -- Managing and Configuring DNS…”
Book -
9
Windows NT server 4 professional reference
Published 1996Table of Contents: “…Managing User Profiles, Logon Scripts, and Environment Variables -- 9. Managing Network Files and File-System Security -- 10. Managing the Windows NT Registry -- 11. …”
Book -
10
Inside SolidWorks / David Murray
Published 2006Table of Contents: “…A SolidWorks Overview -- Getting Started -- Basic Features -- Castings -- Turned Parts -- Molded Parts -- Patterns -- Model Appearance -- Sheet Metal -- Springs, Threads, and Curves -- Part Configurations -- Detailed Design Drawings -- Assemblies -- Core and Cavity -- Weldments -- Assembly Configurations -- Design Tables -- Equations -- Advanced Assembly Modeling -- Advanced Features -- Surfaces -- Engraving and Embossing -- Importing and Exporting Files -- Working With Imported Geometry -- Analyzing Geometry -- Customization…”
Book -
11
Web security a whitehat perspective
Published 2015Table of Contents: “…Application on the server side-- HTML5 securities -- Injection attacks -- File upload vulnerability -- Authentication and session management -- Access control -- Encryption algorithm and random numbers -- Web framework security -- Application-layer denial-of-service attacks -- PHP security -- Web server configuration security -- Section 4. …”
Book -
12
-
13
Computer networks and internets
Published 1997Table of Contents: “…Ch. 1 Introduction -- lCh. 2 Transmission Media -- Ch. 3 Local Asynchronous Communication (RS-232) -- Ch. 4 Long-Distance Communication (Carriers And Modems) -- Ch. 5 Packets, Frames, And Error Detection -- Ch. 6 LAN Technologies And Network Topology -- Ch. 7 Hardware Addressing And Frame Type Identification -- Ch. 8 LAN Writing, Physical Topology, And Interface Hardware -- Ch. 9 Extending LANs: Fiber Modems, Repeaters, Bridges, and Switches -- lCh. 10 WAN Technologies And Routing -- Ch. 11 Network Ownership, Service Paradigm, And Performance -- Ch. 12 Protocols And Layering -- Ch. 13 Internetworking: Concepts, Architecture, and Protocols -- Ch. 14 IP: Internet Protocol Addresses -- Ch. 15 Binding Protocol Addresses (ARP) -- Ch. 16 IP Datagrams and Datagram Forwarding -- Ch. 17 IP Encapsulation, Fragmentation, And Reassembly -- Ch. 18 The Future IP (IPv6) -- Ch. 19 An Error Reporting Mechanism (ICMP) -- Ch. 20 TCP: Reliable Transport Service -- Ch. 21 Client-Server Interaction -- Ch. 22 The Socket Interface -- Ch. 23 Example Of A Client And A Server -- Ch. 24 Naming With The Domain Name System -- Ch. 25 Electronic Mail Representation And -- Ch. 26 File Transfer And Remote File Access -- Ch. 27 World Wide Web Pages And Browsing --Ch. 28 Technology For Dynamic Web Documents -- Ch. 29 ava Technology For Active Web Document -- Ch. 30 Network Management (SNMP) -- Ch. 31 Network Security -- Ch. 32 Initialization (Configuration).…”
Book -
14
Information security and IT risk management
Published 2014Table of Contents: “…Maxx -- Chapter review questions -- Example case questions -- Hands-on Activity -- Linux system installation -- Critical thinking exercise -- Google executives sentenced to prison over video -- Design case -- ch. 3 System Administration (Part 2) -- Overview -- Operating system structure -- The command-line interface -- Files and directories -- Moving around the filesystem -- pwd, cd -- Listing files and directories -- Shell expansions -- File management -- Viewing files -- Searching for files -- Access control and user management -- Access control lists -- File ownership -- Editing files -- Software installation and updates -- Account management -- Command-line user administration -- Example case -- Northwest Florida State College -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- basic Linux system administration -- Critical thinking exercise -- offensive cyber effects operations (OCEO) -- Design Case -- ch. 4 The Basic Information Security Model -- Overview -- Introduction -- Components of the basic information security model -- Common vulnerabilities, threats, and controls -- Example case -- ILOVEYOU virus -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- web server security -- Critical thinking exercise -- the internet, "American values," and security -- Design case -- ch. 5 Asset Identification and Characterization -- Overview -- Assets overview -- Determining assets that are important to the organization -- Asset types -- Asset characterization -- IT asset life cycle and asset identification -- System profiling -- Asset ownership and operational responsibilities -- Example case -- Stuxnet -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- course asset identification -- Critical thinking exercise -- uses of a hacked PC -- Design case -- ch. 6 Threats and Vulnerabilities -- Overview -- Introduction -- Threat models -- Threat agent -- Threat action -- Vulnerabilities -- Example case -- Gozi -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- Vulnerability scanning -- Critical thinking exercise -- Iraq cyberwar plans in 2003 -- Design case -- ch. 7 Encryption Controls -- Overview -- Introduction -- Encryption basics -- Encryption types overview -- Encryption types details -- Encryption in use -- Example case -- Nation technologies -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- encryption -- Critical thinking exercise -- encryption keys embed business models -- Design case -- ch. 8 Identity and Access Management -- Overview -- Identity management -- Access management -- Authentication -- Single sign-on -- Federation -- Example case -- Markus Hess -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- identity match and merge -- Critical thinking exercise -- feudalism the security solution for the internet? …”
Book -
15


