Search Results - configuration file

  • Showing 1 - 15 results of 15
Refine Results
  1. 1
  2. 2

    MCSA guide to installing and configuring Microsoft Windows Server 2012/R2, exam 70-410 by Tomsho, Greg

    Published 2015
    Table of Contents: “…Introductory Windows Server 2012/R2 --Installing Windows Server 2012/R2 -- Local and remote server management -- Configuring server storage -- File and printer services -- Introductory active directory -- Managing OUs and active directory accounts -- Configuring group policies -- Configuring TCP/IP -- Configuring DNS -- Configuring dynamic host configuration protocol -- Configuring virtualization with Hyper-V -- MCSA exam 70-410 objectives…”
    Book
  3. 3

    MCSA guide to configuring advanced Microsoft Windows server 2012/R2 services, exam 70-412 by Tomsho, Greg

    Published 2016
    Table of Contents: “…Advanced DHCP and DNS Configuration -- 4. Configuring Advanced File and Storage Solutions -- 5. …”
    Book
  4. 4

    SAMS teach yourself Windows XP in 21 days by Mueller, John 1958-

    Published 2002
    Book
  5. 5

    Microsoft Windows 7 unleashed by McFedries, Paul

    Published 2010
    Table of Contents: “…Customizing Windows Explorer -- Customizing Internet Explorer -- Customizing the file system -- Customizing startup and shutdown -- Customizing the start menu and taskbar -- Tuning Windows 7's performance -- Maintaining your Windows 7 system -- Controlling Windows 7 with control panel -- Policing Windows 7 with group policies -- Configuring the Microsoft management console -- Controlling services -- Tweaking the Windows 7 registry -- Controlling Windows 7 from the command line -- Securing Windows 7 -- Configuring Internet Explorer security -- Implementing email security -- Securing the file system -- Setting up user security -- Implementing network security -- Tightening wireless network security -- Troubleshooting and recovering from problems -- Troubleshooting devices -- Troubleshooting startup -- Troubleshooting networking -- Setting up a small network -- Accessing and using your network -- Making remote network connections -- Turning Windows 7 into a web server -- Adding Macs to your Windows 7 network -- Scripting Windows 7 with WSH -- Scripting Windows with PowerShell -- Windows 7 keyboard shortcuts -- Understanding TCP/IP…”
    Book
  6. 6

    SCO companion the essential guide for users and system administrators by Mohr, James

    Published 1996
    Table of Contents: “…The Operating System and Its Environment -- 6. Filesystems and Files -- 7. Starting and Stopping the System -- 8. …”
    Book
  7. 7

    Dreamweaver UltraDev 4 the complete reference by West, Ray

    Published 2001
    Book
  8. 8

    MCSA guide to administering Microsoft Windows Server 2012/R2, Exam 70-411 by Tomsho, Greg

    Published 2015
    Table of Contents: “…Deploying Windows Server -- Windows Server Update Services -- Advanced File Services Configuration -- Server Monitoring and Auditing -- Remote Access Configuration -- Network Policy Configuration -- Domain Controller and Active Directory Management -- User and Service Account Configuration -- Group Policy Settings and Preferences -- Managing Group Policies -- Managing and Configuring DNS…”
    Book
  9. 9

    Windows NT server 4 professional reference by Siyan, Karanjit

    Published 1996
    Table of Contents: “…Managing User Profiles, Logon Scripts, and Environment Variables -- 9. Managing Network Files and File-System Security -- 10. Managing the Windows NT Registry -- 11. …”
    Book
  10. 10

    Inside SolidWorks / David Murray by Murray, David 1962-

    Published 2006
    Table of Contents: “…A SolidWorks Overview -- Getting Started -- Basic Features -- Castings -- Turned Parts -- Molded Parts -- Patterns -- Model Appearance -- Sheet Metal -- Springs, Threads, and Curves -- Part Configurations -- Detailed Design Drawings -- Assemblies -- Core and Cavity -- Weldments -- Assembly Configurations -- Design Tables -- Equations -- Advanced Assembly Modeling -- Advanced Features -- Surfaces -- Engraving and Embossing -- Importing and Exporting Files -- Working With Imported Geometry -- Analyzing Geometry -- Customization…”
    Book
  11. 11

    Web security a whitehat perspective by Hanqing, Wu, Zhao, Liz

    Published 2015
    Table of Contents: “…Application on the server side-- HTML5 securities -- Injection attacks -- File upload vulnerability -- Authentication and session management -- Access control -- Encryption algorithm and random numbers -- Web framework security -- Application-layer denial-of-service attacks -- PHP security -- Web server configuration security -- Section 4. …”
    Book
  12. 12

    Anti-hacker tool kit by Shema, Mike

    Published 2014
    Book
  13. 13

    Computer networks and internets by Comer, Douglas E.

    Published 1997
    Table of Contents: “…Ch. 1 Introduction -- lCh. 2 Transmission Media -- Ch. 3 Local Asynchronous Communication (RS-232) -- Ch. 4 Long-Distance Communication (Carriers And Modems) -- Ch. 5 Packets, Frames, And Error Detection -- Ch. 6 LAN Technologies And Network Topology -- Ch. 7 Hardware Addressing And Frame Type Identification -- Ch. 8 LAN Writing, Physical Topology, And Interface Hardware -- Ch. 9 Extending LANs: Fiber Modems, Repeaters, Bridges, and Switches -- lCh. 10 WAN Technologies And Routing -- Ch. 11 Network Ownership, Service Paradigm, And Performance -- Ch. 12 Protocols And Layering -- Ch. 13 Internetworking: Concepts, Architecture, and Protocols -- Ch. 14 IP: Internet Protocol Addresses -- Ch. 15 Binding Protocol Addresses (ARP) -- Ch. 16 IP Datagrams and Datagram Forwarding -- Ch. 17 IP Encapsulation, Fragmentation, And Reassembly -- Ch. 18 The Future IP (IPv6) -- Ch. 19 An Error Reporting Mechanism (ICMP) -- Ch. 20 TCP: Reliable Transport Service -- Ch. 21 Client-Server Interaction -- Ch. 22 The Socket Interface -- Ch. 23 Example Of A Client And A Server -- Ch. 24 Naming With The Domain Name System -- Ch. 25 Electronic Mail Representation And -- Ch. 26 File Transfer And Remote File Access -- Ch. 27 World Wide Web Pages And Browsing --Ch. 28 Technology For Dynamic Web Documents -- Ch. 29œ ava Technology For Active Web Document -- Ch. 30 Network Management (SNMP) -- Ch. 31 Network Security -- Ch. 32 Initialization (Configuration).…”
    Book
  14. 14

    Information security and IT risk management by Agrawal, Manish

    Published 2014
    Table of Contents: “…Maxx -- Chapter review questions -- Example case questions -- Hands-on Activity -- Linux system installation -- Critical thinking exercise -- Google executives sentenced to prison over video -- Design case -- ch. 3 System Administration (Part 2) -- Overview -- Operating system structure -- The command-line interface -- Files and directories -- Moving around the filesystem -- pwd, cd -- Listing files and directories -- Shell expansions -- File management -- Viewing files -- Searching for files -- Access control and user management -- Access control lists -- File ownership -- Editing files -- Software installation and updates -- Account management -- Command-line user administration -- Example case -- Northwest Florida State College -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- basic Linux system administration -- Critical thinking exercise -- offensive cyber effects operations (OCEO) -- Design Case -- ch. 4 The Basic Information Security Model -- Overview -- Introduction -- Components of the basic information security model -- Common vulnerabilities, threats, and controls -- Example case -- ILOVEYOU virus -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- web server security -- Critical thinking exercise -- the internet, "American values," and security -- Design case -- ch. 5 Asset Identification and Characterization -- Overview -- Assets overview -- Determining assets that are important to the organization -- Asset types -- Asset characterization -- IT asset life cycle and asset identification -- System profiling -- Asset ownership and operational responsibilities -- Example case -- Stuxnet -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- course asset identification -- Critical thinking exercise -- uses of a hacked PC -- Design case -- ch. 6 Threats and Vulnerabilities -- Overview -- Introduction -- Threat models -- Threat agent -- Threat action -- Vulnerabilities -- Example case -- Gozi -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- Vulnerability scanning -- Critical thinking exercise -- Iraq cyberwar plans in 2003 -- Design case -- ch. 7 Encryption Controls -- Overview -- Introduction -- Encryption basics -- Encryption types overview -- Encryption types details -- Encryption in use -- Example case -- Nation technologies -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- encryption -- Critical thinking exercise -- encryption keys embed business models -- Design case -- ch. 8 Identity and Access Management -- Overview -- Identity management -- Access management -- Authentication -- Single sign-on -- Federation -- Example case -- Markus Hess -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- identity match and merge -- Critical thinking exercise -- feudalism the security solution for the internet? …”
    Book
  15. 15

    Chister for high availability a primer of HP-UX solution by Weygant, Peter

    Published 1996
    Book