My Account Log in

2 options

MCSE implementing and administering security in a Windows 2000 network study guide & DVD training system / Will Schmied, Robert J. Shimonski.

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online
Format:
Book
Author/Creator:
Schmied, Will.
Contributor:
Schinder, Thomas W.
Piltzecker, Tony, 1975-
Language:
English
Subjects (All):
Electronic data processing personnel--Certification.
Electronic data processing personnel.
Microsoft software--Examinations--Study guides.
Microsoft software.
Physical Description:
1 online resource (865 p.)
Edition:
1st ed.
Place of Publication:
Rockland, Mass. : Syngress, c2003.
Language Note:
English
Summary:
This book covers Exam 200-14 in great detail, digging into some of the most important details involved in locking down Windows systems and networks and taking a systemic approach to keeping Windows networks and systems secured.Boasting a one-of-a-kind integration of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation, this study guide & DVD training system gives students 100% coverage of official Microsoft MCSA exam objectives plus realistic test prep.The System package consists of:1) MCSE Implementing and Administering Security in a Windows 200
Contents:
Cover; MCSE/MCSA 70-214 Exam Objectives Map; Table of Contents; Chapter 1 Basic Windows 2000 Security: Using Security Templates; Chapter 2 Advanced Security Template and Group Policy Issues; Chapter 3 Identifying, Installing, and Troubleshooting Required Updates; Chapter 4 Installing, Configuring, & Managing Windows 2000 Certificate Authorities; Chapter 5 Managing and Troubleshooting the Encrypting File System; Chapter 6 Configuring and Troubleshooting Windows IP Security; Chapter 7 Implementing Secure Wireless Networks; Chapter 8 Configuring Secure Network and Internet Authentication Methods
Chapter 9 Configuring and Troubleshooting Remote Access and VPN AuthenticationChapter 10 Configuring and Using Auditing and the Event Logs; Appendix A Utilities for the White Hat; Appendix B Port Numbers and Associated Attacks; Appendix C Self Test Questions, Answers, and Explanations; Index
Notes:
Dr. Thomas W. Shinder and Tony Piltzecker, technical editors.
ISBN:
1-281-05612-X
9786611056124
0-08-047931-6
OCLC:
808614828

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account