ORPP logo

ExamInsight For MCP / MCSE Certification : (Record no. 90644)

MARC details
000 -LEADER
fixed length control field 09006nam a22004693i 4500
001 - CONTROL NUMBER
control field EBC3410569
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240729125549.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240724s2003 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781590956076
Qualifying information (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC3410569
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL3410569
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr10077718
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)70732249
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.3.S5678 2003
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Simpson, Patrick.
245 10 - TITLE STATEMENT
Title ExamInsight For MCP / MCSE Certification :
Remainder of title Security for a Microsoft Windows 2000 Network Exam 70-220.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Friendswood :
Name of producer, publisher, distributor, manufacturer TotalRecall Publications,
Date of production, publication, distribution, manufacture, or copyright notice 2003.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2003.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (310 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Intro -- Table of Contents -- ExamInsight For Exam 70-220 -- About the Author -- About the Contributing Author -- About The Book -- Introduction -- Forward -- 70-220 Exam Specifications -- Networking Terminology -- Chapter 1: Analyzing Business Requirements -- I Introduction -- -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Analyzing the business models -- The Company Model and Geographical Scope: -- Regional Model: -- National Model: -- International Model: -- Subsidiaries: -- Branch Offices: -- Pop quiz 1.1 -- IIIAnalyzing the Company Process -- Information Flow Process: -- Communication Flow Process: -- The Product Life-Cycle Process: -- Decision Making Process: -- Pop Quiz 1.2 -- IV Analyze Organizational Structures -- Management Model: -- Company Organization: -- Vendors/Partners/Customer Relations: -- Acquisition Plans: -- Pop Quiz 1.3 -- V Analyzing Company Strategies -- Company Priorities: -- Company Projected Growth and Growth Strategy: -- Relevant Laws and Regulations: -- The Company's Tolerance for Risk: -- Total Cost of Operations: -- Pop quiz 1.4 -- VI Business and Security Requirements -- Business Requirements for the End User: -- Security Requirements for the End User: -- Pop quiz 1.5 -- VII Analyze the Structure of IT Management -- Centralized Administration: -- Decentralized Administration: -- The Funding Model: -- Outsourcing: -- The Decision Making Process: -- The Change Management Process: -- Pop quiz 1.6 -- VIII Analyzing the Companies Current Model -- Physical Model: -- Information Security Model: -- IX Analyze Security Risks -- -- Pop Quiz 1.7 -- X Chapter 1: Summary -- XI Chapter 1: Post-Assessment (Answers appear in Appendix A.) -- Chapter 2: Analyzing Technical Requirements -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note II Evaluate Company Technical Environment -- Company Size, User, and Resource Distribution: -- Geographic Work Sites and Remote Sites Connectivity: -- Net Available Bandwidth: -- Performance Requirements: -- Methods for Accessing Data and Systems: -- Network Roles and Responsibilities: -- Administrative Network Roles and Responsibilities -- User Network Roles and Responsibilities -- Service Network Roles and Responsibilities -- Resource Ownership Network Roles and Responsibilities -- Application Network Roles -- Pop Quiz 2.1 -- III Analyze the Security Design -- Systems And Applications: -- Planned Upgrades and Rollouts: -- Technical Support Structure: -- Planned Network and Systems Management: -- Pop Quiz 2.2 -- VI Chapter 2: Summary -- V Chapter 2: Post-Assessment (Answers appear in Appendix A.) -- Chapter 3: Analyzing Security Requirements -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design a Security Baseline -- Domain Controllers: -- Operations Masters: -- Application Servers: -- File and Print Servers: -- RAS Servers: -- Desktop Computers: -- Portable Computers: -- Kiosks: -- Pop Quiz 3.1 -- III Identify Resource Security -- Printers: -- Files: -- Shares: -- Internet Access: -- Dial-in Access: -- Pop Quiz 3.1 -- VI Chapter 3: Summary -- V Chapter 3: Post-Assessment (Answers appear in Appendix A.) -- Chapter 4: Designing a Security Solution -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design an Audit Policy -- What is an Audit Policy: -- Where to start: -- Things to Audit: -- Pop Quiz 4.1 -- III Design a Delegation of Authority Strategy -- What is an Authority Strategy: -- How do I start the design: -- Suggested Authority Strategies: -- Pop Quiz 4.2 -- IV Designing Security Policies -- What is a Security Policy:.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Where do I start the Design: -- Security policies for Sites: -- Security Policies for Domains: -- Security Policies for Organizational Units: -- Pop Quiz 4.3 -- V Design an Authentication Strategy -- What are the authentication methods: -- Certification Based Authentication Method: -- Kerberos Authentication Method: -- Clear Text Passwords Method: -- Digest Authentication Method: -- Smart Card Authentication Method: -- NTLM Authentication Method: -- RADIUS Authentication Method: -- SSL Authentication Method: -- TLS (Transport Layer Security): -- Pop Quiz 4.4 -- VI Design a Security Group Strategy -- Designing a Security Group: -- Security Group: -- Manage Security Group: -- Integrate Security Group with other Domains: -- Pop Quiz 4.5 -- VII Design a Public Key Infrastructure -- Where do I Start: -- Certificate Authority (CA) Hierarchies: -- Certificate Server Roles: -- Manage Certificates: -- Integrating with Third-Party CAs: -- Map Certificates: -- Pop Quiz 4.6 -- VIII Windows 2000 Network Services Security -- Where to Start the Design: -- Windows 2000 DNS Security Designs: -- Windows 2000 Remote Installation Services (RIS) Security Design: -- Windows 2000 SNMP Security Design: -- Windows Terminal Server Security Designs: -- Pop Quiz 4.7 -- IX Chapter 4: Summary -- X Chapter 4: Post-Assessment (Answers appear in Appendix A.) -- Chapter 5: Designing Security Access Between Networks -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Secure Access to Public and Private Networks -- What is a Public Network: -- What is a Private Network: -- Difference between Public and Private Networks: -- Pop Quiz 5.1 -- III Provide External Users with Secure Access -- Who is an External User: -- Secure Access: -- IV Secure Access Between Private Networks -- Secure Access within a LAN: -- Secure Access within a WAN:.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Secure Access across a Public Network: -- Pop Quiz 5.2 -- V Chapter 5: Summary -- VI Chapter 5: Post-Assessment (Answers appear in Appendix A.) -- Chapter 6: Designing Security Communication Channels -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design an SMB-Signing Solution -- SMB Signing Solution: -- Pop Quiz 6.1 -- III Design an IPSec Solution -- The IPSec Encryption Scheme: -- The IPSec Management Strategy Design: -- Negotiation Policies: -- Security Policies: -- IP Filters: -- Security Levels: -- Pop Quiz 6.2 -- IV Chapter 6: Summary -- V Chapter 6: Post-Assessment (Answers appear in Appendix A.) -- Chapter 7: Scenario Concepts with Practice Questions -- I Introduction -- II BFQ - Supreme Division -- III BFQ - ExGovern Division -- IV BFQ - ProTax Division -- V BFQ - Excel Division -- VI BFQ - ABC Toys Division -- VII BFQ - MediAssociate -- VIIIBFQ - Kellok Division -- IX Chapter 7: Summary -- Appendix A -- Chapter 1: Answers -- Chapter 2: Answers -- Chapter 3: Answers -- Chapter 4: Answers -- Chapter 5: Answers -- Chapter 6: Answers -- Chapter 7: Answers -- Chapter 7: Scenario II: BFQ - Supreme Division -- Chapter 7: Scenario III: BFQ - ExGovern Division -- Chapter 7: Scenario IV: BFQ - ProTax Division -- Chapter 7: Scenario V: BFQ - Excel Division -- Chapter 7: Scenario VI: BFQ - ABC Toys Division -- Chapter 7: Scenario VII: BFQ - MediAssociate -- Chapter 7: Scenario VIII: BFQ - Kellok Division -- Index -- Money Back Book Guarantee -- Microsoft 70-220 Practice Exam Offer.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Microsoft Windows (Computer file).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic data processing personnel -- Certification.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Microsoft software -- Examinations -- Study guides.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks -- Examinations -- Study guides.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Simpson, Patrick
Title ExamInsight For MCP / MCSE Certification
Place, publisher, and date of publication Friendswood : TotalRecall Publications,c2003
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=3410569">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=3410569</a>
Public note Click to View

No items available.

© 2024 Resource Centre. All rights reserved.