ExamInsight For MCP / MCSE Certification : (Record no. 90644)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 09006nam a22004693i 4500 |
001 - CONTROL NUMBER | |
control field | EBC3410569 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | MiAaPQ |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240729125549.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240724s2003 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781590956076 |
Qualifying information | (electronic bk.) |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (MiAaPQ)EBC3410569 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Au-PeEL)EBL3410569 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaPaEBR)ebr10077718 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)70732249 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MiAaPQ |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | MiAaPQ |
Modifying agency | MiAaPQ |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.3.S5678 2003 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Simpson, Patrick. |
245 10 - TITLE STATEMENT | |
Title | ExamInsight For MCP / MCSE Certification : |
Remainder of title | Security for a Microsoft Windows 2000 Network Exam 70-220. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Friendswood : |
Name of producer, publisher, distributor, manufacturer | TotalRecall Publications, |
Date of production, publication, distribution, manufacture, or copyright notice | 2003. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | ©2003. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (310 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Intro -- Table of Contents -- ExamInsight For Exam 70-220 -- About the Author -- About the Contributing Author -- About The Book -- Introduction -- Forward -- 70-220 Exam Specifications -- Networking Terminology -- Chapter 1: Analyzing Business Requirements -- I Introduction -- -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Analyzing the business models -- The Company Model and Geographical Scope: -- Regional Model: -- National Model: -- International Model: -- Subsidiaries: -- Branch Offices: -- Pop quiz 1.1 -- IIIAnalyzing the Company Process -- Information Flow Process: -- Communication Flow Process: -- The Product Life-Cycle Process: -- Decision Making Process: -- Pop Quiz 1.2 -- IV Analyze Organizational Structures -- Management Model: -- Company Organization: -- Vendors/Partners/Customer Relations: -- Acquisition Plans: -- Pop Quiz 1.3 -- V Analyzing Company Strategies -- Company Priorities: -- Company Projected Growth and Growth Strategy: -- Relevant Laws and Regulations: -- The Company's Tolerance for Risk: -- Total Cost of Operations: -- Pop quiz 1.4 -- VI Business and Security Requirements -- Business Requirements for the End User: -- Security Requirements for the End User: -- Pop quiz 1.5 -- VII Analyze the Structure of IT Management -- Centralized Administration: -- Decentralized Administration: -- The Funding Model: -- Outsourcing: -- The Decision Making Process: -- The Change Management Process: -- Pop quiz 1.6 -- VIII Analyzing the Companies Current Model -- Physical Model: -- Information Security Model: -- IX Analyze Security Risks -- -- Pop Quiz 1.7 -- X Chapter 1: Summary -- XI Chapter 1: Post-Assessment (Answers appear in Appendix A.) -- Chapter 2: Analyzing Technical Requirements -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | II Evaluate Company Technical Environment -- Company Size, User, and Resource Distribution: -- Geographic Work Sites and Remote Sites Connectivity: -- Net Available Bandwidth: -- Performance Requirements: -- Methods for Accessing Data and Systems: -- Network Roles and Responsibilities: -- Administrative Network Roles and Responsibilities -- User Network Roles and Responsibilities -- Service Network Roles and Responsibilities -- Resource Ownership Network Roles and Responsibilities -- Application Network Roles -- Pop Quiz 2.1 -- III Analyze the Security Design -- Systems And Applications: -- Planned Upgrades and Rollouts: -- Technical Support Structure: -- Planned Network and Systems Management: -- Pop Quiz 2.2 -- VI Chapter 2: Summary -- V Chapter 2: Post-Assessment (Answers appear in Appendix A.) -- Chapter 3: Analyzing Security Requirements -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design a Security Baseline -- Domain Controllers: -- Operations Masters: -- Application Servers: -- File and Print Servers: -- RAS Servers: -- Desktop Computers: -- Portable Computers: -- Kiosks: -- Pop Quiz 3.1 -- III Identify Resource Security -- Printers: -- Files: -- Shares: -- Internet Access: -- Dial-in Access: -- Pop Quiz 3.1 -- VI Chapter 3: Summary -- V Chapter 3: Post-Assessment (Answers appear in Appendix A.) -- Chapter 4: Designing a Security Solution -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design an Audit Policy -- What is an Audit Policy: -- Where to start: -- Things to Audit: -- Pop Quiz 4.1 -- III Design a Delegation of Authority Strategy -- What is an Authority Strategy: -- How do I start the design: -- Suggested Authority Strategies: -- Pop Quiz 4.2 -- IV Designing Security Policies -- What is a Security Policy:. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Where do I start the Design: -- Security policies for Sites: -- Security Policies for Domains: -- Security Policies for Organizational Units: -- Pop Quiz 4.3 -- V Design an Authentication Strategy -- What are the authentication methods: -- Certification Based Authentication Method: -- Kerberos Authentication Method: -- Clear Text Passwords Method: -- Digest Authentication Method: -- Smart Card Authentication Method: -- NTLM Authentication Method: -- RADIUS Authentication Method: -- SSL Authentication Method: -- TLS (Transport Layer Security): -- Pop Quiz 4.4 -- VI Design a Security Group Strategy -- Designing a Security Group: -- Security Group: -- Manage Security Group: -- Integrate Security Group with other Domains: -- Pop Quiz 4.5 -- VII Design a Public Key Infrastructure -- Where do I Start: -- Certificate Authority (CA) Hierarchies: -- Certificate Server Roles: -- Manage Certificates: -- Integrating with Third-Party CAs: -- Map Certificates: -- Pop Quiz 4.6 -- VIII Windows 2000 Network Services Security -- Where to Start the Design: -- Windows 2000 DNS Security Designs: -- Windows 2000 Remote Installation Services (RIS) Security Design: -- Windows 2000 SNMP Security Design: -- Windows Terminal Server Security Designs: -- Pop Quiz 4.7 -- IX Chapter 4: Summary -- X Chapter 4: Post-Assessment (Answers appear in Appendix A.) -- Chapter 5: Designing Security Access Between Networks -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Secure Access to Public and Private Networks -- What is a Public Network: -- What is a Private Network: -- Difference between Public and Private Networks: -- Pop Quiz 5.1 -- III Provide External Users with Secure Access -- Who is an External User: -- Secure Access: -- IV Secure Access Between Private Networks -- Secure Access within a LAN: -- Secure Access within a WAN:. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Secure Access across a Public Network: -- Pop Quiz 5.2 -- V Chapter 5: Summary -- VI Chapter 5: Post-Assessment (Answers appear in Appendix A.) -- Chapter 6: Designing Security Communication Channels -- I Introduction -- Information: -- -- Getting Ready - Questions -- Getting Ready - Answers -- II Design an SMB-Signing Solution -- SMB Signing Solution: -- Pop Quiz 6.1 -- III Design an IPSec Solution -- The IPSec Encryption Scheme: -- The IPSec Management Strategy Design: -- Negotiation Policies: -- Security Policies: -- IP Filters: -- Security Levels: -- Pop Quiz 6.2 -- IV Chapter 6: Summary -- V Chapter 6: Post-Assessment (Answers appear in Appendix A.) -- Chapter 7: Scenario Concepts with Practice Questions -- I Introduction -- II BFQ - Supreme Division -- III BFQ - ExGovern Division -- IV BFQ - ProTax Division -- V BFQ - Excel Division -- VI BFQ - ABC Toys Division -- VII BFQ - MediAssociate -- VIIIBFQ - Kellok Division -- IX Chapter 7: Summary -- Appendix A -- Chapter 1: Answers -- Chapter 2: Answers -- Chapter 3: Answers -- Chapter 4: Answers -- Chapter 5: Answers -- Chapter 6: Answers -- Chapter 7: Answers -- Chapter 7: Scenario II: BFQ - Supreme Division -- Chapter 7: Scenario III: BFQ - ExGovern Division -- Chapter 7: Scenario IV: BFQ - ProTax Division -- Chapter 7: Scenario V: BFQ - Excel Division -- Chapter 7: Scenario VI: BFQ - ABC Toys Division -- Chapter 7: Scenario VII: BFQ - MediAssociate -- Chapter 7: Scenario VIII: BFQ - Kellok Division -- Index -- Money Back Book Guarantee -- Microsoft 70-220 Practice Exam Offer. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on publisher supplied metadata and other sources. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Microsoft Windows (Computer file). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Electronic data processing personnel -- Certification. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Microsoft software -- Examinations -- Study guides. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks -- Examinations -- Study guides. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Simpson, Patrick |
Title | ExamInsight For MCP / MCSE Certification |
Place, publisher, and date of publication | Friendswood : TotalRecall Publications,c2003 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) | |
Corporate name or jurisdiction name as entry element | ProQuest (Firm) |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=3410569">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=3410569</a> |
Public note | Click to View |
No items available.