Networking for Dummies

Networking for Dummies 421 Pages Book for Free

Introduction Networking for Dummies this book has 421 pages and its completely free. Books written by Doug Lowe  – A Wiley Brand.  11th Edition.

Download Now

Part 1: Getting Started with Networking. 5

CHAPTER 1: Let’s Network!. 7
CHAPTER 2: Life on the Network. 19
CHAPTER 3: More Ways to Use Your Network . 39

Part 2: Setting Up a Network. 55

CHAPTER 4: Planning a Network. 57
CHAPTER 5: Dealing with TCP/IP. 69
CHAPTER 6: Oh, What a Tangled Web We Weave: Cables, Switches, and Routers. 95
CHAPTER 7: Configuring Windows Clients. 113
CHAPTER 8: Connecting Your Network to the Internet. 123
CHAPTER 9: Setting Up a Wireless Network. .131
CHAPTER 10: Virtual Networking. 151

Part 3: Working with Servers. 177

CHAPTER 11: Setting Up a Server. 179
CHAPTER 12: Managing Windows User Accounts. 191
CHAPTER 13: Managing Network Storage . 207
CHAPTER 14: Managing Exchange Server 2016. 223
CHAPTER 15: Creating an Intranet. 237

Part 4: Managing and Protecting Your Network. 251

CHAPTER 16: Welcome to Network Management . 253
CHAPTER 17: Solving Network Problems. 263
CHAPTER 18: Backing Up Your Data . 281
CHAPTER 19: Securing Your Network. 295
CHAPTER 20: Hardening Your Network . 311
CHAPTER 21: Network Performance Anxiety . 323

Part 5: More Ways to Network. 335

CHAPTER 22: Life in Cloud City. 337
CHAPTER 23: Managing Mobile Devices. 347
CHAPTER 24: Connecting from Home. 361
0002724121.INDD iv April 27, 2016 5:00 AM

Part 6: Networking Beyond Windows. 369

CHAPTER 25: Networking with Linux. 371
CHAPTER 26: Mac Networking. 393

Part 7: The Part of Tens. 403

CHAPTER 27: Ten Networking Commandments. 405
CHAPTER 28: Ten Big Network Mistakes. 409
CHAPTER 29: Ten Things You Should Keep in Your Closet . 417

Index. 421

Networking for Dummies

Download Free Book Now

Advertisements

Cryptography involves encryption and decryption to safeguard data

Cryptography involves encryption and decryption to safeguard data

  • There are two types of threats internal and external
  • Cryptography involves encrypton and decryption to safeguard data
  • Digital signatures involve the use of private and public keys
  • Authentication involves verification before starting communication
  • Encryption refers to conversion of plain text into cipher text
  • Decryption means converting the cipher text back to plain text
  • Firewall blocks unwanted and unathorized access to system resources
  • Demilitarized zone is usally present between the firewall and internet
  • VLAN is a switched network logically segmented on an organizational basis
  • RAID uses different techniques of using multiple drives for data protection
  • Network Attached Storage is used to implement a file sharing server
  • SAN is used to transfer data between storage devices and computers
  • Tape backup is essential in case of hrdware or server crash
  • SSL is designed to provide security and compression services to data
  • IPSEC provides security to a packet at the network level
  • PPTP allows secure data transfer from a remote client to a private server
  • Point-to-Point Protocol (PPP) is used for point to access
  • SLIP is used to send IP datagrams between serially connected devices

An application layer solution. It is a connection-oriented service and thus uses TCP ONLY. SSH is primarily used for shell based solutions and ideally won’t be used to protect web browsing sessions and other application services (though it can via port forwarding)
Uses public key cryptography to prove the authenticity of the remote user. SSH can generate an RSA key pair (I believe Diffie-Hellman can also be used). It uses what’s known as a fingerprint which is a snapshot of an individual host’s actual public key (for instance the RSA public portion). The fingerprints are usually 128 bits in length. It is what the user can use to verify that a public key is that of an individual or host. SSH will maintain a list of trusted hosts. The actual data communication is secured using symmetric cryptography such as AES or 3DES, IDEA
The public portion of the key is transmitted to the remote endpoint/server via an out-of-band mechanism. Also a lack of key management
SSH does provide some extensible features. Two of these are port forwarding and secure tunneling. With port forwarding, you can tell the SSH daemon to listen to data communication on a particular port and forward this communication to the encrypted SSH session. This allows you to protect other services as well. In Linux, X11 forwarding takes advantage of this. X11 is used for graphical display of a remote system on your localhost. With port forwarding, SSH can be used to provide an encrypted session for X11