Video training,video training rapidshare.com,video training rapidshare,Video training megaupload,Video training mediafire,free ebook rapidshare,computers books rapidshare,Books rapidshare,Book rapidshare, Book mediafire, video tutorials
GNU/Linux Application Programming (Programming Series) English | Charles River Media | 2005-02-02 | 512 pages | ISBN : 1584503718 | PDF | 2.41MB
Book Description:
The wide range of applications available in GNU/Linux includes not only pure applications, but also tools and utilities for the GNU/Linux environment. GNU/Linux Application Programming takes a holistic approach to teaching developers the ins-and-outs of GNU/Linux programming using APIs, tools, communication, and scripting. Covering a variety of topics related to GNU/Linux application programming, the book is split into six parts: The GNU/Linux Operating System, GNU Tools, Application Development, Advanced Topics (including communication and synchronization and distributed computing), Debugging GNU/Linux Applications, and Scripting. The book introduces programmers to the environment from the lowest layers (kernel, device drivers, modules) to the user layer (applications, libraries, tools), using an evolutionary approach that builds on knowledge to cover the more complex aspects of the operating system. Through a readable, code-based style developers will learn about the relevant topics of file handling, pipes and sockets, processes and POSIX threads, inter-process communication, and other development topics. After working through the text, theyíll have the knowledge base and skills to begin developing applications in the GNU/Linux environment.
VBScript: Programmer's Reference Wrox; New ed.. edition | ISBN: 0764543679 | 840 pages | December 31, 1999 | PDF | 2 Mb
What is this book about? VBScript is one of Microsoft's scripting languages, which can be employed in a variety of ways — from client-side scripting in Internet Explorer to server-side programming in ASP and the new Microsoft Windows Script Host. The language itself has been gradually increasing in power and flexibility, and the newest release, VBScript 5.0 (which comes with IE5.0), represents a huge increase in functionality and effectiveness: * VBScript books now in demand from VB and WSH developers * New version 5.0 now available with substantial changes — this is first book * Proven Programmer's Reference format * Extensive reference to langauge and object models
Secure Data Management in Decentralized Systems (Advances in Information Security) Springer; 1 edition | ISBN: 0387276947 | 462 pages | December 11, 2006 | PDF | 23 Mb
The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security domains has become a must for many business practices. New data services are emerging everyday, which also brings new challenges to protect data security. The internet and the web offer means to collecting and sharing data with unprecedented flexibility and convenience. Secure Data Management in Decentralized Systems identifies and addresses these new challenges. This volume presents a wide range of active areas, closely related to database security by distinguished leaders within this field. Solutions are included.
Secure Data Management in Decentralized Systems is designed for a professional audience composed of practitioners and researchers in industry. This book is suitable for graduate-level students in computer science as well.
Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More Prentice Hall PTR | ISBN:0131488740 | 456 pages | March 22, 2005 | CHM | 6 Mb The Insider's Guide to Building Breakthrough Services with Today'sNew Web Services Platform Using today's new Web services platform, you can build services that are secure, reliable, efficient at handling transactions, and well suited to your evolving service-oriented architecture. What's more, you can do all that without compromising the simplicity or interoperability that made Web services so attractive. Now, for the first time, the experts who helped define and architect this platform show you exactly how to make the most of it.
Unlike other books, Web Services Platform Architecture covers the entire platform. The authors illuminate every specification that's ready for practical use, covering messaging, metadata, security, discovery, quality of service, business-process modeling, and more. Drawing on realistic examples and case studies, they present a powerfully coherent view of how all these specifications fit together—and how to combine them to solve real-world problems Service orientation: Clarifying the business and technical value propositions Web services messaging framework: Using SOAP and WS-Addressing to deliver Web services messages WSDL: Documenting messages and supporting diverse message interactions WS-Policy: Building services that specify their requirements and capabilities, and how to interface with them UDDI: Aggregating metadata and making it easily available WS-MetadataExchange: Bootstrapping efficient, customized communication between Web services WS-Reliable Messaging: Ensuring message delivery across unreliable networks Transactions: Defining reliable interactions with WS-Coordination, WS-AtomicTransaction, and WS-BusinessActivity Security: Understanding the roles of WS-Security, WS-Trust, WS-SecureConversation, and WS-Federation BPEL: Modeling and executing business processes as service compositions
Thomas A. Limoncelli, Christina J. Hogan, «Practice of System and Network Administration, The (2nd Edition)» Addison Wesley | ISBN: 0321492668 | 2007 | PDF | 1056 pages | 5.89 MB
“
The first edition of The Practice of System and Network Administration introduced a generation of system and network administrators to a modern IT methodology. Whether you use Linux, Unix, or Windows, this newly revised edition describes the essential practices previously handed down only from mentor to protégé. This wonderfully lucid, often funny cornucopia of information introduces beginners to advanced frameworks valuable for their entire career, yet is structured to help even the most advanced experts through difficult projects.
Bob Schneider, «Hands-On Microsoft Access: A Practical Guide to Improving Your Access Skills» Addison Wesley | ISBN: 0321245458 | 2005 | CHM | 528 pages | 11.42 MB
“
Go from Access "beginner" to Access "master"! Millions of people use Microsoft Access, but only a small fraction of them are really comfortable with it. If you're ready to go "beyond the wizards"and become a confident, highly effective Access userHands-On Microsoft Access was written for you.
Sams Teach Yourself C in 21 Days, Fifth Edition (5th Edition) Sams | 2000 | ISBN: 0672317664 | 800 pages | PDF | 3 MB
Sams Teach Yourself C in 21 Days, Fifth Edition presents C programming techniques in a logical and easy-to-follow sequence that helps you understand the principles involved in developing C programs. Learn the basics of writing a program, then move on to arrays, pointers, disk input/output, functions, and more. This book covers the basics of C including variables, constants, conditional statements, loops, pointers, data structures, input/output, and functions. Sams Teach Yourself C in 21 Days, Fifth Edition, presents C in the most logical and easy-to-learn sequence, and is geared towards programmers learning the C language.
The Art of C++ McGraw-Hill Osborne Media | 424 Pages | ISBN : 0072255129 | 9780072255126 | 5MB |*.chm
“
Learn how to apply C++ to a wide array of sophisticated applications. In his clear prose, C++ expert and the world’s leading programming author Herb Schildt, shares practical, high-powered applications of C++, revealing some of the most interesting features of the language in the process. “Pure code” subsystems that can be adapted to your own programs, financial calculations, and file utilities are discussed. A C++ interpreter, an AI-based search engine, plus a Web-based example for those programmers who interface C++ with the Internet are also included. With downloadable code offered, this resource has something for every C++ developer.
Steven Heller, Teresa Fernandes, "Becoming a Graphic Designer: A Guide to Careers in Design" Wiley 2005 | ISBN-10: 0471715069 | 368 Pages | PDF | 61,4 MB
Becoming a Graphic Designer, Third Edition is the definitive guide to careers in the graphic design market, with complete coverage of print and electronic media and the evolving digital design disciplines that offer today's most sought-after jobs. This visual guide has more than 650 striking illustrations and features the latest material on interactive design, information design, motion graphics, and more.
Drawing on years of experience in the business, veteran designers Steven Heller and Teresa Fernandes cover everything an aspiring graphic designer needs to know, from educational paths, design specialties, and work settings to preparing an effective portfolio and finding a job. They profile major industries employing graphic designers and explore advertising, corporate, editorial, and other key design disciplines.
The major industries covered here include architecture, interactive design, television and film design, publishing, and more. Dozens of up-front interviews with leading graphic designers let you see how companies, such as Esquire magazine, Sony Music, and Aveda Corporation, hire and work with employees. These inside perspectives offer invaluable real-world insights on what different industries and positions are really like. A resource guide to design publications and organizations also points the way to further information and guidance.
Complete with compact, easy-to-use sections, useful sidebars, and sample design pieces, this outstanding guide is invaluable for anyone interested in launching or developing a career in graphic design.
In fact I could only dream about writing this book while working full time at Microsoft. I had problems finding time to share experiences with other teams working on the same project. We were all too busy writing software. And then I managed to get a four-month leave of absence. This is how this book started. Teaching courses to a live, demanding audience is the best way of systematizing and testing ideas and making fast progress writing a book. The goal I put forward for the courses was to prepare the students for jobs in the industry.
Mobile Information Systems II: IFIP Working Conference on Mobile Information Systems, MOBIS 318 pages| Springer; 1 edition (November 17, 2005) | ISBN: 0387295518 | PDF | 18,6 Mb
Mobile Information Systems II provides a collection of research on the planning, analysis, design, construction, modification, implementation, utilization, evaluation, and management of mobile information systems. The articles focus on the implications of this research in the world of commerce, and address technical issues and constraints on mobile information systems functionalities and design.
Deutsch Hacker Schwarzbuch Publisher: The Mystique Man | ISBN: N/A | edition 2008 | PDF | 54 pages | 1,1 mb
Beginning of Text: Wichtiger Hinweis: Dieses “Buch” wurde von mir aus diesen Gründen elektronisch vervielfältigt: 1. Dieses Buch nennt sich Black Book und verspricht tiefe Einblicke in die Hackerszene - dem ist aber nicht so. Jemand, der nur 1/2 Jahr mit dem Inet zu tun hatte wird 90% davon schon wissen. 2. Der Preis von knapp 30 DM ist viel zu hoch. Das Buch hat weder einen Karton-Umschlag, noch ist es gebunden....
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management Prentice Hall PTR | ISBN: 0131463071 | 1088 pages | October 14, 2005 | CHM | 7 Mb
Core Security Patterns is the hands-on practitioner™s guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach fully reflects today™s best practices for security in large-scale, industrial-strength applications.
The authors explain the fundamentals of Java application security from the ground up, then introduce a powerful, structured security methodology; a vendor-independent security framework; a detailed assessment checklist; and twenty-three proven security architectural patterns. They walk through several realistic scenarios, covering architecture and implementation and presenting detailed sample code. They demonstrate how to apply cryptographic techniques; obfuscate code; establish secure communication; secure J2ME™ applications; authenticate and authorize users; and fortify Web services, enabling single sign-on, effective identity management, and personal identification using Smart Cards and Biometrics.
Core Security Patterns covers all of the following, and more: * What works and what doesn™t: J2EE application-security best practices, and common pitfalls to avoid * Implementing key Java platform security features in real-world applications * Establishing Web Services security using XML Signature, XML Encryption, WS-Security, XKMS, and WS-I Basic security profile * Designing identity management and service provisioning systems using SAML, Liberty, XACML, and SPML * Designing secure personal identification solutions using Smart Cards and Biometrics * Security design methodology, patterns, best practices, reality checks, defensive strategies, and evaluation checklists * End-to-end security architecture case study: architecting, designing, and implementing an end-to-end security solution for large-scale applications
Title: MCSE 2003 Core Objectives Bundle Author: Bill Ferguson/Certified Instructor SKU: 33652 ISBN: Release Date: 2005-10-06 Price: Single User: US$ 279.95 Duration: 34 hrs / 427 lessons Compatibility: Win Vista, XP, 2000, 98SE, Mac OS X, OS 9, Linux Work Files: N
VTC - MCSA & MCSE (70-297) Microsoft Windows Server 2003 VTC - MCSA & MCSE (70-294) Microsoft Windows Server 2003 VTC - MCSA & MCSE (70-293) Microsoft Windows Server 2003 VTC - MCSA & MCSE (70-291) Microsoft Windows Server 2003 VTC - MCSA & MCSE (70-290) Microsoft Windows Server 2003 VTC - MCSA&MCSE (70-270) Microsoft Windows XP Administration
A Laboratory Course in C++ Data Structures, Second Edition Jones and Bartlett Publishers, Inc.; 2nd edition | ISBN: 0763719765 | 300 pages | May 25, 2003 | PDF
With a dynamic learn-by-doing focus, this laboratory manual encourages students to explore data structures by implementing them, a process through which students discover how data structures work and how they can be applied.
Christoph Wille - Presenting C# Sams | 2000 | ISBN: 0672320371 | Pages: 216 | PDF | 1.02 MB
C#(C Sharp) is a simple, modern, object-oriented and type-safe programming language that provides the simplicity of Visual Basic with the power of C++. Written by Christoph Wille, one of only a handful of developers with early access to this exciting new language, this book covers the C# language from the ground up with rich coding examples, and expert insight into issues you will need to understand to fully take advantage of the power of C#. Presenting C# assumes you are already familiar with key programming concepts such as variables, and programming constructs. With this concise, code-intensive guide, you can get up to speed on Microsoft's new C# language, and begin creating next-generation applications and Web services today.
Bjarne Stroustrup, "Programming: Principles and Practice Using C++" Addison-Wesley Professional | 2008 | ISBN: 0321543726 | 1272 pages | PDF | 129 MB
An Introduction to Programming by the Inventor of C++
Preparation for Programming in the Real World
The book assumes that you aim eventually to write non-trivial programs, whether for work in software development or in some other technical field.
Focus on Fundamental Concepts and Techniques
The book explains fundamental concepts and techniques in greater depth than traditional introductions. This approach will give you a solid foundation for writing useful, correct, maintainable, and efficient code.
Programming with Today’s C++
The book is an introduction to programming in general, including object-oriented programming and generic programming. It is also a solid introduction to the C++ programming language, one of the most widely used languages for real-world software. The book presents modern C++ programming techniques from the start, introducing the C++ standard library to simplify programming tasks.
For Beginners–And Anyone Who Wants to Learn Something New
The book is primarily designed for people who have never programmed before, and it has been tested with more than 1,000 first-year university students. However, practitioners and advanced students will gain new insight and guidance by seeing how a recognized master approaches the elements of his art.
Provides a Broad View
The first half of the book covers a wide range of essential concepts, design and programming techniques, language features, and libraries. Those will enable you to write programs involving input, output, computation, and simple graphics. The second half explores more specialized topics, such as text processing and testing, and provides abundant reference material. Source code and support supplements are available from the author’s website.
Posted By : hue | Date : 05 Jul 2009 21:42 | Comments : 0
Glenn Rowe - From Java to C# Addison Wesley | 2004 | ISBN: 0321155726 | Pages: 688 | PDF | 21.84 MB
This book introduces programmers, already familiar with object-oriented programming, to the C# programming language. It reviews basic object-oriented concepts when C# implementations are discussed. The book begins by discussing the nuts and bolts of C# before delving into the area of the .Net libraries of code. It then moves on to show how GUI programs are created, and how to populate them with graphics. Advanced topics such as networking, using C# to interface with databases, and using C# with ASP to produce interactive Web pages, are covered at the end of the book. This book is designed for programmers, experienced with object-oriented concepts, who are transitioning to C# or are interested in learning a new programming language.
David Karlins, "Build Your Own Web Site" McGraw-Hill Osborne Media 2003 | ISBN-10: 0072229535 | 154 Pages | PDF | 56,3 MB
Stop dreaming and start building that Web site! This one-stop resource demystifies the process, showing you step-by-step how to plan for, construct, and publish your own Web site. Connect to a remote server, get a domain name, and gather content. Then, construct pages using a variety of tools. Learn to use pictures and graphics, format text, create links and animation, take advantage of interactivity, and input forms. Build Your Own Web Site is a complete and illustrated step-by-step guide to the skills, tools, and accessories you'll need to produce professional-level Web sites in no time. Establish a domain name and secure server space Determine which Web site building tools work best for your needs Use Dreamweaver, FrontPage, GeoCities, and other Web site authoring tools Prepare text and photos for the Web Create graphics, animation, sound, and other exciting Web features Enhance your site with interactive search boxes and input forms Use link-testing tools, hit counters, and online mail list managers Increase traffic by working with search engines
Dogan Ibrahim, "Microcontroller Projects in C for the 8051" Newnes 2000 | ISBN: 0750646403 | 178 pages | PDF | 1,5 MB
This book is a thoroughly practical way to explore the 8051 and discover C programming through project work. Through graded projects, Dogan Ibrahim introduces the reader to the fundamentals of microelectronics, the 8051 family, programming in C, and the use of a C compiler. The specific device used for examples is the AT89C2051 - a small, economical chip with re-writable memory, readily available from the major component suppliers.
A working knowledge of microcontrollers, and how to program them, is essential for all students of electronics. In this rapidly expanding field many students and professionals at all levels need to get up to speed with practical microcontroller applications. Their rapid fall in price has made microcontrollers the most exciting and accessible new development in electronics for years - rendering them equally popular with engineers, electronics hobbyists and teachers looking for a fresh range of projects.
Microcontroller Projects in C for the 8051 is an ideal resource for self-study as well as providing an interesting, enjoyable and easily mastered alternative to more theoretical textbooks.
Dogan Ibrahim has been Associate Professor and Head of Department at the Near East University, Cyprus, lecturer at South Bank University, London, Principal Research Engineer at GEC Hirst Research Centre, and is now a hardware and software systems consultant to London's Traffic Control Systems Unit.
Practical projects that enable students and practitioners to get up and running straight away with 8051 microcontrollers A hands-on introduction to practical C programming A wealth of project ideas for students and enthusiasts
VTC (Virtual Training Company) Microsoft Windows Server 2003 (70-297) Designing Active Directory and Network infrastructure (Eng)
Microsoft network infrastructures can grow to become very large and complex. To master the design of network infrastructures, you will need the ability to understand and engineer complex customer needs and requirements. This course will carry you though the process of understanding and designing a Microsoft Server 2003 Active Directory and Network infrastructure. VTC Author Brad Causey gives a detailed guide of Active DIrectory, from concepts through practical applications, to help you prepare for the 70-297 certification exam.
Overview:
Intro to Active Directory Design Overview of Active Directory Design (06:35) What Active Directory Design is (03:46)
Active Directory Introduction Active Directory Introduction (05:36) Server 2003 (06:24) Domain Controllers (05:05) Roles (06:50) Forests (05:00) Domains (05:03) Trust Types (06:49) Organizational Units (04:04) DNS (03:52) WINS (03:25) DHCP (04:45) Sites (06:55) Replication (06:21) RRAS/RADIUS (04:54)
Analyzing The Existing Infrastructure Analyzing the Existing Infrastructure (03:29) Physical Layout (04:31) Infrastructure Devices (05:03) Addressing Schemes (06:20) Operating Systems (05:42) Hardware (06:06) Performance (05:31) Analyzing It All (05:08)
Basic Active Directory Design Elements Domain Structure Pt.1 (05:09) Domain Structure Pt.2 (06:02) Domain Structure Pt.3 (03:31) NT vs. Server 2003 (05:16) Functional Levels (05:14) Analyzing it all (04:34) Common Solutions (05:13)
Designing Name Resolution DNS Components (05:59) DNS Zones (05:16) Zone Transfers (03:46) Server Roles (04:24) DNS Structure (04:40) Internal DNS vs. Public DNS (04:05) Putting It All Together (04:21)
Designing The Network Infrastructure IP Addressing (05:05) Subnets (04:08) Router Placement (04:57) DMZs (03:47) DHCP (04:33) Implementation Considerations (05:14)
Designing A Security Infrastructure Overview (05:07) Organizational Units (05:46) User and Computer Accounts (06:03) OU Design (07:56) Password Requirements (05:33) Group Types (04:57) Group Scopes (04:57) Group Strategies (06:20) Group Policies (05:46) GPO Implementations (06:50) Overall Group & Group Policy Strategy (03:52)
Designing Internet Access Internet Access Considerations (05:23) ISPs (03:16) WAN Implementations (04:46) Bandwidth (04:49) NAT (04:45) Overall Internet Access Strategy (04:51)
Designing Sites AD Sites (05:22) Site Design Considerations (05:48) Domain Controller Placement (05:31) Domain and Forest Role Placement (05:38) Global Catalog Placement (04:11) Replication (05:26) Site Strategies (03:15)
Case Study - Timekeepers Inc Company Background (03:56) Existing Infrastructure (03:48) Interviews (03:57) Geographical Layout (04:15) Goals (03:48) Designing Network Infrastructure (03:06)
VTC (Virtual Training Company) Microsoft Windows Server 2003 (70-293) Planning and Maintaining Network Infrastructure (Eng)
Designed for IT professionals who work in complex computing environments of medium to large size companies, Microsoft exam 70-293, "Planning and Maintaining a Microsoft Windows® Server 2003 Network Infrastructure" is a core networking system requirement for the MCSE (Microsoft Certified Systems Engineer) on Microsoft Windows® Server 2003 certification. Certified MCT and MCSE, VTC author, Brian Culp, shows users real world network solutions, as well as academic solutions to help users take and pass the MCSE 70-293 exam. He discusses the various server roles and availability, IP addressing, network infrastructure and security, as well as Internet connectivity strategy. This tutorial is essential for anyone considering tackling the MCSE 70-293 exam.
Overview:
Server Roles Tutorial Overview (05:49) Server 2003 Versions (05:16) Understanding Server Roles (05:16) Domain Controllers (04:17) Single Master Roles (05:16) File and Print Servers (04:14) DHCP/ DNS/WINS Servers (04:12) Web Servers (04:17) Application Servers and Terminal Servers (04:50)
Maintaining IP Addressing Understanding Network Protocols (05:59) TCP IP Basics (05:45) IP Addressing (04:29) IP Rules (02:43) Binary Addressing (05:14) Address Classes (06:26) IP Address Rules (06:51) Classless Internet Domain Routing (03:04) Automatic Private IP Addressing (05:07) Using an Alternate Configuration (03:47) Subnetting/Supernetting (06:58) Subnetting Shortcuts (05:59) Installing DHCP (05:24) DHCP Lease Process (05:12) Authorizing/Client Reservations (03:58) Manage DHCP Options (04:20) DHCP in a Routed Environment (05:58) Configuring DHCP Relay Agent (03:58) Using Superscopes (04:55)
Network Infrastructure Resolving a Host Name (05:58) Recursive and Iterative Queries (03:57) Reverse Queries (03:39) Installing the DNS Server Service (05:05) DNS Server Roles (05:44) Manage DNS Zones (04:05) Stub Zone (02:59) DNS Server Options (06:46) Creating a Reverse Lookup Zone (02:40) Resource Records (05:54) DNS Forwarders (03:40) Implementing Dynamic DNS (04:04) Integrating DNS and Active Directory (04:00) Modifying a Zone (04:45) Aging and Scavenging (05:36) Monitoring and Management (04:29) Delegating Zones (06:25) Migrating DNS Information (03:54) Integrating Windows and UNIX (04:41) Understanding NetBIOS Names pt. 1 (04:07) Understanding NetBIOS Names pt. 2 (03:34) Understanding WINS (04:43) Planning WINS Replication (05:27) Adding a WINS Replication Partner (06:41) Static WINS Entries (02:51) WINS Database Backup (03:20) Troubleshoot NetBIOS Resolution (05:13) Troubleshoot Host Resolution (03:56)
Routing and Remote Access Understanding Routing (05:12) Selecting Connectivity Devices (05:28) Configuring RAS (05:21) Configure a Remote Access Client (05:17) Remote Access User Authentication (05:11) Authentication Protocols (06:22) Internet Authentication Service (04:59) Configuring the IAS Server (05:58) Remote Access Policies (05:53) Default Remote Access Policies (06:32) Create a Remote Access Policy (05:29) Manage Routing Tables (07:00) Interfaces/Devices/Ports (03:29) Manage Routing Protocols (06:17) Demand Dial Routing (06:00) Configuring NAT (06:04) Configuring a Firewall (06:11) Internet Connection Sharing (04:58) Setting Up a VPN (06:17) Router to Router VPN (04:56) Secure Callback and Caller ID (03:58) Remote Access Account Lockout (04:42) Multilink and BAP (03:33) Configuring Remote Assistance (04:44) Using Remote Desktop (03:14) Remote Desktop Security (05:56) Troubleshoot RAS (04:10)
Internet Connectivity Strategy Connecting the LAN to the Internet (03:48) Network Address Translation (05:28) Internet Connection Sharing (03:50) Wireless Access Considerations pt. 1 (02:52) Wireless Access Considerations pt. 2 (04:21) Wireless Encryption and Security (05:22) Using the Connection Manager (01:51) Creating a Service Profile (06:46) Customizing Service Profiles (05:02)
Maintaining Network Security Identifying Security Requirements (04:57) Principle of Least Privilege (04:28) Understanding Security Templates (04:46) Configuring a Security Template (03:21) Security Configuration and Analysis (04:15) IPSec Basics (05:55) Enabling IPSec (05:03) Configuring IPSec Policy (04:22) IPSec Policy Rules (04:22) IPSec Policy Example pt. 1 (04:26) IPSec Policy Example pt. 2 (04:17) Using IPSec Monitor (03:20) Resultant Set of Policy (06:29)
Security Infrastructure Security Overview (04:31) Using NTFS Permissions (03:07) NTFS Permission Behavior (04:54) Permissions with the Command Line (03:07) Combining Share and NTFS Permissions (05:23) Effective Permission (02:04) Securing the Schema (06:30) Creating an Audit Policy (06:11) Reviewing Audit Policy (04:08) Microsoft Baseline Security Analyzer (02:01) Creating a Baseline Analysis (04:16) Software Update Services (02:31) Using SUS (03:28) Public Key Cryptography (04:42) Understanding Certification Authorities (05:12) Microsoft Certificates Services (04:10)
Maintaining Server Availability Understand Performance Bottlenecks (06:06) Monitor with System Monitor (04:14) Setting up a Performance Log (06:03) Installing Network Monitor (04:43) Monitor Traffic with Network Monitor (06:11) Windows Backup/Backup Types (05:06) Configuring a Backup (05:33) Using the Command Line (05:47) Automated System Recovery (03:57) Performing a Restore (03:54) Basic and Dynamic Disks (04:02) Disk Fault Tolerance (06:00) Server Clustering (05:01) Configuring a Server Cluster (04:14) Network Load Balancing (04:50) NLB Clusters (04:24)
VTC (Virtual Training Company) Microsoft Windows Server 2003 (70-294) Directory Service environment (Eng)
This VTC course will provide students with the knowledge and skills to take and pass the Microsoft Windows® Server 2003 70-294 exam. The course focuses on the Windows Server 2003 Directory Service environment, including the components of Active Directory, installation and configuration, physical Active Directory components; sites; domain controllers, implementation of a global catalog server, topology, Group Policy Objects, and more. MCSE Author - Brian Culp teaches the Microsoft exam objectives while providing necessary background information, essential to the student’s success.
Overview:
Windows Server 2003 and Active Directory Introduction (06:52) Installing Server 2003 Versions (05:08) Correcting Setup Problems (04:27) Changing the Interface/Adding a Theme (05:07) Schema/Global Catalog/Namespace (05:07) Installing Active Directory (07:15) Objects in Active Directory (07:43)
Physical Active Directory Components Creating a Site to Control Replication (04:52) Adding a Subnet/Moving a Subnet (03:59) Site Properties (04:57) Replication Within Sites (Intra-site) (04:59) Replication Between Sites (Inter-site) (05:16) Using SMPTOP/Site Link Bridges (04:53) Configure Preferred Bridgehead Servers (03:05) Implementing a Global Catalog Server (03:16) Adding Attributes to the Global Catalog (03:25) Forest-Wide Operations Master Roles (04:41) Domain-Wide Operations Master (05:16) Transfer FSMO Roles (05:08)
The Logical Active Directory Components Domains Trees Forests (05:22) Organizational Units (04:58) Delegation of Control (06:25) Application Data Partitions (05:19) Create a Child Domain (04:13) Domain Functional Modes (04:53) Renaming a Domain Controller (05:00) Forest Functional Modes (03:49) Renaming a Domain (04:44) Trust Relationships: External and Internal (06:11) Shortcut/Realm/Cross-Forest Trusts (04:59)
Managing and Maintaining an Active Directory Schema Security and Schema Cache (05:06) Adding a Schema Attribute (07:48) Adding a UPN Suffix (03:12) The NETDOM Utility (03:34) SYSVOL Folder and System State (03:17) Restore of Active Directory/Restore Types (03:47) Non-Authoritative Restore Operations (02:33) Perform an Authoritative Restore Operation (02:36) Active Directory Utilities (04:34) Using REPLMON (04:21)
Planning and Implementing Strategies Creating a Domain User Account (06:38) Creating an Account With the Command Line (03:27) Moving User Accounts (02:16) Creating Lots of Users at Once (04:49) Groups in Windows 2003 (05:00) Creating a Group (02:22) Group Nesting (03:12) Changing Group Scope (01:55) Impact of Universal Groups on Replication (03:46) Recommendations for Strong Passwords (03:48) Plan a Smart Card Authentication Strategy (02:55) Using NTFS Permissions (03:17) NTFS Permission Behavior (05:05) Setting Permissions with the Command Line (03:16) Combining Share and NTFS Permissions (05:38) The Effective Permission (02:06) Copying and Moving Considerations (03:28) Ownership (04:44)
Planning and Implementing Group Policy Group Policy Overview (03:37) Creating a Group Policy Object (05:36) Default Processing Order (05:11) Group Policy Behaviors (04:36) Inheritance (02:50) Filtering Group Policy (03:59) WMI Filters (03:17) Manage the Desktop Environment (05:59) Redirect Folders (05:12) Automatically Enroll User Certificates (05:45) Using the Resultant Set of Policy Tools (06:38) Refresh Interval/GPRESULT/GPUPDATE (03:52)
Manage Software/Security Using Group Policy Distribute Software Using Group Policy (06:09) Advertisement/Default Storage Location (04:27) Publishing/Assigning (03:25) Modifying Packages/Distribute Updates (04:50) Software Removal (04:28) Security Templates (04:52) Importing a Template (03:32) Security Configuration and Analysis (04:16) Creating an Audit Policy (04:15) Reviewing Audit Policy (06:14) Software Restriction Policies (04:46) Restricted Groups/Using SECEDIT (03:32)
VTC (Virtual Training Company) Microsoft Windows Server 2003 (70-291) Network Infrastructure (Eng)
This VTC course will provide students with the knowledge and skills to take and pass the Microsoft Windows® Server 2003 70-291 exam. The course focuses on administrating, implementing and maintaining a Microsoft Windows Server 2003 Network Infrastructure. Included in this course are topics such as: NetBIOS namespace, DNS namespace, implementing zones, implementing and managing IP addresses, TCP/IP protocols, routing and remote access, VPNs, network security, IPSec and more. Learn how to monitor, troubleshoot and diagnose issues related to service dependencies. MCSE author, Brian Culp, teaches the Microsoft exam objectives while providing necessary background information, essential to the student’s success.
Overview:
Administering a Windows 2000 Network Overview of MS 701-291 (04:28) The NetBIOS Namespace (05:44) The DNS Namespace (04:35) Planning Domain and Zones (05:15)
Implementing/Managing/Maintaining IP Addressing TCP/IP overview (05:57) IP Addressing (07:13) Binary Addressing (05:15) Address Classes (06:24) Addressing Rules; the Logical AND Operator (06:51) Classless Internet Domain Routing (03:09) Diagnose and Resolve Issues Related to APIPA (05:13) Using an Alternate Configuration (03:38) Subnetting/Supernetting pt. 1 (03:35) Subnetting/Supernetting pt. 2 (03:22) Subnetting Shortcuts (05:55)
Implementing/Managing/Maintaining IP Addressing Cont'd Installing and Configuring DHCP (05:18) DHCP Lease Process (05:15) DHCP Scopes (04:41) Authorizing; Client Reservations (04:01) Manage DHCP Options (04:23) DHCP in a Routed Environment (05:52) Configuring DHCP Relay Agent (04:03) Using Superscopes (05:11) Manage DHCP Databases (04:19) Option Classes (04:35) Integrating DHCP DDNS (04:00) Integrating DHCP with Remote Access (02:32) Troubleshooting DHCP (05:14) Verify Database Integrity (02:11) DHCP Audit Log Files (03:42)
Implementing/Managing/Maintaining Name Resolution Resolving a Host Name (06:02) Recursive and Iterative Queries (04:07) Reverse Queries (03:47) Install the DNS Server Service (05:17) DNS Server Roles (05:50) Manage DNS Zones (04:03) Stub Zones (02:58) DNS Server Options (06:41) Creating a Reverse Lookup Zone (02:39) Resource Records (05:56) DNS Forwarders (03:34) Implementing Dynamic DNS (04:01) Integrating DNS and Active Directory (04:04) Upgrading a Zone (04:39) Aging and Scavenging (05:44) Monitoring and Management (04:22) Delegating Zones (06:28) Migrating DNS information (03:59) Integrating Windows and UNIX DNS (04:44) Configuring DNS Clients (05:41) NSLOOKUP (04:32)
Routing and Remote Access Configuring the Remote Access Service (05:23) Configure a Remote Access Client (05:16) Remote Access User Authentication (05:18) Remote Access Authentication Protocols (06:34) Authenticating with IAS (05:03) Configuring the IAS Server (05:47) Remote Access Policies (06:04) Default Remote Access Policies (06:24) Create a Remote Access Policy (05:25) Manage Routing Tables (06:50) Interfaces/Devices/Ports (03:29) Manage Routing Protocols (06:14) Demand Dial Routing (06:04) Configuring NAT (06:13) Configuring a Firewall (06:05) Internet Connection Sharing (04:47) Setting up a VPN (06:09) Router to Router VPN (04:54) Secure Callback and Caller ID (03:50) Remote Access Account Lockout (04:33) Troubleshoot RRAS (04:10)
Implementing/Managing/Maintaining Network Security IPSec Basics (05:52) Enabling IPSec (05:01) Configuring IPSec Properties (03:51) Configuring IPSec Policy Rules (04:51) Building an IPSec Policy pt. 1 (04:09) Building an IPSec Policy pt. 2 (04:35) IP Security Monitor (03:23) Configuring a Security Template pt. 1 (03:23) Configuring a Security Template pt. 2 (03:20) Security Configuration and Analysis (04:09) Creating an Audit Policy (04:06) Reviewing Results of an Audit (05:59) Auditing Best Practices (05:02) Recommended Security Practices (04:45) The Privilege of Least Privilege (04:05)
Maintaining a Network Infrastructure Monitor the Network with System Monitor pt. 1 (04:45) Monitor the Network with System Monitor pt. 2 (03:55) Setting up a Performance Log (05:58) Installing Network Monitor (04:36) Monitor Traffic Using Network Monitor (05:59) Troubleshoot Connectivity to the Internet (05:26) Network Tools: IPConfig/Ping/Tracert/Pathping (06:03) More Tools: Netdiag/Netstat/Netsh (05:26) Kerberos Support Tools: Ksetup, Ktpass (04:17) Service Dependency and Recovery Options (03:43) Diagnose and Resolve Service-Related Issues (04:38)
VTC (Virtual Training Company) Microsoft Windows Server 2003 (70-290) Administrating, Implementing and Maintaining (Eng)
This VTC course will provide students with the knowledge and skills to take and pass the Microsoft Windows® Server 2003 70-290 exam. The course focuses on administrating, implementing and maintaining a Microsoft Windows Server 2003 Network Infrastructure. Included in this course are topics such as: administration and security, managing user and group permissions, managing and maintaining printers, print drivers and print permissions and remote administration. Certified MCT, MCSE instructor Bill Ferguson shows you both real world solutions for your network and academic solutions to help you pass the 70-290 exam.
Overview:
Introduction And Overview Introduction (04:43) Managing Overview (04:36)
Administration The Windows Server 2003 Family (05:00) Logging On and the Security Dialog Box (04:18) Installing and Configuring Admin Tools (03:51) Creating User Accounts (03:23) Creating Computer Accounts (05:10) Creating an Organizational Unit Hierarchy (04:11)
Managing Users And Computers Modifying User Properties (05:26) Modifying Computer Properties (03:00) Enabling and Unlocking Accounts (05:04) User Account Templates (04:38) Finding Users in Active Directory (03:22) Creating /Saving Queries in Active Directory (03:10) Resetting User and Computer Accounts (05:00) Moving Domain Objects (04:09)
Managing Groups Group Types and Scopes (05:32) Strategies for Using Groups (03:58) Creating Groups (05:39) Modifying Groups (03:45) Best Practices for Groups (05:05)
Managing Permissions Overview and Importance (04:03) Share Permissions (06:45) NTFS Permissions for Folders (05:42) NTFS Permissions for Files (03:26) NTFS Special Permissions (04:53) Best Practices and Combining Permissions (06:29) Effective Permissions Tool (04:34)
Managing Organizational Units Overview and Purpose of OU's (05:27) Delegation of Administrative Authority (04:17) Distribution of Group Policy (04:22) OU Permissions (05:25)
Managing Group Policy Group Policy Objects (04:18) Creating and Linking a GPO (04:57) Filtering GPO's (04:57) Using Block Inheritance (04:09) Enforcing GPOs (04:44) Configuring Group Policy Settings (04:40) Assigning Scripts with GPOs (04:39) Folder Redirection (06:22) Determining Applied GPOs (05:33) Group Policy Modelling (05:50) Group Policy Results (05:05)
Managing Security Managing Security Overview (02:50) Predefined Security Templates (03:43) Deploying a Custom Security Template (04:32) Applying and Testing Security Templates (06:33) What is Auditing?, Audit Policy (03:42) Determing Events to Audit (04:44) Enabling Audit Policy (06:10) Managing Security Logs (04:59)
Remote Administration Remote Desktop Connections Overview (04:21) Connecting to a Remote Desktop (04:03) Managing Remote Desktop Connections (05:46) Managing Idle and Session Timeouts (05:58) Creating a Share on a Local Computer (04:27) Defragmenting a Disk on a Remote Computer (04:39) Connecting to a Remote Console Session (04:17) Creating Shortcuts to Administrative Tools (04:37)
Monitoring Server Performance Establishing a Baseline (05:32) Real Time Monitoring (03:39) Logged Monitoring (05:28) Configuring Alerts (04:19) Task Manager (06:57)
Managing Server Performance Memory (04:09) Processor (04:11) Disk Subsystem (04:33) Network Subsystem (04:33)
Managing Data Storage File Compression (05:40) File Encryption (05:34) Disk Quotas (07:10)
Managing Disaster Recovery Disaster Recovery Defined (03:11) Parts of a Disaster Recovery Plan (05:42) Backing Up Data and System State Data (04:13) Restoring and Advanced Backup Options (04:59) Volume Shadow Copies (06:20) Safe Mode vs. Last Known Good Configuration (06:27) The Recovery Console (05:14)
Managing Software Update Services Software Update Services (03:10) Server Requirements and Installation (04:21) SUS Tools (03:59) SUS and Group Policy (04:27) Backing Up SUS (03:12)
Preparation for the 70-290 Test Preparation for for the Test (04:46) The Day of the Test (05:48)
This site does not store any files on its server.We only index and link to content provided by other sites. In case of any query/objection regarding copyright or piracy, please inform us at youzhny197@gmail.com, we will immediately respond to you.