14 Book 10: Dealing with Cybersecurity Chapter 1: Securing Your Users Knowing the Difference between Authentication and Authorization Following Password Best Practices Securing the Administrator Account Understanding Multifactor Authentication Securing the Human Firewall Chapter 2: Managing Firewalls and Virus Protection Firewalls The Many Types of Firewalls Firewall Best Practices The Built-In Windows Firewall Configuring Windows Defender Firewall with Group Policy Virus Protection Chapter 3: Dealing with Spam Defining Spam Sampling the Many Flavors of Spam Using Antispam Software Understanding Spam Filters Looking at Three Types of Antispam Software Minimizing Spam Chapter 4: Managing Disaster Recovery and Business Continuity Planning Assessing Different Types of Disasters Analyzing the Impact of a Disaster Developing a Business Continuity Plan Holding a Fire Drill
Автор: | Doug Lowe |
Издательство: | John Wiley & Sons Limited |
Серия: | |
Жанр произведения: | Зарубежная компьютерная литература |
Год издания: | 0 |
isbn: | 9781119689058 |
Building a Library
Getting Certified
Gurus Need Gurus, Too
Helpful Bluffs and Excuses
Chapter 2: Managing Remotely
Enabling Remote Desktop Connection
Connecting Remotely
Using Keyboard Shortcuts for Remote Desktop
Configuring Remote Desktop Options
Using Remote Assistance
Enabling Remote Assistance
Inviting Someone to Help You via a Remote Assistance Session
Responding to a Remote Assistance Invitation
Chapter 3: Managing Network Assets
Introducing IT Asset Management
Why Bother?
Getting Organized
What to Track
Taking Pictures
Picking a Number
Making Labels
Tracking Software
Using Asset-Tracking Software
Other Sources of Asset-Tracking Information
Chapter 4: Solving Network Problems
When Bad Things Happen to Good Computers
Fixing Dead Computers
Ways to Check a Network Connection
A Bunch of Error Messages Just Flew By!
Double-Checking Your Network Settings
Time to Experiment
Who’s on First?
Restarting a Client Computer
Booting in Safe Mode
Using System Restore
Restarting Network Services
Restarting a Network Server
Looking at Event Logs
Documenting Your Trials and Tribulations
Chapter 5: Managing Software Deployment
Understanding Software Licenses
Using a License Server
Options for Deploying Network Software
Keeping Software Up to Date
Chapter 6: Managing Mobile Devices
The Many Types of Mobile Devices
Considering Security for Mobile Devices
Managing iOS Devices
Managing Android Devices