https://www.dummies.com/go/networkingaiofd9e/
|
Published:
December 9, 2024

Networking All-in-One For Dummies

Overview

The essentials you need to learn about networking—10 books in one!

With over 900 pages of clear and trustworthy information, Networking All-in-One For Dummies is the perfect beginner's guide AND the perfect professional reference book. Small networks, large networks, business networks, cloud networks—it's all covered. Learn how to set up a network and keep it functioning, using Windows Server, Linux, and related technologies. This book also covers best practices for security, managing mobile devices, and beyond. Maybe you're just getting started with networking, or maybe you know what you're doing and need a resource with all the knowledge in one place. Either way, you've found what you need with this Dummies All-in-One

  • Plan a network from scratch and learn how to set up all the hardware and software you'll need
  • Find explanations and examples of important networking protocols
  • Build remote and cloud-based networks of various sizes
  • Administer networks with Windows Server and other versions
  • Secure your network with penetration testing and planning for cybersecurity incident responses

Every network administrator needs a copy of Networking All-in-One For Dummies, the comprehensive learning resource and reliable desk reference.

Read More

About The Author

Doug Lowe is the information technology director for a civil engineering firm in Clovis, California. He has been managing networks at publishing companies and nonprofits for 40 years. His 50+ technology books include more than 30 in the For Dummies series. Doug has demystified everything from memory management to client/server computing.

Sample Chapters

networking all-in-one for dummies

CHEAT SHEET

Managing a small computer network is well within your reach! But it's vital that you keep track of key information that's unique to your network. This cheat sheet is designed to give you quick access to your network information, explanation of some basic network concepts, such as pin connections and IP address ranges, and a list of useful websites for networking information.

HAVE THIS BOOK?

Articles from
the book

The many different antispam programs that are available fall into three broad categories: on-premises, appliance, and cloud based (hosted). The following sections describe the relative merits of each of these approaches to providing antispam for your organization. On-premises antispam An on-premises antispam program runs on a server on your network and interacts directly with your email server.
It’s tempting to think that cybersecurity is important only to large enterprises. In a small business, everyone knows and trusts everyone else. Folks don’t lock up their desks when they take a coffee break, and although everyone knows where the petty cash box is, money never disappears.Cybersecurity isn’t necessary in an idyllic setting like this one — or is it?
As network administrator, you just won’t be able to solve a problem sometimes, at least not immediately. You can do two things in this situation. The first is to explain that the problem is particularly difficult and that you’ll have a solution as soon as possible. The second solution is to look the user in the eyes and, with a straight face, try one of these phony explanations: Blame it on the version of whatever software you’re using.
To be a good network administrator, you need to read computer books. Lots of them. And you need to enjoy doing it. If you’re the type who takes computer books with you to the beach, you’ll make a great network administrator. One of Scotty’s best lines in the original Star Trek series was when he refused to take shore leave so he could get caught up on his technical journals.
Before you connect to a remote desktop session, you can set a variety of options that affect how the remote desktop session will behave. To summon these options, click the Start button, type the word Remote, and then click the Remote Desktop Connection icon. When the Remote Desktop Connection window appears, click the Show Options button at the bottom left of the window.
After you’ve enabled remote access on a server, you can connect to the server by using the remote desktop client that’s automatically installed with Windows. Here’s the procedure: 1. Click the Start button and type the word Remote. Then click the Remote Desktop Connection icon. The Remote Desktop Connection client comes to life, as shown here.
Before you can use Remote Desktop Connection (RDC) to access a server, you must enable remote access on the server. To do that, follow these steps (on the server computer, not your desktop computer): Open the Control Panel and click System. This step brings up the System settings page. Click the Remote Settings link.
You can get to a command shell in one of two basic ways when you need to run Linux commands directly. The first is to press Ctrl+Alt+Fx to switch to one of the virtual consoles, where Fx is one of the function keys, from F1 through F12. Then, you can log on and run commands to your heart’s content. When you’re done, press Ctrl+Alt+F7 to return to GNOME.
The following procedure describes the steps you must follow to install Fedora 26 on a virtual machine using a downloaded .iso file containing the Fedora installation media. Note that, for this example, the workstation version of Fedora is installed. You also can install the server version of Fedora, but the server version does not configure a graphical user interface (GUI) by default.
No antispam program is perfect, so you need to understand and expect that a certain amount of spam will get through to your inbox. Here are some tips that you (and your users) should keep in mind to minimize the amount of spam that gets through undetected: Never trust email that requests your password or credit card.
Next to physical security, the careful use of user accounts is the most important type of security for your network. Properly configured user accounts can prevent unauthorized users from accessing the network, even if they gain physical access to the network. The following sections describe some of the steps that you can take to strengthen your network’s use of user accounts.
When you’re working in a Remote Desktop session, some of the standard Windows keyboard shortcuts don’t work exactly as you expect them to. The table lists the special keyboard shortcuts you can use in a Remote Desktop session. Keyboard Shortcuts for Remote Desktop Shortcut What It Does Ctrl+Alt+Break Toggles between full-screen and windowed views.
Managing a small computer network is well within your reach! But it's vital that you keep track of key information that's unique to your network. This cheat sheet is designed to give you quick access to your network information, explanation of some basic network concepts, such as pin connections and IP address ranges, and a list of useful websites for networking information.
Security techniques and technology — physical security, user account security, server security, and locking down your servers — are child’s play compared with the most difficult job of network security: securing your network’s users. All the best-laid security plans are for naught if your users write down their passwords on sticky notes and post them on their computers and click every link that shows up in their email.
Network administrators need certain tools to get their jobs done. Administrators of big, complicated, and expensive networks need big, complicated, and expensive tools. Administrators of small networks need small tools.Some of the tools that the administrator needs are hardware tools, such as screwdrivers, cable crimpers, and hammers.
As an IT professional, cybersecurity is the thing most likely to keep you awake at night. You must consider two basic elements as part of your cybersecurity plan: Prevention: The first pillar of cybersecurity is technology that you can deploy to prevent bad actors from penetrating your network and stealing or damaging your data.
Windows comes with a built-in packet-filtering firewall. If you don’t have a separate firewall router, you can use this built-in firewall to provide a basic level of protection. Note, however, that you should rely on the Windows Firewall only as a last resort. If at all possible, use a separate firewall rather than the Windows Firewall to protect your network.
Your network is no longer just computers, printers, and maybe PDAs. Now, you have to consider a whole bunch of different device types when planning your network's security. Once upon a time, there were mobile phones and PDAs. A mobile phone was just that: a handheld telephone you could take with you. The good ones had nice features such as a call log, an address book, and perhaps a crude game but not much else.
Linux is inherently a command-line–oriented OS. Graphical user interfaces — including the installation program’s GUI — are provided by an optional component called X Window System. However, while you’re working with the GUI of the installation program, Linux keeps several additional command-line consoles open.
Viruses are one of the most misunderstood computer phenomena around these days. What is a virus? How does it work? How does it spread from computer to computer? What is a virus? Make no mistake — viruses are real. Now that most people are connected to the Internet, viruses have really taken off. Every computer user is susceptible to attacks by computer viruses, and using a network increases your vulnerability because it exposes all network users to the risk of being infected by a virus that lands on any one network user’s computer.
The most basic definition of spam is any email that arrives in your inbox that you didn’t ask for. Spam is unsolicited email. It’s email that isn’t welcome, email that you aren’t expecting. It’s email from people you don’t know or haven’t heard of, usually trying to sell you something you aren’t interested in or can’t possibly need, and often trying to trick you into parting with either your money or your valuable personal information, or both.
https://cdn.prod.website-files.com/6630d85d73068bc09c7c436c/69195ee32d5c606051d9f433_4.%20All%20For%20You.mp3

Frequently Asked Questions

No items found.