MCSE training kit : designing Microsoft Windows 2000 network security / Microsoft.
Material type: TextPublication details: Redmond, Wash. : Microsoft Press, 2001.Description: liv, 793 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.)ISBN:- 0735611343
- TK5105.59 .M485 2001
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | Zetech Library - TRC General Stacks | Non-fiction | TK5105.59 .M485 2001 (Browse shelf(Opens below)) | C.5 | Available | Z006298 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | TK5105.59 .M485 2001 (Browse shelf(Opens below)) | C.3 | Available | Z006237 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | TK5105.59 .M485 2001 (Browse shelf(Opens below)) | C.1 | Available | Z006193 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | TK5105.59 .M485 2001 (Browse shelf(Opens below)) | C.2 | Available | Z006226 |
Browsing Zetech Library - TRC shelves, Shelving location: General Stacks, Collection: Non-fiction Close shelf browser (Hides shelf browser)
TK5105.59 .M485 2001 MCSE training kit : | TK5105.59 .M485 2001 MCSE training kit : | TK5105.59 .M485 2001 MCSE training kit : | TK5105.59 .M485 2001 MCSE training kit : | TK5105.59 .S713 2003 Cryptography and network security : | TK5105.59 .W45 2005 Principles of information security / | TK5105.59 .W45 2005 Principles of information security / |
"Exam 70-220."
Includes index.
Introduction to Microsoft windows 2000 security -- Designing active directory for security -- Designing authentication for a Microsoft windows 2000 network -- Planning a Microsoft windows 2000 administrative structure -- Designing group security -- Securing file resources -- Designing group policy -- Securing Microsoft windows 2000 based computers -- Designing Microsoft windows 2000 services security -- Planning a public key infrastructure -- Securing data at the application layer -- Securing data with internet protocol security (IPSec) -- Securing access for remote users and networks -- Securing an extranet -- Securing internet access -- Securing access in a heterogeneous network environment -- Designing a security plan.
There are no comments on this title.