Systems and Network Infrastructure Integration : Design, Implementation, Safety and Supervision /
IT infrastructures are now essential in all areas and sectors of human activity; they are the cornerstone of any information system. Thus, it is clear that the greatest of care must be given to their design, implementation, security and supervision in order to ensure optimum functionality and better...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Newark :
John Wiley & Sons, Incorporated,
2020.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents
- Preface
- Chapter 1 Introduction to Project Management
- 1.1. Introduction
- 1.2. Project management
- 1.3. Project management methods and tools
- 1.3.1. Gantt diagram
- 1.3.2. RACI (Responsible, Accountable, Consulted, Informed) matrix
- 1.3.3. The concept of specifications
- 1.4. Chapter summary
- Chapter 2 Simulating Network Architectures with GNS3
- 2.1. Introduction
- 2.2. Definition
- 2.3. Introduction to GNS3
- 2.3.1. Functionalities of GNS3
- 2.3.2. Limitations
- 2.3.3. GNS3 installation
- 2.3.4. Getting started with GNS3
- 2.4. Chapter summary
- Chapter 3 Green IT
- 3.1. Introduction
- 3.2. Introduction of concept
- 3.3. Green IT trigger factors
- 3.4. Benefits of Green IT
- 3.5. The lifecycle of ICTs
- 3.6. Mechanisms and technical solutions for the implementation of a Green IT infrastructure
- 3.7. Green IT labels and standards
- 3.8. Some examples of Eco-ICTs
- 3.9. Chapter summary
- Chapter 4 Design of Network Infrastructures
- 4.1. Introduction
- 4.2. The founding principles of networks
- 4.2.1. Definition and preliminaries
- 4.2.2. Classification of digital data networks
- 4.2.3. Components of a network
- 4.2.4. Measuring network performance
- 4.2.5. Concepts of collision domain/broadcast domain and VLANs
- 4.3. Methods and models of IT network design
- 4.3.1. Principles of structured engineering
- 4.4. Assessment of needs and choice of equipment
- 4.5. Chapter summary
- Chapter 5 Network Services
- 5.1. Introduction
- 5.2. DHCP service
- 5.2.1. Introduction
- 5.2.2. Operating principle
- 5.2.3. Renewal of lease
- 5.2.4. The concept of a DHCP relay
- 5.3. DNS service
- 5.3.1. Introduction
- 5.3.2. Operating principle
- 5.4. LDAP service
- 5.4.1. Introduction
- 5.4.2. LDAP protocol
- 5.4.3. LDAP directory
- 5.5. E-mail service
- 5.5.1. Introduction
- 5.5.2. Architecture and operating principle
- 5.5.3. Protocols involved
- 5.6. Web server
- 5.6.1. Introduction
- 5.6.2. Operating principle
- 5.6.3. The principle of virtual hosting
- 5.7. FTP file transfer service
- 5.7.1. Definition
- 5.7.2. Operating principle
- 5.7.3. Types
- 5.8. Chapter summary
- Chapter 6 System and Network Security
- 6.1. Introduction
- 6.2. Definitions, challenges and basic concepts
- 6.3. Threats/attacks
- 6.3.1. Access attacks
- 6.3.2. Modification attacks
- 6.3.3. Saturation attacks
- 6.3.4. Repudiation attacks
- 6.4. Security mechanisms
- 6.4.1. Encryption tools
- 6.4.2. Antivirus programs
- 6.4.3. Firewalls/IDS and IPS
- 6.4.4. VPNs
- 6.4.5. Other means of security
- 6.5. Security management systems: norms and security policies
- 6.5.1. Norms
- 6.5.2. The idea of security policy
- 6.6. Chapter summary
- Chapter 7 Virtualization and Cloud Computing
- 7.1. Introduction
- 7.2. Virtualization
- 7.2.1. Definition
- 7.2.2. Benefits of virtualization