Muutke küpsiste eelistusi

E-raamat: Microsoft Windows Vista Administration

  • Formaat: 624 pages
  • Ilmumisaeg: 13-Aug-2007
  • Kirjastus: McGraw-Hill Professional
  • Keel: eng
  • ISBN-13: 9780071595117
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 46,80 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 624 pages
  • Ilmumisaeg: 13-Aug-2007
  • Kirjastus: McGraw-Hill Professional
  • Keel: eng
  • ISBN-13: 9780071595117
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

"I highly recommend this book, the `Vista Manual That Microsoft Never Wrote,' since it has everything about Vista that you need, and nothing you don't." --Stu Sjouwerman, Editor, WServerNews, wservernews.com; Founder, Sunbelt Software
Foreword xv
Acknowledgments xvii
Introduction xix
Part I Windows Vista Basics
Introduction to Windows Vista
3(26)
How Will Vista Help Your Organization?
4(5)
Usability Enhancements
4(1)
Security Enhancements
5(2)
Networking Enhancements
7(1)
Infrastructure Optimization
8(1)
Versions of Vista
9(2)
Windows Vista Business
10(1)
Windows Vista Enterprise
10(1)
Windows Vista Home Premium
11(1)
Windows Vista Home Basic
11(1)
Windows Vista Ultimate
11(1)
Hardware Requirements
11(3)
How You'll Interface with Vista
14(1)
Basic User Interface
14(1)
Aero
14(1)
Features of Windows Vista
14(15)
Wizards
15(2)
Notifications
17(1)
Tone
18(1)
Windows Sidebar and Gadgets
18(4)
Taskbar
22(1)
Flip and Flip 3D
22(1)
Start Menu
23(3)
SuperFetch
26(1)
ReadyBoost
26(1)
Restart Manager
27(1)
Internet Explorer 7
27(2)
Planning a Windows Vista Deployment
29(36)
Deciding Whether to Migrate or Upgrade
30(5)
Understanding Migration
30(2)
Understanding an Upgrade
32(2)
Batch Rollouts vs. a Big Bang
34(1)
Rollout Methods
35(1)
Introduction to Deployments
35(2)
Engineering the Client
36(1)
Application Compatibility
36(1)
Deployment
36(1)
Deployment Process Overview
37(2)
Logical Design
37(1)
Test System
38(1)
Implementation Design
38(1)
Pilot Design
38(1)
Planning
39(2)
Build a Lab
39(1)
Answer File
40(1)
Building a Master Installation and Creating an Image
40(1)
Proof of Concept
41(1)
Deploying
41(10)
Deployment Tools
41(1)
Deployment Techniques
42(9)
Examining Your Organization
51(14)
Network Discovery
51(2)
Hardware Inventory
53(2)
Application Inventory
55(8)
User and Group Data
63(2)
Deploying Windows Vista
65(48)
Image Tools
66(3)
Migration
66(1)
Deployment
67(2)
Migration
69(13)
Plan the Migration
69(2)
Storage Options
71(2)
ScanState and LoadState
73(4)
Gathering Files and Settings
77(1)
Restoring Files and Settings
78(1)
Windows Easy Transfer
78(4)
Deployment Process
82(10)
Answer File
82(7)
Building a Master Installation
89(3)
Deployment Services
92(21)
Vista Deployment Process Overview
92(1)
Microsoft Solution Accelerator for Business Desktop Deployment (BDD)
93(11)
Windows Deployment Services
104(5)
Systems Management Server 2003
109(4)
Part II Networking
TCP/IP and Name Resolution
113(44)
TCP/IP
114(9)
OSI Model
114(2)
How TCP/IP Works
116(3)
Datalink Protocols
119(3)
Host-to-Host Transport Layer Protocols
122(1)
IPv4
123(6)
Elements of an IP Address
124(1)
IPv4 Address Classes
124(1)
Subnet Masks
125(2)
Private Addresses
127(1)
Default Gateways
128(1)
IPv6
129(12)
IPv6 Characteristics
129(2)
IPv6 Addressing Overview
131(10)
The Next Generation TCP/IP Stack in Vista
141(7)
Native IPv6 Support Added to IPv4
143(1)
A Reliable Hook into the TCP/IP Stack
143(1)
Updated Kernel Mode Programming
144(1)
Multihome Security Enhancement
144(1)
Multiprocessors Process Several Network Receipts
145(1)
Portability
145(1)
Offloading TCP/IP Processing
145(1)
Automatic Tuning
145(2)
Configuring the IP Address
147(1)
Name Resolution
148(9)
Choosing a Name Resolution Method
149(1)
Setting and Changing the DNS Host Name
150(1)
Changing the Primary DNS Suffix
151(1)
Connection-Specific Domain Names
152(2)
Preferred and Alternate DNS Servers
154(1)
WINS
155(2)
Creating Network Connections
157(40)
New Networking Features in Vista
158(14)
Architecture
158(4)
Management
162(6)
End-to-End Security
168(4)
Connecting Clients to the Workgroup
172(8)
Automatic Configuration
172(2)
Manual Client Configuration
174(6)
Domain Connectivity
180(4)
Connecting to the Internet
184(6)
Using the Set Up A Connection Or Network Wizard
184(6)
Wireless Connections
190(7)
Wireless Networking Updates in Vista
190(2)
Making a Connection
192(3)
Managing a Connection
195(2)
Network Navigation
197(38)
What's New in Vista Networking
198(2)
New and Improved
198(1)
Retired Technologies
199(1)
The Network And Sharing Center
200(19)
Meet the Network And Sharing Center
200(14)
Managing Networks
214(5)
Wireless Network Configuration
219(5)
The Connect To A Network Dialog Box
220(1)
Manual Configuration
221(2)
Connecting to the Network
223(1)
Command Line
224(11)
Netsh
225(3)
Wired
228(2)
Wireless
230(5)
Collaboration and Communication
235(38)
Sharing Network Resources
236(9)
Authorization Using NTFS and Share Permissions
236(2)
Public Folders
238(1)
Step-by-Step Sharing
239(4)
Sharing Printers
243(2)
People Near Me
245(1)
Windows Mail
246(6)
Using Windows Mail
248(3)
Searching Your E-mail
251(1)
Contacts
251(1)
Windows Calendar
252(9)
Using Windows Calendar
253(1)
Searching the Calendar
254(1)
Working with Calendar
255(5)
Managing Multiple Calendars
260(1)
Publishing Calendars
260(1)
Subscribing to a Calendar
261(1)
Windows Meeting Space
261(8)
Starting a WMS Session
263(1)
Inviting Attendees to a Windows Meeting Space Session
264(3)
Sharing Resources
267(1)
Handouts
267(1)
Speech Recognition
267(2)
Communication Tools
269(4)
Outlook 2007
270(1)
Exchange Server 2007
271(1)
SharePoint 2007
271(2)
Remote Control
273(26)
Remote Desktop
274(5)
Remote Desktop Features
275(1)
Remote Desktop Protocol 6.0
276(1)
Security Settings
276(3)
Using Remote Desktop
279(5)
Remote Desktop Server
279(2)
Remote Desktop Client
281(1)
Establishing a Connection
282(1)
Using Remote Desktop
283(1)
Other Remote Desktop Settings
284(1)
Remote Assistance
284(15)
Remote Assistance Features
285(3)
Security
288(1)
Using Remote Assistance
288(7)
Accepting an Invitation
295(4)
Part III Security
User Accounts
299(32)
Users and Groups
300(2)
The Local Users And Groups Tool
300(1)
The Active Directory Users And Computers Tool
301(1)
Profile Types
301(1)
Creating User Accounts
302(4)
Create a User Account from Control Panel
302(1)
Create a New User Account from Local Users And Groups
303(2)
Add a User Account from Active Directory Users And Computers
305(1)
Account Security
306(5)
Account Policies
306(5)
User Account Control
311(20)
User Modes: Standard and Administrator
315(7)
User Account Control Prompts
322(2)
Managing UAC User Mode with Admin Approval Mode and Group Policy
324(3)
Application Run Levels: Standard and Administrator
327(1)
Monitoring Installations
328(1)
File System and Registry Virtualization
329(1)
Managing UAC Application Run Levels with Application Properties
329(1)
Managing UAC Application Run Levels with Policies
330(1)
System Security
331(42)
Trusted Platform Modules
332(4)
Using TPM
333(1)
Initializing the TPM
333(2)
Turning Off TPM
335(1)
Clearing the TPM
336(1)
BitLocker Drive Encryption
336(11)
Technical Overview
337(1)
Steps for Deploying BitLocker
338(6)
Turning BitLocker On
344(1)
Recovering Data Protected by BitLocker
344(2)
Limitations
346(1)
Windows Security Center
347(3)
Firewall Protection
348(1)
Automatic Updating
348(1)
Malware Protection
348(2)
Other Security Settings
350(1)
Windows Firewall
350(12)
Firewall Features
350(4)
Windows Firewall with Advanced Security
354(2)
Using Windows Firewall with Advanced Security
356(6)
Windows Defender
362(11)
Windows Defender Operation
363(1)
Using Windows Defender
364(3)
Setting Configuration
367(2)
Scanning for Spyware
369(1)
Updating Defender
370(1)
Quarantined Items
371(1)
Managing Programs
372(1)
Network Security
373(34)
Virtual Private Networks
374(14)
New Features in Vista
374(2)
Configuring a VPN
376(11)
Establishing a VPN Connection
387(1)
Using Group Policy to Achieve Network Security
388(5)
Local Policies
388(1)
Domain-Based Policies
388(5)
Service Hardening
393(2)
Network Access Protection
395(12)
How It Works
395(1)
Protection
396(1)
NAP Components
397(2)
Configuring NAP
399(8)
Part IV Working with Windows Vista
Internet Applications
407(44)
Internet Explorer 7
408(18)
Meet Internet Explorer 7
408(2)
Tabbed Browsing
410(1)
Toolbars
411(5)
Internet Explorer Safety and Security
416(6)
Group Policy Settings
422(4)
Internet Information Server 7.0
426(25)
Installing IIS
428(5)
IIS 7 Architecture
433(7)
Managing IIS Using the IIS Manager, the Command Line, and WMI
440(8)
IIS Management Task: Creating a Web Site
448(3)
Mobile Devices
451(32)
Power Management
452(5)
Power Plans
452(2)
Configuring a Plan
454(1)
Advanced Settings
455(1)
Wakeup Behavior
456(1)
Windows Mobility Center
457(1)
Getting Started
457(1)
Using the Windows Mobility Center
458(1)
Tablet PCs
458(13)
The Pen
458(4)
Tablet PC Applications
462(9)
Sync Center
471(4)
Getting Started
471(1)
Sync Modes
472(1)
Synchronization
473(1)
Conflicts
474(1)
Synching Devices
474(1)
Managing Mobile Users
475(8)
DHCP
475(2)
Alternate Private IP Addresses
477(1)
Managing Power Plans with Group Policy
478(5)
Supporting Vista
483(56)
MMC 3.0
484(2)
The MMC Interface
484(1)
Adding and Removing Snap-ins
484(1)
Setting the Parent Node
485(1)
Backing Up and Restoring
486(8)
System Restore
487(3)
Backup
490(2)
Shadow Copies
492(2)
Configuration Tools
494(9)
Computer Management
494(3)
Startup Applications
497(2)
Windows PowerShell
499(3)
New Command-Line Tools
502(1)
Support Tools
503(22)
Event Viewer
504(14)
Device Manager
518(7)
Performance Monitoring
525(7)
Performance Information and Tools
525(7)
Using Local and Group Policies
532(7)
Multiple Local Group Policy Objects
533(4)
New Administrative Templates
537(2)
Troubleshooting
539(42)
Built-in Diagnostics
540(3)
Hardware, Performance, and Memory Diagnostics
541(1)
Network Diagnostics
542(1)
Hardware Problems and Diagnostics
543(6)
Event Viewer
543(3)
Device Manager
546(1)
Memory Diagnostic Tool
546(1)
Registry Helpers
546(3)
Printing Problems and Diagnostics
549(8)
Installation Issues
550(2)
Printing Problems
552(1)
Performance Problems
553(1)
Printer Permissions
554(1)
Print Management
555(2)
Recovering Frozen Applications
557(8)
Release and Recovery
557(1)
Terminating Frozen Applications
558(1)
Stopping Services or Processes
559(1)
Advanced Boot Options
559(3)
Troubleshooting Services
562(1)
Task Scheduler
562(3)
Problem Reporting and Assistance
565(6)
Problem Reports and Solutions
566(1)
Privacy
567(1)
Problem Reports
568(1)
Solutions
569(2)
Stop Errors and the BSOD
571(4)
Composition of a Stop Error
572(2)
Configuration Options
574(1)
Recovering the System
575(6)
Advanced Boot Options
575(1)
Windows Recovery Environment
576(5)
Index 581


Anthony T. Velte, CISSP, CISA (Lake Elmo, MN) is cofounder of Velte Publishing, Inc., and coauthor of several books on Cisco technologies.





Toby J. Velte, Ph.D. is an international best-selling author of business technology articles and books. He is co-founder of Velte Publishing, Inc. and the co-author of more than a dozen books published by McGraw-Hill. He is co-author of Green IT: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line and Cloud Computing: A Practical Approach. V. Dr. Velte is currently part of Microsofts North Central practice focused on helping thriving companies with their technology-based initiatives