Muutke küpsiste eelistusi

Windows 8 Administration Pocket Consultant [Pehme köide]

  • Formaat: Paperback / softback, 672 pages, kõrgus x laius x paksus: 215x144x33 mm, kaal: 768 g
  • Ilmumisaeg: 15-Sep-2012
  • Kirjastus: Microsoft Press,U.S.
  • ISBN-10: 073566613X
  • ISBN-13: 9780735666139
Teised raamatud teemal:
  • Pehme köide
  • Hind: 40,52 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 672 pages, kõrgus x laius x paksus: 215x144x33 mm, kaal: 768 g
  • Ilmumisaeg: 15-Sep-2012
  • Kirjastus: Microsoft Press,U.S.
  • ISBN-10: 073566613X
  • ISBN-13: 9780735666139
Teised raamatud teemal:
Furnishes quick reference answers to questions about day-to-day administration of Windows 8, covering such topics as configuring user and computer policies, automating configuration, managing user access and security, installing and maintaining programs,and handling maintenance and support tasks.

Portable and precise, this pocket-sized guide delivers ready answers for administering computers running Windows 8. Zero in on core operations and daily tasks using quick-reference tables, instructions, and lists. You’ll get the focused information to solve problems and get the job done—whether at your desk or in the field.

Get fast facts on these essential topics:

  • Configuring and optimizing Windows 8 computers
  • Customizing the desktop and UI
  • Configuring user and computer policies
  • Managing disk drives and file systems
  • Managing devices, drivers, and software
  • Administering data access, availability, resource sharing, and security
  • Configuring and troubleshooting TCP/IP networking
  • Administering TPM and BitLocker Driver Encryption
  • Managing mobile users and remote access
Introduction xix
Chapter 1 Introduction to Windows 8 Administration
1(38)
Getting Started with Windows 8: The Quick Tour
2(4)
Understanding 64-Bit Computing
6(2)
Deploying Windows 8
8(1)
Using DISM
9(2)
Understanding Windows Imaging
11(1)
Managing Access and Prestaging Computers
12(2)
Customizing Windows Images
14(4)
Installing Windows 8
18(1)
Preparing for Windows 8 Installation
18(2)
Performing a Windows 8 Installation
20(4)
Running Windows 8
24(2)
Using Action Center and Activating Windows
26(1)
Running Windows 8 in Groups and Domains
27(5)
Power Plans, Sleep Modes, and Shutdown
32(3)
Windows 8 Architecture
35(4)
Chapter 2 Configuring Windows 8 Computers
39(54)
Supporting Computers Running Windows 8
40(1)
Working with the Computer Management Console
41(3)
Getting Basic System and Performance Information
44(3)
Getting Advanced System Information
47(2)
Working with WMI Control
49(2)
Using System Support Tools
51(1)
Working with Disk Cleanup
52(2)
What do you think of this book? We want to hear from you!
Verifying System Files with File Signature Verification
54(1)
Managing System Configuration, Startup, and Boot
55(6)
Managing System Properties
61(1)
The Computer Name Tab
61(1)
The Hardware Tab
62(1)
The Advanced Tab: Performance Options
63(4)
The Advanced Tab: Environment Variables
67(3)
The Advanced Tab: Startup and Recovery Options
70(3)
The System Protection Tab
73(3)
The Remote Tab
76(1)
Configuring Power Management Settings
76(1)
Managing Power Options from the Command Line
77(3)
Working with Power Plans
80(3)
Selecting and Optimizing Power Plans
83(3)
Creating Power Plans
86(1)
Configuring Systemwide Power Button and Password Protection on Wakeup Settings
87(1)
Managing Power Options in Policy Settings
88(1)
Using Alarms and Configuring Alarm Actions
89(4)
Chapter 3 Customizing the Desktop and the User Interface
93(34)
Optimizing PC Settings
93(1)
The Personalize Page
94(1)
The Users Page
95(1)
The Notifications Page
95(1)
The Search, Share, and Privacy Pages
96(1)
The Sync Your Settings Page
96(1)
Working with Desktops and Startup Applications
97(1)
Creating Shortcuts for Desktops, Startup, and More
97(4)
Adding and Removing Startup Applications
101(1)
Customizing the Taskbar
102(1)
Understanding the Taskbar
102(1)
Pinning Shortcuts to the Taskbar
102(1)
Changing the Taskbar's Size and Position
102(1)
Auto Hiding, Locking, and Controlling Taskbar Visibility
103(1)
Controlling Programs in the Notification Area
103(1)
Controlling Icon Display in the Notification Area
103(1)
Optimizing Toolbars
104(1)
Displaying Toolbars
105(1)
Creating Personal Toolbars
105(1)
Working with Desktop Themes
106(1)
Applying and Removing Themes
106(1)
Tailoring and Saving Themes
107(1)
Deleting Custom Themes
108(1)
Optimizing the Desktop Environment
108(1)
Setting the Desktop Background
109(1)
Working with the Default Desktop Icons
110(2)
Screen Saver Dos and Don'ts
112(1)
Configuring Screen Savers with Password Protection
112(1)
Reducing Screen Saver Resource Usage
113(1)
Setting Energy-Saving Settings for Monitors
114(1)
Modifying Display Appearance and Video Settings
114(1)
Configuring Window Color and Appearance
115(1)
Optimizing Display Readability
116(2)
Configuring Video Settings
118(7)
Troubleshooting Display Problems
125(2)
Chapter 4 Managing Firmware, Boot Configuration, and Startup
127(40)
Navigating and Understanding Firmware Options
127(1)
Firmware Interface Types and Boot Data
128(1)
Boot Services, Run-Time Services, and Beyond
129(1)
UEFI
130(2)
Navigating Startup and Power States
132(1)
Working with Firmware Interfaces
133(1)
Examining Firmware Interfaces
134(2)
Power States and Power Management
136(3)
Diagnosing and Resolving Startup Problems
139(2)
Troubleshooting Startup Phase 1
141(1)
Troubleshooting Startup Phase 2
142(1)
Troubleshooting Startup Phase 3
143(1)
Troubleshooting Startup Phase 4
144(1)
Troubleshooting Startup Phase 5
145(1)
Managing Startup and Boot Configuration
146(1)
Setting Startup and Recovery Options
146(1)
Managing System Boot Configuration
147(3)
Using the BCD Editor
150(2)
Managing the BCD Store
152(1)
Viewing BCD Entries
152(3)
Creating and Identifying the BCD Store
155(1)
Importing and Exporting the BCD Store
155(1)
Creating, Copying, and Deleting BCD Entries
156(1)
Setting BCD Entry Values
157(5)
Changing Data Execution Prevention and Physical Address Extension Options
162(1)
Changing the Operating System Display Order
163(1)
Changing the Default Operating System Entry
164(1)
Changing the Default Timeout
164(1)
Changing the Boot Sequence Temporarily
165(2)
Chapter 5 Configuring User and Computer Policies
167(26)
Group Policy Essentials
167(1)
Accessing and Using Local Group Policies
168(3)
Accessing and Using Site, Domain, and OU Policies
171(2)
Configuring Policies
173(1)
Viewing Policies and Templates
174(1)
Enabling, Disabling, and Configuring Policies
174(1)
Adding or Removing Templates
175(1)
Working with File and Data Management Policies
176(1)
Configuring Disk Quota Policies
176(2)
Configuring System Restore Policies
178(1)
Configuring Offline File Policies
179(5)
Working with Access and Connectivity Policies
184(1)
Configuring Network Policies
184(1)
Configuring Remote Assistance Policies
185(2)
Working with Computer and User Script Policies
187(1)
Controlling Script Behavior Through Policy
187(2)
Assigning Computer Startup and Shutdown Scripts
189(1)
Assigning User Logon and Logoff Scripts
190(1)
Working with Logon and Startup Policies
190(2)
Setting Policy-Based Startup Programs
192(1)
Disabling Run Lists Through Policy
192(1)
Chapter 6 Automating Windows 8 Configuration
193(12)
Understanding Group Policy Preferences
193(3)
Configuring Group Policy Preferences
196(1)
Working with Management Actions
196(1)
Working with Editing States
197(2)
Working with Alternative Actions and States
199(1)
Managing Preference Items
200(1)
Creating and Managing a Preference Item
200(2)
Setting Common Tab Options
202(3)
Chapter 7 Managing User Access and Security
205(42)
Understanding User and Group Accounts
205(1)
User Account Essentials
206(3)
Group Account Essentials
209(2)
Domain vs. Local Logon
211(1)
Managing User Account Control and Elevation Prompts
211(1)
Redefining Standard User and Administrator User Accounts
212(2)
Optimizing UAC and Admin Approval Mode
214(3)
Managing Local Logon
217(1)
Creating Local User Accounts in a Homegroup or Workgroup
218(1)
Granting Access to an Existing Domain Account to Allow Local Logon
219(1)
Changing Local User Account Types
220(1)
Switching Between Synced and Regular Accounts
221(1)
Creating Passwords for Local User Accounts
221(2)
Recovering Local User Account Passwords
223(1)
Controlling Logon
224(1)
Removing Accounts and Denying Local Access to Workstations
225(1)
Managing Stored Credentials
226(1)
Adding Windows or Generic Credentials
227(2)
Adding Certificate-Based Credentials
229(1)
Editing Credentials
229(1)
Backing Up and Restoring Windows Credentials
230(1)
Removing Credential Entries
230(1)
Managing Local User Accounts and Groups
231(1)
Creating Local User Accounts
231(2)
Creating Local Groups for Workstations
233(2)
Adding and Removing Local Group Members
235(1)
Enabling or Disabling Local User Accounts
236(1)
Creating a Secure Guest Account
237(1)
Renaming Local User Accounts and Groups
238(1)
Deleting Local User Accounts and Groups
239(1)
Managing Remote Access to Workstations
239(1)
Configuring Remote Assistance
240(3)
Configuring Remote Desktop Access
243(2)
Making Remote Desktop Connections
245(2)
Chapter 8 Installing and Maintaining Applications
247(32)
Managing Desktop Apps
248(1)
Working with Apps: The Essentials
248(1)
Configuring Trusted Apps and Windows Store Access
248(1)
Enhancing Security for Apps and Overriding Default Settings
249(1)
Enhancing Networking Security for Apps
250(1)
Managing Application Virtualization and Run Levels
251(1)
Application Access Tokens and Location Virtualization
251(1)
Application Integrity and Run Levels
252(2)
Setting Run Levels
254(2)
Optimizing Virtualization and Installation Prompting for Elevation
256(1)
Installing Programs: The Essentials
257(1)
Working with Autorun
258(1)
Application Setup and Compatibility
259(1)
Making Programs Available to All or Selected Users
260(2)
Deploying Applications Through Group Policy
262(1)
Configuring Program Compatibility
263(1)
Special Installation Considerations for 16-Bit and MS-DOS-Based Programs
263(1)
Forcing Program Compatibility
264(4)
Managing Installed and Running Programs
268(1)
Managing Currently Running Programs
268(1)
Managing, Repairing, and Uninstalling Programs
269(2)
Designating Default Programs
271(1)
Managing the Command Path
272(2)
Managing File Extensions and File Associations
274(2)
Configuring AutoPlay Options
276(1)
Adding and Removing Windows Features
277(2)
Chapter 9 Managing Hardware Devices and Drivers
279(48)
Working with the Automated Help and Support System
280(1)
Using Automated Help and Support
280(5)
Customizing Automated Help and Support
285(8)
Working with Support Services
293(6)
Managing Services Using Preferences
299(1)
Installing and Maintaining Devices: The Essentials
300(1)
Installing Preexisting Devices
301(1)
Installing Internal, USB, FireWire, and eSATA Devices
302(3)
Installing Wireless, Network, and Bluetooth Devices
305(2)
Installing Local and Network Printers
307(4)
Getting Started with Device Manager
311(2)
Working with Device Drivers
313(1)
Device Driver Essentials
313(1)
Using Signed and Unsigned Device Drivers
314(1)
Tracking Driver Information
314(1)
Installing and Updating Device Drivers
315(3)
Enabling and Disabling Types of Devices
318(1)
Restricting Device Installation Using Group Policy
319(1)
Rolling Back Drivers
320(1)
Removing Device Drivers for Removed Devices
321(1)
Uninstalling, Reinstalling, and Disabling Device Drivers
321(1)
Enabling and Disabling Hardware Devices
322(1)
Troubleshooting Hardware
322(5)
Chapter 10 Handling Maintenance and Support Tasks
327(38)
Managing Automatic Updates
327(1)
Windows Update: The Essentials
327(2)
Restoring Payloads and Components via Windows Update
329(1)
Configuring Automatic Updating
330(5)
Checking for Updates
335(1)
Viewing Update History and Installed Updates
336(1)
Removing Automatic Updates to Recover from Problems
336(1)
Hiding Available Updates
336(1)
Restoring Declined Updates
337(1)
Using Remote Assistance to Resolve Problems
337(1)
Understanding Remote Assistance
337(2)
Creating Remote Assistance Invitations
339(2)
Offering Remote Assistance or Answering a Remote Assistance Invitation
341(1)
Detecting and Resolving Windows 8 Errors
342(1)
Using the Event Logs for Error Tracking and Diagnosis
342(1)
Viewing and Managing the Event Logs
343(1)
Scheduling Maintenance Tasks
344(1)
Understanding Task Scheduling
345(1)
Viewing and Managing Tasks on Local and Remote Systems
346(2)
Creating Scheduled Tasks
348(1)
Troubleshooting Scheduled Tasks
348(1)
Backing Up and Recovering a Computer
349(1)
Backing Up and Recovering Files and Folders Using Previous Versions
349(1)
Recovering from a Failed Start
350(1)
Recovering from a Failed Resume
351(1)
Repairing a Computer to Enable Startup
351(2)
Backing Up and Recovering System State Using System Restore
353(4)
Creating and Using File History
357(4)
Troubleshooting Startup and Shutdown
361(1)
Resolving Restart or Shutdown Issues
361(1)
Making Sense of Stop Errors
362(3)
Chapter 11 Using TPM and BitLocker Drive Encryption
365(38)
Creating Trusted Platforms
365(1)
TPM: The Essentials
366(1)
TPM: Management and Policies
367(3)
Enabling TPM
370(2)
Initializing and Preparing a TPM for First Use
372(3)
Turning an Initialized TPM On or Off
375(1)
Clearing the TPM
375(2)
Changing the TPM Owner Password
377(1)
BitLocker Drive Encryption: The Essentials
378(1)
Understanding BitLocker Drive Encryption
378(3)
Hardware Encryption, Secure Boot, and Network Unlock
381(3)
Deploying BitLocker Drive Encryption
384(4)
Managing BitLocker Drive Encryption
388(1)
Preparing for BitLocker Drive Encryption
389(2)
Enabling BitLocker on Nonsystem Volumes
391(2)
Enabling BitLocker on USB Flash Drives
393(2)
Enabling BitLocker on System Volumes
395(4)
Managing and Troubleshooting BitLocker
399(4)
Chapter 12 Managing Disk Drives and File Systems
403(68)
Disk Management Essentials
403(4)
Using the Computer Console
407(2)
Using Disk Management
409(2)
Using FSUtil and DiskPart
411(1)
Improving Disk Performance
411(1)
Understanding and Using Windows ReadyBoost
411(1)
Enabling and Configuring ReadyBoost
412(2)
Understanding and Using Windows ReadyDrive
414(1)
Understanding and Using Windows SuperFetch
414(2)
Working with Basic and Dynamic Disks
416(4)
Using Basic and Dynamic Disks
420(1)
Understanding Drive Designations
420(2)
Installing and Initializing New Physical Disks
422(1)
Changing a Disk's Partition Table Style
422(1)
Marking a Partition as Active
423(1)
Converting a Basic Disk to a Dynamic Disk or Vice Versa
424(2)
Working with Disks, Partitions, and Volumes
426(1)
Partitioning Disks and Preparing Them for Use
427(1)
Creating Partitions, Logical Drives, and Simple Volumes
428(3)
Creating Spanned and Striped Volumes
431(1)
Shrinking or Extending Volumes
432(2)
Formatting Partitions and Volumes
434(1)
Assigning, Changing, or Removing Drive Letters and Paths
435(1)
Assigning, Changing, or Deleting a Volume Label
436(1)
Deleting Partitions, Volumes, and Logical Drives
437(1)
Converting a Volume to NTFS
437(2)
Recovering a Failed Simple, Spanned, or Striped Volume
439(1)
Regenerating a Striped Set with Parity
440(1)
Using Disk Mirroring
440(1)
Creating Mirrored Volumes
441(1)
Breaking a Mirrored Set
441(1)
Removing a Mirrored Set
442(1)
Moving a Dynamic Disk to a New System
442(1)
Troubleshooting Common Disk Problems
443(4)
Repairing Disk Errors and Inconsistencies
447(1)
Checking for Disk Errors
448(3)
Defragmenting Disks
451(3)
Resynchronizing and Repairing a Mirrored Set
454(1)
Repairing a Mirrored System Volume to Enable Boot
454(1)
Working with Removable Storage Devices
455(2)
Working with Data Discs
457(1)
Disc Burning: The Essentials
457(1)
Mounting ISO Images
458(1)
Burning ISO Images to Disc
459(1)
Burning Mastered Discs
459(2)
Burning Discs with Live File Systems
461(1)
Changing the Default Burning Options
461(1)
Managing Disk Compression and File Encryption
462(1)
Compressing Drives and Data
462(2)
Encrypting Drives and Data
464(7)
Chapter 13 Managing File Security and Resource Sharing
471(44)
File Security and Sharing Options
471(5)
Controlling Access to Files and Folders with NTFS Permissions
476(1)
Understanding and Using Basic Permissions
476(6)
Assigning Special Permissions
482(4)
Assigning Claims-Based Permissions
486(2)
File Ownership and Permission Assignment
488(1)
Applying Permissions Through Inheritance
489(3)
Determining the Effective Permissions and Troubleshooting
492(2)
Sharing Files and Folders over the Network
494(1)
Controlling Access to Network Shares
495(1)
Creating a Shared Resource
496(4)
Creating and Managing Shared Folders in Group Policy
500(2)
Using and Accessing Shared Resources
502(3)
Using and Accessing Shared Folders for Administration
505(2)
Troubleshooting File Sharing
507(1)
Using and Configuring Public Folder Sharing
508(1)
Using Public Folder Sharing
509(1)
Configuring Public Folder Sharing
509(1)
Auditing File and Folder Access
510(1)
Enabling Auditing for Files and Folders
510(1)
Configuring and Tracking Auditing
511(4)
Chapter 14 Maintaining Data Access and Availability
515(28)
Configuring File Explorer Options
515(1)
Customizing File Explorer
515(3)
Configuring Advanced File Explorer Options
518(4)
Managing Offline Files
522(1)
Understanding Offline Files
522(1)
Making Files or Folders Available Offline
523(3)
Managing Offline File Synchronization
526(4)
Configuring Disk Usage Limits for Offline Files
530(1)
Managing Encryption for Offline Files
531(1)
Making Offline Files Unavailable
531(1)
Configuring Disk Quotas
532(1)
Using Disk Quotas
532(1)
Enabling Disk Quotas on NTFS Volumes
533(2)
Viewing Disk Quota Entries
535(1)
Creating Disk Quota Entries
536(1)
Updating and Customizing Disk Quota Entries
536(1)
Deleting Disk Quota Entries
537(1)
Exporting and Importing Disk Quota Settings
538(1)
Disabling Disk Quotas
539(1)
Using Branch Caching
539(4)
Chapter 15 Configuring and Troubleshooting TCP/IP Networking
543(28)
Navigating Windows 8 Networking Features
543(1)
Understanding Network Discovery and Network Categories
544(1)
Working with Network Explorer
545(2)
Working with Network And Sharing Center
547(1)
Installing Networking Components
548(1)
Working with TCP/IP and the Dual IP Stack
548(2)
Installing Network Adapters
550(1)
Installing Networking Services (TCP/IP)
551(1)
Configuring Network Connections
552(1)
Configuring Static IP Addresses
552(3)
Configuring Dynamic IP Addresses and Alternate IP Addressing
555(1)
Configuring Multiple Gateways
556(1)
Configuring DNS Resolution
557(2)
Configuring WINS Resolution
559(2)
Managing Network Connections
561(1)
Enabling and Disabling Network Connections
561(1)
Checking the Status, Speed, and Activity for Network Connections
562(1)
Viewing Network Configuration Information
563(1)
Renaming Network Connections
564(1)
Troubleshooting and Testing Network Settings
564(1)
Diagnosing and Resolving Network Connection Problems
564(1)
Diagnosing and Resolving Internet Connection Problems
565(1)
Performing Basic Network Tests
566(1)
Resolving IP Addressing Problems
567(1)
Releasing and Renewing DHCP Settings
568(1)
Registering and Flushing DNS
569(2)
Chapter 16 Managing Mobile Networking and Remote Access
571(42)
Configuring Networking for Mobile Devices
571(1)
Working with Mobility Settings
572(1)
Configuring Dynamic IP Addresses
573(2)
Configuring Alternate Private IP Addresses
575(1)
Connecting to Networked Projectors
576(1)
Understanding Mobile Networking and Remote Access
577(3)
Creating Connections for Remote Access
580(1)
Creating a Dial-Up Connection
580(6)
Creating a Broadband Connection to the Internet
586(2)
Creating a VPN Connection
588(1)
Configuring Connection Properties
589(1)
Configuring Automatic or Manual Connections
589(2)
Configuring Proxy Settings for Mobile Connections
591(3)
Configuring Connection Logon Information
594(1)
Configuring Automatic Disconnection
595(1)
Setting a Connection to Use Dialing Rules
595(1)
Configuring Primary and Alternate Phone Numbers
596(1)
Configuring Identity Validation
597(1)
Configuring Networking Protocols and Components
597(3)
Enabling and Disabling Windows Firewall for Network Connections
600(1)
Establishing Connections
600(1)
Connecting with Dial-Up
600(2)
Connecting with Broadband
602(1)
Connecting with VPN
603(1)
Wireless Networking
604(1)
Wireless Network Devices and Technologies
604(2)
Wireless Security
606(2)
Installing and Configuring a Wireless Adapter
608(1)
Working with Wireless Networks and Wireless Connections
608(3)
Connecting to Wireless Networks
611(1)
Managing and Troubleshooting Wireless Networking
612(1)
Index 613
William R. Stanek is a Microsoft MVP with 20+ years of experience in systems management and advanced programming. He is an award-winning author whos written more than 100 books, including Windows Server 2012 Pocket Consultant and Microsoft SQL Server 2012 Pocket Consultant.