Muutke küpsiste eelistusi

Windows Vista: Beyond the Manual 1st ed. [Pehme köide]

  • Formaat: Paperback / softback, 475 pages, kõrgus x laius: 235x178 mm, kaal: 943 g, 475 p., 1 Paperback / softback
  • Ilmumisaeg: 06-Mar-2007
  • Kirjastus: APress
  • ISBN-10: 1590597710
  • ISBN-13: 9781590597712
Teised raamatud teemal:
  • Pehme köide
  • Hind: 35,72 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 42,03 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 475 pages, kõrgus x laius: 235x178 mm, kaal: 943 g, 475 p., 1 Paperback / softback
  • Ilmumisaeg: 06-Mar-2007
  • Kirjastus: APress
  • ISBN-10: 1590597710
  • ISBN-13: 9781590597712
Teised raamatud teemal:
Windows Vista: Beyond the Manual is a comprehensive guide to installing, configuring, exploiting, and using the richest Microsoft client operating system on the market. It guides you through the complexities of configuring and running a successful Windows Vista client computer. It also takes an in-depth look at the wealth of features and functions comprising the various flavors of the software.



Windows Vista provides a range of new capabilities and features, many of which are apparent through a totally redesigned interface, and many more that are hidden just beneath the surface. With the help of Windows Vista: Beyond the Manual, IT professionals and home PC enthusiasts alike will become expert users, taking full advantage of the myriad functions and features that make up this release. Noted authors Jonathan Hassell and Tony Campbell pack this book full of their own experience, plus hundreds of hints, tips, and walkthroughs, making it an indispensable companion that wont waste your time.







A one-stop shop for geeks and knowledgeable users getting to know Windows Vista. The authors walk you through practically every useful function. All versions of Windows Vista are covered and analyzed, and recommendations are offered. The book devotes a section to next-generation Media Center. A complete "Where Am I" guide is included for new Vista users. Domain integration and unattended installation are also covered in detail.
About the Authors xxi
About the Technical Reviewer xxiii
Introducing Windows Vista
1(18)
Vista Editions
2(3)
Home Basic
3(1)
Home Premium
3(1)
Business
4(1)
Enterprise
4(1)
Ultimate
4(1)
Upgrading Vista Versions
4(1)
New and Improved in Vista
5(14)
The Interface
5(3)
Instant Search
8(1)
Pervasive Metadata
9(1)
Communications
9(1)
Digital Media and Gaming
10(2)
Mobility
12(1)
Security
13(2)
Deployment
15(1)
Performance and Stability
16(1)
For Developers
17(2)
Meeting the Hardware Requirements
19(12)
Using the Windows Vista Upgrade Advisor
20(4)
Buying the Right PC
24(3)
Upgrading from Windows XP
25(1)
Buying a New System
26(1)
Understanding the Windows Experience Index
27(4)
Installing and Setting Up Vista
31(24)
Obtaining the Software License
31(2)
Licensing Vista in the Home
32(1)
Licensing Vista in Business
32(1)
Installing Vista on a Single Computer
33(2)
Deploying Vista
35(12)
A Brief Word on Modularization
37(1)
Creating Unattended Answer Files
37(4)
Setting Up Your Master Computer
41(1)
Generalizing Your Master Computer Using Sysprep
42(1)
Using WinPE and ImageX to Create the Image
42(2)
Using WinPE and ImageX to Deploy the Image
44(1)
More on ImageX
45(1)
More on WinPE
45(2)
Using Microsoft Solution Accelerator for Business Desktop Deployment
47(1)
Using Windows Easy Transfer
47(6)
Using the User State Migration Tool
53(2)
Finding Your Way Around the Desktop
55(14)
Logging In to Vista
55(1)
Exploring the Vista Desktop
56(7)
Personalizing the Desktop
57(4)
Using the Windows Sidebar
61(2)
Customizing the Start Menu and Taskbar
63(3)
Switching Through Windows
66(3)
Using Flip
67(1)
Using Flip 3D
68(1)
Customizing Windows Vista
69(20)
Customizing Display Settings
69(7)
Customizing Windows Sidebar
76(2)
Customizing Windows SideShow
78(1)
Customizing with the Local Computer Policy
79(10)
How the Local Computer Policy Relates to the Registry
79(3)
Local Policy vs. Domain Policy
82(1)
How to Use the MMC
82(2)
How to Use the Local Computer Policy
84(5)
Working with User Tools
89(24)
Exploring the Welcome Center
89(2)
Understanding the Start Menu
91(5)
Customizing the Start Menu
96(3)
Working with Windows Explorer
99(9)
Following the Breadcrumb Navigation
100(1)
Using the Task Pane
101(3)
Searching in Windows Explorer
104(2)
Increasing the Scope of Your Index
106(2)
Using Groups, Stacks, and Filters
108(5)
Administering Windows Vista
113(20)
Using the Control Panel
113(5)
Using System Administration Tools
118(9)
Backing Up Your Files
118(3)
Restoring Files, Folders, and System Images
121(1)
Starting and Stopping Vista Services
122(3)
Using the System Applet
125(1)
Adding or Removing User Accounts
125(2)
Using System Restore
127(2)
Using User Account Control
129(4)
Working with the Command Line
133(16)
Customizing the Command Shell
134(2)
Understanding Commands
136(3)
Working with Batch Files
139(4)
Starting Out with a Simple Example
139(1)
Creating Advanced Batch Files
140(3)
Commands to Add to Your Admin Arsenal
143(6)
BCDedit
144(1)
ipconfig
144(1)
ping
145(1)
pathping
145(1)
systeminfo
145(1)
net
146(1)
ImageX
147(1)
robocopy
147(1)
shutdown
147(1)
diskpart
148(1)
Understanding the New Folder Structures and Elements
149(8)
Introducing Search Folders
149(2)
Introducing Symbolic Links
151(2)
Using the Preview Pane
153(4)
Working with the File System
157(10)
Setting Permissions
157(7)
Introducing Standard and Special Permissions
157(3)
Setting Permissions
160(1)
Introducing Inheritance and Ownership
161(2)
Determining Effective Permissions
163(1)
Using Previous Versions
164(3)
Using BitLocker
167(10)
Understanding the BitLocker Essentials
167(2)
Under the Hood: BitLocker
168(1)
Partitioning Your Volume
169(1)
Initializing the Trusted Platform Module
170(1)
Turning On BitLocker
171(2)
Using a PIN with TPM-Enabled BitLocker
173(1)
Using BitLocker Without the Trusted Platform Module
173(1)
Recovering BitLocker-Protected Data
174(1)
Disabling BitLocker
175(2)
Hooking Up Wired and Wireless Networks
177(10)
Going Wireless
178(1)
Getting Connected
178(1)
Working with Networks
179(8)
The Network and Sharing Center
179(6)
Network Map
185(1)
Network Connections
185(2)
Understanding TCP/IP
187(12)
Conquering the Jargon
188(2)
Understanding the IP Address
190(1)
Configuring IP Addresses in Vista
191(1)
Understanding DNS
192(1)
Understanding DHCP and Static Addressing
193(1)
Gathering TCP/IP Information
194(1)
Introducing TCP/IP Version 6
195(4)
Who Needs More IP Addresses?
196(3)
Connecting to the Internet
199(6)
Gathering the ISP Account Details
200(1)
Creating the Connection in Vista
201(2)
Setting Up Internet Connection Sharing
203(2)
Using the Remote Desktop Connection
205(8)
Switching On Remote Access
205(4)
Using the RDC Client
209(1)
Setting the Remote Desktop Connection Options
210(3)
Setting Up a Network Presentation
213(4)
Connecting the Projector
213(4)
Using Windows Internet Explorer 7
217(18)
Looking at the Major Areas of Improvement
217(2)
Security
217(1)
User Experience
218(1)
Internet Explorer Platform
218(1)
Standards Compliance
218(1)
Examining the New Internet Explorer Features
219(4)
Tabbed Browsing
219(2)
Phishing Filter
221(2)
Implementing RSS Feeds
223(1)
Customizing Internet Explorer 7
224(7)
Hardening Internet Explorer 7
231(4)
The MHTML Hole
231(1)
Protected Mode and the Phishing Filter
232(1)
Settings Checklist
232(3)
Setting Up Windows Mail
235(16)
Setting Up Accounts
235(2)
Setting Up a Mail Account
235(1)
Setting Up a News Account
236(1)
Setting Up a Directory Service Account
236(1)
Working Within Windows Mail
237(2)
Personalizing Windows Mail
238(1)
Using Newsgroups
239(2)
Strategies for Managing Newsgroup Reading
240(1)
Creating Message Rules
241(2)
Protecting Against Unwanted Email and Attachments
243(6)
Changing the Junk Email Protection Level
243(1)
Adding and Removing Senders to the Blocked Senders and Safe Senders Lists
244(2)
Managing International Messages
246(1)
Guarding Against Phishing
247(1)
Blocking Potentially Problematic Attachments
248(1)
Performing Windows Mail Maintenance
249(2)
Collaborating with Windows Meeting Space
251(6)
What Is Windows Meeting Space?
251(1)
Using Windows Meeting Space
252(5)
Using Windows Fax and Scan
257(8)
Faxing
257(5)
Sending and Receiving Faxes Using a Modem
257(3)
Sending and Receiving Faxes Using a Network Fax Server
260(1)
Sending Faxes Through Other Applications
261(1)
Scanning
262(3)
Tips for Advanced Scanning
263(2)
Working with Windows Media Player 11
265(34)
Setting Up Media Player for the First Time
265(7)
Understanding Privacy
267(2)
Selecting the Default Music and Video Player
269(3)
What's Playing?
272(2)
Introducing the Media Library
274(10)
Working with Different Types of Content
277(1)
Creating and Using Playlists
277(3)
Adding Content to the Library
280(1)
Sharing Your Library
281(1)
Getting Album Art and Media Information
282(1)
Using the Advanced Library Options
282(2)
Ripping Content to the Library
284(2)
Creating CDs and DVDs from Your Library
286(3)
Synchronizing with Portable Devices
289(6)
Shuffling Music Content on a Portable Device
291(1)
Setting Up Synchronizations
292(1)
Using the Advanced Options for Portable Devices
293(2)
Buying Music Online
295(1)
Using the Classic Menus
296(1)
Using the Mini Player
296(1)
Customizing Windows Media Player
297(2)
Working with Windows Movie Maker
299(24)
Examining the Interface
300(3)
Understanding Windows Movie Maker Projects
301(1)
Introducing the Tasks Pane
301(1)
Introducing the Collections Pane
301(1)
Introducing the Preview Pane
302(1)
Introducing the Storyboard and Timeline Panes
302(1)
Introducing AutoMovie
302(1)
Capturing and Importing Content
303(5)
Capturing Content from a Camcorder
304(2)
Importing Videos
306(1)
Importing Pictures
307(1)
Importing Audio Content
307(1)
Producing Your First Movie
308(9)
Getting to Know the Storyboard and Timeline Panes
308(2)
Adding Clips to the Storyboard
310(1)
Splitting Video Clips
311(1)
Adding Transitions
311(1)
Adding Effects
312(2)
Adding a Soundtrack
314(1)
Adding Opening Titles and Closing Credits
314(3)
Creating the Final Cut
317(1)
Setting Advanced Movie Maker Options
317(1)
Mastering Your Production
318(5)
Working with Windows Photo Gallery
323(22)
Getting Started
324(5)
Capturing and Importing Images
329(2)
Importing Photo and Video Items from the File System
329(1)
Importing Photo and Video Items from a Digital Camera
329(2)
Working with Your Photos
331(5)
Using the File Menu
331(4)
Using the Fix Controls
335(1)
Working with Metadata
336(2)
Printing and Online Ordering
338(1)
Creating a DVD, Movie, or Data Disc
339(1)
Sending Photos by Email
340(1)
Running a Slide Show
341(2)
Using Themes
341(1)
Setting Options
341(1)
Manually Controlling Slide Shows
342(1)
Setting Audio Controls
342(1)
Ending a Slide Show
342(1)
Integrating with Other Applications
343(2)
Working with Windows DVD Maker
345(18)
Understanding the Interface
346(5)
Creating a DVD Project
351(5)
Arranging Movie Items in Order
351(1)
Choosing Menu Styles and Viewing Previews
352(3)
Burning a DVD
355(1)
Customizing Your Project
356(3)
Setting DVD Menu Text
356(1)
Working with Menu Styles
357(2)
Creating Slide Shows
359(4)
Working with Windows Media Center
363(16)
Using Media Center PCs
364(1)
Buying a Media Center PC
364(3)
Using a Standard Desktop
365(1)
Using a Laptop
365(1)
Using a Living-Room PC
365(1)
Networking a Media Center PC
365(1)
Using Extenders
366(1)
Setting Up Digital TV
367(4)
Setting Up the Music Library
371(1)
Setting Up Pictures and Videos
372(1)
Exploring More Setup Options
373(1)
Using Media Center
374(5)
Making the Most of the Guide
374(2)
Getting Online Media
376(1)
Setting Parental Controls
377(2)
Managing General Windows Vista Security
379(10)
User Account Control
379(2)
Using Workgroups and Domains
381(2)
Managing Data Execution Prevention
383(1)
Understanding and Using Security Templates
383(4)
Where Security Is Covered Elsewhere
387(2)
Implementing the Windows Firewall
389(16)
Using the Standard-Issue Windows Firewall
389(5)
General Settings
391(1)
Exceptions
392(2)
Advanced Settings
394(1)
Using the Windows Firewall with Advanced Security
394(11)
Inbound and Outbound Rules
396(4)
Connection Security Rules
400(2)
Monitoring
402(1)
Configuring Profiles
403(2)
Using Windows Defender
405(12)
What Is Spyware?
405(1)
Introducing Windows Defender
406(11)
Getting Real-Time Protection
407(1)
Using Windows Defender
408(1)
Configuring Options
409(3)
Joining the Microsoft SpyNet Community
412(1)
Using Software Explorer
413(4)
Best Practices: A Six-Step Guide to Better Security
417(14)
Step 1: Strengthen Your Password Policy
417(2)
Step 2: Use or Convert Drives to NTFS
419(1)
Step 3: Understand and Use File System Security
420(4)
Step 4: Configure the Windows Firewall
424(2)
Configuring Profiles
425(1)
Configuring Through Group Policy
425(1)
Step 5: Think About Patching and Update Policies
426(1)
Step 6: Audit Sensitive Events
427(4)
Recommended Items to Audit
429(2)
Maintaining the Windows Registry
431(8)
Presenting a Brief Structural Overview
431(1)
Using the Registry Editor
432(2)
Using reg Files to Manage the Registry
434(1)
Understanding the Typical Registry Caveats
435(1)
Using Advanced Registry Tools
436(3)
Troubleshooting
439(10)
Using Event Viewer
439(5)
Using Custom Views in Event Viewer
441(1)
Using Event Subscriptions
442(2)
Using the Reliability and Performance Monitor
444(3)
Setting Advanced Boot Options
447(2)
Recovering from Serious Issues
449(12)
Using the Windows Recovery Environment
449(4)
Exploring Other Recovery Options in the WinRE Environment
450(1)
Accessing WinRE
451(2)
Using System Restore
453(6)
What's New in Windows Vista System Restore?
455(1)
Using System Restore
455(3)
Being Aware of System Restore ``Gotchas''
458(1)
The Last Word
459(2)
Index 461


Tony Campbell is a veteran Microsoft consultant (MCP) specializing in the architecture and design of secure Microsoft-centric business solutions. He also has vast experience in many other industry niches such as networking, collaboration, security, business logic, and disaster recovery and resilience. Tony has been involved with all sizes of business, from the very small to the very large, and has successfully delivered secure, reliable, robust solutions to more than 150,000 clients during his 18 years in the business. Tony started his career back in the 1980s as a green screen mainframe programmer for the British Meteorological Office, finally arriving after a long journey to his current role as a self-employed IT consultant for more than a dozen full-time customers. Tony is a regular contributor to a number of IT journals distributed across the globe, and has been involved in the production of software manuals, user guides, white papers, hardware manuals, and training courses. His love of writing has led to publication of some fiction by a number of small presses as well as by a few more obscure magazines.