Windows 2000 Mac Support Little Black Book

Windows 2000 Mac Support Little Black Book

Author: Gene Steinberg

Publisher: Coriolis Group Books

Published: 2000

Total Pages: 420

ISBN-13: 9781576103883

DOWNLOAD EBOOK

This hands-on reference focuses exclusively on difficult Mac/NT integration issues and explains steps required to seamlessly network Mac desktops and NT desktops on the same LAN. The authors provide solutions to data interchange conflicts and suggest strategies for migrating Mac desktops to Win 9x or NT without loss of data or functionality.


Windows 2000 Active Directory Black Book

Windows 2000 Active Directory Black Book

Author: Adam Wood

Publisher: Paraglyph Press

Published: 2000

Total Pages: 702

ISBN-13: 9781932111439

DOWNLOAD EBOOK

This system administrators bible provides detailed coverage of Active Directory security, auditing, and integration with existing installations. It includes a realistic case study to be used as a template for system migration and integration. The book also examines distributed security applications such as Kerberos, and standards such as X.500. It offers hard to find tips on improving directory performance and it explains in detail how Windows 2000's Active Directory subsystem manages "system lookup" tasks by associated users with passwords and permissions.


Windows Admin Scripting Little Black Book

Windows Admin Scripting Little Black Book

Author: Jesse M. Torres

Publisher:

Published: 2006

Total Pages: 514

ISBN-13:

DOWNLOAD EBOOK

Windows Admin Scripting Little Black Book, 3rd Edition, shows Windows users and administrators how to perform Windows management and administrative tasks using powerful scripts for just about every important task imaginable. It covers techniques for working with files, input/output, text files, and performing various network administrative tasks through scripting. It presents the necessity of logon scripts, the backbone structure of a good logon script, and how to implement these scripts in an everyday environment to automate repetitive tasks such as inventory, file modifications, installations, and system updates. It also provides an in-depth look into the registry and registry editing tools including locating the important registry keys and values, and modifying them. The book features example scripts on every new topic covered to reinforce what the reader has just learned. Key scripting topics include manipulating the Windows XP file system, using powerful third-party scripting tools, creating scripts for installing service packs and new applications, automating applications from the command line, and setting up security features for Windows XP. Everything is included in this book, and users can easily modify or combine the scripts to perform myriad tasks. And the author has included all the scripts on his website for easy reference.


SQL Server 2000 Black Book

SQL Server 2000 Black Book

Author: Patrick Dalton

Publisher: Paraglyph Press

Published: 2001

Total Pages: 1020

ISBN-13: 9781932111385

DOWNLOAD EBOOK

This black book shows how to build a simple, but powerful database profile utility, and explains how to set up data replication. It covers the essentials of transaction management, with information on new locking structures. Discover the latest XML data interchange technology along with several examples readers can use to quickly build applications.


Windows 2000 Security

Windows 2000 Security

Author: Ian McLean

Publisher: Paraglyph Press

Published: 2000

Total Pages: 452

ISBN-13: 9781932111286

DOWNLOAD EBOOK

This book is known as the bible that points out security holes in the Windows 2000 system, as well as weaknesses that emerge from poor planning and lax administration. It places extra emphasis on Windows 2000 security issues raised by high-bandwidth connections to the Internet, with and without firewalls. It also covers Windows 2000 security at system deployment and at upgrade time, as well as during routine system administration. It organizes the Windows 2000 security topic functionally, according to tasks a system administrator would be called to perform.


Windows 2000 Systems Programming Black Book

Windows 2000 Systems Programming Black Book

Author: Al Williams

Publisher:

Published: 2000

Total Pages: 644

ISBN-13: 9781576102800

DOWNLOAD EBOOK

Programmers are shown little-known areas of Windows NTs to enable them to write more efficient and powerful programs using NT technology. Topics include multitasking and threading, active directory services, Microsoft message queue, overlapped I/O, advanced memory management and more. The CD-ROM features coverage of the Registry, shareware and freeware utilities for programmers, and tips and tricks for writing code.


Windows XP Registry: A Complete Guide to Customizing and Optimizing Windows XP

Windows XP Registry: A Complete Guide to Customizing and Optimizing Windows XP

Author: Olga Kokoreva

Publisher: БХВ-Петербург

Published: 2001

Total Pages: 534

ISBN-13: 193176901X

DOWNLOAD EBOOK

Targeting IT professionals, system administrators, and experienced users moving to the Windows XP platform, this book enables the user to master registry concepts and architecture, provides a historical overview of the registry, and outlines the differences between Windows 9x/ME and Windows NT/2000/XP registries. Special attention is drawn to the enhancements in registry architecture introduced with Windows XP, such as faster queries and removal of the registry size limitation. Covered in depth are how to properly use registry features, how to plan and implement the most appropriate registry backup strategy, and how to monitor and modify the system registry according to the administrative requirements and individual needs of the users.


Windows 2000 Registry Little Black Book

Windows 2000 Registry Little Black Book

Author: Nathan Wallace

Publisher: Paraglyph Press

Published: 2001-05

Total Pages: 0

ISBN-13: 9781932111194

DOWNLOAD EBOOK

Windows 2000 Registry Little Black Book is a must-have guide for every Windows users and administrator. This book provides more than 450 immediate solutions that help you solve numerous Windows configuration and registry problems.


Windows Server 2003 Regestry

Windows Server 2003 Regestry

Author: Olga Kokoreva

Publisher: БХВ-Петербург

Published: 2003

Total Pages: 571

ISBN-13: 1931769214

DOWNLOAD EBOOK

Enabling system, network, and security administrators to master Registry concepts and architecture, this book provides a historical overview of the Registry and outlines the differences between Windows 9x/ME and Windows NT/2000/XP/.NET Registries. Special attention is given to the enhancements in Registry architecture introduced with Windows XP and .NET such as faster queries and removal of the registry size limitation. Administrators are shown how to properly use Registry features, plan and implement the most appropriate Registry backup strategy, and monitor and modify the system registry according to the administrative requirements and the security policy adopted by the organization with respect to the needs of end-users. Total coverage is provided of the Windows XP and Windows .NET reliability enhancements such as Volume Snapshot Service, Windows File Protection, Automated System Restore, Driver Rollback, and Recovery Console. Advanced topics include Plug and Play implementation; device management including support for Smart devices such as Pocket PC, SmartPhone 2002, and Tablet PC; power management feature; and the role of the system Registry in the boot process.


Defense against the Black Arts

Defense against the Black Arts

Author: Jesse Varsalone

Publisher: CRC Press

Published: 2011-09-07

Total Pages: 414

ISBN-13: 1466509201

DOWNLOAD EBOOK

Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detection. It explains how to find virtually anything on the Internet and explores techniques that hackers can use to exploit physical access, network access, and wireless vectors. The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks.