This system administrators bible provides detailed coverage of Active Directory security, auditing, and integration with existing installations. It includes a realistic case study to be used as a template for system migration and integration. The book also examines distributed security applications such as Kerberos, and standards such as X.500. It offers hard to find tips on improving directory performance and it explains in detail how Windows 2000's Active Directory subsystem manages "system lookup" tasks by associated users with passwords and permissions.
Taking a task-oriented approach to Windows NT Registry, this title provides comprehensive and accurate information on Registry manipulation and settings. The book includes tear-out quick reference cards and important tips for key Registry entries.
This black book shows how to build a simple, but powerful database profile utility, and explains how to set up data replication. It covers the essentials of transaction management, with information on new locking structures. Discover the latest XML data interchange technology along with several examples readers can use to quickly build applications.
This book has been enhanced from the first edition to include group policy, restructuring the enterprise environment, enterprise networking, advanced Active Directory components, enhanced enterprise installation options, advanced file and resource administration, enterprise networking solutions, Windows 2000-specific security features, and additional troubleshooting. Plus, this book takes readers through best practice planning, implementation, and rollout of solutions specific to Windows 2000.
This hands-on reference focuses exclusively on difficult Mac/NT integration issues and explains steps required to seamlessly network Mac desktops and NT desktops on the same LAN. The authors provide solutions to data interchange conflicts and suggest strategies for migrating Mac desktops to Win 9x or NT without loss of data or functionality.
Written by the Cisco expert and author of Cisco Routers for IP Routing Little Black Book (Coriolis ISBN 1-57610-421-4). Explores complex topics in-depth, in the popular Black Book format, using a complete systematic approach to Cisco IP networking along with comprehensive examples and diagrams. Covers the most important routing concepts by introducing the subject and then going through relevant practical examples. The configurations in this book were implemented in a lab with real Cisco routers. Especially written as a comprehensive guide for intermediate and advanced network professionals, or network specialists studying for the CCIE certification, to help answer all major router configuring and troubleshooting issues.
Written for IT professionals, network administrators, and support personnel, this book provides instruction for installing Windows 2000 Professional, calculating deployment costs, configuring and troubleshooting network capabilities, managing registry settings, fixing printing errors, and optimizing performance. A companion CD-ROM contains demo sof
Windows Admin Scripting Little Black Book, 3rd Edition, shows Windows users and administrators how to perform Windows management and administrative tasks using powerful scripts for just about every important task imaginable. It covers techniques for working with files, input/output, text files, and performing various network administrative tasks through scripting. It presents the necessity of logon scripts, the backbone structure of a good logon script, and how to implement these scripts in an everyday environment to automate repetitive tasks such as inventory, file modifications, installations, and system updates. It also provides an in-depth look into the registry and registry editing tools including locating the important registry keys and values, and modifying them. The book features example scripts on every new topic covered to reinforce what the reader has just learned. Key scripting topics include manipulating the Windows XP file system, using powerful third-party scripting tools, creating scripts for installing service packs and new applications, automating applications from the command line, and setting up security features for Windows XP. Everything is included in this book, and users can easily modify or combine the scripts to perform myriad tasks. And the author has included all the scripts on his website for easy reference.
Systems administrators can turn to this guide for help in installing, configuring, operating, and troubleshooting a Windows 2000 network. A unique "write-in" format allows readers to custom this book to their needs. The release is timed to coincide with the availability of Microsoft's NT 5 operating system software.