Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Stanek W.R. — Windows Vista Administrator's Pocket Consultant
Stanek W.R. — Windows Vista Administrator's Pocket Consultant



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Windows Vista Administrator's Pocket Consultant

Автор: Stanek W.R.

Аннотация:

Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of Windows Vista. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You’ll get the precise information you need to solve problems and get the job done—whether you’re at your desk or in the field!

Get fast facts to:

•Install and configure Windows Vista—and optimize the user workspace
•Maintain operating system components, hardware devices, and drivers
•Create user and group accounts—and control rights and permissions
•Administer group policy settings
•Manage files, folders, disk quotas, and shadow copies
•Set up and configure TCP/IP and mobile networking
•Configure security and privacy settings in Windows Internet Explorer
•Administer mobile PC settings with the new Windows Mobility Center
•Troubleshoot system issues and optimize performance


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2006

Количество страниц: 576

Добавлена в каталог: 04.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
NTFS, access permissions through, inheritance and      
NTFS, access permissions through, special      
NTFS, conversions of      
NTFS, disk quotas in      2nd
NTFS, security options on      
Offline Files      2nd
Offline files, files or folders as      
Offline files, Group Policy for      
Offline files, Group Policy for, controlling      
Offline files, Group Policy for, file cache      
Offline files, Group Policy for, setting      
Offline files, Group Policy for, synchronization      
Offline files, Group Policy for, types of      
Offline files, synchronization of      
Offline files, unavailable      
Offline files, understanding      
Offline files, working on      
Ownership, file      
Page file partition or volume      
Paging file size      
partitions, disk      
Partitions, disk, active      2nd
Partitions, disk, boot      
Partitions, disk, crash dump      
Partitions, disk, creating      
Partitions, disk, deleting      
Partitions, disk, extended      
Partitions, disk, formatting      
Partitions, disk, primary      2nd
Partitions, disk, system      
Passwords      
Passwords, as temporary Internet file      
Passwords, complexity of      
passwords, creating      
Passwords, for guest accounts      
Passwords, in mobile networking      
Passwords, key ring entries as      
Passwords, reasons for      2nd
passwords, recovering      
Passwords, required on wakeup      2nd
Passwords, to unlock computers      
Passwords, User Account Control (UAC) and      2nd
PC cards      
Performance      2nd [See also Diagnostics]
Performance log users group      
Performance monitor users group      
Peripheral Component Interconnect (PCI) cards      
Peripheral Component Interconnect (PCI) Express devices      
PERMISSIONS      2nd 3rd [See also NTFS (NT file system)]
Personal digital assistants (PDAs)      [See Mobile computing]
Personal toolbars      
Personalization console      
Personalize Windows option      
personalized menus      
phishing      
Photo Gallery Viewer      
Ping command      2nd
Playback devices      
Plug and play      2nd 3rd
Plug-ins      
policies      [See Group Policy]
pop-up blockers      
Power plans for mobile computing      
Power plans for mobile computing, advanced settings for      
Power plans for mobile computing, balanced      
Power plans for mobile computing, command line management of      
Power plans for mobile computing, creating      
Power plans for mobile computing, Group Policy for      
Power plans for mobile computing, high performance      
Power plans for mobile computing, saver      
Power plans for mobile computing, selecting      
Power plans for mobile computing, sleep mode in      
Power Users group      
Pre-boot execution environment (PXE)      2nd
Preinstallation environment      
presentations      2nd
Previous versions of software      
primary partitions      2nd 3rd
printers, adding      
Privacy settings      
Private network      
Privileges, elevation of      [See Elevation of privileges]
Processes tab      
Processor power management      
Productivity, taskbars and      
Program Compatibility Assistant Service      
Program Compatibility wizard      
Programs      [See Applications]
Projectors, networked      
Public Folders      2nd
Public network      
Quick format      
Quick Launch toolbar      2nd
Random access memory (RAM)      
Recording devices      
recovering      2nd
Recovering, corrupted files      
Recovering, failed disks      
Recovering, in system properties      
Recovering, passwords      
Recovering, rolling back drivers for      
Recycle Bin      2nd 3rd
redundant array of independent disks (RAID)      
Regional hardware device settings      
Register Windows option      
Reinstalling device drivers      
Relational database      
Remote access      [See also Mobile networking and remote access]
Remote Assistance      2nd
Remote desktop connections      
Remote desktop users group      
Remote tab, in system properties      
Removing      
Removing, startup programs      
Removing, themes      
Removing, user and group account members      
Removing, user and group accounts      
Removing, Windows features      
Renaming user and group accounts      
Repairing installed applications      
Repeat delay      
Replicator group      
Reset disk, password      2nd
resolution, screen      
Resource Exhaustion Detection and Resolution      
Resource sharing      [See File security and resource sharing]
Restart Manager      
Restarting Windows Vista      
restore      
Restore, inheritance permissions      
Restore, Show Desktop button      
Restore, system      2nd 3rd
Restore, WMI statistics      
Restricted Web sites, in security zones      2nd
Return on investment (ROI)      
Robust Security Network (RSN)      
Rolling back device drivers      
RSS (Really Simple Syndication) feed      
Run levels of applications      
Run lists      
RunAsAdmin applications      
RunAsHighest applications      
RunAsInvoker applications      
Safe Mode      
Saver power plans      
screen resolution      
screen savers      2nd
Scripts      2nd
Search Box      
Search button      
Secure desktop      
Secure Digital (SD) cards      
Secure guest user and group accounts      2nd 3rd
Secured passwords      
Security      [See also File security and resource sharing]
security groups      
Security Identifiers (SIDs)      
Security, applications and      
Security, dynamic protection for      
Security, for wireless connections      
Security, in domain environment      
Security, Internet Explorer security zones for      
Security, Kerberos      
Security, of NTFS      
Security, of WMI statistics      
Security, User Account Control (UAC) for      2nd 3rd
Security, Wired Equivalent Privacy (WEP) protocol for      
selective startup      
Services, system      
Set userprofile command      
Settings of hardware devices      [See Device settings]
Setup Information files, for drivers      
Sharing of resources      [See File security and resource sharing; Networks; Offline files]
Show Desktop button      
Shutting down Windows Vista      2nd 3rd
Side-by-side, show Windows      
Sidebar, desktop      
Signal strength, in wireless connections      
Signed and unsigned device drivers      
Simple start menu      2nd
Single-instance storage      
Sleep state, computer in      2nd
Slide show, on desktop      
Small memory dumps      
smart cards      
Socks Internet settings      
Software Explorer      
Software, information on      
Sound themes      2nd
Spanned volumes      2nd 3rd 4th
Special identities, for permissions      
Special NTFS access permissions      
SSL (Secure Sockets Layer)      
Stack Windows      
Standard (in-place) file sharing      
Start menu      
Start menu, adding options to      
Start Menu, classic      
Start menu, rearranging items on      
Start menu, simple      2nd
startup      
Startup Repair Tool (StR)      
Startup, Group Policy for      
Startup, in system properties      
Startup, programs in      
Startup, scripts for      2nd
Startup, Software Explorer and      
Startup, system support tools for      2nd
Static IP addresses      
Storage      2nd 3rd
Striped volumes      2nd 3rd 4th
submenus      
Subnet mask      
Summary network map      
Support      [See Automated help and support]
Sync Center      
Synchronization      2nd 3rd
Sysprep image-based installation      
System and user environment variables      
System Checkpoint      
System Configuration Utility      2nd 3rd [See also Configuring systems hardware and
System Information      
System partitions or volume      2nd
System properties of Windows Vista      
System properties of Windows Vista, on advanced tab      
System properties of Windows Vista, on advanced tab, data execution prevention (DEP) on      
System properties of Windows Vista, on advanced tab, performance on      
System properties of Windows Vista, on advanced tab, startup and recovery on      
System properties of Windows Vista, on advanced tab, system and user environment variables on      
System properties of Windows Vista, on advanced tab, virtual memory on      
System properties of Windows Vista, on computer name tab      
System properties of Windows Vista, on hardware tab      
System properties of Windows Vista, on remote tab      
System properties of Windows Vista, on system protection tab      
System Restore      2nd 3rd
System support tools for Windows Vista      2nd
System support tools for Windows Vista, boot options      
System support tools for Windows Vista, disk cleanup      
System support tools for Windows Vista, file signature verification      
System support tools for Windows Vista, startup applications      2nd
System time      [See Internet time]
Tablet display      
Taking ownership permission      
Task Manager      2nd
Task Scheduler      
taskbar      
Taskbar, notification area of      
Taskbar, size and position of      
Taskbar, visibility of      
Templates      2nd
Temporary files, Microsoft Office      
Temporary Internet files      2nd
themes      2nd
thumbnails      2nd
Tile images      
Time      2nd [See also Internet time]
Toolbars      2nd
Total Cost of Ownership (TCO)      
Tracking device drivers      
Transfer files and settings option      
Transmission Control Protocol/Internet Protocol (TCP/IP) networking      
Transparency slider      
Traveling users      [See Mobile computing]
troubleshooting      
Troubleshooting, disks      
Troubleshooting, in preinstallation environment      
Troubleshooting, networking      
Troubleshooting, safe mode for      
troubleshooting, services      
Troubleshooting, startup applications      
Trusted Web sites, in security zones      2nd
Turning off Windows Vista      
Unattended installation answer file      
uninstalling      2nd
Unsecured passwords      
Unsigned device drivers      
Updating      2nd
Upgrading to Windows Vista      2nd
URLs (universal resource locators)      
Usability improvement      
USB (Universal Serial Bus) devices      2nd 3rd
USB (Universal Serial Bus) ports      2nd 3rd 4th
User Account Control (UAC)      
User Account Control (UAC), application installation and      2nd 3rd
User Account Control (UAC), enabling and disabling      
User Account Control (UAC), for security      2nd
User Account Control (UAC), in managing Windows Vista      
user and group accounts      
User and group accounts, adding and removing members of      
User and group accounts, changing types of      
User and group accounts, controlling logon to      
User and group accounts, creating local      
User and group accounts, creating workgroup local      
User and group accounts, deleting      
User and group accounts, domain versus local logon to      
User and group accounts, essentials of      
User and group accounts, existing domain accounts and      
User and group accounts, for workstations      
User and group accounts, passwords for      
User and group accounts, passwords for, creating      
1 2 3 4
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте