Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Hassell J. — Learning Windows Server 2003
Hassell J. — Learning Windows Server 2003



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Learning Windows Server 2003

Автор: Hassell J.

Аннотация:

Windows Server 2003 is the right server for a world dominated by enterprise networks and web-based server applications, but getting this server up and running is a formidable task. Our no-fluff guide gives you exactly what you need for installing, configuring, securing, and managing Server 2003, and offers hands-on advice for planning, implementing and growing Windows networks without trying to teach you how to be a system administrator.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 671

Добавлена в каталог: 13.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Read Data special permission      
Read Extended Attributes special permission      
Read Permissions special permission      
Read standard permission (R)
read-only access
read-only access, to shared folders
recovery agent accounts, encrypted objects
Recovery Console      
Recovery Console, commands for
Recovery Console, setting up
Recreational Software Advisory Council (RSAC)
redundant array of intersomething disks      [See RAID]
refresh interval (SOA records)      2nd
refresh interval (SOA records), no-refresh interval with dynamically registered records
Registry      [See also registry keys] [See also registry keys]
registry keys
registry keys, permissions on, configuring
registry keys, SUS-related
registry, DNS cache timeout value      
registry, GP reversal feature
registry, securews.inf template
registry, trees of, GPs written to
Release Two (R2), Windows Server 2003      
remote access endpoint, RRAS setup scenarios
remote access server      [See RAS]
Remote Administration web site
Remote Administration web site (IIS administration)      
Remote Administration web site, security considerations      
Remote Assistance      2nd
Remote computers      
remote computers, backing up      
remote computers, backing up, system state data on
Remote Control add-on for Active Directory users/computers
Remote Desktop Protocol      [See RDP]
remote installation services
Remote Management      
remote management, tools      
remote management, tools, default shares
remote shares
remote shares, NTBACKUP, backing up with
Remote Storage
remote users      
remote users, distributing quarantined connection profile to, NAQC deployment
Remoting section, Settings configuration file
Removing
removing, nodes from NLB cluster      
removing, print servers
renaming domains      
RepAdmin (Replication Administrator)
RepAdmin, options
replay attacks      
replay attacks, IPSec prevention of
replicating      [See also replication] [See also replication]
replicating, Dfs root nodes
replicating, DNS information
replicating, DNS information, among domain controllers
Replication      2nd
Replication Administrator      [See RepAdmin]
replication partners
replication partners, viewing with RepAdmin
replication, across WAN links, managing bandwidth for
replication, decentralized approach, problems with      
replication, GPOs and
replication, loops
replication, multimaster      [See multimaster replication]
replication, network updates
replication, network updates, conflicts
replication, network updates, USNs
replication, partners      [See replication partners]
replication, PDC emulator role      
replication, strategies, Configure Replication wizard
replication, time synchronization
replication, to domain controllers      
replication, to domain controllers, in branch offices      2nd
replication, topologies
replication, trees/site links, spanning
replication, within sites
report messages (MSMQ)
report queues (MSMQ)
reservations
reservations, creating on DHCP servers
Resize ShadowStorage command
resource groups
resource groups, adding resource to
resource records
resource records, CNAME records      
resource records, creating/modifying
resource records, dynamically registered, scavenging outdated
resource records, host records
resource records, MX records
resource records, NS records      
resource records, pointer records      
resource records, service records      
resource records, SOA records
Resources      
resources, cluster services      
resources, cluster services, types of
resources, sharing
response messages (MSMQ)
response queues (MSMQ)      
restricted groups option (domain GP)      
restricting
restricting, access to shared printers
Resultant Set of Policy Wizard
retry interval (SOA records)      2nd
reverse lookup zones
reverse lookup zones, controlling your own, advantages of      
reverse lookup zones, creating      
RFC 1995      
RID Master      
Rights Management Services (RMS)
ring replication strategy
RIPrep      
RIPrep, limitations
RIS (Remote Installation Services)
RIS servers
RIS servers, activating      
RIS, activating RIS server
RIS, Custom Setup option
RIS, customization using OEM option      
RIS, deploying image to client      
RIS, hardware limitations of
RIS, limitations      
RIS, limitations, PXE      
RIS, slipstreaming service packs
RIS, types of installations with
RIS, using
RMS (Rights Management Services)
RoboCopy
RoboCopy, enhancements to Dfs and
root nodes      
root nodes, Dfs
Rootsec.inf template
round-robin balancing      2nd
Routing and Remote Access Server Setup Wizard
Routing and Remote Access Service      [See RRAS]
routing links      
routing links, configuring
routing links, creating      
RPC calls      
RPC calls, creating site links based over IP
rqc.exe
rqs      
rqs, exe
RRAS (Routing and Remote Access Service)
RRAS, configuring
RRAS, configuring NAQC quarantine policy in
RRAS, configuring, granting VPN access to users
RRAS, configuring, set up scenarios
RSAC (Recreational Software Advisory Council)
RSoP tool      
RSoP tool, GPO logging
RSoP tool, logging mode
RSoP tool, logging mode, using GPMC with
RSoP tool, planning mode
RSoP tool, planning mode, using GPMC with
RSoP tools      
RSoP tools, NTFS file/folder permissions, determining
Runtime section, Settings file
runtime versions
runtime versions, required and supported, specifying
RX permissions      
SAM (Security Accounts Manager)
SAM, Active Directory and
SAM, machine local groups and
SAs (security associations)      
saved indexes      
Scalability
scalability, Active Directory
scans, Indexing Service
scans, Indexing Service, initiating
SCAT (Security Configuration and Analysis Tool)      2nd 3rd
SCAT, enforcing security policies
SCAT, system security
SCAT, system security, correcting with
SCAT, system security, scanning with      
SCAT, template databases, creating/using
Schema
Schema Admins group
Schema Admins group, schema masters, changing      
schema master
schema master, identifying
schema master, Windows 2000 Server, identifying on      
schema, classes
schemas
schemas, master      [See schema master]
schemas, naming      
schemas, naming, replication topologies and
scope of indexes
scripted installation (RIS)      
Scriptomatic utility
Scripts
scripts, assigning with domain GP
scripts, automated administration of IIS
scripts, baselining, NAQC
scripts, GP
scripts, logon/logoff
scripts, logon/logoff, NETLOGON default share
scripts, logon/logoff, print configuration and mapping
scripts, Microsoft Scripting Debugger
scripts, operating system
scripts, operating system, managing
scripts, unattended installation, using for      
scripts, unattended installation, using for, constructing setup scripts
scripts, unattended installations, using for
scripts, unattended installations, using for, WINNT32 command-line switches
SCW (Security Configuration Wizard)      2nd
SCW, auditing mode
SCW, configuration mode
SCW, installing
SCW, security policy, creating
Searching
searching, enhancements to Windows Server 2003
searching, for GPOs
SECEDIT utility
secondary nameservers
secondary nameservers, configuring
secondary nameservers, stub zones and      
secondary nameservers, upgrading to primary      
secondary nameservers, zone transfers
secure channels
secure private connection, RRAS setup scenario      
Secure Sockets Layer, security of, Service Pack 1 and
Securedc.inf template
securews.inf
Securews.inf template
Security      2nd
security (see also SCA; SCW; system security
Security Accounts Manager (SAM)      
Security Accounts Manager (SAM), Active Directory and
security associations (SAs)
Security Configuration and Analysis MMC snap-in      [See SCA]
Security Configuration and Analysis Tool (SCAT)      
Security Configuration Wizard      [See SCW]
Security event log
Security Event Log, permissions use messages
security groups
security groups, individualized, assigning print permissions to
security identifiers      [See SIDs]
security IDs (SIDs)
security IDs (SIDs), problems with
security patches      
security patches, managing      [See SUS]
security patches, scanning clients for information about
security policies      [See also account lockout policies] [See also account lockout policies]
security policies, auditing
security policies, creating/enforcing
security policies, creating/enforcing, security templates
security policies, creating/enforcing, with MBSA
security policies, creating/enforcing, with SCAT
security policies, logon time restrictions
security policies, organizing
security templates      2nd
Security Templates snap-in      2nd
security templates, compiling into template database      2nd
security templates, configuring
security templates, custom, creating      2nd
security templates, importing into GPO
security templates, restoring default
security templates, Security Templates snap-in
security, .NET Framework
security, .NET Framework, code access security
security, .NET Framework, role-based security
security, Active Directory-integrated DNS
security, application pool security content
security, ASP.NET and
security, auditing      2nd
security, backups      [See backups]
security, Certificate Authority      
Security, configuring      
security, DNS requests, keeping outside firewalls      
security, EFS
security, EFS, enhancements to      
Security, encryption      [See encryption]
security, event logs      
security, event logs, Event Viewer      
security, false sense of, Offline Files and Folders      
security, firewalls      
security, firewalls, ports on, Windows Time Service requirements and
security, FrontPage Server Extensions
security, FTP protocol
security, FTP protocol, inherent lack of
security, FTP protocol, new security features in IIS 6
security, FTP sites
security, FTP sites, user isolation in IIS 6      
security, GP and      2nd
security, GPOs and
security, GPOs and, managing      
security, GPOs and, refresh interval
security, hotfixes      
security, hotfixes, Microsoft Windows Update website, accessing for
security, IIS      2nd
security, IIS, deleting default directories
security, IIS, enabling only if it's used
security, IIS, evaluating Indexing Service
security, IIS, IIS 6
security, IIS, ISAPI filters
security, IIS, keeping updated
security, IIS, killing unused ports
security, IIS, quering machines for update levels
1 2 3 4 5 6 7 8 9 10 11 12
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте