Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Hassell J. — Learning Windows Server 2003
Hassell J. — Learning Windows Server 2003



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Learning Windows Server 2003

Автор: Hassell J.

Аннотация:

Windows Server 2003 is the right server for a world dominated by enterprise networks and web-based server applications, but getting this server up and running is a formidable task. Our no-fluff guide gives you exactly what you need for installing, configuring, securing, and managing Server 2003, and offers hands-on advice for planning, implementing and growing Windows networks without trying to teach you how to be a system administrator.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 671

Добавлена в каталог: 13.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Read Data special permission      
Read Extended Attributes special permission
Read Permissions special permission
Read standard permission (R)      
read-only access      
read-only access, to shared folders      
recovery agent accounts, encrypted objects
Recovery Console      
Recovery Console, commands for      
Recovery Console, setting up
Recreational Software Advisory Council (RSAC)      
redundant array of intersomething disks      [See RAID]
refresh interval (SOA records)      2nd
refresh interval (SOA records), no-refresh interval with dynamically registered records
Registry      [See also registry keys] [See also registry keys]
registry keys      
registry keys, permissions on, configuring      
registry keys, SUS-related      
registry, DNS cache timeout value      
registry, GP reversal feature      
registry, securews.inf template      
registry, trees of, GPs written to
Release Two (R2), Windows Server 2003      
remote access endpoint, RRAS setup scenarios      
remote access server      [See RAS]
Remote Administration web site      
Remote Administration web site (IIS administration)      
Remote Administration web site, security considerations
Remote Assistance      2nd
Remote computers      
remote computers, backing up
remote computers, backing up, system state data on
Remote Control add-on for Active Directory users/computers
Remote Desktop Protocol      [See RDP]
remote installation services      
Remote Management
remote management, tools      
remote management, tools, default shares      
remote shares      
remote shares, NTBACKUP, backing up with
Remote Storage      
remote users      
remote users, distributing quarantined connection profile to, NAQC deployment      
Remoting section, Settings configuration file      
Removing
removing, nodes from NLB cluster
removing, print servers      
renaming domains      
RepAdmin (Replication Administrator)
RepAdmin, options      
replay attacks      
replay attacks, IPSec prevention of
replicating      [See also replication] [See also replication]
replicating, Dfs root nodes      
replicating, DNS information      
replicating, DNS information, among domain controllers      
Replication      2nd
Replication Administrator      [See RepAdmin]
replication partners      
replication partners, viewing with RepAdmin
replication, across WAN links, managing bandwidth for
replication, decentralized approach, problems with      
replication, GPOs and      
replication, loops
replication, multimaster      [See multimaster replication]
replication, network updates      
replication, network updates, conflicts      
replication, network updates, USNs      
replication, partners      [See replication partners]
replication, PDC emulator role
replication, strategies, Configure Replication wizard
replication, time synchronization      
replication, to domain controllers      
replication, to domain controllers, in branch offices      2nd
replication, topologies      
replication, trees/site links, spanning
replication, within sites
report messages (MSMQ)      
report queues (MSMQ)
reservations      
reservations, creating on DHCP servers
Resize ShadowStorage command
resource groups      
resource groups, adding resource to      
resource records      
resource records, CNAME records      
resource records, creating/modifying      
resource records, dynamically registered, scavenging outdated      
resource records, host records      
resource records, MX records      
resource records, NS records      
resource records, pointer records      
resource records, service records      
resource records, SOA records      
Resources      
resources, cluster services      
resources, cluster services, types of
resources, sharing
response messages (MSMQ)      
response queues (MSMQ)      
restricted groups option (domain GP)
restricting
restricting, access to shared printers      
Resultant Set of Policy Wizard      
retry interval (SOA records)      2nd
reverse lookup zones      
reverse lookup zones, controlling your own, advantages of      
reverse lookup zones, creating      
RFC 1995      
RID Master      
Rights Management Services (RMS)
ring replication strategy
RIPrep      
RIPrep, limitations      
RIS (Remote Installation Services)      
RIS servers
RIS servers, activating      
RIS, activating RIS server      
RIS, Custom Setup option
RIS, customization using OEM option      
RIS, deploying image to client      
RIS, hardware limitations of
RIS, limitations
RIS, limitations, PXE      
RIS, slipstreaming service packs      
RIS, types of installations with      
RIS, using      
RMS (Rights Management Services)      
RoboCopy      
RoboCopy, enhancements to Dfs and      
root nodes
root nodes, Dfs
Rootsec.inf template      
round-robin balancing      2nd
Routing and Remote Access Server Setup Wizard      
Routing and Remote Access Service      [See RRAS]
routing links      
routing links, configuring
routing links, creating
RPC calls
RPC calls, creating site links based over IP      
rqc.exe      
rqs
rqs, exe
RRAS (Routing and Remote Access Service)
RRAS, configuring
RRAS, configuring NAQC quarantine policy in
RRAS, configuring, granting VPN access to users      
RRAS, configuring, set up scenarios
RSAC (Recreational Software Advisory Council)      
RSoP tool      
RSoP tool, GPO logging
RSoP tool, logging mode      
RSoP tool, logging mode, using GPMC with      
RSoP tool, planning mode
RSoP tool, planning mode, using GPMC with
RSoP tools
RSoP tools, NTFS file/folder permissions, determining
Runtime section, Settings file      
runtime versions      
runtime versions, required and supported, specifying      
RX permissions
SAM (Security Accounts Manager)      
SAM, Active Directory and      
SAM, machine local groups and      
SAs (security associations)
saved indexes      
Scalability
scalability, Active Directory      
scans, Indexing Service
scans, Indexing Service, initiating
SCAT (Security Configuration and Analysis Tool)      2nd 3rd
SCAT, enforcing security policies      
SCAT, system security
SCAT, system security, correcting with      
SCAT, system security, scanning with      
SCAT, template databases, creating/using      
Schema
Schema Admins group
Schema Admins group, schema masters, changing      
schema master
schema master, identifying
schema master, Windows 2000 Server, identifying on
schema, classes      
schemas      
schemas, master      [See schema master]
schemas, naming
schemas, naming, replication topologies and
scope of indexes
scripted installation (RIS)
Scriptomatic utility
Scripts      
scripts, assigning with domain GP
scripts, automated administration of IIS
scripts, baselining, NAQC
scripts, GP
scripts, logon/logoff
scripts, logon/logoff, NETLOGON default share      
scripts, logon/logoff, print configuration and mapping
scripts, Microsoft Scripting Debugger
scripts, operating system
scripts, operating system, managing
scripts, unattended installation, using for
scripts, unattended installation, using for, constructing setup scripts
scripts, unattended installations, using for
scripts, unattended installations, using for, WINNT32 command-line switches
SCW (Security Configuration Wizard)      2nd
SCW, auditing mode      
SCW, configuration mode
SCW, installing
SCW, security policy, creating
Searching
searching, enhancements to Windows Server 2003      
searching, for GPOs      
SECEDIT utility      
secondary nameservers      
secondary nameservers, configuring      
secondary nameservers, stub zones and
secondary nameservers, upgrading to primary      
secondary nameservers, zone transfers
secure channels
secure private connection, RRAS setup scenario      
Secure Sockets Layer, security of, Service Pack 1 and
Securedc.inf template
securews.inf      
Securews.inf template      
Security      2nd
security (see also SCA; SCW; system security      
Security Accounts Manager (SAM)      
Security Accounts Manager (SAM), Active Directory and      
security associations (SAs)      
Security Configuration and Analysis MMC snap-in      [See SCA]
Security Configuration and Analysis Tool (SCAT)      
Security Configuration Wizard      [See SCW]
Security event log      
Security Event Log, permissions use messages      
security groups      
security groups, individualized, assigning print permissions to      
security identifiers      [See SIDs]
security IDs (SIDs)      
security IDs (SIDs), problems with      
security patches      
security patches, managing      [See SUS]
security patches, scanning clients for information about
security policies      [See also account lockout policies] [See also account lockout policies]
security policies, auditing
security policies, creating/enforcing
security policies, creating/enforcing, security templates      
security policies, creating/enforcing, with MBSA
security policies, creating/enforcing, with SCAT      
security policies, logon time restrictions
security policies, organizing
security templates      2nd
Security Templates snap-in      2nd
security templates, compiling into template database      2nd
security templates, configuring
security templates, custom, creating      2nd
security templates, importing into GPO      
security templates, restoring default
security templates, Security Templates snap-in
security, .NET Framework
security, .NET Framework, code access security
security, .NET Framework, role-based security
security, Active Directory-integrated DNS
security, application pool security content
security, ASP.NET and
security, auditing      2nd
security, backups      [See backups]
security, Certificate Authority      
Security, configuring
security, DNS requests, keeping outside firewalls
security, EFS
security, EFS, enhancements to
Security, encryption      [See encryption]
security, event logs      
security, event logs, Event Viewer
security, false sense of, Offline Files and Folders      
security, firewalls
security, firewalls, ports on, Windows Time Service requirements and      
security, FrontPage Server Extensions      
security, FTP protocol      
security, FTP protocol, inherent lack of      
security, FTP protocol, new security features in IIS 6      
security, FTP sites
security, FTP sites, user isolation in IIS 6      
security, GP and      2nd
security, GPOs and      
security, GPOs and, managing      
security, GPOs and, refresh interval      
security, hotfixes      
security, hotfixes, Microsoft Windows Update website, accessing for      
security, IIS      2nd
security, IIS, deleting default directories      
security, IIS, enabling only if it's used      
security, IIS, evaluating Indexing Service      
security, IIS, IIS 6      
security, IIS, ISAPI filters
security, IIS, keeping updated
security, IIS, killing unused ports
security, IIS, quering machines for update levels
1 2 3 4 5 6 7 8 9 10 11 12
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте