Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Spealman J., Hudson K., Craft M. — MCSE Self-Paced Training Kit (Exam 70-294) Planning, Implementing, and Maintaining a Microsoft® Windows Server™ 2003 Active Directory® Infrastructure
Spealman J., Hudson K., Craft M. — MCSE Self-Paced Training Kit (Exam 70-294) Planning, Implementing, and Maintaining a Microsoft® Windows Server™ 2003 Active Directory® Infrastructure



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: MCSE Self-Paced Training Kit (Exam 70-294) Planning, Implementing, and Maintaining a Microsoft® Windows Server™ 2003 Active Directory® Infrastructure

Авторы: Spealman J., Hudson K., Craft M.

Аннотация:

Get in-depth exam preparation for the updated Exam 70-294, a core MCSA/MCSE exam for Windows Server 2003-and build real-world job skills. Includes case studies, troubleshooting labs, and more


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: Second Edition

Год издания: 2006

Количество страниц: 1168

Добавлена в каталог: 22.10.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
application directory partitions, replication and      2nd
application directory partitions, replication failure      
application directory partitions, security descriptor reference domain      
application directory partitions, setting reference domain      
application directory partitions, setting replication notification delays      
application directory partitions, summary      
application directory partitions, Windows Server 2003      
application log      
applications      
applications, assigning      
applications, deploying      
applications, deploying, Gpresult command-line tool      2nd
applications, deploying, overview      
applications, deploying, Questions and Answers, answers      
applications, deploying, Questions and Answers, questions      
applications, deploying, Resultant Set of Policy (RSoP)      
applications, deploying, user logon and      2nd
applications, installing      2nd
applications, publishing      
Apply Group Policy permission      
archiving, security log      
assign, defined      
assigned applications      
assigned applications, overview of      
assigned applications, published vs.      
assigned applications, software deployment best practices      
assigned applications, software deployment process      
ASSIGNMENT      
assignment, applications      
assignment, software      
assignment, user rights      
Attributes      
attributes, hiding Active Directory      
attributes, site link      
audit policies      
audit policies, auditing and      
audit policies, best practices      
audit policies, Directory Service objects      
audit policies, files, folders and printers      
audit policies, guidelines      
audit policies, Local Policies security settings      
audit policies, passwords      
audit policies, practice exercises      
audit policies, Questions and Answers, answers      
audit policies, Questions and Answers, questions      
audit policies, specifying event categories      
audit policies, summary      
audit policies, understanding      
Audit Policy extensions      
Auditing      2nd
Authentication      
authentication, Active Directory features      
authentication, between two domains joined by external trust      
authentication, defined      2nd
authentication, forests and      2nd
authentication, further reading      
authentication, overview      
authentication, password management      
authentication, Questions and Answers, answers      
authentication, Questions and Answers, questions      
authentication, role of sites in      
authentication, traffic      2nd
authentication, user, computer, and group strategies      
author mode, MMC in      
authoritative restore      2nd
Authorization      
Autoenrollment settings, security certificates      
automatic installation      
automating user account creation      
availability, sites      
availability, sites, monitoring replication failure      
availability, sites, monitoring replication monitoring      
availability, sites, site management and      2nd 3rd
available bandwidth      
available bandwidth, defined      2nd
Backup      
backup domain controllers (BDCs)      2nd
Backup Operators Group      2nd
Backup Or Restore Wizard      
Backup Or Restore Wizard, backup with      
Backup Or Restore Wizard, deleting scheduled backups      
Backup Or Restore Wizard, scheduling backups      
backup, Active Directory data      
backup, Active Directory data, case scenario exercise      2nd
backup, Active Directory data, creating      
backup, Active Directory data, deleting scheduled operations      
backup, Active Directory data, exam highlights      
backup, Active Directory data, practice exercises      
backup, Active Directory data, preliminary tasks      
backup, Active Directory data, Questions and Answers, answers      
backup, Active Directory data, Questions and Answers, questions      
backup, Active Directory data, scheduling operations      
backup, Active Directory data, summary      
backup, Active Directory data, troubleshooting lab      
backup, Active Directory installation and      
backup, domain controller installation and      
bandwidth, available      2nd 3rd
baseline establishment      
BDCs (backup domain controllers)      2nd
Berkeley Internet Name Domain (BIND)      
BIND (Berkeley Internet Name Domain)      
biometric authentication      
Block Policy Inheritance      
Block Policy Inheritance, Group Policy setting      
Block Policy Inheritance, specifying      
Block Policy Inheritance, using sparingly      
Bottlenecks      
bridgehead servers      
bridgehead servers, designating preferred      
bridgehead servers, overview of      
bridgehead servers, site management and      
bridgehead servers, site topology and      
bridges, site link      
bridges, site link, creating      
bridges, site link, overview of      
bridges, site link, site management and      
built-in local accounts      
built-in user accounts      
Builtin folder, for default groups      
business and technical analyses, AD infrastructure design      
business function, in OU structure      
CA (certification authority)      
CA (certification authority), Public Key Policies security settings      
CA (certification authority), replication transport protocols and      
CA (certification authority), user authentication and      
Caching      [See universal group membership caching defined.]
catalog services      [See global catalogs.]
centralized administrative control design      
centralized GPO design      
certificate rules      
certificate rules, creating      
certificate rules, designating file types      
certificate rules, rule precedence      
certificate rules, software restriction policies      
certificate trust lists (CTLs)      
certificates      
certificates, autoenrolling      2nd
certificates, managing      
certificates, Public Key Policies security settings      
certificates, user authentication and      
Certification Authority      [See CA (certification authority) Public
change management, Active Directory      
child domains      
child domains, computer environment deployment      2nd
child domains, creating      2nd
child domains, determining domain name      
child domains, forest and domain structures      
child domains, GPOs and      
Chkgrps.vbs      
CIMOM (Common Information Management Object Model) database      
circular trace log file      
client configuration, Active Directory      
combination OU structure      
Command Line Arguments      
command-line tools      
command-line tools, Gpresult      2nd
command-line tools, monitoring performance      
command-line tools, NETDOM      
command-line tools, Windows Server 2003      2nd
Common Information Management Object Model (CIMOM) database      
Compatws.inf (Compatible template)      
Computer Configuration node      
Computer Configuration node, Administrative Templates node in      
Computer Configuration node, computer environment deployment in      
Computer Configuration node, defining      
Computer Configuration node, disabling unused GPO parts in      
Computer Configuration node, disabling unused Group Policy settings in      
Computer Configuration node, Group Policy planning in      
Computer Configuration node, overview of      
Computer Configuration node, Software Settings node in      
Computer Configuration node, Window Settings node in      
computer environment, deploying      
computer environment, deploying, application access      2nd
computer environment, deploying, application installation      2nd
computer environment, deploying, autoenrolling certificates      2nd
computer environment, deploying, child domains      2nd
computer environment, deploying, Computer Configuration node      
computer environment, deploying, Folder redirection      2nd
computer environment, deploying, further reading      
computer environment, deploying, GPO implementation      2nd
computer environment, deploying, kiosks      2nd
computer environment, deploying, overview      
computer environment, deploying, password management      2nd
computer environment, deploying, Questions and Answers, answers      
computer environment, deploying, Questions and Answers, questions      
computer environment, deploying, restricted access desktop      2nd 3rd 4th
computer environment, deploying, security      2nd
computer environment, deploying, software assignment      
computer environment, deploying, software installation      2nd 3rd 4th
computer strategies      
computer strategies, further reading      
computer strategies, OU implementation      
computer strategies, OU planning      2nd
computer strategies, overview      
computer strategies, security groups      2nd
computer strategies, skills and suggested practices      
computer strategies, user authentication      2nd
Computers      
computers, configuring Offline Files for      
computers, IntelliMirror settings      
computers, managing      
computers, RSoP options      2nd 3rd
configuration containers      
Configuration Management      
Configuration Options page, Configure Your Server Wizard      
configuration partitions      
configuration partitions, defined      
configuration partitions, replication and      
configuration partitions, replication failure and      
Configure Your Server Wizard      
connection objects      
connection objects, creating and configuring      
connection objects, defined      
console modes      
console options, MMCs      
console tree, of MMCs      
container objects      
container objects, containing other objects      
container objects, defined      
container objects, delegation of administration and      2nd
container objects, OUs and      
container objects, troubleshooting Group Policy settings      
Coordinated Universal Time (UTC)      
counter logs      
counter logs, creating      2nd
counter logs, logging options      
counter logs, logging requirements      
counter logs, overview of      
credentials, Run As program      
cross-reference object      
CTLs (certificate trust lists)      
custom administrative templates      
custom MMCs      
custom MMCs for remote administration      
custom MMCs, creating      
custom MMCs, defining      
custom MMCs, modifying      
custom MMCs, practice exercises      
data stores, centralized      
database, Active Directory installation      2nd
Dcdiag.exe (Domain Controller Diagnostic tool)      
Dcdiag.exe (Domain Controller Diagnostic tool), defined      
Dcdiag.exe (Domain Controller Diagnostic tool), monitoring replication and security with      
Dcdiag.exe (Domain Controller Diagnostic tool), overview of      2nd
Dcdiag.exe (Domain Controller Diagnostic tool), troubleshooting Active Directory installation      
Dcpromo log files      
dcpromo.exe      
dcpromo.exe, creating additional domains      
dcpromo.exe, creating additional forests      
dcpromo.exe, creating additional trees      
dcpromo.exe, forest and domain structure      2nd
dcpromo.exe, removing Active Directory      
dcpromo.exe, site topology      
DCsecurity.inf (Default Security settings updated for domain controllers) template      
decentralized administrative control design      
decentralized GPO design      
dedicated forest root domain      
dedicated setting GPO      
default administrative templates      
default domain controllers policy      
default domain policy      
default groups      
default groups, built-in local      
default groups, special identity      
default security (Setup security.inf) template      
default security levels      
default security levels, overview of      
default security levels, setting      
Default Security settings updated for domain controllers (DCsecurity.inf) template      
Default-First-Site-Name      
DEFAULTIPSITELINK      2nd
delegation of administration, for OUs      
delegation of administration, for OUs, defined      
delegation of administration, for OUs, hierarchy models for      
delegation of administration, for OUs, overview of      
delegation of administration, for OUs, types of responsibility      
delegation of control      
Delegation of Control Wizard      2nd
delegation of control, container objects      
delegation of control, GPOs      2nd
delegation of control, password management      
delegation of control, planning      
delegation of control, Questions and Answers, answers      
delegation of control, Questions and Answers, questions      
delegation of control, RSoP      
delegation of control, Windows NT      2nd
deleting      
deleting, application directory partition replica      
deleting, application directory partitions      
deleting, delegated permissions      
deleting, GPOs      
deleting, groups      
deleting, OUs      
deleting, trusts      
Deny permissions      
design team, AD infrastructure design      
details pane, MMCs      2nd
details pane, RSoP query results      
DFS (Distributed File System)      
diagnostic test, DNS      
1 2 3 4 5 6 7 8 9 10
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте