Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Cohen K., Daniels A. — Windows XP networking
Cohen K., Daniels A. — Windows XP networking



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Windows XP networking

Авторы: Cohen K., Daniels A.

Аннотация:

Windows XP: practical solutions for working network administrators. Deploying, managing, or supporting networks with Windows XP clients? Here's all the information you need to maximize reliability, security, and performance... and minimize hassles and aggravation! Kackie Cohen and Andrew Daniels share the extraordinary experience they've gained deploying and running some of the world's largest Windows networks. They don't waste time on the "basics" you already know. Rather, they focus on the specific challenges you face as a working professional. You'll find best practices and real-world tips for everything from authentication to Internet connectivity, firewalls to wireless networking... and a whole lot more.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 544

Добавлена в каталог: 18.05.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
-MD5 CHAP      
-TLS      2nd 3rd
.NET      
3.1
3DES      
802.11 basics on      2nd
802.11 standard      2nd
802.11 standard on      2nd
802.11a on      
802.11b on      2nd
802.11g on      2nd 3rd
802.1p in      
802.1p standard      
802.1x and      
802.1x process of      2nd
802.1X standard      2nd
?
A      2nd
abort      
access audits      2nd 3rd 4th
access clients      
Access control      
access control and      2nd 3rd
access control in      [See also authentication]
Access control lists (ACLs)      
access control lists and      2nd
access fix      
access points      
access points in      
access servers      
access to      
Access-Accept message      
Access-Challenge message      
Access-Reject message      
Access-Request message      
Accessibility Options      
account management      2nd
Account Policies      2nd 3rd 4th 5th 6th
Accountability      
accountability in      [See also authentication]
Accounting-Request message      
Accounting-Response message      
ACK, in TCP windowing      2nd 3rd
ACL diagnostics      
AclDiag      
ACLs (access control lists)      
ACS (Admission Control Service)      
actions in VPNs      
Active Directory      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
Active Directory compared with      
ActivePerl      
ActiveState      
ad hoc networking      
adapter information      
Add      
Add Hardware applet      
Add/Remove Programs      
addiag.exe      2nd
additional buffers/threads and      2nd
additional server IP addresses for      
Address Resolution Protocol (ARP)      
address types      
Addressing      
addressing in      
administering from Windows XP      2nd 3rd
Administration Kit      2nd 3rd 4th
administration of      2nd 3rd
administrative templates      2nd 3rd 4th
Admission Control Service (ACS)      
advanced configuration of      2nd 3rd 4th 5th 6th
Advanced menu      2nd
advanced properties of      2nd
aggressive mode      
AH
AI (artificial intelligence), security and      
alert configuration      2nd
Alias      2nd
Allocator      2nd
analysis in      2nd 3rd [See also authentication]
analysis, for security      2nd 3rd
APIPA (Automatic Private IP Addressing)      2nd 3rd
APIs (application programming interfaces)      
Application      2nd
application auditing      2nd 3rd [See also system hardening] [See also system hardening]
application auditing in      2nd 3rd
Application Data folder      
application deployment diagnostics      2nd
application deployment diagnostics and      2nd
application gateways/proxies      2nd
application gateways/proxies and      2nd
Application layer      
approaches to asignment of      
architecture of      2nd
area code rules      
ARP (Address Resolution Protocol)      
ARP cache      
ARPANET      
ASR      2nd 3rd 4th 5th 6th 7th
ASR (Automated System Recovery)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
ASR and      2nd 3rd 4th 5th [See Group Policy Objects (GPOs)]
Attributes      
attributes in      
Auditing      
auditing changes to      
auditing configuration and      2nd 3rd 4th 5th 6th 7th 8th 9th
auditing events in      2nd 3rd 4th
audits      
Authentication      2nd 3rd 4th 5th
authentication and      
Authentication Header (AH) protocol      2nd
Authentication Header and      2nd [See also remote access]
authentication in      2nd
authentication modes in      2nd [See also remote access] [See also remote access]
authentication with      [See also remote access]
authentication/accounting in      
Authorization      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd
authorization in      [See also authentication]
auto update      
auto updates      
auto-enrollment and      2nd
autodfs      
Autodial      2nd 3rd
autodiscovery      
autoenrollment      2nd
automated logon and      2nd
Automated System Recovery      [See ASR (Automated System Recovery)]
Automated System Recovery and      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
automatic configuration of for multiple networks      2nd 3rd
automatic configuration of multiple networks and      2nd 3rd
Automatic Private IP Addressing (APIPA)      2nd 3rd
automating      2nd
autoplay      2nd
Availability      2nd
availability in      2nd [See also authentication]
B      2nd 3rd
B-channels      
Backup      2nd 3rd 4th 5th 6th 7th
Backups      
backups/restores      
bandwidth, QoS and      2nd 3rd 4th
basename      
basic installation of      2nd
basic service/application tuning in      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Basicdc.inf      
basics for      2nd 3rd
Basicsv.inf      
Basicwk.inf      
batch      
bgjob      
BLANK      
Block Policy Inheritance      
break      
BRI (Basic Rate Interface)      
Bridge      
bridges      [See Network Bridges]
bridging      2nd 3rd
browsing issues with      2nd 3rd
Burst mode      
bye      
Callback      2nd 3rd
Calling cards      
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol      
cat      
CCK (Complementary Code Keying)      
CD
CDs, autoplay for      
certificates for IEEE 802.1x      
Certificates snap-in      
Certificates snap-in for      
Change Permissions permission      
CHAP      
CHAP (Challenge Handshake Authentication Protocol)      2nd 3rd 4th
CHAP in      2nd
Checksum      
chkvol      
chmod      
chown      
CIFS (Common Interface File System)      
Classes      
classes in      
classification in      2nd [See also authentication]
classification, security and      2nd
clearing temp files in      
Client (Respond Only) policy      
client configuration      2nd 3rd
Client Service      2nd
client setup      2nd 3rd 4th
client support      
ClipBook      
CLOSE-WAIT      
Closed      
colorpal      
COM (Component Object Model)      
COM+ Event Subsystem      
COM+ System Application      
COMMIT      
Common Interface File System (CIFS)      
Compatible template      
Complementary code keying (CCK)      
components of      2nd
computer and user      2nd
computer and user authentication      2nd
Computer Configuration Group Policy      
Computer Configuration Group Policy and      
Computer Management      
computer settings management      2nd
computer settings management in      2nd
concerns with      2nd
Confidentiality      
confidentiality in      [See also authentication]
configuration/recommended practices in      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
Configuring      2nd 3rd 4th 5th 6th 7th 8th 9th
configuring DNS      2nd 3rd
configuring Windows XP      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd
Connection Manager      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Connection Manager and      2nd 3rd
Connection Point Services      [See CPS (Connection Point Services)]
connection states      2nd 3rd 4th
connection types for      [See also remote access]
Connection Wizard      2nd 3rd 4th 5th 6th
connections services in      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
considerations with      2nd
console utilities      2nd
containment      
containment in      [See also authentication]
CONTINUE      
Control Panel      
Cookies      
CopyTo/MoveTo      2nd
cp
cps      2nd 3rd 4th [See also authentication]
CPS (Connection Point Services)      
CPS security and      2nd
CPU      2nd 3rd
CPU tools      2nd 3rd
Create Files/Write Data permission      
Create Folder/Append Data permission      
Creating      2nd 3rd 4th
creating static port mappings in      2nd 3rd 4th 5th 6th
credential management and      2nd
credential types and      2nd
Credentials      
cron      
Cron service      
crontab      
Customizing      
Cut      
D-channels      
DACL (Discretionary Access Control List)      2nd
Data Encryption Standard (DES)      2nd
Data Link layer      2nd
DatabasePath      2nd
date      
Date/Time applet      
decryption      2nd
default      
default gateways      
default security templates in      [See Group Policy Objects (GPOs)]
default templates      [See also authentication]
Defense Advanced Research Project Agency (DARPA)      
deficit round robin (DRR) scheme      
definition of      
DEFRAG.EXE      
defragmenting drives      
DELETE      
Delete permission      
Delete Subfolders and Files permission      
demand-dial latency      2nd
denying logon through      
dependency walker      
depends.exe      
DES      2nd
DES (Data Encryption Standard)      2nd
desktop management in      
desktop management with      [See Group Policy Objects (GPOs)]
Destination      
Destination Address      
destination network      
Destination node      
destination socket      
Details tab      2nd
development stack      [See TCP/IP (Transmission Control Protocol/Internet Protocol)]
device driver resiliency and      
DFS (Distributed File System)      2nd 3rd
dfsutil.exe      2nd
DHCP (Dynamic Host Configuration Protocol)      
DHCP locator utility      
dhcploc.exe      
diag      
diagnostic settings for      2nd [See telephony]
dial-up connection creation for      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
dial-up connection creation in      2nd 3rd 4th 5th 6th 7th 8th
dial-up connection creation with      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
dial-up connections      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th [See also telephony] [See also telephony]
dial-up networking and      2nd
Dial-up Preferences menu      
diff      
Differentiated services (DiffServ)      2nd 3rd
Differentiated Services in      2nd 3rd
Diffie-Hellman (DH) group      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте