Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Cohen K., Daniels A. — Windows XP networking
Cohen K., Daniels A. — Windows XP networking



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Windows XP networking

Авторы: Cohen K., Daniels A.

Аннотация:

Windows XP: practical solutions for working network administrators. Deploying, managing, or supporting networks with Windows XP clients? Here's all the information you need to maximize reliability, security, and performance... and minimize hassles and aggravation! Kackie Cohen and Andrew Daniels share the extraordinary experience they've gained deploying and running some of the world's largest Windows networks. They don't waste time on the "basics" you already know. Rather, they focus on the specific challenges you face as a working professional. You'll find best practices and real-world tips for everything from authentication to Internet connectivity, firewalls to wireless networking... and a whole lot more.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 544

Добавлена в каталог: 18.05.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
DiffServ      2nd [See Group Policy Objects (GPOs)]
Diffserv codepoint (DSCP)      
Direct Sequence Spread Spectrum (DSSS)      
directory service access      
Directory Services      2nd 3rd 4th
directory services structure of      2nd
dirname      
DisablePagingExecutive      2nd
disabling      2nd
disabling/adjusting grouping on      
Discretionary Access Control List (DACL)      2nd
disk manager diagnostics      2nd 3rd 4th
disk partioning      2nd
disk partitioning      2nd
Diskcache      2nd
diskpart.exe      2nd
Display control panel applet      
Distributed file system (DFS)      2nd 3rd
Distributed File System utility      2nd
distribution      
distribution in      
DLLs (dynamic link libraries)      
dmdiag.exe      2nd 3rd 4th
DNS      2nd
DNS (Domain Name Service)      2nd 3rd 4th
DNS name resolution and      2nd 3rd
Domain      
Domain Group Policy      
dos2unix      
downloads, simultaneous      
drive defragmenting      
Driver Protection for      2nd
driver rollback      
Driver Rollback for      
drivers      
DRR (deficit round robin) scheme      
DSCP (Diffserv codepoint)      
dspace      
DSSS      
DSSS (Direct Sequence Spread Spectrum)      
du
Dump      
Dynamic Host Configuration Protocol (DHCP)      
dynamic link libraries (DLLs)      2nd
dynamic update      
dynamic updates      
EAP (Extensible Authentication Protocol)      2nd 3rd 4th 5th
EAP and      2nd 3rd 4th 5th
EAP in      2nd
EAP over      2nd
EAP-      
echo      
editing policies in      2nd 3rd 4th 5th
effective permissions      2nd
EFS      
EFS (Encrypting File System)      
Enabling      2nd 3rd 4th 5th 6th
enabling logging in      2nd 3rd
encapsulating security payload (ESP)      
Encapsulation      
encapsulation and      
encapsulation in      2nd
Encrypting File System (EFS)      
Encryption      2nd
encryption in      2nd
enhancements to      
enhancing      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
environ      
EQP      2nd 3rd 4th 5th
error messages      
error messaging and product support      
Error Reporting service      
ESP      
ESP (encapsulating security payload)      
ESP and      [See also remote access]
ESS (Extend Service Set)      2nd
ESTABLISHED      
eval      
Event log      2nd
Event Viewer      2nd 3rd 4th 5th 6th 7th 8th 9th
Event Viewer and      2nd 3rd 4th 5th 6th
Everyone group      
exec      2nd
exit      2nd
EXP      
export      
Extend Service Set (ESS)      2nd
Extended View      
Extensible Authentication Protocol      [See EAP (Extensible Authentication Protocol)]
Extensions      2nd [See Group Policy Objects (GPOs)]
extensions, showing      
FALSE      
fast reconnect with      2nd
Fast User Switching      
fax service      
Faxes control panel applet      
fc, hist      
fconsole      
FHSS      
FHSS (Frequency Hopping Spread Spectrum)      
FILE      2nd 3rd
file system utility      2nd
File Transfer Protocol (FTP)      2nd 3rd 4th 5th
filer      
Files      
filter actions for      [See also remote access]
Filtering      
FIN      
FIN-ACK      
FIN-WAIT-1      
FIN-WAIT-2      
find      
firewall types and      2nd 3rd
firewalls.      
FireWire      2nd 3rd 4th
Flag      
flagdir      
Flags      
flows, traffic      2nd
Folder      2nd 3rd 4th
folder redirection and      2nd 3rd [See Group Policy Objects (GPOs)]
folder redirection in      2nd 3rd
Folders      
for IPv      2nd
ForwardBroadcasts      
frame types      
Frequency Hopping Spread Spectrum (FHSS)      
fsutil.exe      2nd
ftp (file transfer protocol)      
Full Control permission      2nd
G      2nd 3rd
game controllers      
gatekeepers, H.323      
gateways, H.323      
General Settings for      2nd [See telephony]
General tab      2nd
General tab for      2nd 3rd [See also telephony]
getopts      
global account settings and      2nd 3rd 4th 5th
global system object      
global system objects      
good practices in      2nd 3rd 4th [See also authentication] [See also authentication]
GPOs      [See Group Policy Objects (GPOs)]
GPUpdate.exe      
GRANT      
GRE      
grep      
Group Policy      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
Group Policy and      
Group Policy Objects      
Group Policy Objects (GPOs)      
Group Policy-based distribution of      2nd 3rd
Guest access and      
Guest account      
gwshare      
H      2nd 3rd 4th
H.323      2nd
H.323 and      
H.323 protocol      
H.ewe protocol      2nd 3rd
handshake      2nd
handshake, TCP/IP      2nd 3rd 4th
Headers      
help      2nd 3rd
Hibernation      
Hibernation and      
hidden files, showing      
hiding applets on      2nd
hiding specific tools on      2nd
hiding tools on      2nd
High Secure templates      
history of      2nd 3rd 4th
HomePNA      
host configuration      
host only      
host only remote access      
hostname      
how it works      2nd 3rd
how they work      2nd
Human Interface Device Access      
HungAppTimeout      2nd
I.LINK      2nd 3rd
IANA      
IAS      2nd
IAS (Internet Authentication Service)      2nd 3rd 4th 5th 6th 7th 8th 9th
IAS and      2nd 3rd 4th 5th 6th 7th 8th
ICF (Internet Connection Firewall)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
ICF and      
ICF log      
ICMP      
iconv      
ICS (Internet Connection Sharing)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th
ICS and      2nd
ICS client configuration with      2nd 3rd 4th
IEEE 1394      2nd 3rd 4th
IEEE 1394 and      
IEEE 802.1x authentication and      [See Group Policy Objects (GPOs)]
IGD (Internet Gateway Device) specification      2nd
II      [See also IPX/SPX protocol stack]
IIS (Internet Information Server) Administrative service      
IKE      2nd
IKE (Internet Key Exchange)      2nd
IMAPI CD-burning service      
in Kerberos      2nd 3rd 4th 5th 6th
in NTLM      2nd
in security      2nd
in service profiles      [See also remote access]
in WEP decryption      2nd
in wireless networking      2nd
inbound connections      
inbound connections in      2nd 3rd 4th 5th 6th 7th 8th
incoming connection configuration and      2nd
Incoming Connection Properties      2nd 3rd 4th 5th 6th
incoming connections and      
incremental security templates in      2nd [See Group Policy Objects (GPOs)]
incremental templates      2nd [See also authentication]
Indexing Service      
individual account settings in      2nd 3rd
infrastructure of      2nd
inheritance      2nd
inheritance of      2nd
Install New Hardware Wizard      2nd
installation and maintenance      2nd 3rd
Installing      
Integrated Services Digital Networks      [See ISDN (Integrated Services Digital Networks)]
Integrity      
integrity in      [See also authentication]
IntelliMirror      2nd 3rd 4th
IntelliMirror and      2nd 3rd
Interactive      2nd
INTERFACE      
Interix      2nd
Interix SDK      
Interix subsystem      
internal network number in      2nd
internal network numbers      2nd
International Telecommunications Union (ITU)      
Internet Authentication Service      [See IAS (Internet Authentication Service)]
Internet Connection Firewall      [See ICF (Internet Connection Firewall)]
Internet Connection Sharing      [See ICS (Internet Connection Sharing)]
Internet Explorer 6      
Internet Gateway Device (IGD) specification      2nd
Internet Information Server (IIS) Administrative service      
Internet Key Exchange (IKE)      2nd
Internet Options applet      2nd
Internet performance tweaks      2nd
Internet Protocol      [See IP (Internet Protocol)]
Internet service providers (ISPs)      2nd 3rd 4th
Internet Services Manager      
Internet tweaks      2nd
Interoperability      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
interoperability with      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
IOPageLockLimit      
IP      2nd 3rd 4th 5th 6th 7th
IP (Internet Protocol)      
IP addresses      2nd [See also NAT (Network Address Translation)] [See also NAT (Network Address Translation)]
IP conferencing      
IP Filter List      2nd
IP Filter List and      2nd [See also remote access]
IP multicast conferencing      
IP property configuration with      
IP property configutation      2nd 3rd 4th 5th 6th 7th 8th
IP telephony      
ipconfig      2nd 3rd 4th
Iplanet Internet Directory Service      
IPSEC (Internet Protocol Security)      2nd 3rd
IPSec and      2nd 3rd 4th 5th [See also remote access] [See also remote access] [See also remote access] [See also remote access]
IPSec editing and      2nd 3rd
IPv      2nd 3rd 4th
IPv6 and      2nd [See also NAT (Network Address Translation)] [See also NAT (Network Address Translation)]
IPX in      2nd 3rd
IPX/SPX protocol stack      2nd 3rd 4th 5th 6th
IrCOMM modem driver      2nd
IrDA      2nd
IrLPT      
IrNet      
IrTran-P      
ISDN      2nd 3rd
ISDN (Integrated Services Digital Networks)      2nd 3rd
ISPs (Internet Service Providers)      
issues/considerations with      2nd 3rd 4th 5th
jobs      
Kerberos      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
Kerberos and      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
Key distribution      2nd 3rd 4th
key distribution in      2nd 3rd 4th
kill      
knowing the threats in      [See also authentication]
L2 cache      
L2 cache and      
L2TP (Layer 2 Tunneling Protocol)      2nd
LargeSystemCache      
last known good configurations      2nd
LAST-ACK      
latency, high      
launching      
Layer 2      2nd 3rd
Layer 3      2nd
layer 3 bridging and
LDAP (Lightweight Directory Application Protocol)      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте