Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Cohen K., Daniels A. — Windows XP networking
Cohen K., Daniels A. — Windows XP networking



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Windows XP networking

Авторы: Cohen K., Daniels A.

Аннотация:

Windows XP: practical solutions for working network administrators. Deploying, managing, or supporting networks with Windows XP clients? Here's all the information you need to maximize reliability, security, and performance... and minimize hassles and aggravation! Kackie Cohen and Andrew Daniels share the extraordinary experience they've gained deploying and running some of the world's largest Windows networks. They don't waste time on the "basics" you already know. Rather, they focus on the specific challenges you face as a working professional. You'll find best practices and real-world tips for everything from authentication to Internet connectivity, firewalls to wireless networking... and a whole lot more.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 544

Добавлена в каталог: 18.05.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
pre-shared key      
pre-shared keys      
Preferences      [See Group Policy Objects (GPOs)]
Preferences menu      [See also telephony]
preferences, definition of      
Preparation Wizard      
Presentation layer      2nd
preshared key      [See also remote access]
prevention      2nd
prevention in      2nd [See also authentication]
PRI (Primary Rate Interface)      
print      
printenv      
printer audits      
printf      
Private Branch Exchange (PBX) systems      2nd 3rd
privilege use      2nd
process in      
process resource monitor      2nd 3rd
process tracking      
Processing      2nd
product support      
Product Support Services (PSS)      
Professional's Remote Desktop      2nd
profiling tool      2nd 3rd
properties configuration of      2nd 3rd 4th [See telephony]
properties for      2nd [See also telephony]
Protected Extensible Authentication Protocol (PEAP)      2nd 3rd 4th 5th
protecting      
Protocol      2nd 3rd
protocols and      2nd [See also remote access]
Proxies      2nd
PS
psc      
PSH      
PSS (Product Support Services)      
PSTN      2nd
PSTN (Public Switched Telephone Network)      2nd 3rd 4th
Public Key Infrastructure (PCI)      
Public switched telephone network (PSTN)      2nd 3rd 4th
publishing      2nd
publishing service      2nd
pushd      
pwd      
QoC and      2nd [See also telephony] [See also telephony]
QoS      [See quality of service (QoS)]
QoS and      2nd 3rd 4th 5th 6th 7th 8th 9th
Quality of service (QoS)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Quality of Service Resource Reservation Protocol (QoSRRP)      
quick launch changes and      2nd 3rd
quick launches      2nd 3rd
quick/aggressive mode      
quit      
Radio frequencies      2nd
radio frequencies in      
RADIUS      2nd
RADIUS (Remote Authentication Dial In User Service)      2nd 3rd 4th 5th 6th 7th 8th 9th
RADIUS and      2nd 3rd 4th 5th 6th 7th 8th
Rand Corporation      
RAS      
rcmd      
rconsole      
READ      
Read and Execute permission      2nd
Read Attributes permission      
Read Extended Attributes permission      
read permission      2nd
Read Permissions permission      
READONLY      
Real Time Communication (RTC)      2nd
Recycle Bin      
redial in      [See also telephony]
redirection and      2nd 3rd
refreshing from the command line      [See Group Policy Objects (GPOs)]
Regedit.exe      2nd
Regional/Language Options      
Registry Editor      2nd 3rd 4th 5th
Registry Editor and      2nd 3rd
registry key activity      2nd
registry key audits      2nd
registry tweaking      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
registry tweaking and      
registry tweaking in      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
reliability and      2nd 3rd 4th 5th
Remote      2nd 3rd 4th 5th 6th 7th 8th
Remote access      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
remote access policies and      2nd
remote access policies in      2nd 3rd 4th 5th 6th 7th
Remote Authentication Dial In User Service      [See RADIUS (Remote Authentication Dial In User Service)]
Remote control      2nd
Remote Procedure Call (RPC)      
Remote Procedure Call System Service (RPCSS)      
Remote Registry service      2nd
Remote Shell service      
removable media and      
Remove      
removing icon for from desktop      
removing shared docs from      2nd
renice      
REPLACE      
replacing computers in      2nd
replacing computers with      2nd
requirements for      
requirements gathering/analysis for      2nd
reserved bits      
Reset Wizard      
resiliency improvements for      
restart icon      2nd
RestoreASR      
restores, audits of      
restoring from      2nd 3rd
restricting installation of from removable media      
RETURN      
reviewing events in      2nd 3rd
REVOKE      
RFC defined      
rights      
RIP (Routing Information Protocol)      
RIP and      
RIS (Remote Installation Services)      
Risk assessment      
Rivest, Ronald      
rm
rmdir      
Roaming      
roaming support for      2nd
roaming user profiles      
roaming user profiles and      [See Group Policy Objects (GPOs)]
roaming user profiles in      
route      
Routing      
RPC (Remote Procedure Call)      
rpcinfo      
RPCSS (Remote Procedure Call System Service)      
RSA SecurID ACE/Agent for Windows      
rshsvc      
RSoP (Resultant Set of Policy)      
RSoP and      [See Group Policy Objects (GPOs)]
RST      
RST-ACK      
RTC      2nd
RTC (Real Time Communication)      2nd
RTC client APIs and      2nd
Running      2nd 3rd 4th 5th
SACL (System Access Control List)      
SAP (Service Advertising Protocol)      2nd 3rd 4th
SAP and      2nd 3rd 4th
Scanners/Cameras applet      
SCEP (Simple Certificate Enrollment Process)      2nd
schedule task in      2nd
sdiff      
SDK      2nd
Secure Server (Require Security) policy      
secure XP features for      2nd 3rd
Securedc.inf      
securews.inf      
securing logs from      2nd
Security      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th [See also authentication] [See also authentication] [See also authentication] [See also authentication]
Security Accounts Manager (SAM)      
security and      2nd 3rd 4th 5th 6th 7th 8th
security groups with      
Security Identifications (SIDs)      2nd
security issues with      2nd
security options      2nd
Security Settings extension      2nd [See Group Policy Objects (GPOs)]
Security tab      2nd
Security tab for      2nd [See also telephony]
sed      
send      
Sequenced Packet Exchange (SPX)      
Server (Request Security) policy      
server service      
Servers      
Service      2nd
service accounts      
service options      
Service Pack 1a      
Service Profiles      2nd 3rd 4th 5th
Service Providers      
Services for Unix (SFU)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
services/components      2nd
session      2nd 3rd
Session Initiation Protocol      [See SIP (Session Initiation Protocol)]
Session layer      2nd
session tickets      
Set      2nd
setpass      
setting      2nd 3rd 4th 5th
settts      
SFU (Services for Unix)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th [See also Windows Services for UNIX (SFU)] [See also Windows Services for UNIX (SFU)]
sh
shadow copy service      
shared DLL support      
shared docs, removing      2nd
shared key      2nd
Shared key authentication      2nd 3rd
shared secrets      2nd 3rd 4th
shared secrets in      2nd 3rd 4th
shared support for      
Shift      
Shiva Password Authentication Protocol (SPAP)      
Show      
showmount      
shpc      
Shutdown Event Tracker      2nd
shutdown shortcut      
shutdown speed      2nd
SIDs (Security Identifications)      2nd
Signaling System 7 (SS7)
Simple network management protocol (SNMP)      
simultaneous downloads in      
SIP      
SIP (Session Initiation Protocol)      
SIP and      
Site      
sleep      
sliding windows      2nd
slist      
smart cards      
smart cards for      
snap-ins      
SNMP (Simple Network Management Protocol)      
Software      
software distribution and      2nd 3rd [See Group Policy Objects (GPOs)]
software distribution in      2nd 3rd
Software Installation extension      [See Group Policy Objects (GPOs)]
sort      
Sounds/Audio Devices      
Source      
Source address      
source network      
source node      
source socket      
Spanning Tree Algorithm (STA)      2nd
SPAP (Shiva Password Authentication Protocol)      
SPAP in      
speed in      2nd 3rd 4th
Split      
SPX (Sequenced Packet Exchange)      [See also IPX/SPX protocol stack]
SSDP Discovery service      
SSIDs (Service Set Identifiers)      
STA (Spanning Tree Algorithm)      2nd
Stanford Research Institute (SRI)      
Start menu sorting      
startup, disabling programs at      
startup/logon and      2nd
stateful inspection      
stateful inspection and      
static mapping of      2nd 3rd 4th 5th 6th
static port mapping      2nd 3rd 4th 5th 6th
Stations      
stations in      
stored      2nd 3rd 4th
stored user names/passwords and      2nd 3rd
Storing      2nd 3rd
strategy in      2nd [See also authentication]
strings      
subnet masks      
supply of      2nd [See also NAT (Network Address Translation)] [See also NAT (Network Address Translation)]
support for      
support services      
Support tab      2nd
Support Tools      
supported types of      2nd 3rd
SYN      2nd
SYN-ACK      
SYN-RECEIVED      
SYN-SENT      
syscon      
system      2nd 3rd
System Access Control List (SACL)      
system auditing      2nd
System control panel applet      
system hardening      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd
system hardening in      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd [See also authentication] [See also authentication] [See also authentication] [See also authentication] [See also authentication] [See also authentication] [See also authentication] [See also authentication]
system notifications and      
system requirements for      
system utility for      2nd
tail      
Take Ownership permission      
TAPI      
TAPI (Telephony Application Programming Interface)      2nd 3rd
Task Manager Network      2nd
task schedule services      
taskbar      
TCP      2nd 3rd
TCP header      2nd 3rd 4th
TCP/IP      2nd
TCP/IP (Transmission Control Protocol/Internet Protocol)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
tee      
telecommunications services      2nd 3rd 4th
telephony      2nd 3rd 4th 5th 6th [See TCP/IP (Transmission Control Protocol/Internet Protocol)]
Telephony Application Programming Interface (TAPI)      [See TAPI (Telephony Application Programming Interface)]
telephony configuration      2nd [See TCP/IP (Transmission Control Protocol/Internet Protocol)]
telephony service providers (TSPs)      2nd
Telnet      
telnet client      
Telnet client software      
tenets of      2nd 3rd 4th 5th 6th 7th 8th [See also authentication] [See also authentication]
Terminal Services      2nd
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте