did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781572318052

Microsoft Windows 2000 Server Resource Kit

by
  • ISBN13:

    9781572318052

  • ISBN10:

    1572318058

  • Format: Padded Hardcover
  • Copyright: 2000-02-19
  • Publisher: Microsoft Pr
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $299.99

Summary

By volume, topics covered, and the authority of the authors, nothing documents Redmond''s new operating system quite like Microsoft Windows 2000 Resource Kit. The kit consists of seven books and a well-organized CD-ROM. Each of the books contains comprehensive information about the respective area that it covers, be it TCP/IP or distributed systems. The kit not only includes essential information but also contains detail and background information for its many subjects in great depth. For example, the book that covers Internet Information Server includes instructions on developing client/server and multitier applications. The Windows 2000 TCP/IP Core Networking Guide also has an outstanding introduction to the core tenets of TCP/IP. Systems administration manuals have come a long way in terms of usability and presentation, but they are still not the easiest to use. Many books (including some from Microsoft) of lesser scope provide information in a format that''s easier to follow, and that includes screen shots and step-by-step instructions. The volumes in this kit do not provide as many images, illustrations, or diagrams as other volumes, but the level of technical detail is unbeatable. Many of the volumes could stand alone. The Distributed Systems Guide, which is over 1,600 pages long, contains complete coverage of Active Directory, PKI, Distributed File System, PKI, and much more. Why the set includes the Internet Explorer 5 Resource Kit is unclear--it stands apart from the others in that it covers an application rather than a core piece of the OS. If you have room in your budget and the need for the most comprehensive and authoritative guide available on Windows 2000 Server, this is it. --John KeoghTopics covered: Each book contains a great deal of information on its subject as listed below. The topics show breadth of coverage for each book and the CD-ROM, rather than simply listing all subjects covered. Security is not mentioned specifically since it is addressed throughout the kit. Operations Guide: Disks, storage media, remote storage, types of file systems, network printing, network printing from non-Windows machines, performance monitoring, memory and caching, monitoring processor activity, examining and tuning disk performance, Dynamic Disks, monitoring network performance, measuring multiprocessor system activity, system recovery, designing reliable systems, backups, repair, recovery, restoration, troubleshooting, boot process, troubleshooting boot problems, Windows 2000 Stop Messages. TCP/IP Core Networking Guide: Introduction to TCP/IP, Windows TCP/IP suite, NETBIOS, TCP/IP troubleshooting, TCP/IP tools, DHCP, WINS, Windows 2000 DNS, IPSec, Quality of Service, OSI Model, Windows 2000 Network Architecture, TCP/IP remote utilities, DHCP Options, SNMP. Internetworking Guide: Unicast Routing, Routing and Remote Access Service, unicast IP routing, IP multicast support, IPX routing, Demand Dial Routing, Remote Access Server, Internet authentication service, virtual private networks, L2TP, PPTP, interoperability with IBM Host Systems, services for Unix, interoperability with NetWare, services for Macintosh, ATM, Telephony integration and conferencing, TAPI 3, NetBEUI, data link control, IBM SNA interoperability concepts.Distributed Systems Guide: Active Directory logical structure, Active Directory data storage, name resolution in Active Directory, Active Directory schema, Global Catalogs, service publication in Active Directory, Active Directory replication, LDAP, Kerberos, managing flexible single-master operations, monitoring performance in Active Directory, Active Directory backup and restore, Active Directory diagnostics, troubleshooting, recovery, authentication, public key technology, cryptography, Encrypting File System, EFS administration, Windows 2000 certificate services and public key infrastructure, Distributed File System, file replication service, network load balancing, interpreting the cluster log, introduc

Table of Contents

Welcome xi
Part 1 Getting Started
What's New in Microsoft Internet Explorer 5?
3(30)
Deploying the Browser
5(7)
Simplifying Web Tasks
12(8)
Automating Web Tasks
20(5)
Developing and Authoring for the Web
25(8)
Microsoft Internet Explorer 5 Components
33(26)
Overview
34(1)
Microsoft Outlook Express
35(7)
Microsoft Windows Media Player
42(4)
Microsoft NetMeeting
46(8)
Microsoft FrontPage Express
54(2)
Additional Microsoft and Third-Party Components
56(3)
Understanding Customization and Administration
59(14)
Reasons to Customize Internet Explorer
60(8)
Using the Microsoft Internet Explorer Administration Kit
68(2)
Integrating Your Custom Solutions
70(1)
Sample Scenarios
71(2)
Working with Different Platforms
73(10)
Overview
74(1)
Windows Platform: 32-bit Versions
75(3)
Windows Platform: 16-bit Versions
78(2)
UNIX Platform
80(3)
Understanding Related Tools and Programs
83(8)
Microsoft Systems Management Server
84(1)
Microsoft Office 2000 Custom Installation Wizard
85(3)
Microsoft Internet Information Server
88(3)
Digital Certificates
91(16)
Understanding Digital Certificates
92(8)
Using Digital Certificates
100(7)
Security Zones and Permission-Based Security for Microsoft Virtual Machine
107(34)
Understanding Security Zones
108(2)
Setting Up Security Zones
110(16)
Understanding Permission-Based Security for Microsoft Virtual Machine
126(7)
Setting Up Java Custom Security
133(8)
Content Ratings and User Privacy
141(16)
Using Content Ratings
142(2)
Configuring Content Advisor Settings
144(6)
Ensuring User Privacy
150(2)
Configuring Privacy Options
152(5)
Part 2 Preparing
Planning the Deployment
157(26)
Evaluating Internet Explorer 5
158(3)
Assembling Project Teams
161(1)
Determining Time and Resource Requirements
161(1)
Assessing System Requirements
162(3)
Assessing Bandwidth Usage
165(3)
Identifying Client and Server Configurations
168(1)
Identifying Migration and Compatibility Issues
169(2)
Managing Multiple Browsers
171(1)
Specifying Custom Package Configurations
172(1)
Considering User Needs
173(5)
Determining Installation Media and Methods
178(2)
Developing a Deployment Plan
180(1)
Developing User Training and Support Plans
181(2)
Accessibility Features and Functionality
183(38)
Overview
184(1)
Accessibility Benefits
185(1)
Upgrade Considerations
186(1)
Suggested Features for Different Types of Disabilities
187(5)
Using Keyboard Navigation
192(12)
Customizing Fonts, Colors, and Styles
204(10)
Configuring Advanced Internet Accessibility Options
214(3)
Accessibility Resources
217(4)
Setting Up and Administering a Pilot Program
221(14)
Overview
222(1)
Preparing the Test Plan and Checklist
223(1)
Testing the Deployment Process in the Lab
224(2)
Planning the Pilot Program
226(1)
Conducting the Pilot Program
227(3)
Finalizing the Deployment Plan
230(5)
Part 3 Customizing
Preparing for the IEAK
235(18)
Preparing to Customize Internet Explorer
236(14)
Setting Up Your Computers
250(3)
Setting Up Servers
253(34)
Preparing Servers
254(2)
Configuring Central Automatic Configuration Servers
256(4)
Working with Proxy Servers
260(4)
Working with Automatic Search
264(3)
Working with Roaming User Profiles (Corporate Administrators)
267(3)
Preparing Servers for Internet Sign-up (ISPs)
270(11)
Server Considerations for NetMeeting
281(6)
Customizing Connection Management and Settings
287(44)
Connection Management Overview
288(3)
Options for Creating a Service Profile
291(7)
Advanced Customization Options for Connection Manager
298(20)
Importing Connection Settings into a Custom Package
318(2)
Setting System Policies and Restrictions for Connections
320(2)
Using the Internet Connection Wizard for Sign-up and Setup
322(6)
Supporting Other Distribution and Installation Methods by Using Command-Line Parameters
328(3)
Running the Internet Explorer Customization Wizard
331(28)
Understanding How the Customization Wizard Works
332(2)
Stages of the Customization Wizard
334(2)
Running the Customization Wizard
336(23)
Customizing Setup
359(24)
Overview
360(2)
Customizing Windows Update Setup
362(14)
Customizing Setup by Using Batch Files and Switches
376(2)
Integrating Setup Solutions with Other Programs
378(2)
Understanding Windows Update Setup
380(3)
Time-Saving Strategies That Address Diverse User Needs
383(10)
Overview
384(1)
Using Automatic Configuration in a Corporate Setting
385(1)
Creating Multiple .isp Files for Internet Services
386(1)
Working with Multiple Platforms
387(2)
Rebuilding Custom Packages Efficiently
389(2)
Using Batch Files to Customize the Setup Program
391(1)
Starting Internet Explorer by Using Command-Line Parameters
392(1)
Working with .inf Files
393(14)
Customizing Installation by Using .inf Files
394(1)
Manipulating Folders and Files by Using .inf Files
395(4)
Extending Setup
399(4)
Providing Uninstall Functionality in an .inf File
403(1)
Using RunOnce Technology
404(3)
Part 4 Installing
Deploying Microsoft Internet Explorer 5
407(8)
Announcing the Deployment
408(1)
Preparing the Users' Computers
408(1)
Providing User Training and Support
409(1)
Building Custom Package Files
409(1)
Signing Custom Package Files
409(1)
Preparing the Distribution Media
410(2)
Installing Microsoft Internet Explorer 5
412(2)
Assisting Users During Installation
414(1)
Implementing the Sign-up Process
415(8)
Implementing a Server-Based Sign-up Process
416(4)
Implementing a Serverless Sign-up Process
420(3)
Part 5 Maintaining and Supporting
Using Automatic Configuration and Automatic Proxy
423(10)
Understanding Automatic Configuration and Automatic Proxy
424(8)
Working with Automatic Detection of Browser Settings
432(1)
Keeping Programs Updated
433(14)
IEAK Profile Manager
434(5)
Update Notification Page
439(3)
Software Distribution Channels
442(5)
Implementing an Ongoing Training and Support Program
447(142)
Overview
448(1)
Ongoing Training Options
448(1)
Microsoft Training Services
449(1)
Ongoing Support Options
450(1)
Microsoft Support Services
451(6)
Part 6 Appendixes
Appendix A Windows 2000 Configuration Solutions for Internet Explorer
457(6)
Administrative Tools Overview
458(1)
Specifying Settings for Unattended Setup
458(1)
Using Group Policy with Internet Explorer
459(4)
Appendix B Troubleshooting
463(34)
Overview: Troubleshooting Strategy
465(2)
Installation and Uninstallation
467(8)
Browser Features and Functions
475(8)
Windows Desktop Update
483(4)
Outlook Express
487(3)
HTML Authoring
490(7)
Appendix C Batch-Mode File Syntax and Command-Line Switches
497(12)
Using Internet Explorer Batch-Mode Setup
498(8)
Using Command-Line Switches
506(3)
Appendix D Checklists for Preparing to Use the IEAK
509(20)
Files and Information to Gather Before Running the IEAK
510(16)
Specifications for IEAK Graphics
526(3)
Appendix E Setting System Policies and Restrictions
529(8)
Overview
530(2)
Setting System Policies and Restrictions
532(3)
Using Custom Policy Templates
535(1)
Updating System Policies and Restrictions After Installation
536(1)
Appendix F Country/Region and Language Codes
537(12)
Country/Region Codes
538(7)
Language Codes
545(4)
Appendix G Microsoft Internet Explorer 5 File Types
549(4)
Common Setup Files
550(3)
Appendix H Structural Definition of .inf Files
553(30)
Sections of an .inf File
554(25)
Sample .inf File
579(4)
Appendix I Microsoft Internet Explorer 5 Resource Directory
583(6)
Product Resources
584(1)
Web Sites
585(4)
Glossary 589(6)
Index 595

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program