واضح آرشیو وب فارسی:سایت ریسک: ***Spring***07-03-2008, 05:23 PMMicrosoft WindowsVista Manegement and Administration http://i32.tinypic.com/hu3plc.jpg Microsoft WindowsVista Manegement and Administration ISBN: 0672329611 | English | Sams; 1 edition (December 7, 2007) | 688 pages | 30MB This book will show administrators how to manage and administer the advanced functions and security features in Windows Vista. The recommendations, tips, tricks, and best practices are based on years of early-adopter implementations of Windows Vista in large corporate and private environments. The authors highlight the functions of Windows Vista that both large and small environments have found to be the most useful, including all-new features such as Complete PC Backup, BitLocker, and the powerful Group Policy options that are only available in Windows Vista. Understand how to… Integrate Windows Vista into an Active Directory domain Properly protect information for local and remote users Utilize BitLocker to encrypt all the data on a disk Properly secure a Windows Vista system Enable self-service recovery with Shadow Copy Deploy Windows Vista systems without having to touch them Deploy powerful new Group Policy settings Pick the version of Vista that is right for your users Optimize Vista performance Securely access corporate information while offline Perform image-level backup and restore of Vista workstations Andrew Abbate is a consultant in and best-selling author on various Microsoft technologies and security and operational practices. James Walker, MCSE, CPM, BSME, has been a consultant, author, and technical editor to several best-selling Windows Unleashed books involving design, security, performance optimization, and data communications. Scott G. Chimner, CISSP, MCSE, MCSA, TCSE 2, A+, is a consultant for Convergent Computing, an ISSA member, and has been in the computer industry for more than 12 years with a concentration on Information Security. Scott has also served as a contributing writer for several books on Microsoft technologies. About the Author Andrew Abbate has been in the IT and consulting world for well over 15 years. His experiences in messaging, security, PKI, operational practices, and project management have granted him a unique perspective on how IT works from a “big picture” perspective. Coauthor of half a dozen books on Microsoft technologies and security, Andrew continues to work with San Francisco Bay area companies to improve their infrastructures and enable them to provide services to their users to improve productivity and security. James Walker, MCSE, CPM, BSME, has been in the information technology industry for more than 20 years and has been a contributing author, technical editor, and technical reviewer for a number of books involving security, electronic messaging, network operating systems, and data communications. He has worked with computers in one form or another since the late 1970s and was an early adopter of Windows since version 1.0 was released in the middle 1980s. As VP Support for Pandora Networks in Sunnyvale, CA, James is involved in the technology selection, design, planning, implementation and migration, and troubleshooting of VoIP telephony, collaboration, and presence IT projects for Fortune 500 companies. After years of supporting Microsoft-based technologies, James uses his experiences as an author, primary technical editor, and contributing author for a number of Sams Publishing technology books, including Teach Yourself Exchange Server 2003 in 10 Minutes, Microsoft Windows Server 2003 Unleashed, Microsoft Exchange Server 2003 Unleashed, Microsoft Windows Server 2003 Insider Solutions, and Microsoft Exchange Server 2003 Delta Guide, and Addison-Wesley technology books, including Exchange 2003 Distilled. Scott Chimner, CISSP, MCSE, MCSA, TCSE 2, A+, has been in the computer industry for more than 12 years, with a 7-year concentration on information security. Scott’s experience ranges from large-scale Ethernet cable drops and deploying networked Point-of-Sale (POS) systems for retail stores, to securely migrating offices to Microsoft solutions such as Active Directory and Exchange. Prior to joining CCO as a consultant, Scott administered several networks for a worldwide environmental engineering company and later filled the role of webmaster for a nationwide investment firm. Scott is a seasoned expert in security operations with extensive experience in system hardening, incident response, and managing network defenses. Scott has designed and implemented anti-malware, antivirus, and host intrusion prevention, and anti-spam and email filtering solutions. Scott is an ISSA member and has served as a contributing writer for books on Microsoft Exchange 2007 and Windows Server 2008. حجم : 30 مگابایت http://i15.tinypic.com/2mdp3pz.gif (http://rapidshare.com/files/97696949/Windows_Vista.rar) . سایت ما را در گوگل محبوب کنید با کلیک روی دکمه ای که در سمت چپ این منو با عنوان +1 قرار داده شده شما به این سایت مهر تأیید میزنید و به دوستانتان در صفحه جستجوی گوگل دیدن این سایت را پیشنهاد میکنید که این امر خود باعث افزایش رتبه سایت در گوگل میشود
این صفحه را در گوگل محبوب کنید
[ارسال شده از: سایت ریسک]
[مشاهده در: www.ri3k.eu]
[تعداد بازديد از اين مطلب: 313]