Author: Robert Reinstein
Publisher: Sams Publishing
ISBN:
Category : Computers
Languages : en
Pages : 1160
Book Description
Understanding how windows NT work: Its architecture. Installing windows NT. Windows NT configuration essentials. Windows NT administration ...
Windows NT
Author: Robert Reinstein
Publisher: Sams Publishing
ISBN:
Category : Computers
Languages : en
Pages : 1160
Book Description
Understanding how windows NT work: Its architecture. Installing windows NT. Windows NT configuration essentials. Windows NT administration ...
Publisher: Sams Publishing
ISBN:
Category : Computers
Languages : en
Pages : 1160
Book Description
Understanding how windows NT work: Its architecture. Installing windows NT. Windows NT configuration essentials. Windows NT administration ...
Windows NT Troubleshooting
Author: Kathy Ivens
Publisher: Oracle Press
ISBN: 9780078824715
Category : Computers
Languages : en
Pages : 538
Book Description
Be prepared--learn all the tweaks, tips, and administration shortcuts necessary to keep a Windows NT environment trouble-free. This guide contains detailed solutions and preventive techniques to the most common NT hotspots. It is organized logically by problem and solution so readers can find their answers fast. Includes real-world proven workarounds and prevention techniques.
Publisher: Oracle Press
ISBN: 9780078824715
Category : Computers
Languages : en
Pages : 538
Book Description
Be prepared--learn all the tweaks, tips, and administration shortcuts necessary to keep a Windows NT environment trouble-free. This guide contains detailed solutions and preventive techniques to the most common NT hotspots. It is organized logically by problem and solution so readers can find their answers fast. Includes real-world proven workarounds and prevention techniques.
Troubleshooting and Configuring the Windows NT/95 Registry
Author: Clayton Johnson
Publisher: Sams Publishing
ISBN: 9780672310669
Category : Information technology
Languages : en
Pages : 0
Book Description
A complete reference for the administrator of the Windows NT and 95 operating systems, this book includes detailed coverage of registry entries for both systems, noting instances when the entries differ. Complete troubleshooting sections outline known problems and details their solutions.
Publisher: Sams Publishing
ISBN: 9780672310669
Category : Information technology
Languages : en
Pages : 0
Book Description
A complete reference for the administrator of the Windows NT and 95 operating systems, this book includes detailed coverage of registry entries for both systems, noting instances when the entries differ. Complete troubleshooting sections outline known problems and details their solutions.
MCSE Supporting and Maintaining a Windows NT Server 4.0 Network
Author: Dennis Maione
Publisher: Que Publishing
ISBN: 9780735711570
Category : Computers
Languages : en
Pages : 762
Book Description
The leading certification product covering one of the hottest MCSE 2000 electives. This book not only prepares the reader for the exam, it provides them with the real-world ability to support and maintain networks that use Microsoft Windows NT Server 4.0 as a primary operating system in a mixed network. The book maps to the actual exam objectives, providing readers with an excellent study tool that is thorough, accurate, and reader-friendly.
Publisher: Que Publishing
ISBN: 9780735711570
Category : Computers
Languages : en
Pages : 762
Book Description
The leading certification product covering one of the hottest MCSE 2000 electives. This book not only prepares the reader for the exam, it provides them with the real-world ability to support and maintain networks that use Microsoft Windows NT Server 4.0 as a primary operating system in a mixed network. The book maps to the actual exam objectives, providing readers with an excellent study tool that is thorough, accurate, and reader-friendly.
Windows NT Troubleshooting and Configuration
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 1075
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 1075
Book Description
Windows NT Registry Troubleshooting
Author: Rob Tidrow
Publisher:
ISBN: 9781562056605
Category : Computers
Languages : en
Pages : 416
Book Description
Following the format of the successful "Windows 95 Registry Troubleshooting", this book serves as a handbook for all system administrators exploring Windows NT. This book enables the administrator to master Registry concepts and to properly plan and implement its features, as well as solve any problems which occur. The CD contains Registry editing utilities and mass update utilities.
Publisher:
ISBN: 9781562056605
Category : Computers
Languages : en
Pages : 416
Book Description
Following the format of the successful "Windows 95 Registry Troubleshooting", this book serves as a handbook for all system administrators exploring Windows NT. This book enables the administrator to master Registry concepts and to properly plan and implement its features, as well as solve any problems which occur. The CD contains Registry editing utilities and mass update utilities.
Windows NT TCP/IP Network Administration
Author: Craig Hunt
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565923775
Category : Computers
Languages : en
Pages : 518
Book Description
Windows NT TCP/IP Network Administrationis a complete guide to setting up and running a TCP/IP network on Windows NT. Windows NT and TCP/IP have long had a close association, and this is the first book to focus exclusively on NT networking with TCP/IP. It starts with the fundamentals--what the protocols do and how they work, how addresses and routing move data through the network, and how to set up your network connection. Beyond that, all the important networking services provided as part of Windows NT-- including IIS, RRAS, DNS, WINS, and DHCP--are presented in detail. This book is the NT administrator's indispensable guide. Contents include: Overview Delivering the data Network services Getting started Installing and configuring NT TCP/IP Using Dynamic Host Configuration Protocol Using Windows Internet Name Service Using Domain Name Service Configuring Email Service Using Microsoft routing Using Remote Access Service Troubleshooting TCP/IP Network Security Internet Information Server Appendixes on the TCP/IP commands, PPP script language reference, and DNS resource records
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565923775
Category : Computers
Languages : en
Pages : 518
Book Description
Windows NT TCP/IP Network Administrationis a complete guide to setting up and running a TCP/IP network on Windows NT. Windows NT and TCP/IP have long had a close association, and this is the first book to focus exclusively on NT networking with TCP/IP. It starts with the fundamentals--what the protocols do and how they work, how addresses and routing move data through the network, and how to set up your network connection. Beyond that, all the important networking services provided as part of Windows NT-- including IIS, RRAS, DNS, WINS, and DHCP--are presented in detail. This book is the NT administrator's indispensable guide. Contents include: Overview Delivering the data Network services Getting started Installing and configuring NT TCP/IP Using Dynamic Host Configuration Protocol Using Windows Internet Name Service Using Domain Name Service Configuring Email Service Using Microsoft routing Using Remote Access Service Troubleshooting TCP/IP Network Security Internet Information Server Appendixes on the TCP/IP commands, PPP script language reference, and DNS resource records
Microsoft System Center Configuration Manager Field Experience
Author: Manoj Pal
Publisher: Microsoft Press
ISBN: 073568460X
Category : Computers
Languages : en
Pages : 92
Book Description
Part of a series of specialized guides on System Center - this book shares real-world expertise for using Configuration Manager capabilities to deliver more effective IT services. Series editor Mitch Tulloch and a team of System Center experts provide concise technical guidance as they step you through key deployment and management scenarios.
Publisher: Microsoft Press
ISBN: 073568460X
Category : Computers
Languages : en
Pages : 92
Book Description
Part of a series of specialized guides on System Center - this book shares real-world expertise for using Configuration Manager capabilities to deliver more effective IT services. Series editor Mitch Tulloch and a team of System Center experts provide concise technical guidance as they step you through key deployment and management scenarios.
E-Mail Virus Protection Handbook
Author: Syngress
Publisher: Elsevier
ISBN: 0080477534
Category : Computers
Languages : en
Pages : 511
Book Description
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. - Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher - Focuses on specific safeguards and solutions that are readily available to users
Publisher: Elsevier
ISBN: 0080477534
Category : Computers
Languages : en
Pages : 511
Book Description
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. - Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher - Focuses on specific safeguards and solutions that are readily available to users
Virtual Private Networks
Author: Charlie Scott
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565925298
Category : Computers
Languages : en
Pages : 238
Book Description
Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization?The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support.Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and L2TP The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshooting
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565925298
Category : Computers
Languages : en
Pages : 238
Book Description
Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization?The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support.Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and L2TP The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshooting