Windows Server Cookbook. For Windows Server 2003 & Windows 2000
- Autor:
- Robbie Allen
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 698
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Windows Server Cookbook. For Windows Server 2003 & Windows 2000
This practical reference guide offers hundreds of useful tasks for managing Windows 2000 and Windows Server 2003, Microsoft's latest and greatest server. Through concise, on-the-job solutions to common problems, Windows Server Cookbook for Windows Server 2003 & Windows 2000 is certain to save you hours of time searching for answers.Now, instead of dredging reams of Microsoft documentation or browsing its unstructured knowledge base to figure out a particular issue--such as how to compare registry values between two hosts--you can simply reference the index of Windows Server Cookbook for Windows Server 2003 & Windows 2000. From there, you'll be directed to the exact trouble-shooting recipe they need.As the newest title in O'Reilly's popular Cookbook series, this book covers a wide range of issues that you are likely to face in your daily management of the Windows Server operating system. This includes how to deal with:
- files
- event logs
- DNS
- DHCP
- security
- the registry
- backup/restore
Wybrane bestsellery
-
Dive into the world of password security with our comprehensive Kali Linux course, designed to equip you with cutting-edge techniques for password cracking and defense, essential for modern cybersecurity.
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
W książce omówiono również nowsze technologie towarzyszące windowsowym serwerom, jak SQL, Docker, Windows Subsystem for Linux (WSL) czy PowerShell - słowem, wszystko, czego może potrzebować administrator, by rozpocząć pracę z systemem Windows Server 2022. Procedury zostały przedstawione w kolejno...(77.40 zł najniższa cena z 30 dni)
90.30 zł
129.00 zł(-30%) -
W drugiej części tego zaktualizowanego przewodnika dla zaawansowanych informatyków znalazł się między innymi opis mechanizmu wywołania ALPC i procedury synchronizacji sterowników urządzeń i aplikacji. Omówiono zasady wirtualizacji, a także takie elementy jak rejestr, interfejs WMI, usługi ETW i D...
Windows od środka. Wnętrze nowoczesnego systemu, wirtualizacja, systemy plików, rozruch, bezpieczeństwo i dużo więcej. Wydanie VII Windows od środka. Wnętrze nowoczesnego systemu, wirtualizacja, systemy plików, rozruch, bezpieczeństwo i dużo więcej. Wydanie VII
Mark Russinovich, Andrea Allievi, Alex Ionescu, David Solomon
(107.40 zł najniższa cena z 30 dni)125.30 zł
179.00 zł(-30%) -
Wśród wielu produktów sygnowanych marką giganta z Redmond znajduje się Microsoft Windows Server. Początki tego systemu operacyjnego sięgają 1987 roku. W odpowiedzi na uświadomioną już wówczas potrzebę pracy w ramach niewielkich sieci lokalnych Microsoft wypuścił LAN Managemen...
Microsoft Windows Server 2022. Kurs video. Active Directory Microsoft Windows Server 2022. Kurs video. Active Directory
(39.90 zł najniższa cena z 30 dni)79.49 zł
159.00 zł(-50%) -
Administrowanie sieciowymi systemami operacyjnymi Windows Serwer i Linux Serwer dla każdego Technika i studenta IT to podręcznik przygotowany z myślą o każdym uczniu oraz studencie związanym z kierunkami informatycznymi. Główną tematyką jest konfiguracja i zarządzanie sieciowymi systemami operacy...
Administrowanie sieciowymi systemami operacyjnymi Windows Serwer i Linux Serwer Administrowanie sieciowymi systemami operacyjnymi Windows Serwer i Linux Serwer
(24.90 zł najniższa cena z 30 dni)44.25 zł
59.00 zł(-25%) -
Active Directory and Azure AD offer centralized administration possibilities for network automation as well as for automating security and access management in Microsoft-oriented environments. This book is updated to Windows Server 2022 and covers the latest information to help you in deploying, ...
Active Directory Administration Cookbook. Proven solutions to everyday identity and authentication challenges for both on-premises and the cloud - Second Edition Active Directory Administration Cookbook. Proven solutions to everyday identity and authentication challenges for both on-premises and the cloud - Second Edition
-
Among the many configuration management tools available, Ansible has some distinct advantages: It's minimal in nature. You don't need to install agents on your nodes. And there's an easy learning curve. With this updated third edition, you'll quickly learn how to be productive with Ansible whethe...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Naucz się korzystać z wieloplatformowej wersji open source powłoki Windows PowerShell Od lat od administratorów systemów Windows oczekuje się znajomości powłoki PowerShell. Ponieważ jest to standardowe narzędzie automatyzacji firmy Microsoft, każdy administrator prędzej czy p&oac...(56.26 zł najniższa cena z 30 dni)
88.83 zł
98.70 zł(-10%) -
Poznaj Windows Server 2019 - kolejną odsłonę sieciowego systemu operacyjnego firmy Microsoft. System ten, przeznaczony przede wszystkim dla większych przedsiębiorstw, wydajnie wspomaga profesjonalną obsługę wewnątrzfirmowej sieci komputerowej. I tu rozpoczyna się Twoja rola, przyszły administrato...
Microsoft Windows Server 2019. Kurs video. Zaawansowane administrowanie siecią Microsoft Windows Server 2019. Kurs video. Zaawansowane administrowanie siecią
(39.90 zł najniższa cena z 30 dni)65.45 zł
119.00 zł(-45%) -
Active Directory stores data about objects such as users and groups in structured data stores and then allows network users and administrators to find and use these data when required.
Mastering Active Directory. Design, deploy, and protect Active Directory Domain Services for Windows Server 2022 - Third Edition Mastering Active Directory. Design, deploy, and protect Active Directory Domain Services for Windows Server 2022 - Third Edition
Robbie Allen - pozostałe książki
-
While computers and other devices identify each other on networks or the Internet by using unique addresses made up of numbers, humans rely on the Domain Name System (DNS), the distributed database that allows us to identify machines by name. DNS does the work of translating domain names into nu...(118.15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft’s ...
Active Directory Cookbook. Solutions for Administrators & Developers. 4th Edition Active Directory Cookbook. Solutions for Administrators & Developers. 4th Edition
(186.15 zł najniższa cena z 30 dni)186.15 zł
219.00 zł(-15%) -
Organize your network resources by learning how to design, manage, and maintain Active Directory. Updated to cover Windows Server 2012, the fifth edition of this bestselling book gives you a thorough grounding in Microsoft’s network directory service by explaining concepts in an easy-to-und...
Active Directory. Designing, Deploying, and Running Active Directory. 5th Edition Active Directory. Designing, Deploying, and Running Active Directory. 5th Edition
(186.15 zł najniższa cena z 30 dni)186.15 zł
219.00 zł(-15%) -
To help you take full advantage of Active Directory, this fourth edition of this bestselling book gives you a thorough grounding in Microsoft's network directory service. With Active Directory, you'll learn how to design, manage, and maintain an AD infrastructure, whether it's for a small busines...
Active Directory. Designing, Deploying, and Running Active Directory. 4th Edition Active Directory. Designing, Deploying, and Running Active Directory. 4th Edition
(160.65 zł najniższa cena z 30 dni)160.65 zł
189.00 zł(-15%) -
Working with Microsoft's network directory service for the first time can be a headache for system and network administrators, IT professionals, technical project managers, and programmers alike. This authoritative guide is meant to relieve that pain. Instead of going through the graphical user i...(143.65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Each year, Windows XP is pre-installed on 30 million PCs sold in the U.S.--and 90 million worldwide--making it the world's most popular operating system, and proving to frustrated users everywhere that preponderance does not equate to ease of use. There are literally thousands of programs, tools,...
Windows XP Cookbook. Solutions and Examples for Power Users & Administrators Windows XP Cookbook. Solutions and Examples for Power Users & Administrators
(143.65 zł najniższa cena z 30 dni)143.65 zł
169.00 zł(-15%)
Ebooka "Windows Server Cookbook. For Windows Server 2003 & Windows 2000" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Windows Server Cookbook. For Windows Server 2003 & Windows 2000" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Windows Server Cookbook. For Windows Server 2003 & Windows 2000" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-05-965-5260-2, 9780596552602
- Data wydania ebooka:
- 2005-03-18 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 2.1MB
- Rozmiar pliku Mobi:
- 2.1MB
Spis treści ebooka
- Windows Server Cookbook
- Dedication
- Foreword
- Preface
- Who Should Read This Book
- Whats in This Book
- Conventions Used in This Book
- Using Code Examples
- Safari Enabled
- Wed Like to Hear from You
- Acknowledgments
- 1. Introduction
- 1.1. Approach to the Book
- 1.2. Where to Find the Tools
- 1.3. Running Tools with Alternate Credentials
- 1.4. A Brief Word on Windows Scripting
- 1.5. Getting the Most Out of Your Scripts
- 1.6. Where to Find More Information
- 2. System Configuration
- Introduction
- 2.1. Activating Windows Server 2003
- 2.2. Configuring Automatic Updates
- 2.3. Disabling Windows Update
- 2.4. Installing or Uninstalling a Windows Component
- 2.5. Installing an Application or Service Pack via Group Policy
- 2.6. Viewing System Properties
- 2.7. Setting the System Time, Date, and Time Zone
- 2.8. Setting the Name of a Server
- 2.9. Joining a Server to a Domain
- 2.10. Testing and Resetting the Secure Channel
- 2.11. Viewing and Setting Environment Variables
- 2.12. Configuring Page Files
- 2.13. Putting System Information on the Desktop
- 2.14. Configuring System Startup Options
- 2.15. Configuring System Failure Options
- 2.16. Viewing System Uptime
- 2.17. Disabling the Manage/Configure Your Server Screen
- 2.18. Disabling Shutdown Tracker
- 2.19. Restarting or Shutting Down a Server
- 3. Disks, Drives, and Volumes
- Introduction
- 3.1. Viewing the Disk, Drive, and Volume Layout
- 3.2. Converting a Basic Disk to Dynamic
- 3.3. Enabling Disk Performance Statistics
- 3.4. Formatting a Volume
- 3.5. Setting the Drive Letter of a Volume
- 3.6. Setting the Label of a Volume
- 3.7. Cleaning Up a Volume
- 3.8. Defragmenting a Volume
- 3.9. Compressing a Volume
- 3.10. Checking a Volume for Errors
- 3.11. Making a Disk or Volume Read-Only
- 3.12. Mapping a Network Drive
- 3.13. Creating a Virtual Drive to Another Drive or Folder
- 3.14. Finding Large Files and Folders on a Volume
- 3.15. Enabling Disk Quotas
- 3.16. Configuring a Disk Quota for a User
- 3.17. Viewing Disk Quota Usage
- 4. Files, Folders, and Shares
- Introduction
- 4.1. Creating and Deleting a File
- 4.2. Creating and Deleting a Folder
- 4.3. Undeleting a File
- 4.4. Securely Deleting a File
- 4.5. Viewing the Properties of a File or Folder
- 4.6. Creating a Shortcut
- 4.7. Creating a Link or Junction Point
- 4.8. Creating a Program Alias
- 4.9. Searching for Files or Folders
- 4.10. Copying, Moving, or Renaming a File or Folder
- 4.11. Comparing Files or Folders
- 4.12. Hiding a File or Folder
- 4.13. Making a File or Folder Read-Only
- 4.14. Compressing a File or Folder
- 4.15. Encrypting a File or Folder
- 4.16. Replacing a File That Is in Use
- 4.17. Taking Ownership of a File or Folder
- 4.18. Finding Who Last Opened or Modified a File
- 4.19. Finding Open Files
- 4.20. Finding the Process That Has a File Open
- 4.21. Viewing File Activity
- 4.22. Performing an Action on Several Files at Once
- 4.23. Creating and Deleting Shares
- 4.24. Viewing Shares
- 4.25. Restricting Access to a Share
- 4.26. Enabling Web Sharing
- 4.27. Publishing a Share in Active Directory
- 5. Running and Scheduling Tasks
- Introduction
- 5.1. Running a Task with Alternate Credentials
- 5.2. Running a Task on a Remote Server
- 5.3. Running a Task When a User Logs On
- 5.4. Running a Task via a Login Script
- 5.5. Running a Task via Group Policy
- 5.6. Listing Automatic Tasks
- 5.7. Scheduling a Task
- 5.8. Deleting a Scheduled Task
- 5.9. Listing the Scheduled Tasks
- 6. Processes
- Introduction
- 6.1. Setting the Priority of a Process
- 6.2. Suspending a Process
- 6.3. Killing a Process
- 6.4. Viewing the Running Processes
- 6.5. Searching Processes
- 6.6. Finding the Services Run from a Process
- 6.7. Viewing the Properties of a Process
- 6.8. Viewing the Performance Statistics of a Process
- 6.9. Viewing the DLLs Being Used by a Process
- 6.10. Viewing the APIs Called by a Process
- 6.11. Viewing the Handles a Process Has Open
- 6.12. Viewing the Network Ports a Process Has Open
- 6.13. Script: Process Doctor
- 6.14. Script: Process Terminator
- 7. Services
- Introduction
- 7.1. Starting and Stopping a Service
- 7.2. Running Any Program or Script as a Service
- 7.3. Removing a Service
- 7.4. Setting the Service Startup Type
- 7.5. Setting the Service Account and Password
- 7.6. Performing an Action Automatically When a Service Fails
- 7.7. Viewing the List of Services
- 7.8. Searching Services
- 7.9. Finding the Process a Service Is Running From
- 7.10. Viewing the Antecedent and Dependent Services for a Service
- 7.11. Viewing the Service Load Order
- 7.12. Viewing the Startup History of a Service
- 7.13. Granting the Permission to Manage One or More Services
- 7.14. Script: Robust Service Restart
- 7.15. Script: Service Monitor
- 8. Event Logs
- Introduction
- 8.1. Creating an Event
- 8.2. Viewing Events
- 8.3. Creating a New Event Log
- 8.4. Viewing the Size of an Event Log
- 8.5. Setting the Maximum Size of an Event Log
- 8.6. Setting the Event Log Retention Policy
- 8.7. Clearing the Events in an Event Log
- 8.8. Restricting Access to an Event Log
- 8.9. Searching an Event Log on a Server
- 8.10. Searching the Event Logs on Multiple Servers
- 8.11. Archiving an Event Log
- 8.12. Finding More Information About an Event
- 8.13. Triggering an Action When an Event Occurs
- 8.14. Script: Event Watcher
- 9. Registry
- Introduction
- 9.1. Creating and Deleting a Key
- 9.2. Setting a Value
- 9.3. Setting Keys or Values Using Group Policy
- 9.4. Exporting Registry Files
- 9.5. Importing Registry Files
- 9.6. Searching the Registry
- 9.7. Comparing the Registry
- 9.8. Restricting Access to the Registry
- 9.9. Backing Up and Restoring the Registry
- 9.10. Creating a Registry Link
- 9.11. Setting the Maximum Registry Size
- 9.12. Monitoring Registry Activity
- 9.13. Viewing Processes That Have a Registry Key Open
- 10. Network Configuration
- Introduction
- 10.1. Viewing the Network Configuration
- 10.2. Disabling a Connection
- 10.3. Configuring an IP Address
- 10.4. Renewing or Releasing a DHCP IP Address
- 10.5. Configuring DNS Settings
- 10.6. Registering DNS Records or Flushing the DNS Cache
- 10.7. Finding a Computers Active Directory Site
- 10.8. Managing Routes
- 10.9. Viewing the Open Ports and Connections
- 10.10. Troubleshooting Network Connectivity Problems
- 10.11. Viewing Network Traffic
- 10.12. Configuring TCP/IP Filtering
- 10.13. Measuring Link Speed and Latency Between Two Hosts
- 10.14. Installing the IPv6 Stack
- 11. Security Best Practices
- Introduction
- 11.1. Analyzing Your Security Configuration
- 11.2. Enabling Auditing
- 11.3. Renaming the Administrator and Guest Accounts
- 11.4. Disabling or Removing Unused Accounts, Services, and Software
- 11.5. Enabling Screensaver Locking
- 11.6. Disabling Storage of the LM Password Hash
- 11.7. Requiring Strong Passwords
- 11.8. Getting Notified of New Security Vulnerabilities
- 11.9. Script: Mass Admin Password Changer
- 12. Internet Information Services 6.0
- Introduction
- 12.1. Installing IIS
- 12.2. Stopping and Starting IIS
- 12.3. Creating Web Sites
- 12.4. Hosting Multiple Web Sites
- 12.5. Creating Virtual Directories
- 12.6. Configuring Web Permissions
- 12.7. Configuring IP Address and Domain Name Restrictions
- 12.8. Configuring Web Site Authentication
- 12.9. Obtaining and Installing SSL Certificates
- 12.10. Enabling SSL on a Web Site
- 12.11. Backing Up SSL Certificates
- 12.12. Configuring Web Site QoS Settings
- 12.13. Configuring Web Site Logging
- 12.14. Configuring Web Site Redirection
- 12.15. Enabling Direct Metabase Editing
- 12.16. Backing Up and Restoring the Metabase
- 12.17. Exporting and Importing the Metabase
- 12.18. Enabling Dynamic Content
- 12.19. Creating Application Pools
- 12.20. Configuring Application Pool Identities
- 12.21. Creating Applications
- 12.22. Isolating Applications into Pools
- 12.23. Configuring Application Pool Recycling
- 12.24. Creating FTP Sites
- 12.25. Configuring FTP Authentication
- 12.26. Configuring FTP User Isolation
- 13. Domain Name System (DNS)
- Introduction
- 13.1. Installing the DNS Server
- 13.2. Starting and Stopping the DNS Server
- 13.3. Modifying DNS Server Configuration
- 13.4. Creating a Zone
- 13.5. Viewing a DNS Servers Zones
- 13.6. Converting a Zone to an Active Directory-Integrated Zone
- 13.7. Moving Active Directory-Integrated Zones into an Application Partition
- 13.8. Creating a Stub Zone
- 13.9. Configuring Conditional Forwarding
- 13.10. Configuring Zone Transfer
- 13.11. Creating and Deleting Resource Records
- 13.12. Querying Resource Records
- 13.13. Scavenging Old Resource Records
- 13.14. Clearing the DNS Cache
- 13.15. Enabling DNS Server Debug Logging
- 13.16. Viewing DNS Server Utilization Statistics
- 13.17. Preventing Cache Pollution on DNS Servers
- 13.18. Preventing Windows Clients from Attempting Dynamic Updates
- 13.19. Script: DNS Server Configuration Checker
- 14. DHCP Server
- Introduction
- 14.1. Installing DHCP Server
- 14.2. Authorizing a DHCP Server
- 14.3. Configuring Server Options
- 14.4. Enabling Address Conflict Detection
- 14.5. Creating a Scope
- 14.6. Creating a Superscope
- 14.7. Activating or Deactivating a Scope
- 14.8. Configuring Scope Options
- 14.9. Enabling Dynamic DNS Updates from the DHCP Server
- 14.10. Managing the Leases for a Scope
- 14.11. Creating a Reservation
- 14.12. Enabling DHCP Audit Logging
- 14.13. Modifying the DHCP Database and Audit Log Paths
- 14.14. Backing Up the DHCP Database
- 14.15. Restoring the DHCP Database
- 14.16. Importing and Exporting DHCP Server Configuration
- 14.17. Viewing DHCP Utilization Statistics
- 14.18. Finding the DHCP Servers on a Subnet
- 14.19. Running DHCP Server on a Domain Controller
- 15. Active Directory
- Introduction
- 15.1. Creating a New Active Directory Forest
- 15.2. Promoting a Domain Controller from Media
- 15.3. Uninstalling Active Directory
- 15.4. Upgrading from Windows 2000 to Windows Server 2003
- 15.5. Raising the Functional Level
- 15.6. Backing Up Active Directory
- 15.7. Restoring Active Directory
- 15.8. Searching for Objects in a Domain
- 15.9. Creating an Object
- 15.10. Modifying an Object
- 15.11. Moving an Object
- 15.12. Moving an Object to a Different Domain
- 15.13. Renaming an Object
- 15.14. Deleting an Object
- 15.15. Exporting and Importing Objects Using LDIF or CSV
- 15.16. Finding the Closest Domain Controller
- 15.17. Enabling and Disabling the Global Catalog
- 15.18. Finding the FSMO Role Holders
- 15.19. Transferring or Seizing a FSMO Role
- 15.20. Creating and Removing a Trust
- 15.21. Viewing the Trusts for a Domain
- 15.22. Verifying and Resetting Trusts
- 15.23. Enabling Diagnostics Logging
- 15.24. Script: Displaying the Structure of a Forest
- 16. Domain User, Group, and Computer Accounts
- Introduction
- 16.1. Creating a User Account
- 16.2. Creating a Large Number of Users
- 16.3. Modifying an Attribute for Several Users at Once
- 16.4. Unlocking a User
- 16.5. Troubleshooting Account Lockout Problems
- 16.6. Viewing and Modifying the Account Lockout and Password Policies
- 16.7. Enabling and Disabling a User Account
- 16.8. Setting a Users Password
- 16.9. Setting a Users Account Options
- 16.10. Setting a Users Profile Attributes
- 16.11. Finding a Users Last Logon Time
- 16.12. Creating a Group Account
- 16.13. Viewing the Members of a Group
- 16.14. Viewing a Users Group Membership
- 16.15. Adding and Removing Members of a Group
- 16.16. Changing the Scope or Type of a Group
- 16.17. Creating a Computer Account
- 16.18. Joining a Computer to a Domain
- 16.19. Renaming a Computer
- 16.20. Resetting a Computer Account
- 17. Exchange Server 2003
- Introduction
- 17.1. Preparing Active Directory for Exchange
- 17.2. Installing the First Exchange Server
- 17.3. Installing Additional Exchange Servers
- 17.4. Installing an Exchange Service Pack
- 17.5. Creating Unattended Installation Files for Exchange and Exchange Service Pack
- 17.6. Installing Exchange Management Tools
- 17.7. Delegating Exchange for the First Time
- 17.8. Stopping and Starting Exchange Server
- 17.9. Mail-Enabling a User
- 17.10. Mail-Disabling a User
- 17.11. Mailbox-Enabling a User
- 17.12. Deleting a Users Mailbox
- 17.13. Purging a Deleted Mailbox
- 17.14. Reconnecting a Deleted Mailbox
- 17.15. Enumerating Disconnected Mailboxes
- 17.16. Moving a Mailbox
- 17.17. Viewing Mailbox Sizes and Message Counts
- 17.18. Mail-Enabling a Contact
- 17.19. Mail-Disabling a Contact
- 17.20. Creating a Mail-Enabled Distribution List
- 17.21. Creating a Query-Based Distribution List
- 17.22. Creating an Address List
- 17.23. Creating a Recipient Policy
- 17.24. Creating a Storage Group
- 17.25. Creating a Mailbox Store
- 17.26. Listing Domain Controllers and Global Catalog Servers Used by an Exchange Server
- 17.27. Mounting and Dismounting Mailbox Stores
- A. Introduction to WSH
- A.1. How to Write Scripts
- A.2. WSH 2.0 Versus 5.6
- B. Introduction to WMI
- B.1. Referencing an Object
- B.2. Enumerating Objects of a Particular Class
- B.3. Searching with WQL
- B.4. Authentication with WMI
- C. Introduction to ADSI
- C.1. Objects and Interfaces
- C.2. Namespaces, ProgIDs, and ADsPaths
- C.3. Retrieving Objects
- D. List of Default Environment Variables
- E. List of Default Processes
- F. List of Default Services
- Index
- About the Author
- Colophon
- Copyright
O'Reilly Media - inne książki
-
JavaScript gives web developers great power to create rich interactive browser experiences, and much of that power is provided by the browser itself. Modern web APIs enable web-based applications to come to life like never before, supporting actions that once required browser plug-ins. Some are s...(177.65 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
How will software development and operations have to change to meet the sustainability and green needs of the planet? And what does that imply for development organizations? In this eye-opening book, sustainable software advocates Anne Currie, Sarah Hsu, and Sara Bergman provide a unique overview...(160.65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
OpenTelemetry is a revolution in observability data. Instead of running multiple uncoordinated pipelines, OpenTelemetry provides users with a single integrated stream of data, providing multiple sources of high-quality telemetry data: tracing, metrics, logs, RUM, eBPF, and more. This practical gu...(143.65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
What will you learn from this book?If you're a software developer looking for a quick on-ramp to software architecture, this handy guide is a great place to start. From the authors of Fundamentals of Software Architecture, Head First Software Architecture teaches you how to think architecturally ...(237.15 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
If you use Linux in your day-to-day work, then Linux Pocket Guide is the perfect on-the-job reference. This thoroughly updated 20th anniversary edition explains more than 200 Linux commands, including new commands for file handling, package management, version control, file format conversions, an...(92.65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate good development practices based on classic software design patterns and new patterns unique to embedded prog...(152.15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean product delivery in a practical and simple way. Dav...(245.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition off...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Decentralized finance (DeFi) is a rapidly growing field in fintech, having grown from $700 million to $100 billion over the past three years alone. But the lack of reliable information makes this area both risky and murky. In this practical book, experienced securities attorney Alexandra Damsker ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Whether you're a startup founder trying to disrupt an industry or an entrepreneur trying to provoke change from within, your biggest challenge is creating a product people actually want. Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find t...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Windows Server Cookbook. For Windows Server 2003 & Windows 2000 Robbie Allen (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.