Windows 2000 Power Toolkit


Book Description

This book will assist readers in the analysis, tuning, optimization, automation, enhancement, maintenance, and troubleshooting of Windows 2000. The authors show users how to use operating system utilities, Resource Kit applications, and third-party tools to help you accomplish everyday and advanced Windows 2000 system tasks.The CD-ROM contains shareware and third-party applications that help users to achieve high system optimization.




Microsoft Windows XP Power Toolkit


Book Description

Microsoft Windows XP Power ToolKit is the most comprehensive resource for providing Super Users with the information they want and need on the most valuable Windows XP tools, utilities and commands offered by Microsoft and other 3rd party companies. This reference identifies and documents the tools and then details how to get the most from them -- all included on a companion CD-ROM so you can use them right away.




MCSE Windows 2000 Server


Book Description

Published under the direction of Series Editor Tittel, the leading authority on certification and the founder of The Exam Cram Method series, this handbook focuses on exactly what is needed to get certified now. The CD-ROM features PrepLogic practice tests.




Windows Developer Power Tools


Book Description

A wealth of open and free software is available today for Windows developers who want to extend the development environment, reduce development effort, and increase productivity. This encyclopedic guide explores more than 100 free and open source tools available to programmers who build applications for Windows desktops and servers.




Windows 2000 Essential Reference


Book Description

Written by a key Microsoft Windows 2000 trainer, this unique reference presents complex information in an intuitive, easy-to-use, and navigable format to help network administrators understand the Active Directory, Kerberos authentication, IntelliMirror, group policies, and other new technologies in Windows 2000.




Unix Power Tools


Book Description

With the growing popularity of Linux and the advent of Darwin, Unix has metamorphosed into something new and exciting. No longer perceived as a difficult operating system, more and more users are discovering the advantages of Unix for the first time. But whether you are a newcomer or a Unix power user, you'll find yourself thumbing through the goldmine of information in the new edition of Unix Power Tools to add to your store of knowledge. Want to try something new? Check this book first, and you're sure to find a tip or trick that will prevent you from learning things the hard way. The latest edition of this best-selling favorite is loaded with advice about almost every aspect of Unix, covering all the new technologies that users need to know. In addition to vital information on Linux, Darwin, and BSD, Unix Power Tools 3rd Edition now offers more coverage of bash, zsh, and other new shells, along with discussions about modern utilities and applications. Several sections focus on security and Internet access. And there is a new chapter on access to Unix from Windows, addressing the heterogeneous nature of systems today. You'll also find expanded coverage of software installation and packaging, as well as basic information on Perl and Python. Unix Power Tools 3rd Edition is a browser's book...like a magazine that you don't read from start to finish, but leaf through repeatedly until you realize that you've read it all. Bursting with cross-references, interesting sidebars explore syntax or point out other directions for exploration, including relevant technical details that might not be immediately apparent. The book includes articles abstracted from other O'Reilly books, new information that highlights program tricks and gotchas, tips posted to the Net over the years, and other accumulated wisdom. Affectionately referred to by readers as "the" Unix book, UNIX Power Tools provides access to information every Unix user is going to need to know. It will help you think creatively about UNIX, and will help you get to the point where you can analyze your own problems. Your own solutions won't be far behind.




Unix Power Tools


Book Description

With the growing popularity of Linux and the advent of Darwin, Unix has metamorphosed into something new and exciting. No longer perceived as a difficult operating system, more and more users are discovering the advantages of Unix for the first time. But whether you are a newcomer or a Unix power user, you'll find yourself thumbing through the goldmine of information in the new edition of Unix Power Tools to add to your store of knowledge. Want to try something new? Check this book first, and you're sure to find a tip or trick that will prevent you from learning things the hard way.The latest edition of this best-selling favorite is loaded with advice about almost every aspect of Unix, covering all the new technologies that users need to know. In addition to vital information on Linux, Darwin, and BSD, Unix Power Tools 3rd Edition now offers more coverage of bash, zsh, and other new shells, along with discussions about modern utilities and applications. Several sections focus on security and Internet access. And there is a new chapter on access to Unix from Windows, addressing the heterogeneous nature of systems today. You'll also find expanded coverage of software installation and packaging, as well as basic information on Perl and Python.Unix Power Tools 3rd Edition is a browser's book...like a magazine that you don't read from start to finish, but leaf through repeatedly until you realize that you've read it all. Bursting with cross-references, interesting sidebars explore syntax or point out other directions for exploration, including relevant technical details that might not be immediately apparent. The book includes articles abstracted from other O'Reilly books, new information that highlights program tricks and gotchas, tips posted to the Net over the years, and other accumulated wisdom.Affectionately referred to by readers as "the" Unix book, UNIX Power Tools provides access to information every Unix user is going to need to know. It will help you think creatively about UNIX, and will help you get to the point where you can analyze your own problems. Your own solutions won't be far behind.




Windows 2000 TCP/IP


Book Description

This informative and complex reference book is written by Dr. Karanjit Siyan, successful author and creator of some of the original TCP/IP applications. The tutorial/reference hybrid offers a complete, focused solution to Windows internetworking concepts and solutions and meets the needs of the serious system administrator by cutting through the complexities of TCP/IP advances.




Windows 2000 Network Infrastructure


Book Description

The Smartest Way to Get Certified(TM)- Published under the direction of Series Editor Ed Tittel, the leading authority on certification and the founder of The Exam Cram Method(TM) series - Nearly 1 million copies sold!- The Exam Cram Method(TM) of study focuses on exactly what is needed to get certified now.- CD-ROM features PrepLogic(TM) Practice Tests- Exam Cram2 is Cramsession(TM) Approved Study Material




GFI Network Security and PCI Compliance Power Tools


Book Description

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning how to set up sophisticated products is time-consuming, and can be confusing. GFI's LANguard Network Security Scanner reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. To take advantage of the best things that GFI's LANguard Network Security Scanner has to offer, you'll want to configure it on your network so that it captures key events and alerts you to potential vulnerabilities before they are exploited.In this book Brien Posey has pinpointed the most important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively. His straightforward, no nonsense writing style is devoid of difficult to understand technical jargon. His descriptive examples explain how GFI's security tools enhance the security controls that are already built into your server's operating system.* Secure Your Network Master the various components that make up the management console and prepare to use it for most tasks.* Analyze Scan Results View detected vulnerabilities, save and print results, query open ports, and filter your results.* Install and Use the ReportPack Learn how to build custom reports and schedule reports. See how filters allow you to control the information that is processed when a reports is run.* Perform a Hardware Inventory and Compile a Software Inventory Use GFI to do your inventories and perform audits. See how to blacklist and whitelist applications to make your reports more meaningful.* Manage Patches Effectively See how to deploy a specific patch, perform a scan comparison, uninstall a patch, and deploy custom software.* Use GFI EndPointSecurity to Lock Down Hardware Be prepared for users trying to install unauthorized software, copy sensitive data onto removable media, or perform other actions to try and circumvent your network's security.* Create Protection Policies Control the level of device access allowed on a system and create separate protection policies; one for servers, one for workstations, and one for laptops. Learn how to deploy agents.* Regulate Specific Devices Master some of the advanced features of GFI: locking device categories, blacklisting and whitelisting devices, and using file type restrictions.* Monitor Device Usage Keep tabs on your network by setting logging options, setting alerting options, and generating end point security reports. - Use GFI EndPointSecurity to Lock Down Hardware - Create Protection Policies to Control the Level of Device Access - Master Advanced Features of GFI: Locking Device Categories, Blacklisting and Whitelisting Devices, Using File Type Restrictions and More