Mostrando 261 - 280 Resultados de 297 Para Buscar '"Windows NT"', tiempo de consulta: 0.15s Limitar resultados
  1. 261
    por Bhardwaj, Pawan K.
    Publicado 2007
    Tabla de Contenidos: “…Disk partitions and filesystemsJoining a workgroup or domain; Installation Methods; Performing the Installation; Text mode; GUI mode; Installing over the Network; Upgrading from Previous Operating Systems; Checking hardware compatibility; Upgrade paths; Upgrading from Windows 98; Upgrading from Windows NT 4.0 and Windows 2000 Professional; Automating the Installation; Unattended installation using Setup Manager; Disk duplication; Remote Installation Service (RIS); Product Activation; Post-Installation Updates; Automatic Updates; Windows Software Update Services; Service packs; Slipstreaming…”
    Libro electrónico
  2. 262
    Publicado 2007
    “…Don Poulton, MCSA, MCSE, A+, Network+, Security+, has been involved in consulting with small training providers as a technical writer, during which time he wrote training and exam prep materials for Windows NT 4.0, Windows 2000, and Windows XP. More recently, he has written or co-authored several certification volumes on Security+, Windows XP, and Windows Server 2003, published by Que Publishing. …”
    Libro electrónico
  3. 263
    por Robichaux, Paul E.
    Publicado 2000
    “…The book, which is an update of Managing the Windows NT Registry, addresses four main areas: What is the Registry? …”
    Libro electrónico
  4. 264
    por Carter, Gerald
    Publicado 2007
    Tabla de Contenidos: “…Browsing ElectionsAuthentication: Peer-to-Peer Versus Domains; What's in Samba 3.0?; Windows NT Domain Controller Support; Active Directory Domain Member Servers; Local Nested Groups; Unicode and Internationalization; User and Group Account Storage Plug-in Modules; Stackable Virtual File System (VFS) Modules; User Privileges; Windows Automatic Driver Downloads; But Wait, There's More; Future Research in Samba 4.0; What Can Samba Do?…”
    Libro electrónico
  5. 265
    por Howard, Michael, 1965-
    Publicado 2004
    Tabla de Contenidos: “…Protecting Secret DataAttacking Secret Data; Sometimes You Don't Need to Store a Secret; Getting the Secret from the User; Protecting Secrets in Windows 2000 and Later; Protecting Secrets in Windows NT 4; Protecting Secrets in Windows 95, Windows 98, Windows Me,and Windows CE; Not Opting for a Least Common Denominator Solution; Managing Secrets in Memory; Locking Memory to Prevent Paging Sensitive Data; Protecting Secret Data in Managed Code; Raising the Security Bar; Trade-Offs When Protecting Secret Data; Summary; Chapter 10. …”
    Libro electrónico
  6. 266
    por Lee, Thomas
    Publicado 2011
    Tabla de Contenidos: “…Windows PowerShell® 2.0 Bible; Contents; Introduction; Part I: Introduction; Chapter 1: Introduction to Windows PowerShell; Managing Windows - The Challenges of the Past; Management in the Early Days; Management with Windows NT; Management with Windows Server 2003; Introducing Windows PowerShell; What Is Windows PowerShell?…”
    Libro electrónico
  7. 267
    Publicado 2007
    Libro
  8. 268
    por McCorry, Kieran, 1968-
    Publicado 2006
    Tabla de Contenidos: “…2.7 How the Active Directory Connector Uses the Active Directory2.8 Mailbox-Enabled and Mail-Enabled Objects; 2.9 Object Class Mapping from Exchange 5.5 to Active Directory; 2.10 Object Class Mapping from Active Directory to Exchange 5.5; 2.11 Synchronizing Hidden Objects; 2.12 Dealing with Hidden Distribution List Membership; 2.13 Object Deletion; 2.14 Connection Agreements and Authentication; 2.15 Controlling the Synchronization Schedule; 2.16 Connection Agreement Advanced Parameters; 2.17 Exchange 5.5 Mailboxes and Multiple Windows NT Accounts; 2.18 Mailbox Delegate Access…”
    Libro electrónico
  9. 269
    por Dalheimer, Matthias Kalle
    Publicado 2010
    “…The popular open source KDE desktop environment for Unix was built with Qt, a C++ class library for writing GUI applications that run on Unix, Linux, Windows 95/98, Windows 2000, and Windows NT platforms. Qt emulates the look and feel of Motif, but is much easier to use. …”
    Libro electrónico
  10. 270
    Tabla de Contenidos: “…Compatibilidad Windows 95 y Windows NT; C. Archivos de parámetros del sistema; 1. …”
    Libro electrónico
  11. 271
    Publicado 2001
    Tabla de Contenidos: “…Programming With PHP Origins of PHP What Makes PHP Better than Its Alternatives Interfaces to External Systems How PHP Works with the Web Server Hardware and Software Requirements Installation on Apache for UNIX Installation on IIS for Windows NT Editing Scripts Algorithms What a PHP Script Looks Like Saving Data for Later Receiving User Input Choosing between Alternatives Repeating Code Variables, Operators, and Expressions Identifiers Data Types Variable Creation and Scope Assigning Values to Variables Retrieving Values Freeing Memory Constants Operators Logical and Relational Operators Bitwise Operators Miscellaneous Operators Assignment Operators Expressions Control Statements…”
    Libro electrónico
  12. 272
    por Aspinwall, Jim
    Publicado 2005
    Tabla de Contenidos: “…Manage the Paging File; 4.6.2. Windows NT, 2000, XP, 2003; 4.6.3. Hacking the Hack; 35. …”
    Libro electrónico
  13. 273
    por Zwicky, Elizabeth D.
    Publicado 2000
    Tabla de Contenidos: “…Religious Arguments; 1.6.2. Unix Versus Windows NT; 1.6.3. That&s Not a Firewall!; 2. Internet Services; 2.2. …”
    Libro electrónico
  14. 274
    por Richards, Joe, 1969-
    Publicado 2006
    Tabla de Contenidos: “…Active Directory Basics; 1.2. Windows NT Versus Active Directory; 1.3. Windows 2000 Versus Windows Server 2003; 1.4. …”
    Libro electrónico
  15. 275
    Publicado 2003
    Tabla de Contenidos: “…-- 6.4 Troubleshooting procedures -- 6.4.1 Clearing a TAPM endpoint -- 6.4.2 Recycling mar_mlm and mar_ctrl processes -- 6.4.3 Clearing the Windows NT registry to make ClientCapture work -- 6.4.4 Fixing corruption in the TAPM database -- 6.4.5 Analyzing ETP log files and trace files -- 6.4.6 Analyzing Web Transaction Performance log and trace files -- Appendix A. …”
    Libro electrónico
  16. 276
    Publicado 2001
    Tabla de Contenidos: “…-- Conclusion -- 8 Access Control -- The UNIX Access Control Model -- How UNIX Permissions Work -- Modifying File Attributes -- Modifying Ownership -- The umask -- The Programmatic Interface -- Setuid Programming -- Access Control in Windows NT -- Compartmentalization -- Fine-Grained Privileges -- Conclusion -- 9 Race Conditions -- What Is a Race Condition?…”
    Libro electrónico
  17. 277
    Publicado 2024
    Tabla de Contenidos: “…Use cases for Entra ID Protection -- Case study analysis -- Extending XDR capabilities to on-premises and hybrid cloud by leveraging MDC -- MDC key features -- Benefits of using unified XDR for on-premises, multi-cloud, or hybrid cloud scenarios -- Case study analysis -- Microsoft Sentinel - SIEM and SOAR -- Sentinel key features -- Microsoft Sentinel versus Microsoft Defender XDR -- Case study analysis -- XDR and beyond - exploring commonly used security solutions -- Microsoft Defender for IoT -- EASM -- MDTI -- Microsoft Copilot for Security -- Case study analysis -- Microsoft's unified XDR and SIEM solution's benefits over non-MS solutions -- The future - Microsoft's influence in cybersecurity -- The graphical Windows OS revolution -- Reshaping server technology with Windows NT -- Outlook and the transformation of email communication -- MS Office - standard in productivity software -- Internet Explorer - a chapter in web browsing -- The future - Microsoft's rising influence in cybersecurity -- Summary -- Further reading -- Part 2 - Microsoft's Unified Approach to Threat Detection and Response -- Chapter 4: Power of Investigation with Microsoft Unified XDR and SIEM Solution -- Understanding the basics of SOC -- Typical SOC roles -- Avengers of cybersecurity -- Traditional versus modern SOC operations -- SOC journey with Microsoft's unified security operations platform -- Investigation in Microsoft Sentinel -- Investigation in Microsoft Defender XDR -- Microsoft Copilot for Security -- Integrations with other Microsoft security solutions and third-party tools -- Microsoft Defender XDR platform - Single pane of glass -- Microsoft Sentinel -- Third Party integrations -- Case study analysis -- Summary -- Further reading -- Chapter 5: Defend Attacks with Microsoft XDR and SIEM -- An attack kill chain in XDR and SIEM…”
    Libro electrónico
  18. 278
    Publicado 2003
    Tabla de Contenidos: “…IBM voice solutions -- 2.1 WebSphere Voice Server -- 2.1.1 Voice-enabling Web applications -- 2.1.2 Speech-enabling IVR applications -- 2.2 WebSphere Voice Response -- 2.2.1 WebSphere Voice Response for AIX, V3.1 -- 2.2.2 WebSphere Voice Response for Windows NT and Windows 2000, Version 3.1 -- 2.3 WebSphere Voice Toolkit -- 2.4 WebSphere Voice Server SDK -- Chapter 3. …”
    Libro electrónico
  19. 279
    por Burleson, Donald K.
    Publicado 2001
    “…If you are an Oracle DBA moving to Unix from another environment such as Windows NT or IBM Mainframe, you know that these commands are far different from those covered in most beginning Unix books. …”
    Libro electrónico
  20. 280
    Publicado 1999
    “…Python is growing in popularity because: It is available on all important platforms: Windows NT, Windows 95, Windows 98, Linux, all major UNIX platforms, MacOS, and even the BeOS. …”
    Libro electrónico