Part IV: Backup and Recovery of Informationġ1: Using Shadow Copy to Recover Lost or Damaged Files 293ġ2: Backing Up and Recovering Windows Vista Information 309ġ3: Using the Complete PC Backup Utility 333ġ5: Setting Up Users and Computers in Windows Vista 375ġ6: Establishing Printer Management in Windows Vista 399Ģ1: Deploying Windows Vista in an Automated Fashion 527 Part II: Security for Windows Vista Systemsĥ: Patching and Keeping Windows Vista Up-to-Date 133Ħ: Using User Account Control to Establish System Security 157ħ: Implementing BitLocker Drive Encryption to Improve Data Privacy 185Ĩ: Configuring and Using Offline Files 209ĩ: Configuring Mobile Functionality in Windows Vista 233ġ0: Creating a Secured Mobile Communications Configuration 261 Ģ: Getting to Understand Your Windows Vista System 29ģ: Understanding Windows Vista Performance Optimization 65 Scott has also served as a contributing writer for several books on Microsoft technologies. Chimner, CISSP, MCSE, MCSA, TCSE 2, A+, is a consultant for Convergent Computing, an ISSA member, and has been in the computer industry for more than 12 years with a concentration on Information Security. James Walker, MCSE, CPM, BSME, has been a consultant, author, and technical editor to several best-selling Windows Unleashed books involving design, security, performance optimization, and data communications. Perform image-level backup and restore of Vista workstationsĪndrew Abbate is a consultant in and best-selling author on various Microsoft technologies and security and operational practices.Securely access corporate information while offline.Pick the version of Vista that is right for your users.Deploy powerful new Group Policy settings.Deploy Windows Vista systems without having to touch them.Enable self-service recovery with Shadow Copy.Utilize BitLocker to encrypt all the data on a disk.Properly protect information for local and remote users.Integrate Windows Vista into an Active Directory domain.The authors highlight the functions of Windows Vista that both large and small environments have found to be the most useful, including all-new features such as Complete PC Backup, BitLocker, and the powerful Group Policy options that are only available in Windows Vista. The recommendations, tips, tricks, and best practices are based on years of early-adopter implementations of Windows Vista in large corporate and private environments. This book will show administrators how to manage and administer the advanced functions and security features in Windows Vista. If the print book includes a CD-ROM, this content is not included within the eBook version. This is the eBook version of the printed book.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |