MCSE Training Kit: Microsoft Windows 2000 Professional

Overview


This official MCSE Training Kit teaches IT professionals how to install, configure, and administer the Windows 2000 Professional operating system -- as they prepare for the corresponding MCP exam. Working at their own pace through an integrated system of lessons and practice exercises, students learn how to set up and troubleshoot the software; monitor and optimize system resources such as files, printers, and applications; and configure hardware devices and drivers.
...
See more details below
Available through our Marketplace sellers.
Other sellers (Other Format)
  • All (31) from $1.99   
  • New (2) from $12.73   
  • Used (29) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$12.73
Seller since 2013

Feedback rating:

(5)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
PAPERBACK New 1572319011 TRACKING NUMBER INCLUDED New Unread Book May have some very minor shelf wear.

Ships from: pembroke pines, FL

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$50.00
Seller since 2014

Feedback rating:

(136)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview


This official MCSE Training Kit teaches IT professionals how to install, configure, and administer the Windows 2000 Professional operating system -- as they prepare for the corresponding MCP exam. Working at their own pace through an integrated system of lessons and practice exercises, students learn how to set up and troubleshoot the software; monitor and optimize system resources such as files, printers, and applications; and configure hardware devices and drivers.
Read More Show Less

Editorial Reviews

Booknews
A study guide for certification exam 70-210: installing, configuring, and administering Windows 2000 Professional. Elements of the operating system covered include the management console, task scheduler, control panel, registry, domain name system, active directory, and TCP/IP. Each chapter is divided into lessons with hands-on procedures to demonstrate that particular concept or skill. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9781572319011
  • Publisher: Microsoft Press
  • Publication date: 1/26/2000
  • Series: IT Professional Series
  • Edition description: BK & CD-ROM
  • Edition number: 2
  • Pages: 800
  • Product dimensions: 7.57 (w) x 9.26 (h) x 2.10 (d)

Meet the Author

Microsoft Corporation Founded in 1975, Microsoft (Nasdaq 'MSFT') is the worldwide leader in software for personal and business computing. The company offers a wide range of products and services designed to empower people through great software—any time, any place and on any device.
Read More Show Less

Read an Excerpt


Note: The Figures and/or Tables mentioned in this chapter do not appear on the web.

Chapter Fourteen

About This Chapter

In Chapter 14, "Securing Resources with NTFS Permissions," you learned about Microsoft Windows 2000 File System (NTFS) permissions. You use NTFS permissions to specify which users and groups can gain access to files and folders, and what these permissions allow users to do with the contents of the file or folder. NTFS permissions are available only on NTFS volumes. NTFS security is effective whether a user gains access to the file or folder at the computer or over the network.

In this chapter, you will learn how to make folders accessible over the network. You can access a computer's folders and their contents only by physically sitting at the computer and logging on to it or by accessing a shared folder on a remote computer. Sharing folders is the only way to make folders and their contents available over the network. Shared folders also provide another way to secure file resources, one that can be used on FAT or FAT32 partitions. In this chapter, you will also learn how to share file resources, secure them with permissions, and provide access to them.

Before You Begin

To complete this chapter, you must have

  • A computer that meets the minimum hardware requirements listed in "Hardware Requirements."
  • Microsoft Windows 2000 Professional installed on the computer.

Lesson 1: Understanding Shared Folders

You use shared folders to provide network users with access to file resources. When a folder is shared, users can connect to the folder over the network and gain accessto the files that it contains. However, to gain access to the files, users must have permissions to access the shared folders.

After this lesson, you will be able to

  • Use shared folders to provide access to network resources.
  • Describe how permissions affect access to shared folders.

Estimated lesson time: 15 minutes

Shared Folder Permissions

A shared folder can contain applications, data, or a user's personal data, called a home folder. Each type of data requires different shared folder permissions.

The following are characteristics of shared folder permissions:

  • Shared folder permissions apply to folders, not individual files. Since you can apply shared folder permissions only to the entire shared folder, and not to individual files or subfolders in the shared folder, shared folder permissions provide less detailed security than NTFS permissions.
  • Shared folder permissions don't restrict access to users who gain access to the folder at the computer where the folder is stored. They apply only to users who connect to the folder over the network.
  • Shared folder permissions are the only way to secure network resources on a FAT volume. NTFS permissions aren't available on FAT volumes.
  • The default shared folder permission is Full Control, and it is assigned to the Everyone group when you share the folder.

NOTE
A shared folder appears in Windows Explorer as an icon of a hand holding the shared folder. (Figure 15.1 shows the sharing icon.)

To control how users gain access to a shared folder, you assign shared folder permissions.

Table 15.1 explains what each of the shared folder permissions allows a user to do. The permissions are presented from most restrictive to least restrictive.

Figure 15.1 Shared folders in Windows Explorer

Table 15.1 Shared Folder Permissions

Shared folder permission Allows the user to
Read Display folder names, filenames, file data, and attributes; run program files; and change folders within the shared folder.
Change Create folders, add files to folders, change data in files, append data to files, change file attributes, delete folders and files, plus, it allows the user to perform actions permitted by the Read permission.
Full Control Change file permissions, take ownership of files, and perform all tasks permitted by the Change permission.


You can allow or deny shared folder permissions. Generally, it is best to allow permissions and to assign permissions to a group rather than to individual users. You deny permissions only when it is necessary to override permissions that are otherwise applied. In most cases, you should deny permissions only when it is necessary to deny permission to a specific user who belongs to a group to which you have given the permission. If you deny a shared folder permission to a user, the user won't have that permission. For example, to deny all access to a shared folder, deny the Full Control permission.

How Shared Folder Permissions Are Applied

Applying shared permissions to user accounts and groups affects access to a shared folder. Denying permission takes precedence over the permissions that you allow. The following list describes the effects of applying permissions.

  • Multiple Permissions Combine. A user can be a member of multiple groups, each with different permissions that provide different levels of access to a shared folder. When you assign permission to a user for a shared folder, and that user is a member of a group to which you assigned a different permission, the user's effective permissions are the combination of the user and group permissions. For example, if a user has Read permission and is a member of a group with Change permission, the user's effective permission is Change, which includes Read.
  • Denying Permissions Overrides Other Permissions. Denied permissions take precedence over any permissions that you otherwise allow for user accounts and groups. If you deny a shared folder permission to a user, the user won't have that permission, even if you allow the permission for a group of which the user is a member.
  • NTFS Permissions Are Required on NTFS Volumes. Shared folder permissions are sufficient to gain access to files and folders on a FAT volume but not on an NTFS volume. On a FAT volume, users can gain access to a shared folder for which they have permissions, as well as all of the folder's contents. When users gain access to a shared folder on an NTFS volume, they need the shared folder permission and also the appropriate NTFS permissions for each file and folder to which they gain access.
  • Copied or Moved Shared Folders Are No Longer Shared. When you copy a shared folder, the original shared folder is still shared, but the copy is not shared. When you move a shared folder, it is no longer shared.

Guidelines for Shared Folder Permissions

The following list provides some general guidelines for managing your shared folders and assigning shared folder permissions:

  • Determine which groups need access to each resource and the level of access that they require. Document the groups and their permissions for each resource.
  • Assign permissions to groups instead of user accounts to simplify access administration.
  • Assign to a resource the most restrictive permissions that still allow users to perform required tasks. For example, if users need only to read information in a folder, and they will never delete or create files, assign the Read permission.
  • Organize resources so that folders with the same security requirements are located within a folder. For example, if users require Read permission for several application folders, store the application folders within the same folder. Then share this folder instead of sharing each individual application folder.
  • Use intuitive share names so that users can easily recognize and locateresources. For example, for the Application folder, use Apps for the share name. You should also use share names that all client operating systems can use.

Although Windows 2000 allows for very long share names, try to keep share names short, about 12 characters. Shorter names are easier to remember and type. Products such as MS-DOS, Windows 3.x, and Windows for Workgroups require an 8.3-character share name.

Microsoft Windows 2000 provides 8.3-character equivalent names, but the resulting names might not be intuitive to users. For example, a Windows 2000 folder named Accountants Database would appear as Account~1 on client computers running MS-DOS, Windows 3.x, and Windows for Workgroups.

Practice: Applied Permissions

In the following practice, User101 has been assigned permissions to gain access to resources as an individual and as a member of a group, as shown in Figure 15.2. Determine which effective permissions User101 has in each situation:

  1. User101 is a member of Group1, Group2, and Group3. Group1 has Read permission and Group3 has Full Control permission for FolderA. Group2 has no permissions assigned for FolderA. What are User101's effective permissions for FolderA?
  2. User101 is also a member of the Sales group, which has the Read permission for FolderB. User101 has been denied the shared folder permission Full Control for FolderB as an individual user. What are User101's effective permissions for FolderB?

Figure 15.2 Applied permissions

Lesson Summary

In this lesson, you learned that you can make a folder and its contents available to other users over the network by sharing the folder. Using shared folder permissions is the only way to secure file resources on FAT volumes. Shared folder permissions apply to folders, not individual files. Shared folder permissions don't restrict access to users who gain access to the folder at the computer where the folder is stored. Shared folder permissions apply only to users who connect to the folder over the network.

You also learned about the three shared folder permissions: Read, Change, and Full Control. The Read permission allows users to display folder names, filenames, file data, and attributes. The Read permission also allows users to run program files and to change folders within the shared folder. The Change permission allows users to create folders, add files to folders, change data in files, append data to files, change file attributes, and delete folders and files, plus it allows the user to perform actions permitted by the Read permission. The Full Control permission allows users to change file permissions, take ownership of files, and perform all tasks permitted by the Change permission. The default shared folder permission is Full Control, and it is assigned to the Everyone group when you share the folder.

Lesson 2: Planning Shared Folders

When you plan shared folders, you can reduce administrative overhead and ease user access. You can organize resources that will be shared and put them into folders according to common access requirements. You can also determine which resources you want shared, organize resources according to function and use, and decide how you will administer the resources.

Shared folders can contain applications and data. Use shared application folders to centralize administration. Use shared data folders to provide a central location for users to store and gain access to common files. If all data files are centralized in one shared folder, users will find them easily. You will be able to back up data folders more easily if data folders are centralized, and you will be able to upgrade application software more easily if applications are centralized.

After this lesson, you will be able to

  • Plan which shared folder permissions to assign to user accounts and groups for application and data folders.

Estimated lesson time: 5 minutes

Application Folders

Shared application folders are used for applications that are installed on a network server and can be used from client computers. The main advantage of shared applications is that you don't need to install and maintain most components of the applications on each computer. While program files for applications can be stored on a server, configuration information for most network applications is often stored on each client computer. The exact way in which you share application folders will vary depending on the application and your particular network environment and company organization.

When you share application folders, consider the points in Figure 15.3. These points are explained in more detail as follows:

  • Create one shared folder for applications and organize all of your applications under this folder. When you combine all applications under one shared folder, you designate one location for installing and upgrading software.
  • Assign the Administrators group the Full Control permission for the applications folder so that they can manage the application software and control user permissions.
  • Remove the Full Control permission from the Everyone group and assign Read permission to the Users group. This provides more security because the Users group includes only user accounts that you created, whereas the Everyone group includes anyone who has access to network resources, including the Guest account.
  • Assign the Change permission to groups that are responsible for upgrading and troubleshooting applications.
  • Create a separate shared folder outside your application folder hierarchy for any application for which you need to assign different permissions. Then assign the appropriate permissions to that folder.
  • Figure 15.3 Creating and sharing application folders

Data Folders

Users on a network use data folders to exchange public and working data. Working data folders are used by members of a team who need access to shared files. Public data folders are used by larger groups of users who all need access to common data.

When you use data folders, create and share common data folders on a volume that is separate from the operating system and applications. Data files should be backed up frequently, and with data folders on a separate volume, you can conveniently back them up. If the operating system requires reinstallation, the volume containing the data folder remains intact.

Public Data

When you share a common public data folder, do the following:

  • Use centralized data folders so that data can be easily backed up.
  • Assign the Change permission to the Users group for the common data folder (see Figure 15.4). This will provide users with a central, publicly accessible location for storing data files that they want to share with other users. Users will be able to gain access to the folder and read, create, or change files in it.
  • Figure 15.4 Public data and working data shared folders

Working Data

When you share a data folder for working files, do the following:

  • Assign the Full Control permission to the Administrators group for a central data folder so that administrators can perform maintenance.
  • Share lower-level data folders below the central folder with the Change permission for the appropriate groups when you need to restrict access to those folders.

For an example, see Figure 15.4. To protect data in the Accountants folder, which is a subfolder of the Data folder, share the Accountants folder and assign the Change permission only to the Accountants group so that only members of the Accountants group can gain access to the Accountants folder.

Lesson Summary

In this lesson, you learned that you use shared application folders to centralize administration and make it easier to upgrade application software. When you use shared application folders, you should assign the Administrators group the Full Control permission for the applications folder so that members of this group can manage the application software and control user permissions. You should also remove the Full Control permission from the Everyone group and assign Read permission to the Users group. This provides more security because the Users group includes only user accounts that you created, whereas the Everyone group includes anyone who has access to network resources, including the Guest account.

You also learned that you use shared data folders to provide a central location for users to store and gain access to common files. When you use data folders, create and share common data folders on a volume that is separate from the operating system and applications. Data files should be backed up frequently, and with data folders on a separate volume, you can conveniently back them up.

Lesson 3: Sharing Folders

You can share resources with others by sharing folders containing those resources. To share a folder, you must be a member of one of several groups, depending on the role of the computer where the shared folder resides. When you share a folder, you can control access to the folder by limiting the number of users who can simultaneously gain access to it, and you can also control access to the folder and its contents by assigning permissions to selected users and groups. Once you have shared a folder, users must connect to the shared folder and must have the appropriate permissions to gain access to it. After you have shared a folder, you might want to modify it. You can stop sharing it, change its share name, and change user and group permissions to gain access to it.

After this lesson, you will be able to

  • Create and modify shared folders.
  • Make a connection to a shared folder.

Estimated lesson time: 20 minutes

Requirements for Sharing Folders

In Windows 2000 Professional, members of the built-in Administrators and Power Users groups are able to share folders. Which groups can share folders and on which machines they can share them depends on whether it is a workgroup or a domain and the type of computer on which the shared folders reside:

  • In a Windows 2000 domain, the Administrators and Server Operators groups can share folders residing on any machines in the domain. The Power Users group is a local group and can share folders residing only on the stand-alone server or computer running Windows 2000 Professional where the group is located.
  • In a Windows 2000 workgroup, the Administrators and Power Users groups can share folders on the Windows 2000 Server stand-alone server or the computer running Windows 2000 Professional on which the group exists.

NOTE
If the folder to be shared resides on an NTFS volume, users must also have at least the Read permission for that folder to be able to share it.

Administrative Shared Folders

Windows 2000 automatically shares folders for administrative purposes. These shares are appended with a dollar sign ($), which hides the shared folder from users who browse the computer. The root of each volume, the system root folder, and the location of the printer drivers are all hidden shared folders that you can gain access to across the network.

Table 15.2 describes the purpose of the administrative shared folders that Windows 2000 automatically provides.

Table 15.2 Windows 2000 Administrative Shared Folders

Share Purpose
C$, D$, E$, and so on The root of each volume on a hard disk is automatically shared, and the share name is the drive letter appended with a dollar sign ($). When you connect to this folder, you have access to the entire volume. You use the administrative shares to remotely connect to the computer to perform administrative tasks. Windows 2000 assigns the Full Control permission to the Administrators group.

Windows 2000 also automatically shares CD-ROM drives and creates the share name by appending the dollar sign to the CD-ROM drive letter.

Read More Show Less

Table of Contents

About This Book
Chapter 1: Introduction to Windows 2000
Lesson 1: Overview of the Windows 2000 Platform
Lesson 2: Windows 2000 Professional
Lesson 3: Windows 2000 Workgroups and Domains
Lesson 4: Logging On to Windows 2000
Lesson 5: The Windows Security Dialog Box
Review
Chapter 2: Installing Windows 2000 Professional
Lesson 1: Getting Started
Lesson 2: Installing Windows 2000 from a CD-ROM
Lesson 3: Installing Windows 2000 over the Network
Lesson 4: Troubleshooting Windows 2000 Setup
Review
Chapter 3: Using Microsoft Management Console and Task Scheduler
Lesson 1: Introducing the Microsoft Management Console
Lesson 2: Using Consoles
Lesson 3: Using Task Scheduler
Review
Chapter 4: Using Windows Control Panel
Lesson 1: Configuring Hardware Settings
Lesson 2: Configuring the Display
Lesson 3: Configuring Operating System Settings
Lesson 4: Installing Hardware Automatically
Lesson 5: Installing Hardware Manually
Lesson 6: Configuring and Troubleshooting the Desktop Environment
Review
Chapter 5: Using the Registry
Lesson 1: Understanding the Registry
Lesson 2: Using Registry Editor
Review
Chapter 6: Managing Disks
Lesson 1: Introduction to Disk Management
Lesson 2: Common Disk Management Tasks
Review
Chapter 7: Installing and Configuring Network Protocols
Lesson 1: TCP/IP
Lesson 2: NWLink
Lesson 3: Other Protocols Supported by Windows 2000
Lesson 4: Network Bindings
Review
Chapter 8: Using the DNS Service
Lesson 1: Understanding DNS
Lesson 2: Understanding Name Resolution
Lesson 3: Configuring a DNS Client
Review
Chapter 9: Introducing Active Directory Directory Services
Lesson 1: Understanding Active Directory Directory Services
Lesson 2: Active Directory Structure and Replication
Lesson 3: Understanding Active Directory Concepts
Review
Chapter 10: Setting Up and Managing User Accounts
Lesson 1: Understanding User Accounts
Lesson 2: Planning New User Accounts
Lesson 3: Creating User Accounts
Lesson 4: Setting Properties for User Accounts
Review
Chapter 11: Setting Up and Managing Groups
Lesson 1: Implementing Local Groups
Lesson 2: Implementing Built-In Local Groups
Review
Chapter 12: Setting Up and Configuring Network Printers
Lesson 1: Introducing Windows 2000 Printing
Lesson 2: Setting Up Network Printers
Lesson 3: Connecting to Network Printers
Lesson 4: Configuring Network Printers
Lesson 5: Troubleshooting Network Printers
Review
Chapter 13: Administering Network Printers
Lesson 1: Understanding Printer Administration
Lesson 2: Managing Printers
Lesson 3: Managing Documents
Lesson 4: Administering Printers Using a Web Browser
Lesson 5: Troubleshooting Common Printing Problems
Review
Chapter 14: Securing Resources with NTFS Permissions
Lesson 1: Understanding NTFS Permissions
Lesson 2: Applying NTFS Permissions
Lesson 3: Assigning NTFS Permissions
Lesson 4: Assigning Special Access Permissions
Lesson 5: Copying and Moving Files and Folders
Lesson 6: Solving Permissions Problems
Review
Chapter 15: Administering Shared Folders
Lesson 1: Understanding Shared Folders
Lesson 2: Planning Shared Folders
Lesson 3: Sharing Folders
Lesson 4: Combining Shared Folder Permissions and NTFS Permissions
Review
Chapter 16: Auditing Resources and Events
Lesson 1: Understanding Auditing
Lesson 2: Planning an Audit Policy
Lesson 3: Implementing an Audit Policy
Lesson 4: Using Event Viewer
Review
Chapter 17: Configuring Group Policy and Local Security Policy
Lesson 1: Configuring Account Policies
Lesson 2: Configuring Security Options
Review
Chapter 18: Managing Data Storage
Lesson 1: Managing NTFS Compression
Selecting an Alternate Display Color for Compressed Files and Folders
Lesson 2: Managing Disk Quotas
Lesson 3: Increasing Security with EFS
Lesson 4: Using Disk Defragmenter
Review
Chapter 19: Backing Up and Restoring Data
Lesson 1: Understanding How to Back Up and Restore Data
Lesson 2: Backing Up Data
Lesson 3: Restoring Data
Lesson 4: Changing Windows Default Backup Options
Review
Chapter 20: Monitoring Access to Network Resources
Lesson 1: Monitoring Network Resources
Lesson 2: Monitoring Access to Shared Folders
Lesson 3: Sharing a Folder Using the Shared Folders Snap-In
Lesson 4: Monitoring Network Users
Review
Chapter 21: Configuring Remote Access
Lesson 1: Understanding the New Authentication Protocols in Windows 2000
Lesson 2: Configuring Inbound Connections
Lesson 3: Configuring Outbound Connections
Review
Chapter 22: The Windows 2000 Boot Process
Lesson 1: The Boot Process
Lesson 2: Control Sets in the Registry
Lesson 3: Advanced Boot Options
Lesson 4: The Boot.ini File
Lesson 5: Using the Recovery Console
Review
Chapter 23: Deploying Windows 2000
Lesson 1: Automating Installations
Lesson 2: Using Disk Duplication to Deploy Windows 2000
Lesson 3: Performing Remote Installations
Lesson 4: Upgrading Previous Versions of Windows to Windows 2000
Lesson 5: Installing Service Packs
Review
Chapter 24: Configuring Windows 2000 for Mobile Computers
Lesson 1: Using Offline Folders and Files
Lesson 2: Configuring Power Options
Review
Chapter 25: Implementing, Managing, and Troubleshooting Hardware Devices and Drivers
Lesson 1: Using Device Manager and System Information
Lesson 2: Configuring, Monitoring, and Troubleshooting Driver Signing
Lesson 3: Configuring Computers with Multiple Processors and Monitoring System Performance
Lesson 4: Installing, Managing, and Troubleshooting Devices
Review
Appendix A: Questions and Answers
Appendix B: Creating Setup Boot Disks
Appendix C: Understanding the DHCP Service
Appendix D: Managing Backup Tapes
Glossary
Index
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted June 22, 2000

    Essential read for MCP certification

    this is a very well written primer for the 2000 Professional exam. The author included a good amount of redundancy and restatements which help commit the information to memory. At times it was a little vague for the actual test, but, it is a must read for exam preparation

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)