Microsoft Windows Vista Management and Administration

Overview

This book will show administrators how to manage and administer the advanced functions and security features in Windows Vista. The recommendations, tips, tricks, and best practices are based on years of early-adopter implementations of Windows Vista in large corporate and private environments. The authors highlight the functions of Windows Vista that both large and small environments have found to be the most useful, including all-new features such as Complete PC Backup, BitLocker, and the powerful Group Policy ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (14) from $1.99   
  • New (6) from $20.32   
  • Used (8) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$20.32
Seller since 2009

Feedback rating:

(145)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
New Book from multilingual publisher. Shipped from UK in 10 to 14 business days.

Ships from: Fairford, United Kingdom

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$33.45
Seller since 2015

Feedback rating:

(367)

Condition: New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$44.99
Seller since 2008

Feedback rating:

(18552)

Condition: New
Brand New, Perfect Condition, Please allow 4-14 business days for delivery. 100% Money Back Guarantee, Over 1,000,000 customers served.

Ships from: Batavia, IL

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$45.00
Seller since 2015

Feedback rating:

(241)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$45.00
Seller since 2015

Feedback rating:

(241)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$74.95
Seller since 2008

Feedback rating:

(220)

Condition: New

Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Microsoft Windows Vista Management and Administration

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac

Want a NOOK? Explore Now

NOOK Book (eBook)
$19.99
BN.com price
(Save 44%)$35.99 List Price

Overview

This book will show administrators how to manage and administer the advanced functions and security features in Windows Vista. The recommendations, tips, tricks, and best practices are based on years of early-adopter implementations of Windows Vista in large corporate and private environments. The authors highlight the functions of Windows Vista that both large and small environments have found to be the most useful, including all-new features such as Complete PC Backup, BitLocker, and the powerful Group Policy options that are only available in Windows Vista.

Understand how to…

  • Integrate Windows Vista into an Active Directory domain
  • Properly protect information for local and remote users
  • Utilize BitLocker to encrypt all the data on a disk
  • Properly secure a Windows Vista system
  • Enable self-service recovery with Shadow Copy
  • Deploy Windows Vista systems without having to touch them
  • Deploy powerful new Group Policy settings
  • Pick the version of Vista that is right for your users
  • Optimize Vista performance
  • Securely access corporate information while offline
  • Perform image-level backup and restore of Vista workstations

Andrew Abbate is a consultant in and best-selling author on various Microsoft technologies and security and operational practices.

James Walker, MCSE, CPM, BSME, has been a consultant, author, and technical editor to several best-selling Windows Unleashed books involving design, security, performance optimization, and data communications.

Scott G. Chimner, CISSP, MCSE, MCSA, TCSE 2, A+, is a consultant for Convergent Computing, an ISSA member, and has been in the computer industry for more than 12 years with a concentration on Information Security. Scott has also served as a contributing writer for several books on Microsoft technologies.

Read More Show Less

Product Details

  • ISBN-13: 9780672329616
  • Publisher: Sams
  • Publication date: 12/11/2007
  • Pages: 659
  • Product dimensions: 5.48 (w) x 8.24 (h) x 1.53 (d)

Meet the Author

Andrew Abbate has been in the IT and consulting world for well over 15 years. His experiences in messaging, security, PKI, operational practices, and project management have granted him a unique perspective on how IT works from a “big picture” perspective. Coauthor of half a dozen books on Microsoft technologies and security, Andrew continues to work with San Francisco Bay area companies to improve their infrastructures and enable them to provide services to their users to improve productivity and security.

James Walker, MCSE, CPM, BSME, has been in the information technology industry for more than 20 years and has been a contributing author, technical editor, and technical reviewer for a number of books involving security, electronic messaging, network operating systems, and data communications. He has worked with computers in one form or another since the late 1970s and was an early adopter of Windows since version 1.0 was released in the middle 1980s. As VP Support for Pandora Networks in Sunnyvale, CA, James is involved in the technology selection, design, planning, implementation and migration, and troubleshooting of VoIP telephony, collaboration, and presence IT projects for Fortune 500 companies. After years of supporting Microsoft-based technologies, James uses his experiences as an author, primary technical editor, and contributing author for a number of Sams Publishing technology books, including Teach Yourself Exchange Server 2003 in 10 Minutes, Microsoft Windows Server 2003 Unleashed, Microsoft Exchange Server 2003 Unleashed, Microsoft Windows Server 2003 Insider Solutions, and Microsoft Exchange Server 2003 Delta Guide, and Addison-Wesley technology books, including Exchange 2003 Distilled.

Scott Chimner, CISSP, MCSE, MCSA, TCSE 2, A+, has been in the computer industry for more than 12 years, with a 7-year concentration on information security. Scott’s experience ranges from large-scale Ethernet cable drops and deploying networked Point-of-Sale (POS) systems for retail stores, to securely migrating offices to Microsoft solutions such as Active Directory and Exchange. Prior to joining CCO as a consultant, Scott administered several networks for a worldwide environmental engineering company and later filled the role of webmaster for a nationwide investment firm. Scott is a seasoned expert in security operations with extensive experience in system hardening, incident response, and managing network defenses. Scott has designed and implemented anti-malware, antivirus, and host intrusion prevention, and anti-spam and email filtering solutions. Scott is an ISSA member and has served as a contributing writer for books on Microsoft Exchange 2007 and Windows Server 2008.

Read More Show Less

Table of Contents

Introduction 1

Part I: Windows Vista Health Check

1: Windows Vista Technology Primer 9

2: Getting to Understand Your Windows Vista System 29

3: Understanding Windows Vista Performance Optimization 65

Part II: Security for Windows Vista Systems

4: Securing a Windows Vista System 97

5: Patching and Keeping Windows Vista Up-to-Date 133

6: Using User Account Control to Establish System Security 157

7: Implementing BitLocker Drive Encryption to Improve Data Privacy 185

Part III: Windows Vista Mobility

8: Configuring and Using Offline Files 209

9: Configuring Mobile Functionality in Windows Vista 233

10: Creating a Secured Mobile Communications Configuration 261

Part IV: Backup and Recovery of Information

11: Using Shadow Copy to Recover Lost or Damaged Files 293

12: Backing Up and Recovering Windows Vista Information 309

13: Using the Complete PC Backup Utility 333

14: Microsoft Vista System Restore 351

Part V: Managing Vista

15: Setting Up Users and Computers in Windows Vista 375

16: Establishing Printer Management in Windows Vista 399

17: Troubleshooting Windows Vista 419

18: Using Internet Explorer 7 451

Part VI: Deploying Vista

19: Creating Windows Vista Images 481

20: Imaging Tools and Processes 501

21: Deploying Windows Vista in an Automated Fashion 527

Part VII: Windows Vista in an Active Directory Environment

22: Understanding Group Policy Basics to Manage Windows Vista Systems 563

23: Expanding on the Use of Group Policies to Better Manage Windows Vista Systems 587

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)