Winternals Defragmentation, Recovery, and Administration Field Guide

Paperback (Print)
Buy New
Buy New from BN.com
$42.31
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Paperback)
  • All (13) from $1.99   
  • New (5) from $36.03   
  • Used (8) from $1.99   

Overview

The only book available for the market leading Winternals tools used in over 70,000 Microsoft networks worldwide.

The book begins with a chapter describing the most common challenges faced by system administrators related to system recovery, data backup and system performance enhancements. The next chapters introduce the readers to the complete suite of Winternals solutions including Recovery Manager, Defrag Manager, and the Administrator's Pak which repairs unbootable or locked-out systems, restores lost data, and removes malware from infected machines. Chapters on the Administrator’ Pak detail all the components of this powerful suite of tools including: ERD Commander 2005, Remote Recover, NTFSDOS Professional, Crash Analyzer Wizard, FileRestore, Filemon Enterprise Edition, Regmon Enterprise Edition, AD Explorer, Insight for Active Directory, and TCP Tools. Each of these chapters details the complete functionality of all tools, and also provides detailed examples for using all tools in relatively simple to extremely complex scenarios. The chapters and companion Web site also include dozens of working scripts to automate many data recovery, backup, and performance enhancement tasks.

· Winternals tools are the market leading data recovery and system optimization tools for Microsoft Networks. These tools are deployed in more than 70,000 companies worldwide

· Despite the popularity of the Winternals tools, there are no competing books

· The companion Web site to the book will provide dozens of working scripts to optimize and enhance the performance of the Winternals tools

This guide and its companion Web site provide system administrators for a Microsoft network with all the information necessary to take full advantage of Winternals' comprehensive and reliable tools.

Read More Show Less

Product Details

  • ISBN-13: 9781597490795
  • Publisher: Elsevier Science
  • Publication date: 9/4/2006
  • Pages: 512
  • Product dimensions: 7.00 (w) x 10.00 (h) x 1.02 (d)

Meet the Author

Dave Kleiman (CAS, CCE, CIFI, CISM, CISSP, ISSAP, ISSMP, MCSE) has worked in the Information Technology Security sector since 1990. Currently, he is the owner of SecurityBreachResponse.com, and is the Chief Information Security Officer for Securit-e-Doc, Inc. Before starting this position, he was Vice President of Technical Operations at Intelliswitch, Inc., where he supervised an international telecommunications and Internet service provider network. Dave is a recognized security expert. A former Florida Certified Law Enforcement Officer, he specializes in computer forensic investigations, incident response, intrusion analysis, security audits, and secure network infrastructures. He has written several secure installation and configuration guides about Microsoft technologies that are used by network professionals. He has developed a Windows Operating System lockdown tool, S-Lok (www.s-doc.com/products/slok.asp ), which surpasses NSA, NIST, and Microsoft Common Criteria Guidelines. Dave was a contributing author to Microsoft Log Parser Toolkit (Syngress Publishing, ISBN: 1-932266-52-6). He is frequently a speaker at many national security conferences and is a regular contributor to many security-related newsletters, Web sites, and Internet forums. Dave is a member of several organizations, including the International Association of Counter Terrorism and Security Professionals (IACSP), International Society of Forensic Computer Examiners® (ISFCE), Information Systems Audit and Control Association® (ISACA), High Technology Crime Investigation Association (HTCIA), Network and Systems Professionals Association (NaSPA), Association of Certified Fraud Examiners (ACFE), Anti Terrorism Accreditation Board (ATAB), and ASIS International®. He is also a Secure Member and Sector Chief for Information Technology at The FBI’s InfraGard® and a Member and Director of Education at the International Information Systems Forensics Association (IISFA).

Laura E. Hunter (CISSP, MCSE, MCT, MCDBA, MCP, MCP+I, CCNA, A+, Network+, iNet+, CNE-4, CNE-5) is a Senior IT Specialist with the University of Pennsylvania, where she provides network planning, implementation, and troubleshooting services for various business units and schools within the university. Her specialties include Microsoft Windows NT and 2000 design and implementation, troubleshooting, and security topics.

Read More Show Less

Table of Contents

Chapter 1: Introduction to Defragmentation, Data Recovery, and Performance Enhancement. Chapter 2: Recovery Manager Chapter 3: Defrag Manager Chapter 4: Introduction to the Administrator's Chapter 5: ERD Chapter 6: Remote Recover Chapter 7: NTFSDOS Professional Chapter 8: Crash Analyzer Wizard Chapter 9: FileRestore Chapter 10: Filemon Enterprise Edition Chapter 11: Regmon Enterprise Edition Chapter 12: AD Explorer Chapter 13: Insight for Active Directory Chapter 14: TCP Tools
Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted December 9, 2006

    VERY VERY HIGHLY RECOMMENDED!!

    Are you a systems administrator? If you are, then this book is for you. Authors Dave Kleiman, Laura Hunter, Mahesh Satyanarayana, Kimon Andreou, Nancy G Altholz, Lawrence Abrams, Darren Windham, Tony Bradley and Brian Barber, have done an outstanding job of writing a book about the Winternals and Sysinternal tools in real-world situations that administrators can and will face on a daily basis. Kleiman, Hunter, Satyanarayana, Andreou, Altholz, Abrams, Windham, Bradley and Barber, begin by showing you how to use Process Explorer and Autoruns to spot and eliminate malware autostarts, services, drivers, and processes. Then, the authors describe in detail, the tools developed by Sysinternals to illustrate this sort of advanced information and explain how to use them. Next, they show you how to use Sysinternals tools to monitor active sessions on a computer and how to discover which processes are accessing which resources. They also show you a better way to manage disk and file fragmentation on your volumes. The authors then continue by examining the data recovery tools made available to you by the Winternals team. Then, they show you how to make sense of the infamous Blue Screen of Death. Next, the authors show you how to monitor active socket connections. They also examine a few tools provided by the Winternals group that any software developer would find useful. The authors continue by discussing the available source code. Then, they cover topics ranging from advanced system optimization, to options available in a multiboot system with various versions of Windows, to data recovery for NT. Finally, the authors show you how to use screensaver with a perverted twist to it. This most excellent book will show you how to bring dead systems back to life through the use of Winternals. Perhaps more importantly, Winternals software is capable of doing much more than that!

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)