Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: The Essentials of Scripting
Figure 1.1: The CMD.exe command prompt window.
Figure 1.2: The Windows Script Host object model.
Chapter 2: Scripting Workstation Setups
Figure 2.1: PowerQuest's Drive Image Pro.
Chapter 3: Scripting Installations and Updates
Figure 3.1: The Add New Hardware Wizard window.
Figure 3.2: Detecting window title and text with /REVEAL.
Chapter 5: Automating Windows and Applications
Figure 5.1: Editing a recorded Office macro.
Figure 5.2: The
GetDetailsOf
file and folder output.
Figure 5.3: Windows file operating dialog box.
Figure 5.4: Windows context menu.
Chapter 6: Inside the Registry
Figure 6.1: The Windows REGEDIT screen.
Figure 6.2: The Windows REGEDT32 screen.
Chapter 7: Local System Management
Figure 7.1: Editing NTFS general permissions.
Figure 7.2: Editing NTFS special access permissions.
Chapter 8: Remote System Management
Figure 8.1: Mapping a network drive.
Figure 8.2: Disconnecting a mapped drive.
Figure 8.3: The WMI Object Browser.
Chapter 9: Enterprise Management
Figure 9.1: The ADSI process.
Chapter 10: Managing Inventory
Figure 10.1: The Windows 2000 Device Manager.
Chapter 11: Security
Figure 11.1: The Security Configuration and Analysis tool.
Chapter 12: Logging and Alerting
Figure 12.1: The Windows 2000 Event viewer.
Chapter 13: Logon Scripts
Figure 13.1: The time synchronization hierarchy.
Previous page
Table of content
Next page
Windows Admin Scripting Little Black Book (Little Black Books (Paraglyph Press))
ISBN: 1933097108
EAN: 2147483647
Year: 2004
Pages: 89
Authors:
Jesse M. Torres
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Modeling Internal Impedance
LC Region (Constant-Loss Region)
Limits to Attainable Distance
150- W STP-A Noise and Interference
Power Supply Filtering for Clock Sources, Repeaters, and PLL Circuits
Snort Cookbook
Installing Snort from Source on Unix
Logging to a Unix Socket
Detecting P2P
Excluding from Logging
Detecting and Normalizing HTTP Traffic
Building Web Applications with UML (2nd Edition)
What This Book Is About
Activities
Discussion
Summary
Controlled Controllers Pattern
Network Security Architectures
References
Rogue Device Detection
What Is the Campus?
Teleworker Security Design
Homogeneous and Heterogeneous Networks
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
What Are Commands?
Working with Iterative Loops
Search for a Document
View Enhancements
Add an Icon to an Action Button
FileMaker 8 Functions and Scripts Desk Reference
DayOfYear()
Get(LayoutNumber)
Get(RecordOpenCount)
Max()
RomanZenkaku()
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies