Flylib.com
MicrosoftR WindowsR 2000 Active DirectoryT Programming
MicrosoftR WindowsR 2000 Active DirectoryT Programming
ISBN: N/A
EAN: N/A
Year: 2001
Pages: 108
BUY ON AMAZON
Cover
LOC
Dedication
Foreword
Acknowledgments
Introduction
What This Book Covers
Who This Book Is For
What You Should Know Beforehand
What s On the Companion CD
System Requirements
Creating a Test Network and Development Environment
Good Citizenship
Chapter 1 -- Introduction to Directory Services
Network Computing Long Ago
What Is a Directory?
What Is a Directory Service?
A Brief History of Directories
The Present State of Directories
Active Directory Features
Chapter 2 -- Active Directory Architecture
Active Directory Concepts
Active Directory Components
Examples of Services That Use Active Directory
Tools for Active Directory
Summary
Chapter 3 -- Programming Interfaces for Active Directory
Incredibly Simple Sample
Interfaces to Active Directory
Relationship Between ADSI and Active Directory
Deciding on the Best Interface
But First ... a COM Primer
ADSI and COM
Summary
Chapter 4 -- Connecting to Active Directory
Step by Step
Binding
Binding Options
Summary
Chapter 5 -- Searching Active Directory
Search Technologies
A Searching Sample Using ADO and VBScript
Using IDirectorySearch
Search Options
Summary
Chapter 6 -- Reading and Writing Directory Data
Directory Attributes
Reading Attributes
Reading Multivalued Attributes
Named Properties or the Get Method: Which Is Better?
The Property Cache
Writing Attributes
Writing Multivalued Attributes
Containers
Summary
Chapter 7 -- Advanced Properties and Values
Trolling for Properties
The Property Cache Interfaces
Monster Property Cache Interfaces Sample
IDirectoryObject
Summary
Chapter 8 -- The Active Directory User Interface
But First, a Note from Our Sponsor...
Common Dialog Boxes
Display Specifiers
Summary
Chapter 9 -- Active Directory Schema
Understanding the Schema
Working with Classes
Working with Attributes
Extending the Schema
Summary
Chapter 10 -- Active Directory Administration Using Windows Script
Windows Scripting
Managing Users
Managing Groups
Managing Computers
Managing Services
Summary
Chapter 11 -- The Web and Beyond
Active Directory and ASP
Windows Platform Considerations
Whistler
Summary
Appendix -- Active Directory Resources
About the Author
About This Electronic Book
Create a List of Favorite Topics
External Links
Enlarge Graphics
Use Accessibility Shortcut Keys
Use the Shortcut Menu Commands
To Turn On MouseKeys
Customize the Help Viewer
Print the Current Topic
Full-Text Search
Use Full-Text Search
Advanced Full-Text Search
Search for Information
Find Information with Advanced Full-Text Search
Search for Words or Phrases
Define Search Terms
Use Nested Expressions
Search for Words in the Titles of Topic Files
Find Words Similar to Your Search Term
Search Previous Results
MicrosoftR WindowsR 2000 Active DirectoryT Programming
ISBN: N/A
EAN: N/A
Year: 2001
Pages: 108
BUY ON AMAZON
Lotus Notes and Domino 6 Development (2nd Edition)
Using Formulas in Forms and Subforms
Writing Java Agents
How Does Domino Security Work?
Implementing Document-Level Security
Document Tags
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
Cisco Secure IDS
NFR Security
Incident Response
Policy and Procedures
GO! with Microsoft Office 2003 Brief (2nd Edition)
Objective 1. Define Computer and Identify the Four Basic Computing Functions
Skill Assessments
Objective 6. Copy Formulas
Objective 7. Create a Data Table
Problem Solving
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Trim-Out Installation
Distributed Video Basics
Designing a Home Lighting Control System
HVAC Controls
Home Access Control Systems
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Organizing and Estimating the Work
Expense Accounting and Earned Value
Quantitative Time Management
Special Topics in Quantitative Management
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Indirect Privilege Escalation
Defeating Virtual Private Databases
Running Operating System Commands
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies