News Stay informed about the latest enterprise technology news and product updates.

Load up on chapter downloads

Educate yourself and explore free chapters from best-selling technical books on Windows XP, Windows Server 2003, Active Directory, security and many more.

Every week, publishes a free chapter download chock-full of Windows tips, hints and secrets. Be sure to bookmark the page and check back each week to find out what's coming next. September's offerings include:

The Ultimate Windows .NET Server 2003 System Administrator's Guide
This book is an essential resource for planning, deploying and administering a Windows .NET enterprise system. The authors draw on years of experience designing and administering Windows NT and UNIX systems and guide you through the varied tasks involved in real-world system administration. Included are detailed discussions of key Windows .NET Server administrative functions and descriptions of advanced tools and optional components. In addition, you'll find comprehensive and convenient command reference. Recognizing that the adoption of .NET Server is likely to be a slow process, the book not only reflects the new features of Windows .NET, but also provides continued support for Windows 2000.

  • Chapter 15, 'Terminal services.'
    This chapter looks at the security services that can, in some way, be enabled by a PKI. These are not services inherent in, or fundamental to any PKI, but are services that can build on the core PKI services. Some PKIs may support these auxiliary services, and others may not.

    Understanding PKI, Second Edition
    PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, including the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition provides network and security architects with the tools they need to grasp each phase of the key and certificate life cycle, including generation, publication, deployment and recovery.

  • Chapter 5, 'PKI-enabled services.
    This chapter looks at the security services that can, in some way, be enabled by a PKI. These are not services inherent in, or fundamental to any PKI, but are services that can build on the core PKI services. Some PKIs may support these auxiliary services, and others may not.

    Microsoft SQL Server 2000
    Microsoft SQL Server 2000: A Guide to Enhancements and New Features shows database administrators and developers how to optimize their databases. This book illustrates all the significant enhancements and additions in SQL Server 2000 and shows how to use them most effectively. Readers learn by example about security features, replication, backup procedures, data warehousing and optimization techniques. Beginning with an overview of SQL Server 2000, the book discusses online transaction processing (OLTP) and online analytical processing (OLAP). It also features a tour of different SQL Server releases and an installation guide. The book is also a good resource for those new to SQL Server because it provides a basic introduction and details about how to make successful conversions, as well as a feature-by-feature comparison to Oracle 9i. Sample code is used extensively to illustrate feature sets and illuminate topics covered, and an accompanying CD includes code, scripts and utilities.

  • Chapter 2, 'Enhancements and changes to existing SQL features.
    This chapter outlines the feature sets that have been enhanced since SQL Server 7.0 and the new feature sets that have been added to SQL Server 2000 like XML capability, indexed views and distributed partitioned views.

    Managing Enterprise Active Directory Services
    This book will teach you how to manage and monitor Active Directory programmatically in a large-scale environment. It provides expert advice from two authors who led Cisco's Active Directory deployment and management initiative. With a focus on post-deployment issues surrounding Active Directory, it also shares insight from enterprise-level deployers through real-world case studies. Active Directory is complex, and managing it requires careful maintenance and monitoring. In Managing Enterprise Active Directory Services, the authors draw from their unique experiences with Active Directory programming interfaces and management concepts to provide readers with an authoritative reference that will enable them to manage Active Directory services more efficiently.

  • Chapter 2, 'Active directory management.'
    In this chapter, authors Robbie Allen and Richard Puckett discuss the focus, philosophy and basics of actively managing Active Directory. They also cover the advantages/disadvantages of management applications.

  • Chapter 10, 'Schema.
    To really understand the inner workings of Active Directory, it helps to have a thorough understanding of the Active Directory schema. This chapter gives a brief introduction to schema concepts, then covers the tools and programmatic interfaces that can be used to manage the schema. The second half focuses on the steps necessary to extend the schema and includes a schema verification and extension program.

  • Dig Deeper on Windows client management

    Start the conversation

    Send me notifications when other members comment.

    Please create a username to comment.