Part IV: Backup and Recovery of Informationġ1: Using Shadow Copy to Recover Lost or Damaged Files 293ġ2: Backing Up and Recovering Windows Vista Information 309ġ3: Using the Complete PC Backup Utility 333ġ5: Setting Up Users and Computers in Windows Vista 375ġ6: Establishing Printer Management in Windows Vista 399Ģ1: Deploying Windows Vista in an Automated Fashion 527 Part II: Security for Windows Vista Systemsĥ: Patching and Keeping Windows Vista Up-to-Date 133Ħ: Using User Account Control to Establish System Security 157ħ: Implementing BitLocker Drive Encryption to Improve Data Privacy 185Ĩ: Configuring and Using Offline Files 209ĩ: Configuring Mobile Functionality in Windows Vista 233ġ0: Creating a Secured Mobile Communications Configuration 261 Ģ: Getting to Understand Your Windows Vista System 29ģ: Understanding Windows Vista Performance Optimization 65 Scott has also served as a contributing writer for several books on Microsoft technologies. Chimner, CISSP, MCSE, MCSA, TCSE 2, A+, is a consultant for Convergent Computing, an ISSA member, and has been in the computer industry for more than 12 years with a concentration on Information Security. James Walker, MCSE, CPM, BSME, has been a consultant, author, and technical editor to several best-selling Windows Unleashed books involving design, security, performance optimization, and data communications. Perform image-level backup and restore of Vista workstationsĪndrew Abbate is a consultant in and best-selling author on various Microsoft technologies and security and operational practices.Securely access corporate information while offline.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |