Active directory cookbook-(E-BOOK) (Record no. 192113)

000 -LEADER
fixed length control field 03927 a2200253 4500
003 - CONTROL NUMBER IDENTIFIER
control field Nust
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170207154030.0
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2004272739
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0596004648
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocm52530307
040 ## - CATALOGING SOURCE
Transcribing agency Nust
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.4/46
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Allen, Robbie.
245 10 - TITLE STATEMENT
Title Active directory cookbook-(E-BOOK)
Statement of responsibility, etc. Robbie Allen.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Sebastopol, CA :
Name of publisher, distributor, etc. O'Reilly,
Date of publication, distribution, etc. c2003.
300 ## - PHYSICAL DESCRIPTION
Extent xxvi, 593 p. :
Other physical details ill. ;
Dimensions 24 cm.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note • Chapter 1, sets the stage for the book by covering where you can find the tools used in the book, VBScript and Perl issues to consider, and where to find additional information. • Chapter 2, covers how to create and remove forests and domains, update the domain mode or functional levels, create different types of trusts, and other administrative trust tasks. • Chapter 3, covers promoting and demoting domain controllers, finding domain controllers, enabling the global catalog, and finding and managing Flexible Single Master Operations (FSMO) roles. • Chapter 4, covers the basics of searching Active Directory; creating, modifying, and deleting objects; using LDAP controls; and importing and exporting data using LDAP Data Interchange Format (LDIF) and comma-separated variable (CSV) files. • Chapter 5, covers creating, moving, and deleting Organizational Units, and managing the objects contained within them. • Chapter 6, covers all aspects of managing user objects, including creating, renaming, moving, resetting passwords, unlocking, modifying the profile attributes, and locating users that have certain criteria (e.g., password is about to expire). • Chapter 7, covers how to create groups, modify group scope, and type and manage membership. 6 • Chapter 8, covers creating computers, joining computers to a domain, resetting computers, and locating computers that match certain criteria (e.g., have been inactive for a number of weeks). • Chapter 9, covers how to create, modify, link, copy, import, back up, restore, and delete GPOs using the Group Policy Management Console and scripting interface. • Chapter 10, covers basic schema administration tasks, such as generating object identifiers (OIDs) and schemaIDGUIDs, how to use LDIF to extend the schema, and how to locate attributes or classes that match certain criteria (e.g., all attributes that are indexed). • Chapter 11, covers how to manage sites, subnets, site links, and connection objects. • Chapter 12, covers how to trigger and disable the Knowledge Consistency Checker (KCC), how to query metadata, force replication, and determine what changes have yet to replicate between domain controllers. • Chapter 13, covers creating zones and resource records, modifying DNS server configuration, querying DNS, and customizing the resource records a domain controller dynamically registers. • Chapter 14, covers how to delegate control, view and modify permissions, view effective permissions, and manage Kerberos tickets. • Chapter 15, covers how to enable auditing, diagnostics, DNS, NetLogon, Kerberos and GPO logging, obtain LDAP query statistics, and manage quotas. • Chapter 16, covers how to back up Active Directory, perform authoritative and nonauthoritative restores, check DIT file integrity, perform online and offline defrags, and search for deleted objects. • Chapter 17, covers creating and managing application partitions. • Chapter 18, covers how to integrate Active Directory with various applications, services,
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Directory services (Computer network technology)
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Geographic name E-BOOK
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Contributor biographical information
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/enhancements/fy0915/2004272739-b.html">http://www.loc.gov/catdir/enhancements/fy0915/2004272739-b.html</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Publisher description
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/enhancements/fy0915/2004272739-d.html">http://www.loc.gov/catdir/enhancements/fy0915/2004272739-d.html</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Table of contents only
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/enhancements/fy1009/2004272739-t.html">http://www.loc.gov/catdir/enhancements/fy1009/2004272739-t.html</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Permanent Location Current Location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
            Military College of Signals (MCS) Military College of Signals (MCS) 12/12/2016   005.446 ALL MCSEB-1369 12/08/2016 12/12/2016 Book
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.