Inside Windows Server 1002003 [Electronic resources]

Addison Wesley

نسخه متنی -صفحه : 245/ 228
نمايش فراداده

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

HAL (Hardware Abstraction Layer) drivers

handling

I/O 2nd 3rd 4th 5th

IA32 memory 2nd 3rd 4th 5th 6th

hangs

Setup

troubleshooting

hard drives

. [See also drives]

IDE hard drives

installing 2nd

SCSI drives

installing 2nd 3rd

hard links

NTFS

hard repairs

Active Directory

hardware

adding 2nd

BIOS 2nd

certified hardware 2nd

chipsets 2nd

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

CPUs 2nd

EFI disk utilities 2nd 3rd 4th 5th 6th

multiple displays 2nd

Windows Update 2nd 3rd 4th

devices

removing

drivers

Driver Rollback

protection

support

drives

types 2nd 3rd 4th 5th 6th 7th 8th 9th

installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

CPUs 2nd

EFI disk utilities 2nd 3rd 4th 5th 6th

IDE hard drives 2nd

multiple displays 2nd

network adapters 2nd 3rd

removable media drives 2nd 3rd 4th

SCSI adapters 2nd 3rd

Windows Update 2nd 3rd 4th

interrupts 2nd 3rd 4th 5th 6th 7th

L2 caches 2nd

memory

minimum requirements

motherboards 2nd

multiprocessors

support

process protection 2nd 3rd

recognition

Setup 2nd 3rd

storage

support for 2nd 3rd 4th

troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th

unsupported hardware 2nd

updates

Windows .NET

recommendations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th

Hardware Abstraction Layer (HAL) drivers

Hardware Compatibility List (HCL). [See HCL (Hardware Compatibility List)]

hardware RAID

dynamic disks

Hashed Message Authentication Code (HMAC). [See HMAC (Hashed Message Authentication Code)]

hashes

collisions

digital signatures

hashing mechanisms

HMAC (Hashed Message Authentication Code)

PKI 2nd 3rd 4th

SHA-1 (Secure Hash Algorithm)

SHS (Secure Hash Standard)

hashing algorithm

passwords

hashing mechanisms

HCL

(Hardware Compatibility List) 2nd

HCLs

NICs

verifying

headers

NTFS records 2nd

security descriptors

headless servers

installing

RIS (Remote Installation Services) 2nd 3rd 4th 5th 6th

Hellman, Martin

Help and Support Center

Hidusb.sys drivers

hierarchical zones

DNS

configuring 2nd 3rd 4th 5th 6th 7th 8th

hierarchies

CAs (Certificate Authorities) 2nd 3rd 4th

High-Level Kerberos Example procedure (11.5)

HMAC

(Hashed Message Authentication Code)

home directories

assigning

AD Users and Computers 2nd 3rd 4th 5th 6th

creating 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

command line 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

terminal services 2nd

mapping

for downlevel clients 2nd

host files

DNS 2nd

host records

DNS

Hosts tool (Tcpip.sys)

hot add memory

Enterprise Server

support

hot memory

Hubbell, Edwin