Inside Windows Server 1002003 [Electronic resources]

Addison Wesley

نسخه متنی -صفحه : 245/ 242
نمايش فراداده

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Valid From entity (certificates)

Valid To entity (certificates)

Validate option (Secedit utility)

validating server

Kerberos

validating server name (Kerberos reply messages)

validity checks

certificates 2nd 3rd 4th 5th 6th 7th

variables

OSCML

VBScript

viruses

VCN

(Virtual Cluster Number)

vendors

PKI

verifications

RIS

configurations

Verifying Link Tracking Operation procedure (15.2)

Verifying Resource Record Integration procedure (5.15)

Verifying Transitive Trust Accessibility procedure (9.3)

Verifying WFP Operation procedure (15.3)

Verisign Web site

Version entity (certificates)

version numbers

GPOs 2nd

storage 2nd

versions

Ntldr

Windows .NET

compared 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

Vga.sys drivers

Vgaoem.fon drivers

video

troubleshooting

Videoprt.sys drivers

viewing

access tokens

ACEs (access control entries)

consolidated permissions

consolidated permisssions

ESP (EFI System Partition)

GPOs (Group Policy Objects) 2nd 3rd

group membership lists

MAC addresses

system privileges 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

tickets

Kerberos

Viewing a Resultant Set of Permissions procedure (11.1)

Viewing Personal Certificates via the Certificates Snap-In procedure (17.1)

Viewing Printer Driver Details procedure (16.10)

virtual blocks

LDM volumes

Virtual Cluster Number (VCN). [See VCN (Virtual Cluster Number)]

Virtual List Views

Virtual Memory Manager (VMM). [See VBScript

Viscarola, Peter

visual cues

file encryption

VMM (Virtual Memory Manager)

vocabulary

Kerberos 2nd 3rd 4th 5th 6th

volume extensions 2nd 3rd

Volume Manager

LDM volumes

volume requirments

RIS 2nd

Volume Shadow Copy Service (VSS). [See VSS (Volume Shadow Copy Service)]

volume shadow service (Ntbackup) 2nd 3rd 4th

volumes

deleting 2nd

dynamic disks

creating on 2nd 3rd

dynamic volumes

creating

restrictions 2nd 3rd 4th

extending

between dynamic disks 2nd

file systems

mirrored volumes 2nd

breaking 2nd 3rd 4th 5th

creating 2nd

replacing in 2nd 3rd 4th

RAID 5 volumes 2nd

shadows

simple volumes 2nd

spanned volumes 2nd

striped volumes 2nd

creating 2nd

VPNs

connections

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

VSS

(Volume Shadow Copy Service)

vunerabilities

passwords 2nd 3rd 4th

storage 2nd