Tournament of Books 2015
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    Required Reading | January 16, 2015

    Required Reading: Books That Changed Us



    We tend to think of reading as a cerebral endeavor, but every once in a while, it can spur action. The following books — ranging from... Continue »

    spacer
Qualifying orders ship free.
$59.99
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
Qty Store Section
1 Beaverton COMP- WIN SERVER
1 Burnside Microsoft Windows- Server Applications
1 Remote Warehouse General- General
13 Remote Warehouse Operating Systems- General

This title in other editions

Windows Server 2012 R2 Inside Out: Configuration, Storage, & Essentials

by

Windows Server 2012 R2 Inside Out: Configuration, Storage, & Essentials Cover

 

Synopses & Reviews

Publisher Comments:

This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds for Windows Server 2012 R2 - with a focus on configuration, storage, and essential administrative tasks.

Coverage includes:

  • Deployment
  • Boot configuration
  • Administration
  • Configuring roles, role services, and features
  • Managing and troubleshooting hardware
  • TPM and Bitlocker drive encryption
  • Managing the registry
  • Software and user account control administration
  • Managing storage and file systems
  • File sharing and security features
  • Performance monitoring, analyzing, and tuning
  • Backup and recovery

About the Author

William R. Stanek is a leading technology expert with 20+ years of experience in system management and advanced programming. He is an award-winning author of more than 100 books, including the Microsoft Press Pocket Consultant titles for Windows 8, Windows Server 2012, and Microsoft SQL Server 2012.

Table of Contents

Introduction; Who is this book for?; Conventions used in this book; How to reach the author; Errata and book support; We want to hear from you; Stay in touch; Chapter 1: Introducing Windows Server 2012 R2; 1.1 Getting to know Windows Server 2012 R2; 1.2 Windows 8.1 and Windows Server 2012 R2; 1.3 Planning for Windows Server 2012 R2; 1.4 Thinking about server roles and Active Directory; 1.5 Planning for availability, scalability, and manageability; Chapter 2: Deploying Windows Server 2012 R2; 2.1 Getting a quick start; 2.2 Product licensing; 2.3 Preparing for a Windows Server 2012 R2 installation; 2.4 Installing Windows Server 2012 R2; 2.5 Performing additional administration tasks during installations; 2.6 Troubleshooting installation; 2.7 Postinstallation tasks; Chapter 3: Boot configuration; 3.1 Boot from hardware and firmware; 3.2 Boot environment essentials; 3.3 Managing startup and boot configuration; 3.4 Managing the boot configuration data store and its entries; Chapter 4: Managing Windows Server 2012 R2; 4.1 Working with the administration tools; 4.2 Working with Server Manager; 4.3 Working with Computer Management; Chapter 5: Windows Server 2012 R2 MMC administration; 5.1 Using the MMC; 5.2 Building custom MMCs; 5.3 Designing custom taskpads for the MMC; 5.4 Publishing and distributing your custom tools; Chapter 6: Configuring roles, role services, and features; 6.1 Using roles, role services, and features; 6.2 Making supplemental components available; 6.3 Installing components with Server Manager; 6.4 Installing components at the prompt; 6.5 Tracking installed roles, role services, and features; Chapter 7: Managing and troubleshooting hardware; 7.1 Understanding hardware installation changes; 7.2 Installing devices; 7.3 Working with device drivers; 7.4 Managing hardware; Chapter 8: Managing the registry; 8.1 Introducing the registry; 8.2 Understanding the registry structure; 8.3 Registry root keys; 8.4 Registry data: How it is stored and used; 8.5 Registry administration; 8.6 Backing up and restoring the registry; 8.7 Maintaining the registry; 8.8 Securing the registry; Chapter 9: Software and User Account Control administration; 9.1 Software installation essentials; 9.2 Mastering User Account Control; 9.3 Maintaining application integrity; Chapter 10: Performance monitoring and tuning; 10.1 Tuning performance, memory usage, and data throughput; 10.2 Tracking a system's general health; 10.3 Tracking events and troubleshooting by using Event Viewer; Chapter 11: Comprehensive performance analysis and logging; 11.1 Establishing performance baselines; 11.2 Comprehensive performance monitoring; 11.3 Resolving performance bottlenecks; 11.4 Performance logging; Chapter 12: Storage management essentials; 12.1 Essential storage technologies; 12.2 Installing and configuring file services; Chapter 13: Configuring disks and storage; 13.1 Configuring storage; 13.2 Managing MBR disk partitions on basic disks; 13.3 Managing GPT disk partitions on basic disks; 13.4 Managing volumes on dynamic disks; Chapter 14: TPM and BitLocker Drive Encryption; 14.1 Working with trusted platforms; 14.2 Managing TPM; 14.3 Introducing BitLocker Drive Encryption; 14.4 Using hardware encryption, secure boot, and Network Unlock; 14.5 Deploying BitLocker Drive Encryption; 14.6 Setting up and managing BitLocker Drive Encryption; Chapter 15: File system essentials; 15.1 Understanding the disk and file-system structure; 15.2 Using FAT; 15.3 Using NTFS; 15.4 Advanced NTFS features; 15.5 Using ReFS; 15.6 Using file-based compression; Chapter 16: Maintaining and optimizing storage; 16.1 Managing NTFS disk quotas; 16.2 Automated disk maintenance; 16.3 Automated optimization of disks; Chapter 17: Managing storage spaces; 17.1 Understanding storage spaces; 17.2 Using and configuring offloaded transfers; 17.3 Working with available storage; 17.4 Configuring data deduplication; Chapter 18: Managing file sharing; 18.1 File-sharing essentials; 18.2 Creating and publishing shared folders; 18.3 Managing share permissions; 18.4 Configuring synced sharing; Chapter 19: File security, access controls, and auditing; 19.1 Managing access permissions; 19.2 Managing file shares after configuration; 19.3 Managing claims-based access controls; 19.4 Auditing file and folder access; Chapter 20: Managing file screening and storage reporting; 20.1 Understanding file screening and storage reporting; 20.2 Managing file screening and storage reporting; About the author;

Product Details

ISBN:
9780735682672
Author:
Stanek, William R
Publisher:
Microsoft Press
Author:
Stanek, William R.
Author:
Stanek, William
Subject:
Operating Systems - NT
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Subject:
Operating Systems - Windows
Subject:
Windows Server; R2; servers; server role; user account; UAC; domain; domain controller; OU; Active Directory; Group Policy; group policies; Bitlocker; encryption; software; applications; performance monitoring; performance logging; logging; installation;
Copyright:
Edition Description:
Print PDF
Series:
Inside Out
Publication Date:
20140231
Binding:
TRADE PAPER
Language:
English
Pages:
848
Dimensions:
9 x 7.38 in

Related Subjects

Computers and Internet » Computers Reference » System Administration
Computers and Internet » Operating Systems » General
Computers and Internet » Operating Systems » Microsoft Windows » NT
Computers and Internet » Operating Systems » Microsoft Windows » Server Applications
Computers and Internet » Operating Systems » Microsoft Windows » System Administration » Windows Administration

Windows Server 2012 R2 Inside Out: Configuration, Storage, & Essentials New Trade Paper
0 stars - 0 reviews
$59.99 In Stock
Product details 848 pages Microsoft Press - English 9780735682672 Reviews:
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.