- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
Used Trade Paper
Ships in 1 to 3 days
Other titles in the Bible series:
Deploying and Administering Windows Vista Bible with CDROM (Bible)by Bill Kelly
Synopses & Reviews
Safely deploy Windows Vista across your enterprise
If you're responsible for deploying Windows Vista across an enterprise, this is the book you need to succeed. Packed with over 500 pages of best practices, sound techniques, and in-depth guidance, it's a must-read whether you're coming to Vista cold or are migrating from an older Windows operating system. Configure a secure network for your business, handle troubleshooting, and avoid pitfalls with this valuable resource from a top-notch team of Windows systems veterans.
What's on the CD-ROM?
A valuable CD included with the book contains useful tools and utilities to help you as you deploy Windows Vista for the first time.
See the CD appendix for details and complete system requirements.
Although analysts expect the majority of enterprises to tread slowly into migration, there certainly will be early adopters, as there are with any system or device. Because Microsoft has announced that it will support Windows 2000 only until the year 2010, enterprises using older versions of Windows will not have much time for leisurely testing and pilot projects before they need to seriously consider migrating to and deploying Windows Vista. Deploying Windows Vista will require an entirely new set of skills for IT departments called on to migrate from older versions of Windows. Any IT professional looking to the future of their enterprise network deployment will benefit from the advice, tips, and reliable information contained in this resource. The book covers all the important security issues that are top of mind in today's IT world, as well as troubleshooting practices to help get issues resolved in less time. A valuable CD ROM contains tools and utilities to help IT professionals as they deploy Windows Vista for the first time.
About the Author
Bob Kelly has been working in the IT field for 18 years with a focus on application deployment, scripting, and the automated distribution of Windows systems and is a Microsoft MVP for Setup and Deployment. Bob served in the U.S. Navy for eight years, ending his service as Systems Administrator for the White House Communications Agency. He spent the next several years as a consultant supporting various commercial and government agencies in the Washington DC area as a systems architect. Bob currently works as Senior Product manager for KACE (www.kace.com) where his primary focus is support of the AppDeploy.com online community and its integration with the KBOX Systems Management Appliance. Bob founded AppDeploy.com (www.appdeploy.com) in September of 1999 as the premier destination for administrators seeking application and systems deployment expertise and has been writing for the website ever since. He has produced several hours of free videos on deployment related topics as well as several product reviews. Bob is author of The Definitive Guide to Desktop Administration as well as Start to Finish Guide to Scripting with KiXtart. He has gone on to speak at events like the Microsoft Management Summit and has written several articles, white papers, and books on the topics of scripting and desktop management. For more on Bob, visit www.bkelly.com.
Danielle Ruest and Nelson Ruest are both enterprise IT architects with over 20 years of experience in migration planning and network, PC, change management projects, and server infrastructure design. Danielle is a Microsoft MVP for Virtual Machines. Nelson is an MCSE, Microsoft Certified Trainer, and Microsoft MVP in Failover Clustering. Both are very familiar with all versions of Microsoft Windows as well as security, Active Directory, systems management, intra- and extranet configurations, collaboration technologies, office automation, and virtualization solutions. Together they have co-authored The Complete Reference for Windows Server 2008 (http://www.amazon.com/Microsoft-Windows- Server-2008-Reference/dp/0072263652), The Definitive Guide to Vista Migration (http:// www.realtime-nexus.com/dgvm.htm) which is referenced on the companion CD, Deploying Messaging Solutions with Microsoft Exchange Server 2007 (http://www.microsoft.com/MSPress/books/10938.aspx), as well as Configuring Windows Server 2008 Active Directory (http://www.microsoft.com/MSPress/books/11754.aspx), and that was just last year. This year they are working on two books on virtualization in the datacenter. Danielle and Nelson work for Resolutions Enterprises Ltd. (www.reso-net.com), a consulting firm focused on IT Infrastructure and dynamic datacenter design. Resolutions has been offering OS migration solutions for every version of Windows since Windows 2.0. It now has offered virtualization solutions for the past ten years. These solutions range from testing and development support environments to the virtualization of enterprise production systems. Danielle and Nelson have been instrumental in the development of these offerings to meet customer requirements as well as their promotion through multiple articles, presentations, and conferences. Bob Kelly, Danielle Ruest and Nelson Ruest have also participated in the production of the documentation for the Microsoft Deployment Toolkit, which was called Business Desktop Deployment (BDD) when Microsoft first prepared it for release in support of Windows Vista deployments. Together, they bring this expertise to this Bible.
Table of Contents
Part I: Developing the Deployment Strategy.
Chapter 1: Planning the Deployment.
Chapter 2: Creating Basic Windows Images.
Chapter 3: Managing Windows Licensing and Activation.
Part II: Customizing the Deployment Process.
Chapter 4: Working with Windows Installer.
Chapter 5: Migrating User Data.
Chapter 6: Managing Windows Images.
Chapter 7: Using the Microsoft Deployment Toolkit 2008.
Chapter 8: Windows Deployment Services.
Part III: Administering Windows Vista.
Chapter 9: Managing Change in Vista.
Chapter 10: Administering Workstations.
Part IV: Protecting and Maintaining the System.
Chapter 11: Securing the Workstation.
Chapter 12: Protecting User Data.
Chapter 13: Recovering Damaged Systems and Lost Data.
Appendix: What’s on the CD-ROM.
What Our Readers Are Saying