Angebote zu "Show-Domain" (62 Treffer)

Kategorien

Shops

VBScript, WMI, and ADSI Unleashed
45,99 € *
ggf. zzgl. Versand

Don Jones brings experience from years of conferences, classes, online training, and ScriptingAnswers.com posts to make learning VBScript, WMI, and ADSI easier than ever. All-new sample scripts throughout the book are accompanied by Don's signature line-by-line explanations. New, expanded explanations target difficult-to-understand techniques and challenging technologies to make them more accessible. You'll also learn about scripting security, debugging techniques, script troubleshooting, HTML applications (HTAs), and more. If you want to become a more effective and efficient Windows administrator by learning to automate key administrative tasks, this is the book that will show you how. Product Description If you're a Windows administrator, scripting expertise can liberate you from boring, repetitive work-so you can take on the sophisticated, high-value projects you really want. Top scripting guru Don Jones has written the definitive administrator's guide to getting results with Microsoft's key scripting technologies: VBScript, WMI, and ADSI. Jones draws on his unsurpassed experience training Windows administrators in conferences, classes, and from his enormously popular site, ScriptingAnswers.com. You'll learn how to use VBScript, WMI, and ADSI to gain administrative control over nearly every aspect of every recent Windows server or client, including Windows Server 2003, Vista, XP, 2000, and NT. As you gain experience, Jones introduces more advanced techniques, ranging from modular scripting and script encryption to integrating VBScript with HTML code. Jones concludes with a full section of ready-to-run, real-world examples-from logon/logoff scripts to automated domain and network administration, from querying WMI to creating Active Directory groups. Every script is explained line-by-line, with challenging techniques described in even greater detail. Detailed information on how to. Decide what you can script: a framework for getting started fast Understand how scripts are designed, assembled, and run Master VBScript from start to finish: functions, I/O, data manipulation, program flow, and much more Use scripting objects for tasks ranging from retrieving network information to mapping drives Utilize FileSystemObject to manipulate the Windows filesystem Write ADSI scripts to manipulate any directory service your company uses, from Active Directory to Novell NDS Modify domain information, users, groups, and policies Query WMI information-from basic to advanced Plan for errors, and test and debug your scripts Build your own "resource kit" of reusable script components ON THE WEB: Download all examples and source code presented in this book from ScriptingAnswers.com, where you'll also be able to post follow-up questions directly to the author in a moderated, active community. Introduction 1 Part I: Introduction to Windows Administrative Scripting 11 Chapter 1: Scripting Concepts and Terminology 13 Chapter 2: Running Scripts 21 Chapter 3: The Components of a Script 39 Chapter 4: Designing a Script 55 Part II: VBScript Tutorial 73 Chapter 5: Functions, Objects, Variables, and More 75 Chapter 6: Input and Output 101 Chapter 7: Manipulating Numbers 115 Chapter 8: Manipulating Strings 129 Chapter 9: Manipulating Other Types of Data 145 Chapter 10: Controlling the Flow of Execution 155 Chapter 11: Built-In Scripting Objects 173 Chapter 12: Working with the File System 193 Chapter 13: Putting It All Together: Creating Your First Script from Scratch 219 Part III: Windows Management Instrumentation and Active Directory Services Interface 245 Chapter 14: Working with ADSI Providers 247 Chapter 15: Manipulating Domains 257 Chapter 16: Manipulating Users and Groups 271 Chapter 17: Understanding WMI 283 Chapter 18: Querying Basic WMI Information 299 Chapter 19: Querying Complex WMI Information 317 Chapter 20: Putting It All Together: Your First WMI/ADSI Script 335 Chapter 21: Testing and Debugging WMI and ADSI Queries 357 Part IV: Advanced Scripting Techniques 371 Chapter 22: Modular Script Programming 373 Chapter 23: Scripts Packaging and Protection 389 Chapter 24: Scripting Security 399 Chapter 25: Introduction to HTML Applications 409 Chapter 26: Debugging Tips, Tools, and Techniques 421 Part V: Ready-to-Run Examples 437 Chapter 27: Logon and Logoff Scripts 439 Chapter 28: Windows and Domain Administration Scripts 455 Chapter 29: Network Administration Scripts 481 Chapter 30: WMI and ADSI Scripts 497 Appendix 509 Index 523 . Backcover If you're a Windows administrator, scripting expertise can liberate you from boring, repetitive work-so you can take on the sophisticated, high-value projects you really want. Top scripting guru Don Jones has written the definitive administrator's guide to getting results with Microsoft's key scripting technologies: VBScript, WMI, and ADSI. Jones draws on his unsurpassed experience training Windows administrators in conferences, classes, and from his enormously popular site, ScriptingAnswers.com. You'll learn how to use VBScript, WMI, and ADSI to gain administrative control over nearly every aspect of every recent Windows server or client, including Windows Server 2003, Vista, XP, 2000, and NT. As you gain experience, Jones introduces more advanced techniques, ranging from modular scripting and script encryption to integrating VBScript with HTML code. Jones concludes with a full section of ready-to-run, real-world examples-from logon/logoff scripts to automated domain and network administration, from querying WMI to creating Active Directory groups. Every script is explained line-by-line, with challenging techniques described in even greater detail. Detailed information on how to. Decide what you can script: a framework for getting started fast Understand how scripts are designed, assembled, and run Master VBScript from start to finish: functions, I/O, data manipulation, program flow, and much more Use scripting objects for tasks ranging from retrieving network information to mapping drives Utilize FileSystemObject to manipulate the Windows filesystem Write ADSI scripts to manipulate any directory service your company uses, from Active Directory to Novell NDS Modify domain information, users, groups, and policies Query WMI information-from basic to advanced Plan for errors, and test and debug your scripts Build your own "resource kit" of reusable script components ON THE WEB: Download all examples and source code presented in this book from ScriptingAnswers.com, where you'll also be able to post follow-up questions directly to the author in a moderated, active community. Introduction 1 Part I: Introduction to Windows Administrative Scripting 11 Chapter 1: Scripting Concepts and Terminology 13 Chapter 2: Running Scripts 21 Chapter 3: The Components of a Script 39 Chapter 4: Designing a Script 55 Part II: VBScript Tutorial 73 Chapter 5: Functions, Objects, Variables, and More 75 Chapter 6: Input and Output 101 Chapter 7: Manipulating Numbers 115 Chapter 8: Manipulating Strings 129 Chapter 9: Manipulating Other Types of Data 145 Chapter 10: Controlling the Flow of Execution 155 Chapter 11: Built-In Scripting Objects 173 Chapter 12: Working with the File System 193 Chapter 13: Putting It All Together: Creating Your First Script from Scratch 219 Part III: Windows Management Instrumentation and Active Directory Services Interface 245 Chapter 14: Working with ADSI Providers 247 Chapter 15: Manipulating Domains 257 Chapter 16: Manipulating Users and Groups 271 Chapter 17: Understanding WMI 283 Chapter 18: Querying Basic WMI Information 299 Chapter 19: Querying Complex WMI Information 317 Chapter 20: Putting It All Together: Your First WMI/ADSI Script 335 Chapter 21: Testing and Debugging WMI and ADSI Queries 357 Part IV: Advanced Scripting Techniques 371 Chapter 22: Modular Script Programming 373 Chapter 23: Scripts Packaging and Protection 389 Chapter 24: Scripting Security 399 Chapter 25: Introduction to HTML Applications 409 Chapter 26: Debugging Tips, Tools, and Techniques 421 Part V: Ready-to-Run Examples 437 Chapter 27: Logon and Logoff Scripts 439 Chapter 28: Windows and Domain Administration Scripts 455 Chapter 29: Network Administration Scripts 481 Chapter 30: WMI and ADSI Scripts 497 Appendix 509 Index 523 . Introduction 1 Part I: Introduction to Windows Administrative Scripting 11 Chapter 1: Scripting Concepts and Terminology 13 Chapter 2: Running Scripts 21 Chapter 3: The Components of a Script 39 Chapter 4: Designing a Script 55 Part II: VBScript Tutorial 73 Chapter 5: Functions, Objects, Variables, and More 75 Chapter 6: Input and Output 101 Chapter 7: Manipulating Numbers 115 Chapter 8: Manipulating Strings 129 Chapter 9: Manipulating Other Types of Data 145 Chapter 10: Controlling the Flow of Execution 155 Chapter 11: Built-In Scripting Objects 173 Chapter 12: Working with the File System 193 Chapter 13: Putting It All Together: Creating Your First Script from Scratch 219 Part III: Windows Management Instrumentation and Active Directory Services Interface 245 Chapter 14: Working with ADSI Providers 247 Chapter 15: Manipulating Domains 257 Chapter 16: Manipulating Users and Groups 271 Chapter 17: Understanding WMI 283 Chapter 18: Querying Basic WMI Information 299 Chapter 19: Querying Complex WMI Information 317 Chapter 20: Putting It All Together: Your First WMI/ADSI Script 335 Chapter 21: Testing and Debugging WMI and ADSI Queries 357 Part IV: Advanced Scripting Techniques 371 Chapter 22: Modular Script Programming 373 Chapter 23: Scripts Packaging and Protection 389 Chapter 24: Scripting Security 399 Chapter 25: Introduction to HTML Applications 409 Chapter 26: Debugging Tips, Tools, and Techniques 421 Part V: Ready-to-Run Examples 437 Chapter 27: Logon and Logoff Scripts 439 Chapter 28: Windows and Domain Administration Scripts 455 Chapter 29: Network Administration Scripts 481 Chapter 30: WMI and ADSI Scripts 497 Appendix 509 Index 523If you're a Windows administrator, scripting expertise can liberate you from boring, repetitive work-so you can take on the sophisticated, high-value projects you really want. Top scripting guru Don Jones has written the definitive administrator's guide to getting results with Microsoft's key scripting technologies: VBScript, WMI, and ADSI. Jones draws on his unsurpassed experience training Windows administrators in conferences, classes, and from his enormously popular site, ScriptingAnswers.com. You'll learn how to use VBScript, WMI, and ADSI to gain administrative control over nearly every aspect of every recent Windows server or client, including Windows Server 2003, Vista, XP, 2000, and NT. As you gain experience, Jones introduces more advanced techniques, ranging from modular scripting and script encryption to integrating VBScript with HTML code. Jones concludes with a full section of ready-to-run, real-world examples-from logon/logoff scripts to automated domain and network administration, from querying WMI to creating Active Directory groups. Every script is explained line-by-line, with challenging techniques described in even greater detail. Detailed information on how to... Decide what you can script: a framework for getting started fast Understand how scripts are designed, assembled, and run Master VBScript from start to finish: functions, I/O, data manipulation, program flow, and much more Use scripting objects for tasks ranging from retrieving network information to mapping drives Utilize FileSystemObject to manipulate the Windows filesystem Write ADSI scripts to manipulate any directory service your company uses, from Active Directory to Novell NDS Modify domain information, users, groups, and policies Query WMI information-from basic to advanced Plan for errors, and test and debug your scripts Build your own "resource kit" of reusable script components ON THE WEB: Download all examples and source code presented in this book from ScriptingAnswers.com, where you'll also be able to post follow-up questions directly to the author in a moderated, active community. Introduction 1 Part I: Introduction to Windows Administrative Scripting 11 Chapter 1: Scripting Concepts and Terminology 13 Chapter 2: Running Scripts 21 Chapter 3: The Components of a Script 39 Chapter 4: Designing a Script 55 Part II: VBScript Tutorial 73 Chapter 5: Functions, Objects, Variables, and More 75 Chapter 6: Input and Output 101 Chapter 7: Manipulating Numbers 115 Chapter 8: Manipulating Strings 129 Chapter 9: Manipulating Other Types of Data 145 Chapter 10: Controlling the Flow of Execution 155 Chapter 11: Built-In Scripting Objects 173 Chapter 12: Working with the File System 193 Chapter 13: Putting It All Together: Creating Your First Script from Scratch 219 Part III: Windows Management Instrumentation and Active Directory Services Interface 245 Chapter 14: Working with ADSI Providers 247 Chapter 15: Manipulating Domains 257 Chapter 16: Manipulating Users and Groups 271 Chapter 17: Understanding WMI 283 Chapter 18: Querying Basic WMI Information 299 Chapter 19: Querying Complex WMI Information 317 Chapter 20: Putting It All Together: Your First WMI/ADSI Script 335 Chapter 21: Testing and Debugging WMI and ADSI Queries 357 Part IV: Advanced Scripting Techniques 371 Chapter 22: Modular Script Programming 373 Chapter 23: Scripts Packaging and Protection 389 Chapter 24: Scripting Security 399 Chapter 25: Introduction to HTML Applications 409 Chapter 26: Debug

Anbieter: buecher
Stand: 18.02.2020
Zum Angebot
Impact of blockchain technology on supply chain...
54,90 € *
ggf. zzgl. Versand

After globalization supply chain management risks are increased such as deficiency in perceptibility, high-priced broker, frauds, and gradual settlement processes. Visibility deficit has always been seen in supplier's operations, organizations repeatedly as a conflict with mastering information flows within tiers as well as in procurement and trust in outer as well as in inner partners. The first part of this book contains potential analysis to find the potential of the current blockchain use cases into different domains. The next step is to find the opportunity into the existing use cases which are already in use and can be modified for the improvement also on top of that the book shows the development of new use cases for the domain of blockchain into supply chain sector on the basis of different services and products. The motive of this book is to show the best starting position to start working with blockchain technology within supply chain management for cash flow optimization. The blockchain is a modern revolution for many organizations and is discovering different use cases to execute in several sectors.

Anbieter: Dodax
Stand: 18.02.2020
Zum Angebot
Hell in Mobility and Redeployment in Cameroon's...
39,90 € *
ggf. zzgl. Versand

This book is an attempt to show that, despite the efforts made by the Cameroon Government in the domain of mobility and redeployment in the public service, a lot still has to be done in terms of plans, policies and programmes in these two vital domains, as well as the implementation of the instruments ensuring rational public service mobility and redeployment. At the end of this book, some recommendations are provided so as to better the situation.

Anbieter: Dodax
Stand: 18.02.2020
Zum Angebot
Security for Pervasive Healthcare
45,80 € *
ggf. zzgl. Versand

Miniaturization of medical appliances and wireless communication enable the pervasive health monitoring of users in their daily life thus improving users’ health and well-being, helping for quick reaction on emergencies, and yet, allowing for cost reduction in the healthcare sector. In the simplest healthcare setting, a fixed set of wireless medical sensors forms a patient area network (PAN) monitoring the user’s vital signs. Medical staff can access, gather, or process data directly, or transmit it to a remote healthcare service. Pervasive health monitoring in these diverse situations and locations is carried out by different organizations, such as fitness centers or retirement homes, by means of a medical sensor network (MSN) allowing authorized parties to access to the sensed health information.In this context, the exchange of users’ medical data leads to severe privacy and security concerns. Meeting these strict security needs of these ubiquitous medical applications is a big challenge, since privacy of medical data has to be guaranteed all the way from the resource-constrained sensor nodes to the backend services, the system has to fulfill latency needs, and lots of mobility is involved. In fact, ensuring the smooth but secure interaction of the different system parts is one of the most testing tasks.This thesis addresses the challenge of deploying secure medical sensor networks, and to this end we propose algorithms, protocols, and systems that pursue three main goals. The first being the described solutions enabling the efficient deployment of security systems – bearing in mind that the underlying interactions and the expected system operation is fundamental for the successful system deployment. Secondly, the individual mechanisms and the overall architecture should provide a comprehensive solution for key and entity management, access control, and privacy-aware identification. These are the key challenges in the analyzed scenarios due to the pervasive nature of the system wherein a multitude of parties interact with each other. Finally, security methods and cryptographic algorithms should be lightweight to allow for efficient system deployment and operation on resource-constrained devices.Overall, this work proposes a security architecture that is comprised of three security layers, namely MSN, PAN, and backend security layers. In our architecture, the MSN and PAN security layers reflect the trend towards a patient-centric approach wherein both user and health institutions share responsibility on the control of the health information. The MSN security layer is in charge of providing the basic link-security within each MSN. The PAN layer creates a security domain around the user’s PAN giving him control on the disclosure of his health information. The backend security layer ensures smooth interaction between the MSN and PAN layers.The proposed security architecture is articulated and supported by the results in four complementary research areas. The first one refers to lightweight key establishment and information verification algorithms used at the MSN layer. With this we investigate and specify how the wireless medical sensors can agree on pairwise keys and verify information in an efficient way based on polynomial schemes in the scope of an MSN. We propose several optimizations for key establishment algorithms and introduce the concept of lightweight digital certificates that allows for distributed information verification without the need of public-key cryptography.Second, we examine how the polynomial keying material can be distributed and arranged at the MSN security layer to achieve a higher resiliency level, to reduce system requirements, and to provide other security functionalities. We also show how the proposed hierarchical and multidimensional systems – tailored to fit the underlying organization of health institutions – allow for efficient deployment. A resourceful approach for key establishment is not usable if it cannot be deployed and managed, hence, we describe two key distribution and management systems for the polynomial keying material fitting the specific system deployment and operational requirements. The first system, which applies to infrastructureless systems, relies on a lightweight but resilient device, a smart card, playing the role of trust center. The second one makes use of backend services to control and manage more complex systems comprised of a multitude of networks.Third, we introduce several lightweight security mechanisms running at the PAN security layer. We describe the system interactions between both the MSN and PAN layers based on dedicated-hardware including the formation and management of the PAN security domain within the MSN security domain. The main goal of this piece of hardware, the patient security manager star – that consists of a healthcare card linked to each user and a patient security manager managed by the MSN – is to allow for PAN roaming between MSNs while guaranteeing end-to-end security. Additionally, this layer provides user privacy-aware identification for roaming users based on a hierarchy of identifiers and context-aware access control depending, e.g., on the user’s health state.The fourth addressed research topic is denominated cooperative security, an approach that aims at leveraging system security by enforcing cooperation among the nodes in an MSN, converting PANs in authentic distributed security domains that are able to manage their trust relationships, and allowing for fast and distributed revocation when nodes misbehave thus enhancing the system security.After successfully analyzing, prototyping, and testing the key components in both the MSN and the PAN layers, we have shown that our comprehensive security architecture and its components can play a fundamental role in the efficient and progressive rollout of secure pervasive healthcare systems. Further research lines emerge from this work. The first one refers to the additional refinements and extensions of the overall security architecture as well as a closer analysis of the interactions between PAN and MSN in specific use cases. The second one refers to the design of identity-based pairwise key generation engines based on non-linear keying material structures that can allow any pair of peers to generate a common symmetric-key given their identifiers but without suffering from the alpha-secure property inherent to the polynomial schemes. Such schemes might become more and more important for future pervasive systems comprising thousands or millions of devices. The third one involves further extensions for cooperative security protocols to convert large-scale distributed systems into living networks capable of autonomously controlling their own security system and removing infected nodes.

Anbieter: Dodax
Stand: 18.02.2020
Zum Angebot
Relational Semi-Supervised Classification Using...
48,80 € *
ggf. zzgl. Versand

Nowadays new technologies allow to store vast amounts of data, hence the amount of collected data grows steadily. This trend is positive on one hand since more knowledge is available, but on the other hand it may lead to information overload on the side of the user. This means, we need to provide the user with facilities that help organizing the collected data. Therefore usually supervised classification algorithms, under the assumption that data instances are independent and identically-distributed iid, are applied. Meaning that only inherent attributes of the instance itself are taken into account. However, using standard supervised classification methods may lead to less accurate results because of the following three issues: First, the iid assumption may not always hold, i.e. often relations and dependencies among data instances exist, but are ignored, second, if relations are taken into account, often only one is considered even if multiple exist, and third, the required labeled data for supervised classification is scarce and costly to obtain. Examples for data where the iid assumption does not hold are: Web pages connected by hyperlinks and scientific publications which are related by common authors, venue or citations.Apart from text documents, relations can also be observed in other domains like social tagging systems where users are related to each other by sharing the same resources. We also consider situations where a relation is not explicitly given, in these cases a relation can be constructed using similarities. In the medical domain for instance, patients could be connected to other patients if they have similar measurements (time series of blood pressure, heart rate, etc.).In each domain mentioned above, labeled data is scarce while the cost of expert annotation is high, and multiple relations among data instances exist, thus we will address all three issues in this thesis. We propose and analyze several semi-supervised relational algorithms using multiple relations. We investigate their benefits in different domains and show that independent of the type of data or the area of application, semi-supervised relational methods exploiting multiple relations are highly predictive and mostly outperform state-of-the-art algorithms.

Anbieter: Dodax
Stand: 18.02.2020
Zum Angebot
Temporal Metric Planning in Continuous Time
68,00 € *
ggf. zzgl. Versand

The TM-LPSAT planner can construct plans in domains containing atomic actions and durative actions, events and processes, discrete, real-valued, and interval-valued fluents, reusable resources,both numeric and interval-valued, and continuous linear change to quantities. It works in three tages.In the first stage, a representation of the domain and problem in an extended version of PDDL+ iscompiled into a system of Boolean combinations of propositional atoms and linear constraints overnumeric variables. In the second stage, a SAT-based arithmetic constraint solver, such as LPSAT orMathSAT, is used to find a solution to the system of constraints. In the third stage, a correct plan isextracted from this solution. We discuss the structure of the planner and show how planning withtime and metric quantities is compiled into a system of constraints.

Anbieter: Dodax
Stand: 18.02.2020
Zum Angebot
Coping with Boundaries
49,00 € *
ggf. zzgl. Versand

The increase of women s labor force participation, the diversity of family constellations, many men s increased participation in childcare, and the development of flexible working arrangements have stimulated research on the relationship between work and non-work. In this thesis, the interaction between work and non-work is examined in the case of home-based telework, an example of flexible working arrangement. Because of the disappearance or blurring of the traditional boundaries in time and space, the consequences of these working conditions for individuals need to be analyzed. The overall aim of this thesis was to study the interaction between work and non-work in home-based telework and to analyze the following issues:- conflict versus facilitation as related to the segmentation and integration of work/non-work domains- the nature and role of boundaries - the physical and mental aspects of work activities within the domains The results show the importance of boundaries, as they are needed in order to bring structure and legitimacy to the work (carried out in the home/private domain) and to detach from work.

Anbieter: Dodax
Stand: 18.02.2020
Zum Angebot
h-p Spectral Element Method for Elliptic Eigenv...
49,00 € *
ggf. zzgl. Versand

This book deals with the techniques to solve elliptic eigenvalue problems on polygonal domains using least squares methods. It provides an in-depth treatment of an exponentially accurate nonconforming h-p spectral element method. The spectral element functions are nonconforming and a correction is made to the approximate solution so that the corrected solution is conforming. In this book we discuss the method separately when the boundary of underlying domain is smooth and also when the boundary contains corners. We present error estimates for the eigenvalues and eigenvectors and show that the error in the numerical solution is exponentially small. Theoretical results presented in the book are equally well suited for multiple or clustered eigenvalues.

Anbieter: Dodax
Stand: 18.02.2020
Zum Angebot
Estimation Methods for Small Area Statistics in...
59,00 € *
ggf. zzgl. Versand

The requirements for small area statistics have been in great demand by public as well as private sectors because the governments are interested in obtaining statistics for smaller domains such as States, Provinces, Districts, Tehsils, Blocks and Village Panchayat etc or different racial and ethnic subgroups for implementing their policies at local. These domains are called small area-the term SMALL refers to the fact that the sample size in the area or domain from the survey is small. The Small Area Statistics (SAS) method like synthetic etc. may be used to utilise such data for obtaining small area estimates of change in the parameters or an overall estimates over a period of time or most efficient small area estimates on current occasion. In this book, we have presented estimations methodologies for small areas statistics in repeated surveys. Also an empirical study is carried out to show the properties of the proposed estimators.

Anbieter: Dodax
Stand: 18.02.2020
Zum Angebot