<ul> <li>Technical Editor</li> <li>Foreword Contributor</li> <li>Foreword</li> <li>About the Companion Material</li> <li>Chapter 1: Microsoft Vista: An Overview <ul> <li>Introduction</li> <li>The User Interface</li> <li>Internet Explorer 7</li> <li>Summary</li> <li>Solutions Fast Track</li> <li>Frequently Asked Questions</li></ul></li> <li>Chapter 2: Microsoft Vista: The Battle Against Malware Lives On <ul> <li>Introduction</li> <li>Malware Fundamentals</li> <li>Improvements in Internet Explorer 7</li> <li>Windows Security Center</li> <li>Windows Defender</li> <li>Summary</li> <li>Solutions Fast Track</li> <li>Frequently Asked Questions</li></ul></li> <li>Chapter 3: Microsoft Vista: Securing User Access <ul> <li>Introduction</li> <li>Access Control Fundamentals</li> <li>Improving the Logon Architecture</li> <li>User Account Control</li> <li>Remote Assistance</li> <li>Network Access Protection</li> <li>Summary</li> <li>Solutions Fast Track</li> <li>Frequently Asked Questions</li></ul></li> <li>Chapter 4: Microsoft Vista: Trusted Platform Module Services <ul> <li>Introduction</li> <li>Understanding the TPM</li> <li>Configuring and Managing the TPM on a Stand-Alone System</li> <li>Configuring and Managing the TPM in an Enterprise Environment</li> <li>TPM Applications</li> <li>Understanding the Security Implications of the TPM</li> <li>Summary</li> <li>Solutions Fast Track</li> <li>Frequently Asked Questions</li></ul></li> <li>Chapter 5: Microsoft Vista: Data Protection <ul> <li>Introduction</li> <li>Rights Management</li> <li>Encrypting File System</li> <li>Whole-Disk Encryption</li> <li>PatchGuard</li> <li>Summary</li> <li>Solutions Fast Track</li> <li>Frequently Asked Questions</li></ul></li> <li>Chapter 6: Microsoft Vista: Networking Essentials <ul> <li>Introduction</li> <li>Not Your Father’s TCP/IP Stack</li> <li>Using the Network and Sharing Center</li> <li>Using the Network Map</li> <li>Working with the Windows Firewall</li> <li>Summary</li> <li>Solutions Fast Track</li> <li>Frequently Asked Questions</li></ul></li> <li>Chapter 7: Microsoft Vista: Wireless World <ul> <li>Introduction</li> <li>What’s New with Wireless in Vista?</li> <li>Wireless Security</li> <li>Network Group Policy Enhancements</li> <li>Configuring Wireless Security in Vista</li> <li>Summary</li> <li>Solutions Fast Track</li> <li>Frequently Asked Questions</li></ul></li> <li>Chapter 8: Microsoft Vista: Windows Mail <ul> <li>Introduction</li> <li>Comparing Windows Mail with Outlook Express</li> <li>Phishing Filter</li> <li>Junk Mail Filter</li> <li>Instant Search</li> <li>Summary</li> <li>Solutions Fast Track</li> <li>Frequently Asked Questions</li></ul></li> <li>Chapter 9: Microsoft Vista: Update and Monitoring Services <ul> <li>Introduction</li> <li>Using Windows Update</li> <li>Using Windows Server Update Services (WSUS) and Vista</li> <li>Using Systems Management Server and Vista</li> <li>Using Microsoft Operations Manager and Vista</li> <li>Using Third-Party Tools with Vista</li> <li>Summary</li> <li>Solutions Fast Track</li> <li>Frequently Asked Questions</li></ul></li> <li>Chapter 10: Disaster Recovery with Exchange Server 2007 <ul> <li>Introduction</li> <li>Backing Up Exchange 2007 Using Windows 2003 Backup</li> <li>Restoring Exchange 2007 Storage Groups and Databases Using Windows 2003 Backup</li> <li>Repairing a Corrupt or Damaged Exchange 2007 Database Using Eseutil</li> <li>Recovering an Exchange 2007 Server Using the RecoverServer Switch</li> <li>Recovering an Exchange 2007 Cluster Using the RecoverCMS Switch</li> <li>Summary</li> <li>Solutions Fast Track</li> <li>Frequently Asked Questions</li></ul></li> <li>Appendix A: Microsoft Vista: The International Community <ul> <li>Microsoft vs. The World: What’s the Issue?</li> <li>Microsoft Vista: The EU Fixes</li> <li>Microsoft and Japan</li> <li>Microsoft Vista: The Korean Fixes</li> <li>Notes and Sources</li> <li>Summary</li></ul></li> <li>Appendix B: Microsoft Vista: The EULA <ul> <li>Introduction</li> <li>Criticism and Change</li> <li>Benchmark Testing</li> <li>Virtualization</li> <li>Notes and Sources</li> <li>Summary</li></ul></li> <li>Index</li></ul>