Microsoft Internet Explorer 5 resource kit / Microsoft Corporation.
Publication details: Washington : Microsoft Press, c2000.Description: xiv, 651 p. : ill. ; 23 cmISBN:- 0735605874 (pbk./CDROM)
- Microsoft Internet Explorer five resource kit
- Internet Explorer 5 resource kit
- 005.44 21 MIC
Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book Open Access | Engineering Library | 005.44 MIC 1 (Browse shelf(Opens below)) | 1 | Available | BUML23111347 |
Browsing Engineering Library shelves Close shelf browser (Hides shelf browser)
005.437 SPO 1 User Interface Design for Programmers / | 005.44.682 SHE 1 Microsoft windows XP : brief concepts and techniques / | 005.44 MIC 1 Microsoft Windows 2000 server : distributed systems guide / | 005.44 MIC 1 Microsoft Internet Explorer 5 resource kit / | 005.44 PLU 10 minute guide to Windows 95 / | 005.44 WIN 1 Using Windows NT Workstation 4.0 / | 005.443 PAL A guide to microsoft window NT server 4.0 : networking / |
Contents
Part 1: Getting started
Chapter 1: What's new in Microsoft internet explorer 5?
Deploying the browser
Simplifying web tasks
Automating web tasks
Developing and authoring for the web
Chapter 2: Microsoft internet explorer 5 components
Microsoft outlook express
Microsoft windows media player
Microsoft netmeeting
etc.
Chapter 3: understanding customization and administration
Reasons to customize internet explorer
Using the microsoft internet explorer administration
Integrating your custom solutions
Sample scenarios
Chapter 4: Working with different platforms
Overview
Windows platform: 32-bit versions
Windows platform: 16-bit versions
UNIX platform
Chapter 5: Understanding related tools and programs
Microsoft systems management server
Microsoft office 2000 custom installation wizard
Microsoft internet information server
Chapter 6: Digital certificates
Understanding digital certificates
Using digital certificates
Chapter 7: Security zones and permission-based security for Microsoft virtual machine
Understanding security zones
Setting up security zones
Understanding permission-based security for Microsoft virtual machine
Setting up Java custom security
Chapter 8: Content ratings and user privacy
using content ratings
Configuring content advisor settings
Ensuring user privacy
Configuring privacy options
Part 2: Preparing
Chapter 9: Planning the development
Evaluating internet explorer 5
Assembling project teams
Determining time and resource requirements
etc.
Chapter 10: Accessibility features and functionality
Overview
Accessibility benefits
Upgrade considerations
etc.
Chapter 11: Setting up and administering a pilot program
Overview
Preparing the test plan and checklist
Testing the deployment process in the lab
Planning the pilot program
etc.
Part 3: Customizing
Chapter 12: Preparing for IEAK
Preparing to customize internet explorer
Setting up your computers
Chapter 13: Setting up servers
Preparing servers
Configuring central automatic configuration servers
Working with proxy servers
etc.
Chapter 14: Customizing connection management and settings
Connection management overview
Options for creating a service profile
Advanced customization options for connection manager
etc.
Chapter 15: Running the internet explorer customization wizard
Understanding how the customization wizard works
Stages of the customization wizard
Running the customization wizard
Chapter 16: Customizing setup
Overview
Customizing windows update setup
Customizing setup by using batch files and switches
etc.
Chapter 17: Time-saving strategies that address diverse user needs
Overview
Using automatic configuration in a corporate setting
Creating multiple .isp files for internet services
etc.
Chapter 18: Working with .inf files
Customizing installation by using .inf files
Manipulating folders and files by using .inf filers
Extending setup
etc.
Part 4: Installing
Chapter 19: Deploying Microsoft internet explorer 5
Announcing the deployment
Preparing the users' computers
Providing user training and support
etc.
Chapter 20: Implementing the sign-up process
Implementing a server-based sign-up process
Implementing a serverless sign-up process
Part 5: Maintaining and supporting
Chapter 21: Using automatic configuration and automatic proxy
Understanding automatic configuration and automatic proxy
Working with automatic detection of browser settings
Chapter 22: Keeping programs updated
IEAK profile manager
Update notification page
Software distribution channels
Chapter 23: Implementing an ongoing training and support program
Overview
Ongoing training options
Microsoft training services
etc.
Glossary : p. 589-593 . _ Index : p. 595-651
There are no comments on this title.