简介:
Section II is the meat of the book. Chao takes us on a
journey of discovery starting at the network level,
through server installation and management, software
installation and management, authentication,
administration, security management, and virus
attack management, and culminating with the
users’ desktop machines. The journey is easier
because of excellent external references and
examples of installation processes. His commentary
gives the reader confidence that the end is achievable,
but this is a book about IT rather than ET.