Apress

Managing Enterprise Systems with the Windows Script Host

By Stein Borge

Managing Enterprise Systems with the Windows Script Host Cover Image

This invaluable guide will provide you with a problem/solution-oriented approach to solving common administrative issues with Windows Script Host (WSH), complete with ready-to-use, real-world examples.

Full Description

  • ISBN13: 978-1-893115-67-5
  • 792 Pages
  • User Level: Beginner to Advanced
  • Publication Date: November 15, 2001
  • Available eBook Formats: PDF
  • Print Book Price: $49.95
  • eBook Price: $34.99
Buy eBook Buy Print Book Add to Wishlist

Related Titles

Full Description

Managing Enterprise Systems with the Windows Script Host is targeted toward administrative and support staff in Microsoft networked environments with the aim of automating common administrative tasks. It provides practical solutions to common problems and detailed discussions of the underlying technology used in the solutions.

Author Stein Borge starts with a general introduction to new features in recent versions of WSH, and then covers the file, shell, and network operations using built-in WSH objects. Borge also provides chapters on lesser-known but important aspects of WSH, including standard input/output streams and regular expressions, in addition to covering registry operations using the built-in shell objects and Windows Management Instrumentation (WMI) objects.

Managing Enterprise Systems with the Windows Script Host then goes on to cover how to manipulate application objects, such as Microsoft Office, CorelDRAW, and Internet Explorer. Borge also demonstrates how to perform common network tasks, such as network configuration and hardware, event log, and system information retrieval. You'll discover how to work with database access using ActiveX Data Objects (ADO), and how to implement e-mail operations using Collaboration Data Objects (CDO). You'll learn how to perform server administrative tasks such as user, IIS, and Exchange server using the Active Directory Services Interface (ADSI) and, finally, you'll see how complex security operations are performed using WMI and ADSI.

Source Code/Downloads

Downloads are available to accompany this book.

Your operating system can likely extract zipped downloads automatically, but you may require software such as WinZip for PC, or StuffIt on a Mac.

Errata

If you think that you've found an error in this book, please let us know about it. You will find any confirmed erratum below, so you can check if your concern has already been addressed.

* Required Fields

No errata are currently published