A07I622310.fm Page xxiv Tuesday, September 27, 2005 10:44 AM
xxiv About This Book
■ Chapter 3: Using Basic WMI Queries
■ Chapter 4: Using Advanced WMI Queries
■ Chapter 5: Using WMI Events
Part III: Connect Server and Additional Privileges
Chapter 6, “Using the SWbemLocator Methods,” introduces the rich programming model
available from the SWbemLocator object. This is the way to make remote connections to com-
puters on the network, and it even enables you to supply alternative credentials. It is a very
rich model, so I have some tips and tricks that will enable you to mine this object easily. Chap-
ter 7, “Requesting Additional Privileges for WMI,” explores the WMI security model in detail
and provides guidance on when to use each of ...