Table of Contents

  1. Cover
  2. Title Page
  3. Foreword
  4. Introduction
  5. Chapter 1: Setting Up a PowerShell 7 Environment
    1. What Is New in PowerShell 7
    2. Systems Used in This Book and Chapter
    3. Installing PowerShell 7
    4. Installing and Configuring VS Code
    5. Using the PowerShell Gallery
    6. Creating a Local PowerShellGet Repository
    7. Creating a Code‐Signing Environment
    8. Summary
  6. Chapter 2: PowerShell 7 Compatibility with Windows PowerShell
    1. Examining PowerShell Modules
    2. Introducing the Compatibility Solution
    3. Things That Do Not Work with PowerShell 7
    4. Summary
  7. Chapter 3: Managing Active Directory
    1. Systems Used in This Chapter
    2. Establishing a Forest Root Domain
    3. Installing a Replica DC
    4. Installing a Child Domain
    5. Configuring a Cross‐Forest Trust
    6. Managing AD Users, Computers, and OUs
    7. Adding Users to AD via a CSV
    8. Configuring Just Enough Administration (JEA)
    9. Summary
  8. Chapter 4: Managing Networking
    1. Systems Used in This Chapter
    2. Configuring IP Addressing
    3. Testing Network Connectivity
    4. Installing the DHCP Service
    5. Configuring DHCP Scopes
    6. Configuring DHCP Failover
    7. Configuring the DNS Service
    8. Configuring DNS Zones and Resource Records
    9. Summary
  9. Chapter 5: Managing Storage
    1. Systems Used in This Chapter
    2. Managing Disks and Volumes
    3. Managing NTFS Permissions
    4. Managing Storage Replica
    5. Managing Filestore Quotas
    6. Managing File Screening
    7. Summary
  10. Chapter 6: Managing Shared Data
    1. Systems Used in This Chapter
    2. Setting Up and Securing an SMB File Server
    3. Creating and Securing SMB Shares
    4. Creating and Using an iSCSI Target
    5. Setting Up a Clustered Scale‐Out File Server
    6. Summary
  11. Chapter 7: Managing Printing
    1. Systems Used in This Chapter
    2. Installing and Sharing Printers
    3. Publishing a Printer in AD
    4. Changing the Spool Folder
    5. Printing a Test Page
    6. Creating a Printer Pool
    7. Summary
  12. Chapter 8: Managing Hyper‐V
    1. Systems Used in This Chapter
    2. Installing and Configuring Hyper‐V
    3. Creating a Hyper‐V VM
    4. Using PowerShell Direct
    5. Configuring VM Networking
    6. Configuring VM Hardware
    7. Implementing Nested Virtualization
    8. Using VM Checkpoints
    9. Using VM Replication
    10. Managing VM Movement
    11. Measuring VM Resource Usage
    12. Summary
  13. Chapter 9: Using WMI with CIM Cmdlets
    1. Exploring WMI Namespaces
    2. Exploring WMI Classes
    3. Getting Local and Remote Objects
    4. Invoking WMI Methods
    5. Managing WMI Events
    6. Implementing Permanent WMI Event Handling
    7. Summary
  14. Chapter 10: Reporting
    1. Systems Used in This Chapter
    2. Reporting on AD Users and Computers
    3. Managing Filesystem Reporting
    4. Collecting Performance Information Using PLA
    5. Reporting on PLA Performance Data
    6. Creating a Performance Monitoring Graph
    7. Creating a System Diagnostics Report
    8. Reporting on Printer Usage
    9. Creating a Hyper‐V Status Report
    10. Reviewing Event Logs
    11. Summary
  15. Index
  16. Copyright
  17. Dedication
  18. About the Author
  19. About the Technical Editor
  20. Acknowledgments
  21. End User License Agreement

List of Illustrations

  1. Chapter 1
    1. Figure 1.1: Systems used in this chapter
    2. Figure 1.2: Viewing help information
    3. Figure 1.3: Examining the installation folder
    4. Figure 1.4: Viewing module paths
    5. Figure 1.5: Viewing profile file locations
    6. Figure 1.6: Viewing help information
    7. Figure 1.7: Viewing PowerShell 7 module paths
    8. Figure 1.8: Viewing PowerShell profile file locations
    9. Figure 1.9: Installing VS Code on DC1
    10. Figure 1.10: Updated taskbar
    11. Figure 1.11: Count of modules available in the PowerShell Gallery
    12. Figure 1.12: Count of available modules that support .NET core
    13. Figure 1.13: NTFS‐related modules
    14. Figure 1.14: Commands in the NTFSSecurity module
    15. Figure 1.15: Testing the Hello World module
    16. Figure 1.16: Viewing configured repositories
    17. Figure 1.17: Viewing the repository folder
    18. Figure 1.18: Viewing the RKRepo modules
    19. Figure 1.19: Viewing the certificate
    20. Figure 1.20: Attempting to run the script
    21. Figure 1.21: Signing a PowerShell script
    22. Figure 1.22: Signing a PowerShell script with a trusted certificate
    23. Figure 1.23: Running a signed PowerShell script
    24. Figure 1.24: Testing a script's digital signature
  2. Chapter 2
    1. Figure 2.1: System used in this chapter
    2. Figure 2.2: Creating a new module
    3. Figure 2.3: Importing the MyModule1 module
    4. Figure 2.4: Creating and using a manifest
    5. Figure 2.5: Viewing files in MyModule1
    6. Figure 2.6: Using MyModule2
    7. Figure 2.7: Viewing MyModule2
    8. Figure 2.8: Using module autoload
    9. Figure 2.9: Viewing the module analysis cache
    10. Figure 2.10: Loading the ServerManager module
    11. Figure 2.11: Viewing the module deny list
  3. Chapter 3
    1. Figure 3.1: Forests, domains, and hosts used in this chapter
    2. Figure 3.2: Installing AD DS Domain Services
    3. Figure 3.3: Promoting DC1
    4. Figure 3.4: Viewing the DSE
    5. Figure 3.5: Viewing the Reskit.Org forest
    6. Figure 3.6: Viewing the Reskit.Org domain
    7. Figure 3.7: Viewing DNS settings and configuration
    8. Figure 3.8: Testing connectivity with DC1
    9. Figure 3.9: Installing Windows features
    10. Figure 3.10: Viewing DCs in the Reskit.Org domain
    11. Figure 3.11: Viewing DNS settings and configuration
    12. Figure 3.12: Verifying connectivity to DC1
    13. Figure 3.13: Adding features to UKDC1
    14. Figure 3.14: Viewing the Reskit forest
    15. Figure 3.15: Viewing the child domain information
    16. Figure 3.16: Installing the AD DS feature
    17. Figure 3.17: Testing network connectivity
    18. Figure 3.18: Viewing details of the Kapoho.Com forest
    19. Figure 3.19: Adding a DNS conditional forwarder
    20. Figure 3.20: Testing conditional DNS forwarding
    21. Figure 3.21: Setting up a conditional forwarder on DC1
    22. Figure 3.22: Viewing the Reskit.Org forest
    23. Figure 3.23: Viewing the Kahopo.Com forest
    24. Figure 3.24: Updating the ACL and viewing its details
    25. Figure 3.25: Viewing users in Reskit.Org
    26. Figure 3.26: Viewing updated user details
    27. Figure 3.27: Viewing updated user details
    28. Figure 3.28: Viewing group membership
    29. Figure 3.29: Viewing computers in the AD
    30. Figure 3.30: Viewing users to be added to AD
    31. Figure 3.31: Creating new users
    32. Figure 3.32: Viewing all users
    33. Figure 3.33: Testing the session configuration file
    34. Figure 3.34: Registering the session configuration file
    35. Figure 3.35: Determining session capabilities
    36. Figure 3.36: Checking on commands in the JEA session
    37. Figure 3.37: Invoking a JEA‐defined function
    38. Figure 3.38: Counting DNS server commands available
    39. Figure 3.39: Viewing the JEA Transcripts folder
    40. Figure 3.40: Viewing a JEA transcript
  4. Chapter 4
    1. Figure 4.1: Systems used in this chapter
    2. Figure 4.2: IP address details returned after checking the current state
    3. Figure 4.3: Verifying the NIC IP address
    4. Figure 4.4: Verifying the new IP configuration
    5. Figure 4.5: Testing the TCP/IP stack
    6. Figure 4.6: Verifying connectivity to DC1
    7. Figure 4.7: Verifying SMB/LDAP connectivity to DC1
    8. Figure 4.8: Verifying access to an Internet server
    9. Figure 4.9: Installing the DHCP service
    10. Figure 4.10: Checking the DHCP service
    11. Figure 4.11: Reviewing IPv4 scopes
    12. Figure 4.12: Checking DHCP operation
    13. Figure 4.13: Installing the DHCP feature
    14. Figure 4.14: Viewing authorized DHCP servers
    15. Figure 4.15: Verbose output when creating DHCP failover
    16. Figure 4.16: Viewing active DHCP leases
    17. Figure 4.17: Viewing DHCP server statistics
    18. Figure 4.18: Installing the DNS feature
    19. Figure 4.19: Examining key DNS configuration settings
    20. Figure 4.20: Starting NSLookup
    21. Figure 4.21: Checking on recently created DNS zones
    22. Figure 4.22: Checking on DNS RRs
    23. Figure 4.23: Checking DNS name resolution on DC1
  5. Chapter 5
    1. Figure 5.1: Systems used in this chapter
    2. Figure 5.2: Examining physical disks in SRV1
    3. Figure 5.3: Examining the initialized disks in SRV1
    4. Figure 5.4: Creating an F: volume
    5. Figure 5.5: Creating a G: volume
    6. Figure 5.6: Creating an H: volume
    7. Figure 5.7: Viewing created volumes
    8. Figure 5.8: Formatting volumes G: and H:
    9. Figure 5.9: Viewing partitions on SRV1
    10. Figure 5.10: Viewing partitions on SRV1
    11. Figure 5.11: Viewing cmdlets in the NTFSSecurity module
    12. Figure 5.12: Creating a folder and file
    13. Figure 5.13: Viewing the ACL of the folder
    14. Figure 5.14: Viewing the ACL of the file
    15. Figure 5.15: Checking the sales group
    16. Figure 5.16: Viewing the ACL of the folder
    17. Figure 5.17: Viewing the ACL of the file
    18. Figure 5.18: Viewing the F: drive
    19. Figure 5.19: Viewing the content of SRV2
    20. Figure 5.20: The result of adding SR to SRV1
    21. Figure 5.21: Testing the SR configuration
    22. Figure 5.22: Viewing topology test results
    23. Figure 5.23: Creating an SR partnership
    24. Figure 5.24: Viewing the SR partnership
    25. Figure 5.25: Examining volumes on SRV2
    26. Figure 5.26: Examining updated RG status
    27. Figure 5.27: Examining volumes on SRV2
    28. Figure 5.28: Installing FSRM
    29. Figure 5.29: Viewing the test email
    30. Figure 5.30: Viewing quota templates
    31. Figure 5.31: Building a quota
    32. Figure 5.32: Examining the FSRM email
    33. Figure 5.33: Testing the quota limit
    34. Figure 5.34: Viewing the total size of the folder contents
    35. Figure 5.35: Examining the existing file groups
    36. Figure 5.36: Examining existing templates
    37. Figure 5.37: Creating a file screen
    38. Figure 5.38: Testing a file screen
    39. Figure 5.39: Viewing notification limits
    40. Figure 5.40: Testing the active file screen
    41. Figure 5.41: Viewing the screening email
  6. Chapter 6
    1. Figure 6.1: Systems used in this chapter
    2. Figure 6.2: Installing file server features
    3. Figure 6.3: Viewing SMB server settings
    4. Figure 6.4: Viewing the reconfigured SMB server settings
    5. Figure 6.5: Viewing shares on FS1
    6. Figure 6.6: Creating an SMB share
    7. Figure 6.7: Viewing share access
    8. Figure 6.8: Reviewing NTFS permissions
    9. Figure 6.9: Viewing folder ACL
    10. Figure 6.10: Installing the iSCSI target feature
    11. Figure 6.11: Viewing iSCSI target server settings
    12. Figure 6.12: Creating an iSCSI virtual disk
    13. Figure 6.13: Creating an iSCSI target
    14. Figure 6.14: Creating the iSCSI target portal
    15. Figure 6.15: Viewing the SalesTarget
    16. Figure 6.16: Connecting to the SalesTarget
    17. Figure 6.17: Viewing the disk
    18. Figure 6.18: Creating an S: drive
    19. Figure 6.19: Using the iSCSI S: drive
    20. Figure 6.20: Setting up the iSCSI portal
    21. Figure 6.21: Installing clustering on FS1 and FS2
    22. Figure 6.22: Viewing cluster test results
    23. Figure 6.23: Adding an iSCSI disk to the cluster
    24. Figure 6.24: Adding the new disk to the CSV
    25. Figure 6.25: Adding a continuously available share
    26. Figure 6.26: Viewing shares
  7. Chapter 7
    1. Figure 7.1: Systems used in this chapter
    2. Figure 7.2: Installing the Print Server feature
    3. Figure 7.3: Reviewing the setup of the new printer
    4. Figure 7.4: Checking on the SalesPrinter1 printer
    5. Figure 7.5: Reviewing the setup of the new printer
    6. Figure 7.6: Reviewing existing spool folder
    7. Figure 7.7: Reviewing the spool folder
    8. Figure 7.8: Reviewing the spool folder after the change
    9. Figure 7.9: Displaying the number of printers
    10. Figure 7.10: Displaying the printer's details
    11. Figure 7.11: Printing a test page
    12. Figure 7.12: Viewing printer pool details
  8. Chapter 8
    1. Figure 8.1: Systems used in this chapter
    2. Figure 8.2: Installing Hyper‐V on HV1
    3. Figure 8.3: Reviewing VM host settings
    4. Figure 8.4: Mounting the ISO disk image
    5. Figure 8.5: Viewing the contents of install.wim
    6. Figure 8.6: Creating a new VM
    7. Figure 8.7: Viewing newly created VM details
    8. Figure 8.8: Displaying VM details
    9. Figure 8.9: Getting the VM host name
    10. Figure 8.10: Displaying VM details using VM ID
    11. Figure 8.11: Viewing NIC details
    12. Figure 8.12: Viewing the NIC configuration
    13. Figure 8.13: Creating a virtual switch
    14. Figure 8.14: Viewing the virtual NIC configuration
    15. Figure 8.15: Viewing the NIC IP address
    16. Figure 8.16: Joining the domain
    17. Figure 8.17: Obtaining the host name
    18. Figure 8.18: Shutting down a VM
    19. Figure 8.19: Updating VM BIOS
    20. Figure 8.20: Changing the VM processor count
    21. Figure 8.21: Changing the VM memory allocation
    22. Figure 8.22: Adding an SCSI controller
    23. Figure 8.23: Creating a new virtual disk
    24. Figure 8.24: Viewing SCSI disks
    25. Figure 8.25: Configuring the VM processor
    26. Figure 8.26: Restarting HVDirect
    27. Figure 8.27: Installing Hyper‐V in HVDirect
    28. Figure 8.28: Restarting HVDirect
    29. Figure 8.29: Examining Hyper‐V within HVDirect
    30. Figure 8.30: Examining the HVDirect C: drive
    31. Figure 8.31: Examining the checkpoint files
    32. Figure 8.32: Creating content on HVDirect
    33. Figure 8.33: Viewing Hyper‐V checkpoints
    34. Figure 8.34: Viewing checkpoint files
    35. Figure 8.35: Viewing checkpoint files after the second checkpoint
    36. Figure 8.36: Viewing files in the VM
    37. Figure 8.37: Viewing files in the VM after rolling forward
    38. Figure 8.38: Viewing checkpoints for HVDirect
    39. Figure 8.39: Viewing virtual hard disks
    40. Figure 8.40: Viewing replication status
    41. Figure 8.41: Viewing VM status
    42. Figure 8.42: Examining the replication status
    43. Figure 8.43: Viewing the progress of replication
    44. Figure 8.44: Viewing the VMs running on HV2
    45. Figure 8.45: Getting the VM details on the replica source
    46. Figure 8.46: Testing the replica VM
    47. Figure 8.47: Viewing VM status
    48. Figure 8.48: Checking VM status after failover
    49. Figure 8.49: Verifying the VM networking configuration
    50. Figure 8.50: Viewing HVDirect VM
    51. Figure 8.51: Viewing the VM configuration path
    52. Figure 8.52: Getting the VM hard drive locations for HVDirect
    53. Figure 8.53: Viewing the VM configuration path
    54. Figure 8.54: Displaying migration time
    55. Figure 8.55: Viewing the VMs on HV2
    56. Figure 8.56: Examining VM details
    57. Figure 8.57: Examining VM details
    58. Figure 8.58: Measuring VM resource usage
    59. Figure 8.59: Remeasuring VM resource usage after computation
  9. Chapter 9
    1. Figure 9.1: WMI architecture
    2. Figure 9.2: Viewing classes in root namespace
    3. Figure 9.3: Viewing namespaces in root
    4. Figure 9.4: Getting classes in the root\CIMV2 namespace
    5. Figure 9.5: Getting all namespaces
    6. Figure 9.6: Viewing some namespaces
    7. Figure 9.7: Counting classes
    8. Figure 9.8: Viewing namespaces on SRV2
    9. Figure 9.9: Counting namespaces and classes on SRV2
    10. Figure 9.10: Counting namespaces and classes on DC2
    11. Figure 9.11: Viewing the Win32_Share WMI class
    12. Figure 9.12: Counting namespaces and classes on DC1
    13. Figure 9.13: Viewing the methods supported by the Win32_Share class
    14. Figure 9.14: Viewing class details with a specified namespace
    15. Figure 9.15: Viewing details of the Win32_Share class
    16. Figure 9.16: Viewing details of a class in a non‐default namespace
    17. Figure 9.17: Using the ‐Filter parameter
    18. Figure 9.18: Using a WQL query
    19. Figure 9.19: Getting remote WMI objects
    20. Figure 9.20: Viewing methods of the Win32_Share class
    21. Figure 9.21: Viewing methods of the Win32_Share class
    22. Figure 9.22: Invoking a WMI method
    23. Figure 9.23: Viewing the SMB share
    24. Figure 9.24: Viewing an SMB share
    25. Figure 9.25: Removing an SMB share
    26. Figure 9.26: Viewing WMI event details
    27. Figure 9.27: Creating an extrinsic event subscription
    28. Figure 9.28: Updating a registry value
    29. Figure 9.29: Viewing event details
    30. Figure 9.30: Creating a temporary WMI event subscription
    31. Figure 9.31: Adding a user to an AD group
    32. Figure 9.32: Viewing event details
    33. Figure 9.33: Viewing event details
    34. Figure 9.34: Viewing event details
  10. Chapter 10
    1. Figure 10.1: Systems used in this chapter
    2. Figure 10.2: AD user and computer report
    3. Figure 10.3: Creating a new FSRM report
    4. Figure 10.4: Viewing the FSRM report
    5. Figure 10.5: Viewing the FSRM report output files
    6. Figure 10.6: Viewing the FSRM report output files
    7. Figure 10.7: Using FSRM XML output
    8. Figure 10.8: Viewing a scheduled task
    9. Figure 10.9: Running the report interactively
    10. Figure 10.10: Viewing the report
    11. Figure 10.11: Viewing data collector sets with perfmon.exe
    12. Figure 10.12: Counting available performance counters
    13. Figure 10.13: Viewing CPU Information
    14. Figure 10.14: Viewing the CPU usage chart
    15. Figure 10.15: Viewing the System Diagnostics Report
    16. Figure 10.16: Viewing PDF output files
    17. Figure 10.17: Viewing printer usage
    18. Figure 10.18: Viewing the VM report
    19. Figure 10.19: Viewing the VM report on another Hyper‐V host
    20. Figure 10.20: Viewing a count of event logs
    21. Figure 10.21: Viewing the total number of event logs
    22. Figure 10.22: Viewing the total numbers of System, Application, and Security ...
    23. Figure 10.23: Viewing the Security log events
    24. Figure 10.24: Getting logon events
    25. Figure 10.25: Getting logon event types
    26. Figure 10.26: Getting RDP logons

Guide

  1. Cover Page
  2. Table of Contents
  3. Begin Reading

Pages

  1. iii
  2. xiii
  3. xiv
  4. xxxiii
  5. xxxiv
  6. xxxv
  7. xxxvi
  8. 1
  9. 2
  10. 3
  11. 4
  12. 5
  13. 6
  14. 7
  15. 8
  16. 9
  17. 10
  18. 11
  19. 12
  20. 13
  21. 14
  22. 15
  23. 16
  24. 17
  25. 18
  26. 19
  27. 20
  28. 21
  29. 22
  30. 23
  31. 24
  32. 25
  33. 26
  34. 27
  35. 28
  36. 29
  37. 30
  38. 31
  39. 32
  40. 33
  41. 34
  42. 35
  43. 36
  44. 37
  45. 38
  46. 39
  47. 40
  48. 41
  49. 42
  50. 43
  51. 44
  52. 45
  53. 46
  54. 47
  55. 48
  56. 49
  57. 50
  58. 51
  59. 52
  60. 53
  61. 54
  62. 55
  63. 56
  64. 57
  65. 58
  66. 59
  67. 60
  68. 61
  69. 62
  70. 63
  71. 64
  72. 65
  73. 66
  74. 67
  75. 68
  76. 69
  77. 70
  78. 71
  79. 72
  80. 73
  81. 74
  82. 75
  83. 76
  84. 77
  85. 78
  86. 79
  87. 80
  88. 81
  89. 82
  90. 83
  91. 84
  92. 85
  93. 86
  94. 87
  95. 88
  96. 89
  97. 90
  98. 91
  99. 92
  100. 93
  101. 94
  102. 95
  103. 96
  104. 97
  105. 98
  106. 99
  107. 100
  108. 101
  109. 102
  110. 103
  111. 104
  112. 105
  113. 106
  114. 107
  115. 108
  116. 109
  117. 111
  118. 112
  119. 113
  120. 114
  121. 115
  122. 116
  123. 117
  124. 118
  125. 119
  126. 120
  127. 121
  128. 122
  129. 123
  130. 124
  131. 125
  132. 126
  133. 127
  134. 128
  135. 129
  136. 130
  137. 131
  138. 132
  139. 133
  140. 134
  141. 135
  142. 136
  143. 137
  144. 138
  145. 139
  146. 140
  147. 141
  148. 142
  149. 143
  150. 144
  151. 145
  152. 146
  153. 147
  154. 148
  155. 149
  156. 150
  157. 151
  158. 152
  159. 153
  160. 154
  161. 155
  162. 156
  163. 157
  164. 158
  165. 159
  166. 160
  167. 161
  168. 162
  169. 163
  170. 164
  171. 165
  172. 166
  173. 167
  174. 168
  175. 169
  176. 170
  177. 171
  178. 172
  179. 173
  180. 174
  181. 175
  182. 176
  183. 177
  184. 178
  185. 179
  186. 180
  187. 181
  188. 182
  189. 183
  190. 184
  191. 185
  192. 186
  193. 187
  194. 188
  195. 189
  196. 190
  197. 191
  198. 192
  199. 193
  200. 194
  201. 195
  202. 196
  203. 197
  204. 198
  205. 199
  206. 200
  207. 201
  208. 202
  209. 203
  210. 204
  211. 205
  212. 206
  213. 207
  214. 208
  215. 209
  216. 210
  217. 211
  218. 212
  219. 213
  220. 214
  221. 215
  222. 216
  223. 217
  224. 218
  225. 219
  226. 220
  227. 221
  228. 222
  229. 223
  230. 224
  231. 225
  232. 226
  233. 227
  234. 228
  235. 229
  236. 231
  237. 232
  238. 233
  239. 234
  240. 235
  241. 236
  242. 237
  243. 238
  244. 239
  245. 240
  246. 241
  247. 242
  248. 243
  249. 244
  250. 245
  251. 246
  252. 247
  253. 248
  254. 249
  255. 251
  256. 252
  257. 253
  258. 254
  259. 255
  260. 256
  261. 257
  262. 258
  263. 259
  264. 260
  265. 261
  266. 262
  267. 263
  268. 264
  269. 265
  270. 266
  271. 267
  272. 268
  273. 269
  274. 270
  275. 271
  276. 272
  277. 273
  278. 274
  279. 275
  280. 276
  281. 277
  282. 278
  283. 279
  284. 280
  285. 281
  286. 282
  287. 283
  288. 284
  289. 285
  290. 286
  291. 287
  292. 288
  293. 289
  294. 290
  295. 291
  296. 292
  297. 293
  298. 294
  299. 295
  300. 296
  301. 297
  302. 298
  303. 299
  304. 300
  305. 301
  306. 302
  307. 303
  308. 304
  309. 305
  310. 306
  311. 307
  312. 308
  313. 309
  314. 310
  315. 311
  316. 312
  317. 313
  318. 314
  319. 315
  320. 316
  321. 317
  322. 318
  323. 319
  324. 320
  325. 321
  326. 322
  327. 323
  328. 324
  329. 325
  330. 326
  331. 327
  332. 328
  333. 329
  334. 330
  335. 331
  336. 332
  337. 333
  338. 334
  339. 335
  340. 336
  341. 337
  342. 338
  343. 339
  344. 340
  345. 341
  346. 342
  347. 343
  348. 344
  349. 345
  350. 346
  351. 347
  352. 348
  353. 349
  354. 350
  355. 351
  356. 352
  357. 353
  358. 354
  359. 355
  360. 357
  361. 358
  362. 359
  363. 360
  364. 361
  365. 362
  366. 363
  367. 364
  368. 365
  369. 366
  370. 367
  371. 368
  372. 369
  373. 370
  374. 371
  375. 372
  376. 373
  377. 374
  378. 375
  379. 376
  380. 377
  381. 378
  382. 379
  383. 380
  384. 381
  385. 382
  386. 383
  387. 384
  388. 385
  389. 386
  390. 387
  391. 388
  392. 389
  393. 390
  394. 391
  395. 392
  396. 393
  397. 394
  398. 395
  399. 396
  400. 397
  401. 398
  402. 399
  403. 400
  404. 401
  405. 402
  406. 403
  407. 404
  408. 405
  409. 406
  410. 407
  411. 408
  412. 409
  413. 410
  414. 411
  415. 412
  416. 413
  417. 414
  418. 415
  419. 416
  420. 417
  421. 418
  422. 419
  423. 420
  424. 421
  425. 422
  426. 423
  427. 424
  428. 425
  429. 426
  430. iv
  431. v
  432. vii
  433. ix
  434. xi
  435. xii
  436. 427