Cantitate/Preț
Produs

How to Cheat at Managing Microsoft Operations Manager 2005: How to Cheat

Autor Anthony Piltzecker
en Limba Engleză Paperback – 28 feb 2006
Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever find them, thereby enabling administrators to lower their costs of operations and simplify management of their Windows Server System infrastructure. MOM can notify system administrators of overloaded processors, depleted memory, or failed network connections affecting their Windows servers long before these problems bother users.

Microsoft Operations Manager (MOM) 2005 delivers open and scalable enterprise-class operational management by providing comprehensive event management, proactive monitoring and alerting, reporting and trend analysis, and system and application specific knowledge and tasks to improve the manageability of Windows Server System environments, including Windows, Exchange, SQL, IIS, Active Directory etc.

* A users guide to Microsoft Operations Manager (MOM) enabling a cost reduction and simplification in managing your Windows Server System Infrastructure
* Companion Web site for book offers dozens of customized scripts and tools for automating MOM 2005 and many other Windows Server products
* There is no other compact resource like this for this core, Microsoft Server product
Citește tot Restrânge

Din seria How to Cheat

Preț: 28999 lei

Preț vechi: 36249 lei
-20% Nou

Puncte Express: 435

Preț estimativ în valută:
5550 5765$ 4610£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781597492515
ISBN-10: 1597492515
Pagini: 496
Dimensiuni: 178 x 232 x 35 mm
Greutate: 0.73 kg
Editura: ELSEVIER SCIENCE
Seria How to Cheat


Public țintă

System Administrators

Cuprins

Chapter 1 Designing a Secure Network Framework

Chapter 2 Securing Servers Based on Function

Chapter 3 Designing a Secure Public Key Infrastructure

Chapter 4 Securing the Network Management Process

Chapter 5 Securing Network Services and Protocols

Chapter 6 Securing Internet Information Services

Chapter 7 Securing VPN and Extranet Communications

Chapter 8 Securing Active Directory

Chapter 9 Securing Network Resources

Chapter 10 Securing Network Clients Self Test

Appendix