How to Cheat at Managing Microsoft Operations Manager 2005: How to Cheat
Autor Anthony Piltzeckeren Limba Engleză Paperback – 28 feb 2006
Microsoft Operations Manager (MOM) 2005 delivers open and scalable enterprise-class operational management by providing comprehensive event management, proactive monitoring and alerting, reporting and trend analysis, and system and application specific knowledge and tasks to improve the manageability of Windows Server System environments, including Windows, Exchange, SQL, IIS, Active Directory etc.
* A users guide to Microsoft Operations Manager (MOM) enabling a cost reduction and simplification in managing your Windows Server System Infrastructure
* Companion Web site for book offers dozens of customized scripts and tools for automating MOM 2005 and many other Windows Server products
* There is no other compact resource like this for this core, Microsoft Server product
Din seria How to Cheat
- 21% Preț: 219.68 lei
- 20% Preț: 376.51 lei
- 20% Preț: 366.65 lei
- 20% Preț: 357.25 lei
- 20% Preț: 356.51 lei
- 20% Preț: 323.93 lei
- 20% Preț: 287.57 lei
- 20% Preț: 369.56 lei
- 20% Preț: 374.24 lei
- 20% Preț: 314.23 lei
- 20% Preț: 271.72 lei
- 20% Preț: 369.56 lei
- 20% Preț: 306.47 lei
- 20% Preț: 299.99 lei
- 20% Preț: 307.76 lei
- 20% Preț: 351.67 lei
- 20% Preț: 372.63 lei
- 16% Preț: 185.08 lei
Preț: 289.99 lei
Preț vechi: 362.49 lei
-20% Nou
Puncte Express: 435
Preț estimativ în valută:
55.50€ • 57.65$ • 46.10£
55.50€ • 57.65$ • 46.10£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597492515
ISBN-10: 1597492515
Pagini: 496
Dimensiuni: 178 x 232 x 35 mm
Greutate: 0.73 kg
Editura: ELSEVIER SCIENCE
Seria How to Cheat
ISBN-10: 1597492515
Pagini: 496
Dimensiuni: 178 x 232 x 35 mm
Greutate: 0.73 kg
Editura: ELSEVIER SCIENCE
Seria How to Cheat
Public țintă
System AdministratorsCuprins
Chapter 1 Designing a Secure Network Framework
Chapter 2 Securing Servers Based on Function
Chapter 3 Designing a Secure Public Key Infrastructure
Chapter 4 Securing the Network Management Process
Chapter 5 Securing Network Services and Protocols
Chapter 6 Securing Internet Information Services
Chapter 7 Securing VPN and Extranet Communications
Chapter 8 Securing Active Directory
Chapter 9 Securing Network Resources
Chapter 10 Securing Network Clients Self Test
Appendix
Chapter 2 Securing Servers Based on Function
Chapter 3 Designing a Secure Public Key Infrastructure
Chapter 4 Securing the Network Management Process
Chapter 5 Securing Network Services and Protocols
Chapter 6 Securing Internet Information Services
Chapter 7 Securing VPN and Extranet Communications
Chapter 8 Securing Active Directory
Chapter 9 Securing Network Resources
Chapter 10 Securing Network Clients Self Test
Appendix