Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Operating Systems & Server Administration


1821. 

Clusterbau mit Linux-HA Version 2

Clusterbau mit Linux-HA Version 2

By: Michael Schwartzkopff

Publisher: O'Reilly Verlag

Publication Date: 15-MAY-2008

Insert Date: 14-APR-2009

Slots: 1.0

Table of Contents • Start Reading

Das zentrale Prinzip: Redundanz, Redundanz, Redundanz Das Buch erläutert, was Hochverfügbarkeit eigentlich bedeutet, führt die zentralen Begriffe ein und erklärt, worauf es beim Einrichten von Clustern ankommt. Sie erfahren dann, wie Linux-HA funktioniert und welche Aufgaben diese Software für Sie lösen kann. Alles ist eine Ressource Nach der Installation und Konfiguration der Software geht es um die Einrichtung und Verwaltung Ihrer Ressourcen. Gemäß dem Motto ""If we can manage it, it's a resource"" tragen Sie in der zentralen Cluster Information Base (CIB) alle Dienste ein und...

1822. 

Schnelleinstieg in die Windows PowerShell

Schnelleinstieg in die Windows PowerShell

By: Andy Oakley

Publisher: O'Reilly Verlag

Publication Date: 15-MAR-2007

Insert Date: 14-APR-2009

Slots: 1.0

Table of Contents • Start Reading

Die Windows PowerShell ist die Zukunft der Windows-Administration - jetzt ist die Zeit, damit zu starten. Mit der PowerShell, Microsofts neuer interaktiver Kommandozeilen-Shell für Windows, lassen sich nicht nur Aufgaben jeder Art schneller erledigen und automatisieren. Sie bietet darüber hinaus auch die Möglichkeit, tief in das Betriebssystem einzutauchen, um dort eine breite Palette von Prozessen und Diensten zu steuern. Dieses Buch ist die praktische Anleitung, die Sie benötigen, um die PowerShell sofort zu nutzen. Es führt Sie in die Arbeit mit der neuen Shell ein und demonstriert...

1823. 

GNU Emacs: kurz & gut

GNU Emacs: kurz & gut

By: Debra Cameron

Publisher: O'Reilly Verlag

Publication Date: 15-JAN-1999

Insert Date: 14-APR-2009

Slots: 1.0

Table of Contents • Start Reading

GNU Emacs ist die bekannteste und am weitesten verbreitete Variante des UNIX-Texteditors Emacs, und bietet im Gegensatz zu den meisten Editoren eine komplette Arbeitsumgebung. Die vorliegende deutschsprachige Befehlsreferenz ist die ideale Ergänzung zu Learning GNU Emacs von Debra Cameron, Bill Rosenblatt und Eric Raymond, das mittlerweile in der 2. Auflage vorliegt. ...

1824. 

SAP® Business Information Warehouse Reporting: Building Better BI with SAP® BI 7.0

SAP® Business Information Warehouse Reporting: Building Better BI with SAP® BI 7.0

By: 

Publisher: McGraw-Hill Osborne Media

Publication Date: 18-JAN-2008

Insert Date: 06-APR-2009

Slots: 1.0

Table of Contents • Start Reading

Your Hands-On Guide to SAP Business Information Warehouse Give your company the competitive edge by delivering up-to-date, pertinent business reports to users inside and outside your enterprise. SAP Business Information Warehouse Reporting shows you how to construct Enterprise Data Warehouses, create workbooks and queries, analyze and format results, and supply meaningful reports. Learn how to use the BEx and Web Analyzers, Web Application Designer, Visual Composer, and Information Broadcaster. You will also find out how to forecast future business trends, build enterprise portals and...

1825. 

Grow a Greener Data Center

Grow a Greener Data Center

By: 

Publisher: Cisco Press

Publication Date: 17-AUG-2009

Insert Date: 02-APR-2009

Slots: 1.0

Table of Contents • Start Reading

Grow a Greener Data Center A guide to building and operating energy-efficient, ecologically sensitive IT and Facilities infrastructure Conventional Data Centers can have a huge impact upon the environment, using massive amounts of energy and water, emitting pollutants, and discarding huge quantities of machine waste. Their insatiable demand for energy and often inefficient designs make Data Centers expensive to operate and prime targets for future environmental regulation. Fortunately, it’s now possible to design a Data Center that consumes fewer resources, costs less money to run, has...

1826. 

How to Cheat at Administering Office Communications Server 2007

How to Cheat at Administering Office Communications Server 2007

By: Anthony Piltzecker

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Microsoft Office Communications Server (OCS) 2007 is Microsoft’s latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM), Voice over IP (VoIP), and audio conferencing and videoconferencing. It will work with your company’s existing telecommunications systems without major hardware upgrades. This means your business can deploy advanced VoIP and conferencing without tearing out its preexisting legacy telephone network. How to Cheat at Administering Microsoft...

1827. 

How to Cheat at Configuring VmWare ESX Server

How to Cheat at Configuring VmWare ESX Server

By: David Rule

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

A virtual evolution in IT shops large and small has begun. VMware’s ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress’ proven “How to Cheat” methodology to configure and build VMware’s ESX Server version 3. This clear, concise guide provides all the information you need to become a virtual whiz! This book will detail the default and custom installation of VMware’s ESX server as well as basic and advanced virtual machine configurations. It will then...

1828. 

Dr. Tom Shinder's ISA Server 2006 Migration Guide

Dr. Tom Shinder's ISA Server 2006 Migration Guide

By: Thomas W Shinder

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Dr. Tom Shinder&#8217;s ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ.<br><br>* Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.<br>* Learn to Publish...

1829. 

The Best Damn Server Virtualization Book Period

The Best Damn Server Virtualization Book Period

By: Rogier Dittner; David Rule

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to troubleshoot. Virtualization allows you to consolidate many servers onto a single physical server reducing hardware, electrical, cooling, and administrative costs. These virtual servers run completely independent of each other so if one crashes the other...

1830. 

Securing Citrix XenApp Server in the Enterprise

Securing Citrix XenApp Server in the Enterprise

By: Tariq Azad

Publisher: Syngress

Publication Date: 08-AUG-2008

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for...

1831. 

Server Architectures

Server Architectures

By: René J. Chevance

Publisher: Digital Press

Publication Date: 31-DEC-2004

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

The goal of this book is to present and compare various options one for systems architecture from two separate points of view. One, that of the information technology decision-maker who must choose a solution matching company business requirements, and secondly that of the systems architect who finds himself between the rock of changes in hardware and software technologies and the hard place of changing business needs. Different aspects of server architecture are presented, from databases designed for parallel architectures to high-availability systems, and touching en route on often-...

1832. 

The Best Damn Windows Server 2008 Book Period, 2nd Edition

The Best Damn Windows Server 2008 Book Period, 2nd Edition

By: Anthony Piltzecker

Publisher: Syngress

Publication Date: 31-AUG-2011

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller. New to this Edition: * Web server management with Internet Information Services 7.0 * Virtualize...

1833. 

UNIX and Linux Forensic Analysis DVD Toolkit

UNIX and Linux Forensic Analysis DVD Toolkit

By: Chris Pogue; Cory Altheide; Todd Haverkos

Publisher: Syngress

Publication Date: 24-JUL-2008

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with $4.2 billion in 2Q07, representing 31.7% of corporate server spending. UNIX systems have not been analyzed to any significant depth largely due to a lack of understanding on the part of the investigator, an understanding and knowledge base that has been achieved by...

1834. 

How to Cheat at Managing Windows Server Update Services

How to Cheat at Managing Windows Server Update Services

By: B. Barber

Publisher: Syngress

Publication Date: 12-DEC-2005

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft’s earlier update service, Software Update Service (SUS) to WSUS. The next...

1835. 

Mastering Windows® SharePoint® Services 3.0

Mastering Windows® SharePoint® Services 3.0

By: 

Publisher: Sybex

Publication Date: 22-JAN-2008

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Windows SharePoint Services (WSS) 3.0 is the latest version of the collaboration tool found in Windows Server 2003 R2 and also the underlying technology of Microsoft Office SharePoint Server (MOSS) 2007. In this comprehensive book you’ll go under the hood of WSS 3.0 and discover how to make it easy to share documents, track tasks, create common workspaces where teams can work collectively, set up discussion groups, and more. Includes essential techniques for site creation, administration, customization, security, and disaster recovery, and practical steps for migrating from 2.0 to 3.0. ...

1836. 

System Configuration

System Configuration

By: 

Publisher: The USENIX Association

Publication Date: 30-JUN-2006

Insert Date: 20-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

This booklet is aimed squarely at the working system administrator; it aims to explain clearly the various facets of the system configuration problem and to describe how these relate to current tools and future research. Understanding underlying configuration principles will help system administrators use "best practice" in applying current configuration tools and procedures; these are often very flexible, and it is all too easy to negate the advantages presented by a perfectly good tool. Descriptions of the various facets of the configuration problem should also help provide system...

1837. 

Configuration Management with Bcfg2

Configuration Management with Bcfg2

By: 

Publisher: The USENIX Association

Publication Date: 10-NOV-2008

Insert Date: 20-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Configuration is the medium in which system administrators work. Ranging from the most sweeping decisions to minor troubleshooting of software problems, the act of helping people use computers necessitates a stream of decisions that result in the configuration and software infrastructures that each of us uses on a daily basis. Configuration management is a process whereby administrator interactions with configuration are streamlined and simplified. As the scale of infrastructures grows and the complexity of software systems increases, the cost of system administration rises rapidly....

1838. 

Deploying the VMware Infrastructure

Deploying the VMware Infrastructure

By: 

Publisher: The USENIX Association

Publication Date: 10-AUG-2008

Insert Date: 20-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Virtual machines, which were almost forgotten in the 1990s, have re-emerged as a method to install and consolidate many server systems into one physical machine. Many virtual machines can run on one host. Fast networks and CPUs now enable PCs to be hosted as virtual machines in central servers accessed from thin clients, just like the old time-sharing terminals, which improves the manageability of desktop computing. Complex, multi-tiered systems can be tested and deployed using virtual machines, which helps bring a wide array of configurations to the fingertips of developers, with no need...

1839. 

LCFG: A Practical Tool for System Configuration

LCFG: A Practical Tool for System Configuration

By: 

Publisher: The USENIX Association

Publication Date: 01-AUG-2008

Insert Date: 20-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Even a site with a small network of computers is likely to have hundreds of configuration files. The content of these files determines how the overall system works and what it does; this is what makes the difference between a lab of student machines and the same set of hardware providing a Web service. Working out what to put in the configuration files takes a lot of skill and experience. Any mistakes are likely to cause some kind of failure or security breach. A system administrator will usually be responsible for setting these files up correctly and updating them as the system and the...

1840. 

A System Engineer's Guide to Host Configuration and Maintenance Using Cfengine

A System Engineer's Guide to Host Configuration and Maintenance Using Cfengine

By: 

Publisher: The USENIX Association

Publication Date: 09-APR-2007

Insert Date: 20-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Cfengine is a free software package for automating the configuration and maintenance of networked computers. Its purpose is to implement policy-based configuration management. A System Engineer's Guide to Host Configuration and Maintenance Using Cfengine describes all aspects of using Cfengine 2. Beginning with the fundamentals of Cfengine itself, the booklet takes you though the policies, shows you how to build an infrastructure. It then covers host monitoring and anomaly detection, as well as the management process. Finally, the booklet provides case studies and sample policies and a...