Flylib.com
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers (HP Technologies)
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers (HP Technologies)
ISBN: 155558294X
EAN: 2147483647
Year: 2003
Pages: 91
Authors:
Jerry Cochran
BUY ON AMAZON
Table of Contents
BackCover
Mission-Critical Microsoft Exchange 2003 - Designing and Building Reliable Exchange Servers
Foreword
Preface and Acknowledgements
Chapter 1: Has Anyone Seen My Mission-Critical Microsoft Exchange Server?
1.2 What does mission critical mean?
1.3 The four pillars of mission-critical
1.4 Assumptions about the reader
1.5 Who should read this book
1.6 How this book is organized
Chapter 2: Public Enemy 1: Exchange Downtime
2.2 Step 1: What is the cost of Exchange downtime?
2.3 Step 2: Understanding the anatomy of Exchange downtime
2.4 Step 3: Assessing the causes of downtime for Exchange
2.5 Step 4: Defining mission-critical service-level agreements
2.6 The Final Step: Architecting mission-critical Exchange servers
Chapter 3: The Heart of Exchange: Exchange Store Technology
3.2 Exchange s storage workhorse - the store
3.3 Microsoft s Extensible Storage Engine (ESE)
3.4 Additional resources and information
Chapter 4: When Exchange Servers Fall Down
4.2 Focus: Exchange recovery technology
4.3 Additional resources and information
Chapter 5: Protecting and Recovering Exchange Data
5.2 In depth: Exchange 2003 backup operation
5.3 In depth: Exchange 2003 restore operation
5.4 Supercharged disaster recovery for Exchange Server 2003
5.5 Additional resources and information
Chapter 6: Exchange Server Disaster-Recovery Best Practices
6.2 Best practice 2: Plan and partition data
6.3 Best practice 3: Establish disaster-recovery service-level agreements
6.4 Best practice 4: Select the right disaster recovery technology
6.5 Best practice 5: Select the right backup and recovery strategy
6.6 Best practice 6: Look for ways to shrink disaster-recovery windows
6.7 Best practice 7: Develop an Exchange disaster-recovery plan
6.8 Best practice 8: Train personnel and practice disaster-recovery
6.9 Best practice 9: Disaster-recovery management
6.10 Best practice 10: Plan for growth s impact on disaster-recovery
Chapter 7: Mission-Critical Server and Storage Technologies
7.2 Key server technologies for Exchange Server 2003
7.3 Key storage technologies for Exchange Server 2003
7.4 Storage technologies overview
Chapter 8: Leveraging Exchange Clusters
8.2 The problems clustering does and does not solve
8.3 Windows cluster technology fundamentals
8.4 A history lesson in Exchange Server clustering
8.5 Successfully deploying Exchange clusters
Chapter 9: Locking Down Mission-Critical Exchange Servers
9.1 Threat: Denial of service
9.2 Threat: Viruses and spamUCE
9.3 Threat: Unauthorized access and information disclosure
9.4 Threat: Forgery, spoofing, and relay
9.5 Windows Server security features
9.6 Locking down and securing your Exchange servers
Chapter 10: Proactive Management for Mission-Critical Exchange Servers
10.2 Establishing service-level agreements
10.3 Performance management
10.4 Configuration management
10.5 Fault management
10.6 Leveraging Microsoft Operations manager for Exchange server management
10.7 Putting it all together - mission-critical Exchange
10.8 Additional resources and information
Appendix A: Supplemental Resources
A.2 Supplemental Exchange security information
A.3 Exchange backup and restore API information
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J-K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
List of Sidebars
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers (HP Technologies)
ISBN: 155558294X
EAN: 2147483647
Year: 2003
Pages: 91
Authors:
Jerry Cochran
BUY ON AMAZON
Java I/O
Reading Files
Sockets
Validation
Decimal Formats
Hot Plugging
CISSP Exam Cram 2
How to Prepare for the Exam
About This Book
Common Flaws in the Security Architecture
Security Mechanisms
Computer Crimes
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Basic SWT Widgets
Text Controls
Menus, Toolbars, Cool, Bars, and Actions
Tables
Drag and Drop and the Clipboard
SQL Hacks
Hack 2. Connect to SQL from a Program
Hack 18. Sort Your Email
Hack 63. Generate Rows Without Tables
Hack 76. Compress to Avoid LOBs
Hack 83. Find the Top n in Each Group
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Part I: SOA and Web Services Fundamentals
Correlation
Common principles of service-orientation
The top-down strategy
Entity-centric business service design (a step-by-step process)
Understanding Digital Signal Processing (2nd Edition)
SIGNAL PROCESSING OPERATIONAL SYMBOLS
DFT LEAKAGE
HIGHPASS FIR FILTER DESIGN
IMPULSE RESPONSE OF A HILBERT TRANSFORMER
REFERENCES
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies