Flylib.com
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers (HP Technologies)
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers (HP Technologies)
ISBN: 155558294X
EAN: 2147483647
Year: 2003
Pages: 91
Authors:
Jerry Cochran
BUY ON AMAZON
Table of Contents
BackCover
Mission-Critical Microsoft Exchange 2003 - Designing and Building Reliable Exchange Servers
Foreword
Preface and Acknowledgements
Chapter 1: Has Anyone Seen My Mission-Critical Microsoft Exchange Server?
1.2 What does mission critical mean?
1.3 The four pillars of mission-critical
1.4 Assumptions about the reader
1.5 Who should read this book
1.6 How this book is organized
Chapter 2: Public Enemy 1: Exchange Downtime
2.2 Step 1: What is the cost of Exchange downtime?
2.3 Step 2: Understanding the anatomy of Exchange downtime
2.4 Step 3: Assessing the causes of downtime for Exchange
2.5 Step 4: Defining mission-critical service-level agreements
2.6 The Final Step: Architecting mission-critical Exchange servers
Chapter 3: The Heart of Exchange: Exchange Store Technology
3.2 Exchange s storage workhorse - the store
3.3 Microsoft s Extensible Storage Engine (ESE)
3.4 Additional resources and information
Chapter 4: When Exchange Servers Fall Down
4.2 Focus: Exchange recovery technology
4.3 Additional resources and information
Chapter 5: Protecting and Recovering Exchange Data
5.2 In depth: Exchange 2003 backup operation
5.3 In depth: Exchange 2003 restore operation
5.4 Supercharged disaster recovery for Exchange Server 2003
5.5 Additional resources and information
Chapter 6: Exchange Server Disaster-Recovery Best Practices
6.2 Best practice 2: Plan and partition data
6.3 Best practice 3: Establish disaster-recovery service-level agreements
6.4 Best practice 4: Select the right disaster recovery technology
6.5 Best practice 5: Select the right backup and recovery strategy
6.6 Best practice 6: Look for ways to shrink disaster-recovery windows
6.7 Best practice 7: Develop an Exchange disaster-recovery plan
6.8 Best practice 8: Train personnel and practice disaster-recovery
6.9 Best practice 9: Disaster-recovery management
6.10 Best practice 10: Plan for growth s impact on disaster-recovery
Chapter 7: Mission-Critical Server and Storage Technologies
7.2 Key server technologies for Exchange Server 2003
7.3 Key storage technologies for Exchange Server 2003
7.4 Storage technologies overview
Chapter 8: Leveraging Exchange Clusters
8.2 The problems clustering does and does not solve
8.3 Windows cluster technology fundamentals
8.4 A history lesson in Exchange Server clustering
8.5 Successfully deploying Exchange clusters
Chapter 9: Locking Down Mission-Critical Exchange Servers
9.1 Threat: Denial of service
9.2 Threat: Viruses and spamUCE
9.3 Threat: Unauthorized access and information disclosure
9.4 Threat: Forgery, spoofing, and relay
9.5 Windows Server security features
9.6 Locking down and securing your Exchange servers
Chapter 10: Proactive Management for Mission-Critical Exchange Servers
10.2 Establishing service-level agreements
10.3 Performance management
10.4 Configuration management
10.5 Fault management
10.6 Leveraging Microsoft Operations manager for Exchange server management
10.7 Putting it all together - mission-critical Exchange
10.8 Additional resources and information
Appendix A: Supplemental Resources
A.2 Supplemental Exchange security information
A.3 Exchange backup and restore API information
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J-K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
List of Sidebars
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers (HP Technologies)
ISBN: 155558294X
EAN: 2147483647
Year: 2003
Pages: 91
Authors:
Jerry Cochran
BUY ON AMAZON
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Formatting Forms
Validating Form Data
Working with Advanced Form Elements
Designing InfoPath Web Service Clients
Navigating the InfoPath Object Model
SQL Hacks
Hack 5. Solve a Crossword Puzzle Using SQL
Hack 9. Filter on Indexed Columns
Hack 55. Import Someone Elses Data
Hack 76. Compress to Avoid LOBs
Hack 97. Allow an Anonymous Account
C & Data Structures (Charles River Media Computer Engineering)
Control Structures
The printf Function
Preprocessing
Linked Lists
Problems in Graphs
Cisco Voice Gateways and Gatekeepers
Design Considerations
Numbering Plans
Using Trunk Groups
Assigning COR Lists with Cisco CallManager Express
Implementing the AA Tcl Script
Data Structures and Algorithms in Java
Problems
Analysis of Algorithms
Amortized Analysis
Binary Search
The Set Interface
802.11 Wireless Networks: The Definitive Guide, Second Edition
1X on Wireless LANs
RF Propagation with 802.11
Complementary Code Keying
ERP Physical Medium Dependent (PMD) Layer
Network Requirements
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies