Jump to content

downtemplate

Banned
  • Content Count

    33
  • Joined

  • Last visited

  • Days Won

    31

Everything posted by downtemplate

  1. Book Details Paperback: 54 pages Publisher: Packt Publishing (November 2012) Language: English ISBN-10:1849519846 ISBN-13: 978-1849519847 File Size: 1.4 MB In the data-centered world, backup and duplication is an important factor that keeps your computer network fail-safe and healthy. Backup solutions allow you to quickly recover from power failures, damaged hardware and hacker attacks. “Network Backup with Bacula” is a practical guide to setting up the Bacula backup system using a number of sequential recipes, ranging from the simplest to intricate ones, which will give you knowledge needed to build a self-contained backup infrastructure. “Network Backup with Bacula” contains the instructions on setup and configuration of various Bacula components as well as information to help you painlessly integrate your Windows and Linux workstations into the backup system. You will learn how to setup Bacula Director and Storage, how to backup Linux and Windows clients, ways to overcome limitations implied by firewall protection, and specific cases of backup for MySQL, OpenLDAP, Postfix. You will also learn different scheduling strategies and various other tips. With Network Backup with Bacula, you will learn everything you need to know to create an autonomous backup solution for your computer network. What you will learn from this book How to set up Bacula Director and Storage components Backing up directories from Linux and BSD workstations Scheduling your backups Backing up data from MySQL and PostgreSQL Backing up mailboxes from Postfix and Zarafa Overcoming firewall to back up the machine from the different network Using multiple backup storage servers Quirks of backing up Windows workstations Approach This book is a practical, task-based, how-to guide that starts with setup and configuration of various Bacula components and then takes the reader through different scheduling strategies and various other tips. Who this book is written for This book is for junior network administrators familiar with Linux or BSD who are looking for a simple and consistent network backup solution. It’s assumed that you are able to set up and configure a Linux or BSD server and are familiar with local network layouts and routing. Download E-Book Uploaded Link [Hidden Content]
  2. Book Details Hardcover: 390 pages Publisher: Wiley (February 2012) Language: English ISBN-10:1119971098 ISBN-13: 978-1119971092 File Size: 5.7 MB This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC) by NFC Lab – Istanbul research center which conducts intense research on NFC technology. In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail. Key Features: Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives Discusses methods, techniques and modelling support including UML, demonstrating them with real cases Contains case studies such as payment, ticketing, social networking and remote shopping This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates. Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  3. Book Details Paperback: 256 pages Publisher: O’Reilly Media (November 2012) Language: English ISBN-10:1449329705 ISBN-13: 978-1449329709 File Size: 17.3 MB Written by Ganglia designers and maintainers, this book shows you how to collect and visualize metrics from clusters, grids, and cloud infrastructures at any scale. Want to track CPU utilization from 20,000 hosts every ten seconds? Ganglia is just the tool you need, once you know how its main components work together. This hands-on book helps experienced system administrators take advantage of Ganglia 3.x. Learn how to extend the base set of metrics you collect, fetch current values, see aggregate views of metrics, and observe time-series trends in your data. You’ll also examine real-world case studies of Ganglia installs that feature challenging monitoring requirements. Determine whether Ganglia is a good fit for your environment Learn how Ganglia’s gmond and gmetad daemons build a metric collection overlay Plan for scalability early in your Ganglia deployment, with valuable tips and advice Take data visualization to a new level with gweb, Ganglia’s web frontend Write plugins to extend gmond’s metric-collection capability Troubleshoot issues you may encounter with a Ganglia installation Integrate Ganglia with the sFlow and Nagios monitoring systems Contributors include: Robert Alexander, Jeff Buchbinder, Frederiko Costa, Alex Dean, Dave Josephsen, Peter Phaal, and Daniel Pocock. Table of Contents Chapter 1. Introducing Ganglia Chapter 2. Installing and Configuring Ganglia Chapter 3. Scalability Chapter 4. The Ganglia Web Interface Chapter 5. Managing and Extending Metrics Chapter 6. Troubleshooting Ganglia Chapter 7. Ganglia and Nagios Chapter 8. Ganglia and sFlow Chapter 9. Ganglia Case Studies Appendix A. Advanced Metric Configuration and Debugging Appendix B. Ganglia and Hadoop/HBase Download E-Book Uploaded Link [Hidden Content]
  4. Book Details Hardcover: 336 pages Publisher: Wiley (May 2012) Language: English ISBN-10:1119994756 ISBN-13: 978-1119994756 File Size: 10.2 MB A comprehensive introduction to M2M Standards and systems architecture, from concept to implementation Focusing on the latest technological developments, M2M Communications: A Systems Approach is an advanced introduction to this important and rapidly evolving topic. It provides a systems perspective on machine-to-machine services and the major telecommunications relevant technologies. It provides a focus on the latest standards currently in progress by ETSI and 3GPP, the leading standards entities in telecommunication networks and solutions. The structure of the book is inspired by ongoing standards developments and uses a systems-based approach for describing the problems which may be encountered when considering M2M, as well as offering proposed solutions from the latest developments in industry and standardization. The authors provide comprehensive technical information on M2M architecture, protocols and applications, especially examining M2M service architecture, access and core network optimizations, and M2M area networks technologies. It also considers dominant M2M application domains such as Smart Metering, Smart Grid, and eHealth. Aimed as an advanced introduction to this complex technical field, the book will provide an essential end-to-end overview of M2M for professionals working in the industry and advanced students. Key features: First technical book emerging from a standards perspective to respond to this highly specific technology/business segment Covers the main challenges facing the M2M industry today, and proposes early roll-out scenarios and potential optimization solutions Examines the system level architecture and clearly defines the methodology and interfaces to be considered Includes important information presented in a logical manner essential for any engineer or business manager involved in the field of M2M and Internet of Things Provides a cross-over between vertical and horizontal M2M concepts and a possible evolution path between the two Written by experts involved at the cutting edge of M2M developments Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  5. Book Details Paperback: 68 pages Publisher: Packt Publishing (January 2013) Language: English ISBN-10:1849695644 ISBN-13: 978-1849695640 File Size: 9.1 MB Wireshark is by far the most popular network traffic analyzing tool. It not only provides an interface for traffic capture but also provides a rich platform for an in-depth analysis of the traffic. The GUI provides a very user friendly and interactive media that simplifies the process of network forensics. This concise book provides a perfect start to getting hands-on with packet analysis using Wireshark. Instant Wireshark Starter is the perfect guide for new learners who are willing to dive into the world of computer networks. Walking you through from the very start, it transitions smoothly to cover core topics like filters, decoding packets, command line tools, and more. It covers every inch of Wireshark in a concise and comprehensive manner. Instant Wireshark Starter has been designed keeping basic learners in mind. After initial setup, the book leads you through your first packet capture followed by some core topics like analyzing the captured traffic and understanding filters. You will then be guided through more detailed topics like the decoding of captured packets, generating graphs based on statistics, and name resolution. Finally the book concludes by providing information about further references and official sources to learn more about the tool. What you will learn from this book Learn how to effectively utilize Wireshark Capture and decode data packets Understand protocol representation in Wireshark alongside statistical analysis Implement display and capture filters Import and export capture files Approach Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. Written as a practical guide, Wireshark Starter will show you all you need to know to effectively capture and analyze network traffic. Who this book is for This book is specially designed for new learners who are willing to dive deeper into network analysis using Wireshark. It requires a basic understanding of network protocols and their implementation and is equally handy for network administrators, forensic experts, and network penetration testers. Download E-Book Uploaded Link [Hidden Content]
  6. Book Details Paperback: 64 pages Publisher: Packt Publishing (January 2013) Language: English ISBN-10:184951996X ISBN-13: 978-1849519960 File Size: unknown As a featured networking utility, Netcat uses TCP/IP protocols to read and write data across network connections. Netcat is a feature rich backend network debugging and exploration tool with the ability to create almost any type of connection you would need. “Instant Netcat Starter Guide” is a practical, hands-on guide that provides you with a simple and straightforward roadmap to proceed from newbie to seasoned professional with the Netcat utility. By progressing from simple to more complex uses, this book will inform and explain many of the primary use cases that are only limited by your imagination. This book explores the classic Netcat utility, and breaks down the common ways in which it can be utilized in the field. Beginning with compilation and installation, this book quickly has you utilizing the core features of the utility to perform file transfers regardless of commonly blocked firewall ports, perform real-world interrogation of services and listening ports to discover the true intention of an application or service, and tunnelling remotely into systems to produce remote command shells. What you will learn from this book Locate the various distributions of Netcat, including the original “Hobbit” version, GNU Netcat, and Ncat. Install the utility on Windows and Linux distributions. Understand the differences between the listening mode and the client mode and when you should use one over the other. Establish a simplistic chat interface between two computers. Use Netcat to establish a remote shell on Windows systems. How to Portscan with Netcat. Learn about file transfers within Netcat. Perform banner grabbing of services. Approach Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. Who this book is written for This book is for IT professionals who have no previous experience with Netcat but need to understand it quickly and easily. Download E-Book Uploaded Link [Hidden Content]
  7. Book Details Paperback: 402 pages Publisher: Wiley (October 2003) Language: English ISBN-10:0471458805 ISBN-13: 978-0471458807 File Size: 3.9 MB A tactical guide to installing, implementing, optimizing, and supporting SSH in order to secure your network Prevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system’s defenses, keep critical data secure, and add to the functionality of your network by deploying SSH. Security expert Himanshu Dwivedi shows you ways to implement SSH on virtually all operating systems, desktops, and servers, so your system is safe, secure, and stable. Learn how SSH fulfills all the core items in security, including authentication, authorization, encryption, integrity, and auditing. Also, discover methods to optimize the protocol for security and functionality on Unix®, Windows®, and network architecture environments. Additionally, find out about the similarities and differences of the major SSH servers and clients. With the help of numerous architectural examples and case studies, you’ll gain the necessary skills to: Explore many remote access solutions, including the theory, setup, and configuration of port forwarding Take advantage of features such as secure e-mail, proxy, and dynamic port forwarding Use SSH on network devices that are traditionally managed by Telnet Utilize SSH as a VPN solution in both a server and client aspect Replace insecure protocols such as Rsh, Rlogin, and FTP Use SSH to secure Web browsing and as a secure wireless (802.11) solution Table of Contents Part 1: SSH Basics Chapter 1. Overview of SSH Chapter 2. SSH Servers Chapter 3. Secure Shell Clients Chapter 4. Authentication Chapter 5. SSH Management Part 2: Remote Access Solutions Chapter 6. SSH Port Forwarding Chapter 7. Secure Remote Access Part 3: Protocol Replacement Chapter 8. SSH Versatility Chapter 9. Proxy Technologies in a secure Web Environment Chapter 10. SSH Case Studies Download E-Book Uploaded Link [Hidden Content]
  8. Book Details Paperback: 44 pages Publisher: O’Reilly Media (March 2012) Language: English ISBN-10:1449324185 ISBN-13: 978-1449324186 File Size: 5.1 MB If you want to experiment with radio frequency identification (RFID), this book is the perfect place to start. All you need is some experience with Arduino and Processing, the ability to connect basic circuits on a breadboard with jumper wire-and you’re good to go. You’ll be guided through three hands-on projects that let you experience RFID in action. RFID is used in various applications, such as identifying store items or accessing a toll road with an EZPass system. After you build each of the book’s projects in succession, you’ll have the knowledge to pursue RFID applications of your own. Use Processing to get a sense of how RFID readers behave Connect Arduino to an RFID reader and discover how to use RFID tags as keys Automate your office or home, using RFID to turn on systems when you’re present, and turn them off when you leave Get a complete list of materials you need, along with code samples and helpful illustrations Tackle each project with easy-to-follow explanations of how the code works Table of Contents Chapter 1. Radio Frequency Identification Chapter 2. Reading RFID Tags in Processing Chapter 3. Reading RFID Tags in Arduino Chapter 4. RFID Meets Home Automation Chapter 5. Conclusion Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  9. Book Details Paperback: 116 pages Publisher: O’Reilly Media (December 2012) Language: English ISBN-10:1449331009 ISBN-13: 978-1449331009 File Size: 11.0 MB Connect your enterprise to a wide range of SaaS platforms, Open APIs, and social networks quickly and without difficulty. Through step-by-step instructions and numerous real-world examples, this concise guide shows you how to seamlessly integrate the external services you need with Mule ESB and its powerful Cloud Connect toolset. You’ll learn how to use service-specific connectors for many popular APIs-including Salesforce, Twitter, LinkedIn, and Twilio-through easy-to-learn abstractions. If Mule doesn’t have a connector for the resource you need, you’ll learn how to build your own. You’ll discover how easy it is to reach beyond the enterprise firewall for a host of Internet resources. Discover the advantages of using Mule Cloud Connect over typical web service clients and protocols Learn how Cloud Connectors eliminate the need to understand the underlying API of each service Get started with the latest real-time technologies, including REST, WebHooks, and Streaming APIs Integrate OAuth secure APIs and understand their role in authorization and information sharing Delve into advanced topics such as multi-tenancy and connection management Build your own custom connectors with the Mule DevKit Table of Contents Chapter 1. Getting Started Chapter 2. Cloud Connectors Chapter 3. OAuth Connectivity Chapter 4. Connection Management Chapter 5. Real-Time Connectivity Chapter 6. Custom Connectivity Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  10. Book Details Paperback: 150 pages Publisher: Packt Publishing (February 2012) Language: English ISBN-10:1849515409 ISBN-13: 978-1849515405 File Size: 2.3 MB FreeSWITCH is an open source telephony platform designed to facilitate the creation of voice, chat, and video applications. It can scale from a soft-phone to a PBX and even up to an enterprise-class softswitch. In the FreeSWITCH Cookbook, members of the FreeSWITCH development team share some of their hard-earned knowledge with you in the book’s recipes. Use this knowledge to improve and expand your FreeSWITCH installations. The FreeSWITCH Cookbook is an essential addition to any VoIP administrator’s library. The book starts with recipes on how to handle call routing and then discusses connecting your FreeSWITCH server to the outside world. It then teaches you more advanced topics like CDR handling, practical examples of controlling FreeSWITCH with the event socket, and configuring many features commonly associated with a PBX installation. What you will learn from this book Configure users and phones as well as connections to VoIP providers and even Google Voice Control FreeSWITCH remotely with the powerful event socket interface Route inbound and outbound calls Handle call detail records, which includes inserting CDRs into a database Enable text-to-speech conversion in your voice applications Monitor calls via the FreeSWITCH Web interface Approach This is a problem-solution approach to take your FreeSWITCH skills to the next level, where everything is explained in a practical way. Who this book is for If you are a system administrator, hobbyist, or someone who uses FreeSWITCH on a regular basis, this book is for you. Whether you are a FreeSWITCH expert or just getting started, this book will take your skills to the next level. Download E-Book Uploaded Link [Hidden Content]
  11. Book Details Paperback: 606 pages Publisher: O’Reilly Media (December 1994) Language: English ISBN-10:1565920902 ISBN-13: 978-1565920903 File Size: 19.9 MB Expect is quickly becoming a part of every UNIX user’s toolbox. It allows you to automate Telnet, FTP, passwd, rlogin, and hundreds of other applications that normally require human interaction. Using Expect to automate these applications will allow you to speed up tasks and, in many cases, solve new problems that you never would have even considered before. For example, you can use Expect to test interactive programs with no changes to their interfaces. Or wrap interactive programs with Motif-like front-ends to control applications by buttons, scrollbars, and other graphic elements with no recompilation of the original programs. You don’t even need the source code! Expect works with remote applications, too. Use it to tie together Internet applications including Telnet, Archie, FTP, Gopher, and Mosaic. Don Libes is the creator of Expect as well as the author of this book. In Exploring Expect, he provides a comprehensive tutorial on all of Expect’s features, allowing you to put it immediately to work on your problems. In a down-to-earth and humorous style, he provides numerous examples of challenging real-world applications and how they can be automated using Expect to save you time and money. Expect is the first of a new breed of programs based on Tcl, the Tool Command Language that is rocking the computer science community. This book provides an introduction to Tcl and describes how Expect applies Tcl’s power to the new field of interaction automation. Whether your interest is in Expect or interaction automation or you simply want to learn about Tcl and see how it has been used in real software, you will find Exploring Expect a treasure trove of easy-to-understand and valuable information. Table of Contents Chapter 1. Intro-What Is Expect? Chapter 2. Tcl-Introduction And Overview Chapter 3. Getting Started With Expect Chapter 4. Glob Patterns And Other Basics Chapter 5. Regular Expressions Chapter 6. Patterns, Actions, And Limits Chapter 7. Debugging Patterns And Controlling Output Chapter 8. Handling A Process And A User Chapter 9. The Expect Program Chapter 10. Handling Multiple Processes Chapter 11. Handling Multiple Processes Simultaneously Chapter 12. Send Chapter 13. Spawn Chapter 14. Signals Chapter 15. Interact Chapter 16. Interacting With Multiple Processes Chapter 17. Background Processing Chapter 18. Debugging Scripts Chapter 19. Expect + Tk = Expectk Chapter 20. Extended Examples Chapter 21. Expect, C, And C++ Chapter 22. Expect As Just Another Tcl Extension Chapter 23. Miscellaneous Appendix. Commands and Variables Download E-Book Uploaded Link [Hidden Content]
  12. Book Details Hardcover: 408 pages Publisher: Wiley (December 2011) Language: English ISBN-10:0470711922 ISBN-13: 978-0470711927 File Size: 16.6 MB This book explains how the performance of modern cellular wireless networks can be evaluated by measurements and simulations With the roll-out of LTE, high data throughput is promised to be available to cellular users. In case you have ever wondered how high this throughput really is, this book is the right read for you: At first, it presents results from experimental research and simulations of the physical layer of HSDPA, WiMAX, and LTE. Next, it explains in detail how measurements on such systems need to be performed in order to achieve reproducible and repeatable results. The book further addresses how wireless links can be evaluated by means of standard-compliant link-level simulation. The major challenge in this context is their complexity when investigating complete wireless cellular networks. Consequently, it is shown how system-level simulators with a higher abstraction level can be designed such that their results still match link-level simulations. Exemplarily, the book finally presents optimizations of wireless systems over several cells. This book: Explains how the performance of modern cellular wireless networks can be evaluated by measurements and simulations Discusses the concept of testbeds, highlighting the challenges and expectations when building them Explains measurement techniques, including the evaluation of the measurement quality by statistical inference techniques Presents throughput results for HSDPA, WiMAX,and LTE Demonstrates simulators at both, link- level and system-level Provides system-level and link-level simulators (for WiMAX and LTE) on an accompanying website ([Hidden Content]) This book is an insightful guide for researchers and engineers working in the field of mobile radio communication as well as network planning. Advanced students studying related courses will also find the book interesting. Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  13. Book Details Paperback: 1178 pages Publisher: O’Reilly Media; 3rd Edition (August 2002) Language: English ISBN-10:0596003439 ISBN-13: 978-0596003432 File Size: 12.1 MB Essential System Administration,3rd Edition is the definitive guide for Unix system administration, covering all the fundamental and essential tasks required to run such divergent Unix systems as AIX, FreeBSD, HP-UX, Linux, Solaris, Tru64 and more. Essential System Administration provides a clear, concise, practical guide to the real-world issues that anyone responsible for a Unix system faces daily. The new edition of this indispensable reference has been fully updated for all the latest operating systems. Even more importantly, it has been extensively revised and expanded to consider the current system administrative topics that administrators need most. Essential System Administration,3rd Edition covers: DHCP, USB devices, the latest automation tools, SNMP and network management, LDAP, PAM, and recent security tools and techniques. Essential System Administration is comprehensive. But what has made this book the guide system administrators turn to over and over again is not just the sheer volume of valuable information it provides, but the clear, useful way the information is presented. It discusses the underlying higher-level concepts, but it also provides the details of the procedures needed to carry them out. It is not organized around the features of the Unix operating system, but around the various facets of a system administrator’s job. It describes all the usual administrative tools that Unix provides, but it also shows how to use them intelligently and efficiently. Whether you use a standalone Unix system, routinely provide administrative support for a larger shared system, or just want an understanding of basic administrative functions, Essential System Administration is for you. This comprehensive and invaluable book combines the author’s years of practical experience with technical expertise to help you manage Unix systems as productively and painlessly as possible. Table of Contents Chapter 1. Introduction to System Administration Chapter 2. The Unix Way Chapter 3. Essential AdministrativeTools and Techniques Chapter 4. Startup and Shutdown Chapter 5. TCP/IP Networking Chapter 6. Managing Users and Groups Chapter 7. Security Chapter 8. Managing Network Services Chapter 9. Electronic Mail Chapter 10. Filesystems and Disks Chapter 11. Backup and Restore Chapter 12. Serial Lines and Devices Chapter 13. Printers and the Spooling Subsystem Chapter 14. Automating Administrative Tasks Chapter 15. Managing System Resources Chapter 16. Configuring and Building Kernels Chapter 17. Accounting Chapter 18. The Profession of System Administration Appendix. Administrative Shell Programming Download E-Book Uploaded Link [Hidden Content]
  14. Book Details Paperback: 385 pages Publisher: IBM Press (July 2012) Language: English ISBN-10:0133066843 ISBN-13: 978-0133066845 File Size: 44.5 MB A Complete, Practical Guide to Building and Hosting Cloud Services That Deliver Exceptional Business Value In this unique title, key developers of the IBM SmartCloud Enterprise share indispensable insights for developing and operating cloud-based solutions on any cloud platform. Drawing on their unsurpassed in-the-trenches experience, the authors help you develop the new mindset and skills needed to succeed in cloud environments, where development, business, and system operations are linked more tightly than ever. Using examples based on IBM SmartCloud Enterprise, the authors cover a wide variety of cloud “use cases,” while also introducing general principles for automating and optimizing IT infrastructure in any cloud environment. They begin by presenting an authoritative, accessible review of cloud computing and Infrastructure as a Service (IaaS) cloud concepts. Next, they demonstrate how to use cloud tools, develop basic cloud applications, and utilize standards to establish interoperability between clouds. Finally, drawing on deep personal experience, they offer best-practice solutions for all facets of cloud hosting, including security, monitoring, performance, availability, and business support. Throughout, they emphasize real-world problem solving, offering numerous code examples and practical demonstrations of real-world tools and utilities. Coverage includes Understanding each cloud deployment model: private, community, public, and hybrid Reviewing key cloud computing use cases, including those based on virtualization and collaboration Developing for the cloud with the LAMP stack, Windows, J2EE, WebSphere, and other technologies Building apps for the IBM SmartCloud Enterprise public infrastructure Using the command line toolkit, Java, and REST APIs to manage IBM SmartCloud Enterprise resources Exploring cloud computing standards and open source projects that promote interoperability among clouds Building cloud applications to customize images, deliver network services, install/manage software, and provide remote desktops Using IBM’s powerful self-service and delegated administration models and best-of-breed VM images Leveraging open source projects for cloud service management and virtualization Understanding cloud service security: trusted certificates, identity/access management, SSH, HTTPS, IPSec, application hardening, and much more Monitoring and optimizing performance and availability through the entire system lifecycle Managing, scaling, and automating cloud applications to meet business needs This title will be valuable to every enterprise developer, architect, and IT manager seeking the full benefits of cloud-based services; all ISVs building value-add services on public clouds; and everyone building applications that rely heavily on IaaS, Platform as a Service (PaaS), Software as a Service (SaaS), or Business as a Service (BaaS). Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  15. Book Details Hardcover: 736 pages Publisher: Cisco Press; 3rd Edition (November 2011) Language: English ISBN-10:1587142880 ISBN-13: 978-1587142888 File Size: 10.6 MB Designing Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Third Edition, is a Cisco®-authorized, self-paced learning tool for CCDP® foundation learning. This book provides you with the knowledge needed to perform the conceptual, intermediate, and detailed design of a network infrastructure that supports desired network solutions over intelligent network services, in order to achieve effective performance, scalability, and availability. By reading this book, you will gain a thorough understanding of how to apply solid Cisco network solution models and recommended design practices to provide viable, stable enterprise internetworking solutions. The book presents concepts and examples that are necessary to design converged enterprise networks. Advanced network infrastructure technologies, such as virtual private networks (VPNs) and other security solutions are also covered. Designing Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Third Edition teaches you the latest development in network design and technologies, including network infrastructure, intelligent network services, and converged network solutions. Specific topics include campus, routing, addressing, WAN services, data center, e-commerce, SAN, security, VPN, and IP multicast design, as well as network management. Chapter-ending review questions illustrate and help solidify the concepts presented in the book. Whether you are preparing for CCDP certification or simply want to gain a better understanding of designing scalable and reliable network architectures, you will benefit from the foundation information presented in this book. Designing Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Third Edition, is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. John Tiso, CCIE No. 5162, CCDP is a Product Manager for Cisco Systems. He holds a B.S. Degree in Computer Science and Mathematics from Adelphi University and a Graduate Citation in Strategic Management from Harvard University. John is a published author, has served as a technical editor for Cisco Press, and has participated as a SME for the CCIE program. Prior to Cisco, he was a senior consultant and architect in the Cisco partner channel. Learn about the Cisco Enterprise Architecture Create highly available campus and data center network designs Develop optimum Layer 3 designs Examine advanced WAN services design considerations Evaluate SAN design considerations Deploy effective e-commerce module designs Create effective security services and IPsec and SSL VPN designs Design IP multicast networks Understand the network management capabilities within Cisco IOS Software This book is in the Foundation Learning Guide Series. These guides are developed together with Cisco® as the only authorized, self-paced learning tools that help networking professionals build their understanding of networking concepts and prepare for Cisco certification exams. Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  16. Book Details Paperback: 240 pages Publisher: Pragmatic Bookshelf (July 2012) Language: English ISBN-10:1934356956 ISBN-13: 978-1934356951 File Size: 4.4 MB Deploying Rails takes you on a expertly guided tour of the current best practices in Rails deployment and management. You’ll find in-depth explanations on effectively running a Rails app by leveraging popular open source tools such as Puppet, Capistrano, and Vagrant. Then you’ll go beyond deployment and learn how to use Ganglia and Nagios to monitor your application’s health and gather metrics so you can head off problems before they happen. You’ll start out by building your own virtual environment by writing scripts to provision a production server with Vagrant and Puppet. Then you’ll leverage the popular Rails deployment tool Capistrano to deploy an application into this infrastructure. Once the app is live, you’ll monitor your application’s health with Nagios, and configure Ganglia to collect system metrics. Finally, you’ll see how to keep your data backed up, recover data when things go wrong, tame your log files, and use Puppet to automate everything along the way. Whether you’re a Rails developer who wants a better understanding of the needs of a production Rails system, if you’re a system administrator who wants to manage a Rails application, or if you’re bridging the gap between development and operations, this book will be your roadmap to successful production deployment and maintenance, whether your application has ten users or ten million users. What You Need: The exercises and examples are most suited to a computer running some Unix variant, such as Mac OS X or Linux. But a Windows machine running Linux in a VirtualBox virtual machine is also sufficient. We’ll show you how to set up a local virtual machine for your deployments; you won’t need a dedicated server to hone your deployment skills. We expect you to have a basic familiarity with the Ruby programming language, the Ruby on Rails framework, and the Unix command line. Table of Contents Chapter 1. Introduction Chapter 2. Getting Started with Vagrant Chapter 3. Rails on Puppet Chapter 4. Basic Capistrano Chapter 5. Advanced Capistrano Chapter 6. Monitoring with Nagios Chapter 7. Collecting Metrics with Ganglia Chapter 8. Maintaining the Application Chapter 9. Running Rubies with RVM Chapter 10. Special Topics Appendix 1. A Capistrano Case Study Appendix 2. Running on Unicorn and nginx Download E-Book Uploaded Link [Hidden Content]
  17. Book Details Hardcover: 280 pages Publisher: Wiley (September 2011) Language: English ISBN-10:1118054164 ISBN-13: 978-1118054161 File Size: 6.7 MB Explores and analyzes past and current technologies and trends in multimedia communication Digital natives-those persons born in the digital age-have an ever-widening range of wireless-enabled devices at their disposal. They are the drivers of multimedia communications, continually seeking out the technologies and distribution channels that best match their needs. This book outlines the changes in telecommunications that are occurring to meet these needs. It addresses the continually increasing requirement to provide connections that make the electronic encounter as natural and convenient as possible, exploring the vast assortment of devices that exist as part of everyday living for digital natives. Featuring precise diagrams and tables to illustrate the evolving environment, the book begins by describing the competitive interactions of telephone, cable TV, and cellular mobile companies in providing services and content. It outlines the creation of digital multimedia streams and how they are transported, explains what multimedia connections are available, and summarizes the activities of competitors while providing an overview of their markets and customer statistics. This book uniquely covers wireline, optical fiber, cable, and wireless access methods, explaining the coding required to create digital streams. It combines ethernet with provider bridging and multi-protocol label switching and highlights the necessity to serve legacy streams. In addition, the book addresses controversial issue: will incumbent communications providers ever overtake Internet as the chief source of digital feeds and popular contents? Featuring extensive references and a glossary of multimedia terms, Connections for the Digital Age is written for digital natives and other persons with an interest in multimedia communications; industrial, commercial, and financial managers; engineers; software professionals and Internet specialists; and students at technical schools and universities. Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  18. Book Details Hardcover: 350 pages Publisher: Wiley (September 2011) Language: English ISBN-10:0470974559 ISBN-13: 978-0470974551 File Size: 4.1 MB “Connected Services is a must-read for telco strategists who need to get up to speed on how the world of software and the web 2. 0 works.” –Andreas Constantinou, Research Director, VisionMobile “This book is a must read for those charged with leading innovation in a world of connected services where telco and Internet collide.” – Jason Goecke, VP of Innovation, Voxeo Labs This book explains the common underlying technological themes that underpin the new era of connected services in a post Web 2.0 epoch In this book, the author explores the underlying technological themes that underpin the new era of connected services. Furthermore, it explains how the technologies work and what makes each of them significant, for example, the potential for finding new meaning in data in the world of BIG DATA platforms, often referred to as “No-SQL” databases. In addition, it tackles the newest areas of technology such as HTML5, Android, iOS, open source, mash-ups, cloud computing, real-time Web, augmented reality, and more. Finally, the book discusses the opportunities and challenges of a connected world where both machines and people communicate in a pervasive fashion, looking beyond the hype and promise of emerging categories of communication such as the “Internet of Things” and “Real-time Web” to show managers how to understand the potential of the enabling technologies and apply them for meaningful applications in their own world. Key Features: Explores the common and emergent underlying technological themes that underpin the new era of connected services Addresses the newest areas of Internet technology such as web and mobile 2.0, open source, mash-ups, cloud computing, web 3.0, augmented reality, and more Shows the reader how to understand the potential of the enabling technologies and apply them for meaningful applications in their own world Discusses new developments in the technological landscape such as Smartphone proliferation, maturation of Web 2.0, increased convergence between mobile networks and the Internet, and so forth Examines modern software paradigms like Software-as-as-Service (SaaS), Platform-as-a-Service (PaaS) and Network-as-a-Service (NaaS) Explores in detail how Web start-ups really work and what telcos can do to adopt lean and agile methods This book will be an invaluable guide for technical designers and managers, project managers, product managers, CEOs etc. at mobile operators (O2, Vodafone, Orange, T-Mobile, BT), fixed operators, converged operators and their contributory supplier networks (e.g. infrastructure providers). Internet providers (Google, Yahoo, Amazon, eBay, Apple, Facebook), analysts, product managers, developers, architects, consultants, technology investors, analysts, marketing directors, business development directors will also find this book of interest. Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  19. Book Details Paperback: 182 pages Publisher: O’Reilly Media (September 2012) Language: English ISBN-10:1449319777 ISBN-13: 978-1449319779 File Size: 7.9 MB If your team is investigating ways to design applications for the cloud, this concise book introduces 11 architecture patterns that can help you take advantage of several cloud-platform services. You’ll learn how each of these platform-agnostic patterns work, when they might be useful in the cloud, and what impact they’ll have on your application architecture. You’ll also see an example of each pattern applied to an application built with Windows Azure. The patterns are organized into four major topics, such as scalability and eventual consistency, and primer chapters provide background on each topic. With the information in this book, you’ll be able to make informed decisions for designing effective cloud-native applications, where cloud-native applications maximize the value of cloud services while also paying attention to user experience and operational efficiency. Learn about architectural patterns for: Scalability. Discover the advantages of horizontal scaling. Patterns covered include Horizontally Scaling Compute, Queue-Centric Workflow, and Auto-Scaling. Big data. Learn how to handle large amounts of data across a distributed system. Eventual consistency is explained, along with the MapReduce and Database Sharding patterns. Multitenancy and commodity hardware. Understand how they influence your applications. Patterns covered include Busy Signal and Node Failure. Network latency. Learn how to overcome delays due to network latency when building applications for a geographically distributed user base. Patterns covered include Colocation, Valet Key, CDN, and Multi-Site Deployment. Table of Contents Chapter 1. Scalability Primer Chapter 2. Horizontally Scaling Compute Pattern Chapter 3. Queue-Centric Workflow Pattern Chapter 4. Auto-Scaling Pattern Chapter 5. Eventual Consistency Primer Chapter 6. MapReduce Pattern Chapter 7. Database Sharding Pattern Chapter 8. Multitenancy and Commodity Hardware Primer Chapter 9. Busy Signal Pattern Chapter 10. Node Failure Pattern Chapter 11. Network Latency Primer Chapter 12. Colocate Pattern Chapter 13. Valet Key Pattern Chapter 14. CDN Pattern Chapter 15. Multisite Deployment Pattern Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  20. Book Details Paperback: 414 pages Publisher: Packt Publishing (May 2012) Language: English ISBN-10:1849517746 ISBN-13: 978-1849517744 File Size: 34.3 MB The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and not all of them with good intentions. The need for penetration testers has grown now that the security industryhas had time to mature. Simply running a vulnerability scanner is a thing of the past and is no longer an effective method of determining a business’s true security posture. Learn effective penetration testing skills so that you can effectively meet and manage the rapidly changing security needs of your company. Advanced Penetration Testing for Highly-Secured Environments will teach you how to efficiently and effectively ensure the security posture of environments that have been secured using IDS/IPS, firewalls, network segmentation, hardened system configurations and more. The stages of a penetration test are clearly defined and addressed using step-by-step instructions that you can follow on your own virtual lab. The book follows the standard penetration testing stages from start to finish with step-by-step examples. The book thoroughly covers penetration test expectations, proper scoping and planning, as well as enumeration and footprinting. You’ll learn how to clean up and compile proof of concept, exploit code from the web, advanced web application testing techniques, client side attacks, post exploitation strategies, detection avoidance methods, generation of well defined reports and metrics, and setting up a penetration testing virtual lab that mimics a secured environment. The book closes by issuing a challenge to your skills and ability to perform a full penetration test against a fictional corporation; followed by a detailed walk through of the solution. Advanced Penetration Testing for Highly-Secured Environments is packed with detailed examples that reinforce enumeration, exploitation, post-exploitation, reporting skills and more. What you will learn from this book Detailed step-by-step guidance on managing testing results and writing clearly organized and effective penetration testing reports Properly scope your penetration test to avoid catastrophe Understand in detail how the testing process works from start to finish, not just how to use specific tools Use advanced techniques to bypass security controls and remain hidden while testing Create a segmented virtual network with several targets, IDS and firewall Generate testing reports and statistics Advanced web application testing and exploitation Perform an efficient, organized, and effective penetration test from start to finish Approach An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with mature security infrastructure. Understand how to perform each stage of the penetration test by gaining hands-on experience in performing attacks that mimic those seen in the wild. In the end, take the challenge and perform a virtual penetration test against a fictional corporation. Who this book is for If you are looking for guidance and detailed instructions on how to perform a penetration test from start to finish, are looking to build out your own penetration testing lab, or are looking to improve on your existing penetration testing skills, this book is for you. Although the books attempts to accommodate those that are still new to the penetration testing field, experienced testers should be able to gain knowledge and hands-on experience as well. The book does assume that you have some experience in web application testing and as such the chapter regarding this subject may require you to understand the basic concepts of web security. The reader should also be familiar with basic IT concepts, and commonly used protocols such as TCP/IP. Download E-Book Uploaded Link [Hidden Content]
  21. Book Details Hardcover: 260 pages Publisher: Wiley (April 2012) Language: English ISBN-10:0470499036 ISBN-13: 978-0470499030 File Size: 3.1 MB Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discuss internetworking technologies, architectures and protocols. The book also shows application of the concepts in next generation networks and discusses protection and restoration, as well as various tunnelling protocols and applications. The book ends with a thorough discussion of emerging topics. From the Back Cover Explains how advanced Internet protocols will support the next-generation networks Most messages or transactions sent over the web are dependent on an infrastructure based on advanced Internet protocols. These protocols ensure that public and private networks operate at maximum performance, security, and flexibility. Advanced Internet Protocols, Services, and Applications fully examines all the core concepts underlying advanced Internet protocols, explaining both their current applications and their applicability to the design and deployment of the next-generation networks. The book begins with an introduction to Internet working technologies, architectures, and protocols and then progressively builds to discussions of new and emerging advanced Internet protocols and their applications. Key topics include: Transport layer protocols, including transmission control, user datagram, stream control transmission, and real-time transport protocols Internet architecture and routing protocols Layer-2 encapsulation protocols that allow Layer-2 connectivity through non-adjacent networks Point-to-point virtual connectivity and virtual broadcast access connectivity Key differences between IPv4 and IPv6 Common threats to networks and countermeasures to protect them With its comprehensive technical overview, survey of advanced Internet protocols, and examples of real-world networks, services, and applications, this is an ideal book for both students and professionals in software, hardware, systems engineering, telecommunications, and networking. Download E-Book Uploaded Link [Hidden Content]
  22. Book Details Paperback: 240 pages Publisher: Cisco Press (December 2007) Language: English ISBN-10:1587132176 ISBN-13: 978-1587132179 File Size: 22.1 MB A day-by-day ICND1 exam review guide for the CCNA Discovery student After you complete the first two courses of the CCNA® Discovery version 4 curriculum in a Cisco® Networking Academy®, you are ready to officially demonstrate that knowledge by getting CCENTâ„¢ (Cisco Certified Entry Networking Technician) certified. The CCENT is a new entry-level certification that validates to a potential employer the practical skills you learned in these courses, which are required for entry-level network support positions. 31 Days Before Your CCENT Certification offers you a personable and practical way to understand the certification process and commit to taking the 640-822 ICND1 certification exam while the course material is fresh in your mind. Sign up for the ICND1 exam and use the book’s day-by-day guide and checklist to organize, prepare, and review. Each day in this guide breaks down an exam topic into a manageable bit of information to review using short summaries from relevant parts of the CCNA Discovery courses. The features of the book empower you to fit exam preparation into a busy schedule: Visual calendar summarizing each day’s study topic Checklist providing advice for preparation activities leading up to the exam Description of the 640-822 ICND1 exam and how to sign up for it, including how to use a course voucher Strategies to be mentally, organizationally, and physically prepared for exam day Conversational tone, which makes your study time more enjoyable CCENT certification is open to everyone, but this book is specifically designed to prepare the Cisco Networking Academy CCNA Discovery student for the exam. Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  23. Book Details Paperback: 400 pages Publisher: Packt Publishing (January 2012) Language: English ISBN-10:1849683263 ISBN-13: 978-1849683265 File Size: 23.6 MB Oracle Essbase is a Multi-Dimensional Online Analytical Processing (OLAP) server, providing a rich environment for effectively developing custom analytic and enterprise performance management applications. Oracle Essbase enables business users to quickly model complex business scenarios. This practical cookbook shows you the advanced development techniques when building Essbase Applications and how to take these applications further. Packed with over 90 task-based and immediately reusable recipes, this book starts by showing you how to use a relational data model to build and load an Essbase cube and how to create a data source, prepare the mini schema, and work with the data elements in Essbase Studio. The book then dives into topics such as building the BSO cube, building the ASO cube, using EAS for development, creating Calculation Scripts and using MaxL to automate processes. What you will learn from this book Design components of a Data Mart to use as data source, maintain meta-data, and support drill-through reporting. Setup a Data Source and Minischema in Essbase Studio so that metadata elements can be manipulated and hierarchies built. Create an Essbase Model, Cube Schema, drill-through report, and deploy both a Block Storage (BSO) and Aggregate Storage (ASO) application. Use Essbase Administration Services (EAS) to create applications, create and use substitution variables, and add complex outline formulas in both the Block Storage (BSO) and Aggregate Storage (ASO) models. Create dimension build rules, flat file load rules, and SQL load rules. Create complex calculations using the Calculation Script Editor, optimize a cube for calculations, and run allocation calculations off an Aggregate Storage database. Automate processes via MaxL scripts and integrate data between Essbase databases and to relational databases Design effective security and build dynamic reports Approach This cookbook is full of immediately useable recipes showing you the advanced development techniques when building Essbase Applications and how to take these applications further. This cookbook offers practical, task-based, and immediately usable recipes covering a wide range of advanced development techniques to build Essbase Applications and take them further. In addition to its cookbook style, which ensures the solutions are presented in a clear step-by-step manner, its explanations go into great detail, which makes it good learning material for everyone who has experience in Essbase and wants to improve. The book is designed in such a way that you can either read it chapter by chapter or refer to recipes that you want in no particular order. Who this book is for If you are an experienced Essbase developer, Essbase Database Designer or Database Administrator, then this book is for you. This book assumes that you have good knowledge of Oracle Essbase. Download E-Book Uploaded Link [Hidden Content]
  24. Book Details Paperback: 394 pages Publisher: Packt Publishing (December 2012) Language: English ISBN-10:1849684782 ISBN-13: 978-1849684781 File Size: 116.3 MB Data centers around the world are experiencing an unprecedented era of growth due to expanding data volumes. There is also a corresponding increase in the number of databases and applications. In such rapid-growth centers, it is inevitable that fighting fires daily becomes a common occurrence. There is often no controlled method of performance management, neither is rapidly changing configuration information collected. With the lack of automation and control, Data Centers do not often realize their intended cost-effectiveness and regress into a chaotic and uncontrolled day-to-day type of existence. This was the case until Oracle Enterprise Manager started being used as an Enterprise-wide central management solution, changing the whole game in the process. In this brand new book by Porus Homi Havewala, one of the leading experts in the Oracle space, you will be introduced to the all-encompassing world of Oracle Enterprise Manager Cloud Control 12c, Oracle’s premier product for managing and monitoring the Enterprise space. Drawing from the author’s many years of experience in the real world, the book brings together the major capabilities of the latest Enterprise Manager software and demonstrates how to ease the growing pains of Data Centers. The book takes you on a descriptive journey of what issues are normally experienced in the Data Center, and how Oracle Enterprise Manager Cloud Control 12c manages to address and resolve many of the issues. The book introduces the reader to the typical chaos in Data Centers and discusses the way these common issues are normally resolved, by manual labor or manual scripting using extensive human resources. Then it will show you how Cloud Control 12c aids in Database Performance Management, Configuration Management, Security Compliance, Automated Provisioning, Automated Patching and Database Change Management. What will you learn from this book Get started straight away by installing Enterprise Manager 12c or upgrading from earlier versions Learn how to discover components automatically, collect configuration information and allow configuration comparisons Enforce security compliance with frameworks, standards and rules including real-time configuration change detection Master Oracle Enterprise Manager techniques for automated provisioning and patching, using the new Designer/Operator role separation Understand the powerful database change management capabilities of Enterprise Manager Take advantage of Oracle Enterprise Manager to discover, monitor and manage the powerful Exadata Database Machine Use Oracle Enterprise Manager 12c Cloud Control effectively to resolve typical Data Center chaos Learn about the new Performance Management capabilities of Enterprise Manager 12c. Approach This book is a practical step-by-step tutorial with screenshots for carrying out tasks showing you how to manage and administer your data center with Oracle Enterprise Manager. It is packed with best practices and tips that will help you benefit from the author’s extensive experience of working with Oracle Enterprise Manager since at least a decade, and combined with his 25+ years IT industry experience. Who this book is for If you are a Data Center, IT or Database Team manager who wants to take advantage of the automation and compliance benefits of Enterprise Manager 12c Cloud Control, then Oracle Enterprise Manager Cloud Control 12c: Managing Data Center Chaos is for you. CTOs will also find this book useful. Experience of Enterprise Manager is not essential as the author’s experience tells you all you need to know about getting started with Enterprise Manager. More experienced readers will learn about the brand new capabilities of the 12c release. Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  25. Book Details Paperback: 1360 pages Publisher: Sams Publishing (July 2012) Language: English ISBN-10:0672334372 ISBN-13: 978-0672334375 File Size: 172.8 MB This is the comprehensive reference and technical guide to Microsoft System Center Configuration Manager 2012. A team of expert authors offers step-by-step coverage of related topics in every feature area, organized to help IT professionals rapidly optimize Configuration Manager 2012 for their requirements, and then deploy and use it successfully. The authors begin by introducing Configuration Manager 2012 and its goals, and explaining how it fits into the broader System Center product suite. Next, they fully address planning, design, and implementation. Finally, they systematically cover each of Configuration Manager 2012′s most important feature sets, addressing issues ranging from configuration management to software distribution. Readers will learn how to use Configuration Manager 2012′s user-centric capabilities to provide anytime/anywhere services and software, and to strengthen both control and compliance. The first book on Configuration Manager 2012, System Center Configuration Manager 2012 Unleashed joins Sams’ market-leading series of books on Microsoft’s System Center product suite: books that have achieved go-to status amongst IT implementers and administrators worldwide. From the Back Cover The comprehensive reference and technical guide to Microsoft System Center Configuration Manager 2012. Foreword by Wally Mead, Microsoft Corporation Leading System Center experts offer step-by-step coverage of every feature area, organized to help you rapidly optimize ConfigMgr 2012 for your specific requirements, deploy and use it successfully, and gain even more value by integrating it with the rest of System Center. Extensively revised to reflect major improvements in Configuration Manager 2012, this book fully addresses planning, design, and implementation, offering best practice processes for everything from software distribution to client security. Drawing on their unsurpassed “in-the-trenches” experience, the authors show how to use Configuration Manager 2012’s user-centric capabilities to provide anytime/anywhere services and software, and to strengthen both control and compliance. Understand Configuration Manager 2012’s key concepts and components Plan your architecture, and design supporting network infrastructure Install Configuration Manager 2012 and integrate it with existing systems Leverage Configuration Manager 2012’s major improvements in security and scalability Manage operations and clients through the new Outlook-style console Efficiently create, manage, distribute, deploy, and update applications Centrally manage all your mobile devices Simplify client security management with new Endpoint Protection capabilities Query and report on configurations throughout your enterprise Implement reliable backup and recovery Establish security accounts, groups, and requirements, and safely delegate security rights Table of Contents PART I: Configuration Manager Overview and Concepts Chapter 1. Configuration Management Basics Chapter 2. Configuration Manager Overview Chapter 3. Looking Inside Configuration Manager PART II: Planning, Design, and Installation Chapter 4. Architecture Design Planning Chapter 5. Network Design Chapter 6. Installing System Center 2012 Configuration Manager Chapter 7. Migrating to System Center 2012 Configuration Manager PART III: Configuration Manager Operations Chapter 8. The Configuration Manager Console Chapter 9. Configuration Manager Client Management PART IV: Software and Configuration Management Chapter 10. Managing Compliance Chapter 11. Packages and Programs Chapter 12. Creating and Managing Applications Chapter 13. Distributing and Deploying Applications Chapter 14. Software Update Management Chapter 15. Mobile Device Management Chapter 16. Endpoint Protection Chapter 17. Configuration Manager Queries Chapter 18. Reporting Chapter 19. Operating System Deployment PART V: Administering System Center Configuration Manager Chapter 20. Security and Delegation in Configuration Manager Chapter 21. Backup, Recovery, and Maintenance PART VI: Appendixes Appendix A. Configuration Manager Log Files Appendix B. Extending Hardware Inventory Appendix C. Reference URLs Appendix D. Available Online Download E-Book Uploaded Link [Hidden Content]
×
×
  • Create New...