Microsoft® Exchange Server 2010 UNLEASHED
فهرست مطالب کتاب Microsoft® Exchange Server 2010 UNLEASHED:
Introduction
Part I: Microsoft Exchange Server 2010 Overview
1 Exchange Server 2010 Technology Primer
2 Planning, Prototyping, Migrating, and Deploying Exchange Server 2010
Part II: Planning and Designing an Exchange Server 2010 Environment
3 Understanding Core Exchange Server 2010 Design Plans
4 Architecting an Enterprise-Level Exchange Server Environment
5 Integrating Exchange Server 2010 in a Non-Windows Environment
6 Understanding Network Services and Active Directory Domain
Controller Placement for Exchange Server 2010
Part III: Implementing Exchange Server 2010 Services
7 Installing Exchange Server 2010
8 Implementing Edge Services for an Exchange Server
2010 Environment
9 Using Windows PowerShell in an Exchange Server 2010 Environment
Part IV: Securing an Exchange Server 2010 Environment
10 Client-Level Secured Messaging
11 Server and Transport-Level Security
12 Integrating Certificate-Based Public Key Infrastructure (PKI) in
Exchange Server 2010
13 Securing Exchange Server 2010 with ISA Server
14 Understanding Exchange Server Policy Enforcement Security
Part V: Migrations and Coexistence with Exchange Server 2010
15 Migrating from Active Directory 2000/2003 to Active Directory 2008
16 Transitioning from Exchange Server 2003/2007 to Exchange
Server 2010
17 Implementing Client Access and Hub Transport Servers
Part VI: Exchange Server 2010 Administration and Management
18 Administering an Exchange Server 2010 Environment
19 Exchange Server 2010 Management and Maintenance Practices
20 Using Operations Manager to Monitor Exchange Server 2010
21 Remote Administration of Exchange Server 2010 Servers
22 Documenting an Exchange Server 2010 Environment
Part VII: Unified Communications in an Exchange Server 2010 Environment
23 Designing and Implementing Mobility in Exchange Server 2010
24 Designing and Configuring Unified Messaging in Exchange
Server 2010
25 Collaborating Within an Exchange Server Environment Using
Microsoft Office SharePoint Server 2007
26 Integrating Office Communications Server 2007 in an Exchange
Server 2010 Environment
Part VIII: Client Access to Exchange Server 2010
27 Getting the Most Out of the Microsoft Outlook Client
28 Leveraging the Capabilities of the Outlook Web App (OWA) Client
29 Using Non-Windows Systems to Access Exchange Server 2010
30 Deploying the Client for Microsoft Exchange Server 2010
Part IX: Data Protection and Disaster Recovery of Exchange Server
31 Database Availability Group Replication in Exchange Server
32 Backing Up the Exchange Server 2010 Environment
33 Recovering from a Disaster in an Exchange Server
2010 Environment
Part X: Optimizing Exchange Server 2010 Environments
34 Optimizing an Exchange Server 2010 Environment
35 Designing and Optimizing Storage in an Exchange Server
2010 Environment
Network Design Cookbook – 2nd Edition
فهرست مطالب کتاب Network Design Cookbook – 2nd Edition:
Start Here
Introduction
Design Process
Design PODs
Example
Frameworks
Solutions
Services
Attributes
Networking with MikroTik MTCNA Study Guide
فهرست مطالب کتاب Networking with MikroTik MTCNA Study Guide:
1 MikroTik
2 RouterOS Software
3 Defaults
4 Accessing the Router
5 Configuring RouterOS
6 Managing Users
7 Interfaces
8 Addresses
9 Routing
10 VPNs and Tunnels
11 Queues
12 Firewalls
13 NAT
14 Wireless Networks
15 Wireless Security
16 Troubleshooting Tools
17 RouterOS Monitoring
18 The Dude
ntroducing Windows Server 2016 Technical Preview
فهرست مطالب کتاب Windows Server 2016 Technical Preview:
Introduction
Chapter 1: The software-defined datacenter
Chapter 2: Compute
Chapter 3: Storage
Chapter 4: Networking
Chapter 5: Security
Chapter 6: App Plat
Chapter 7: Systems management
Penetration Testing Fundamentals A Hands-On Guide to Reliable Security Audits
فهرست مطالب:
Introduction
1 Introduction to Penetration Testing
2 Standards
3 Cryptography
4 Reconnaissance
5 Malware
6 Hacking Windows
7 Web Hacking
8 Vulnerability Scanning
9 Introduction to Linux
10 Linux Hacking
11 Introduction to Kali Linux
12 General Hacking Techniques
13 Introduction to Metasploit
14 More with Metasploit
15 Introduction to Scripting with Ruby
16 Write Your Own Metasploit Exploits with Ruby
17 General Hacking Knowledge
18 Additional Pen Testing Topics
19 A Sample Pen Test Project
Appendix A: Answers to Chapter Multiple Choice Questions
Index Index
Pro SQL Server 2019 Administration
فهرست مطالب کتاب Pro SQL Server 2019 Administration:
Chapter 2: GUI Installation
Chapter 3: Server Core Installation
Chapter 4: Installation on Heterogeneous Operating Systems
Chapter 5: Configuring the Instance
Chapter 6: Database Configuration
Chapter 7: Table Optimizations
Chapter 8: Indexes and Statistics
Chapter 9: Database Consistency
Chapter 10: SQL Server Security Mode
Chapter 11: Encryption
Chapter 12: Backups and Restores
Chapter 13: High Availability and Disaster Recovery Concepts
Chapter 14: Implementing Always On Availability Groups
Chapter 15: Implementing Log Shipping
Chapter 16: Scaling Workloads
Chapter 17: SQL Server Metadata
Chapter 18: Locking and Blocking
Chapter 19: Extended Events
Chapter 20: Query Store
Chapter 21: Distributed Replay
Chapter 22: Automating Maintenance Routines
Chapter 23: Policy-Based Management
Chapter 24: Resource Governor
The Linux Programming Interface A Linux and UNIX System Programming Handbook
فهرست مطالب کتاب The Linux Programming Interface:
Preface
Chapter 1: History and Standards
Chapter 2: Fundamental Concepts .
Chapter 3: System Programming Concepts.
Chapter 4: File I/O: The Universal I/O Model
Chapter 5: File I/O: Further Details
Chapter 6: Processes
Chapter 7: Memory Allocation.
Chapter 8: Users and Groups
Chapter 9: Process Credentials
Chapter 10: Time.
Chapter 11: System Limits and Options
Chapter 12: System and Process Information
Chapter 13: File I/O Buffering.
Chapter 14: File Systems
Chapter 15: File Attributes
Chapter 16: Extended Attributes
Chapter 17: Access Control Lists
Chapter 18: Directories and Links
Chapter 19: Monitoring File Events
viii Brief Contents
Chapter 20: Signals: Fundamental Concepts
Chapter 21: Signals: Signal Handlers
Chapter 22: Signals: Advanced Features
Chapter 23: Timers and Sleeping
Chapter 24: Process Creation
Chapter 25: Process Termination
Chapter 26: Monitoring Child Processes
Chapter 27: Program Execution.
Chapter 28: Process Creation and Program Execution in More Detail.
Chapter 29: Threads: Introduction
Chapter 30: Threads: Thread Synchronization
Chapter 31: Threads: Thread Safety and Per-Thread Storage
Chapter 32: Threads: Thread Cancellation.
Chapter 33: Threads: Further Details
Chapter 34: Process Groups, Sessions, and Job Control
Chapter 35: Process Priorities and Scheduling
Chapter 36: Process Resources
Chapter 37: Daemons
Chapter 38: Writing Secure Privileged Programs
Chapter 39: Capabilities
Chapter 40: Login Accounting
Chapter 41: Fundamentals of Shared Libraries
Chapter 42: Advanced Features of Shared Libraries
Chapter 43: Interprocess Communication Overview
Chapter 44: Pipes and FIFOs
Chapter 45: Introduction to System V IPC
Chapter 46: System V Message Queues
Brief Contents ix
Chapter 47: System V Semaphores
Chapter 48: System V Shared Memory
Chapter 49: Memory Mappings
Chapter 50: Virtual Memory Operations
Chapter 51: Introduction to POSIX IPC.
Chapter 52: POSIX Message Queues
Chapter 53: POSIX Semaphores
Chapter 54: POSIX Shared Memory
Chapter 55: File Locking.
Chapter 56: Sockets: Introduction
Chapter 57: Sockets: UNIX Domain
Chapter 58: Sockets: Fundamentals of TCP/IP Networks
Chapter 59: Sockets: Internet Domains
Chapter 60: Sockets: Server Design
Chapter 61: Sockets: Advanced Topics
Chapter 62: Terminals
Chapter 63: Alternative I/O Models
Chapter 64: Pseudoterminals
Appendix A: Tracing System Calls
Appendix B: Parsing Command-Line Options
Appendix C: Casting the NULL Pointer
Appendix D: Kernel Configuration
Appendix E: Further Sources of Information
Appendix F: Solutions to Selected Exercises
Bibliography
Index
The LISP Network Evolution to the Next-Generation of Data Networks
فهرست مطالب کتاب The LISP Network:
Chapter 1: LISP and the Future of Networking
Chapter 2: LISP Architecture
Chapter 3: Data Center Trends
Chapter 4: The WideArea Network: Bringing Traffic from Access to the Data Center
Chapter 5: MegaScale Access Networks: LISP, User Access, and the Internet of Things
Chapter 6: Security
Chapter 7: LISP and the NextGeneration Mobile Network
Training Guide: Installing and Configuring Windows Server 2012 R2
فهرست مطالب کتاب Training Guide: Installing and Configuring Windows Server 2012 R2:
Introduction
CHAPTER 1 Preparing for Windows Server 2012 R2
CHAPTER 2 Deploying servers
CHAPTER 3 Server remote management
CHAPTER 4 Deploying domain controllers
CHAPTER 5 Active Directory administration
CHAPTER 6 Network administration
CHAPTER 7 Hyper-V virtualization
CHAPTER 8 File services and storage
CHAPTER 9 Print and document services
CHAPTER 10 Implementing Group Policy
CHAPTER 11 Configuring Windows Firewall and IPsec
Index
Ubuntu Linux Unleashed 2021 Edition
فهرست مطالب کتاب Ubuntu Linux Unleashed 2021 Edition:
Part I Getting Started
Part II Desktop Ubuntu
Part III System Administration
Part IV Ubuntu as a Server
Part V Programming Linux
Part VI Bonus Online Chapters
Windows Networking Troubleshooting
فهرست مطالب:
About the Authors
About the Technical Reviewer
Windows Troubleshooting Series
Chapter 1: Understanding Networks 1 Chapter 2: Managing Network Connections
Chapter 3: TCP/IP Networking
Chapter 4: What Causes Networking Problems
Chapter 5: Troubleshooting Networking 83 Chapter 6: Networking in a Virtual World
Chapter 7: Troubleshooting Mobile Worker and BYOD Networking Problems
Index
Windows Server 2016 The Administrator’s Reference
فهرست مطالب کتاب Windows Server 2016 The Administrator’s Reference:
How to Use This Guide
Print Readers
Digital Book Readers
Support Information
Conventions & Features
Share & Stay in Touch
Chapter 1. Welcome to Windows Server 2016
Chapter 2. Working with Windows Servers
Chapter 3. Configuring Server Settings
Chapter 4. Understanding Active Directory Connecting Network Resources
Chapter 5. Managing Active Directory
Chapter 6. Maintaining Active Directory
Chapter 7. Accounts: The Essentials
Chapter 8. Managing Account Policies
Chapter 9. Creating Accounts
Chapter 10. Working with Managed Accounts
Chapter 11. Managing Computers, Users and Groups
Chapter 12. Maintaining Your Servers
Chapter 13. Optimizing Server Performance
Chapter 14. Using Group Policy
Chapter 15. Maintaining and Troubleshooting Group Policy
Chapter 16. Optimizing Server Security
Chapter 17. Deploying Windows Server 2016
Chapter 18. Implementing TCP/IP Networking
Chapter 19. Data Storage: The Essentials
Chapter 20. Partitioning and Optimizing Drives
Chapter 21. Using TPM and BitLocker Drive Encryption
Chapter 22. Using Storage Spaces
Chapter 23. Using RAID
Chapter 24. Maintaining Partitions and Drives
Chapter 25. Implementing File Sharing
Chapter 26. Using Shadow Copies and Work Folders
Chapter 27. Managing Permissions and Auditing
Chapter 28. Configuring Disk Quotas
Chapter 29. Using Group Policy for Administration
Chapter 30. Implementing Print Services
Chapter 31. Configuring and Maintaining Print Services
Chapter 32. Implementing DHCP
Chapter 33. Managing and Maintaining DHCP
Chapter 34. Implementing DNS
Chapter 35. Managing and Maintaining DNS
Index