Microsoft® Exchange Server 2010 UNLEASHED

فهرست مطالب کتاب Microsoft® Exchange Server 2010 UNLEASHED:

Introduction

Part I: Microsoft Exchange Server 2010 Overview

1 Exchange Server 2010 Technology Primer

2 Planning, Prototyping, Migrating, and Deploying Exchange Server 2010

Part II: Planning and Designing an Exchange Server 2010 Environment

3 Understanding Core Exchange Server 2010 Design Plans

4 Architecting an Enterprise-Level Exchange Server Environment

5 Integrating Exchange Server 2010 in a Non-Windows Environment

6 Understanding Network Services and Active Directory Domain

Controller Placement for Exchange Server 2010

Part III: Implementing Exchange Server 2010 Services

7 Installing Exchange Server 2010

8 Implementing Edge Services for an Exchange Server

2010 Environment

9 Using Windows PowerShell in an Exchange Server 2010 Environment

Part IV: Securing an Exchange Server 2010 Environment

10 Client-Level Secured Messaging

11 Server and Transport-Level Security

12 Integrating Certificate-Based Public Key Infrastructure (PKI) in

Exchange Server 2010

13 Securing Exchange Server 2010 with ISA Server

14 Understanding Exchange Server Policy Enforcement Security

Part V: Migrations and Coexistence with Exchange Server 2010

15 Migrating from Active Directory 2000/2003 to Active Directory 2008

16 Transitioning from Exchange Server 2003/2007 to Exchange

Server 2010

17 Implementing Client Access and Hub Transport Servers

Part VI: Exchange Server 2010 Administration and Management

18 Administering an Exchange Server 2010 Environment

19 Exchange Server 2010 Management and Maintenance Practices

20 Using Operations Manager to Monitor Exchange Server 2010

21 Remote Administration of Exchange Server 2010 Servers

22 Documenting an Exchange Server 2010 Environment

Part VII: Unified Communications in an Exchange Server 2010 Environment

23 Designing and Implementing Mobility in Exchange Server 2010

24 Designing and Configuring Unified Messaging in Exchange

Server 2010

25 Collaborating Within an Exchange Server Environment Using

Microsoft Office SharePoint Server 2007

26 Integrating Office Communications Server 2007 in an Exchange

Server 2010 Environment

Part VIII: Client Access to Exchange Server 2010

27 Getting the Most Out of the Microsoft Outlook Client

28 Leveraging the Capabilities of the Outlook Web App (OWA) Client

29 Using Non-Windows Systems to Access Exchange Server 2010

30 Deploying the Client for Microsoft Exchange Server 2010

Part IX: Data Protection and Disaster Recovery of Exchange Server

31 Database Availability Group Replication in Exchange Server

32 Backing Up the Exchange Server 2010 Environment

33 Recovering from a Disaster in an Exchange Server

2010 Environment

Part X: Optimizing Exchange Server 2010 Environments

34 Optimizing an Exchange Server 2010 Environment

35 Designing and Optimizing Storage in an Exchange Server

2010 Environment

Network Design Cookbook – 2nd Edition

فهرست مطالب کتاب Network Design Cookbook – 2nd Edition:

Start Here

Introduction

Design Process

Design PODs

Example

Frameworks

Solutions

Services

Attributes

Networking with MikroTik MTCNA Study Guide

فهرست مطالب کتاب Networking with MikroTik MTCNA Study Guide:

1 MikroTik

2 RouterOS Software

3 Defaults

4 Accessing the Router

5 Configuring RouterOS

6 Managing Users

7 Interfaces

8 Addresses

9 Routing

10 VPNs and Tunnels

11 Queues

12 Firewalls

13 NAT

14 Wireless Networks

15 Wireless Security

16 Troubleshooting Tools

17 RouterOS Monitoring

18 The Dude

ntroducing Windows Server 2016 Technical Preview

فهرست مطالب کتاب Windows Server 2016 Technical Preview:

Introduction

Chapter 1: The software-defined datacenter

Chapter 2: Compute

Chapter 3: Storage

Chapter 4: Networking

Chapter 5: Security

Chapter 6: App Plat

Chapter 7: Systems management

Penetration Testing Fundamentals A Hands-On Guide to Reliable Security Audits

فهرست مطالب:

Introduction

1 Introduction to Penetration Testing

2 Standards

3 Cryptography

4 Reconnaissance

5 Malware

6 Hacking Windows

7 Web Hacking

8 Vulnerability Scanning

9 Introduction to Linux

10 Linux Hacking

11 Introduction to Kali Linux

12 General Hacking Techniques

13 Introduction to Metasploit

14 More with Metasploit

15 Introduction to Scripting with Ruby

16 Write Your Own Metasploit Exploits with Ruby

17 General Hacking Knowledge

18 Additional Pen Testing Topics

19 A Sample Pen Test Project

Appendix A: Answers to Chapter Multiple Choice Questions

Index Index

Pro SQL Server 2019 Administration

فهرست مطالب کتاب Pro SQL Server 2019 Administration:

Chapter 2: GUI Installation

Chapter 3: Server Core Installation

Chapter 4: Installation on Heterogeneous Operating Systems

Chapter 5: Configuring the Instance

Chapter 6: Database Configuration

Chapter 7: Table Optimizations

Chapter 8: Indexes and Statistics

Chapter 9: Database Consistency

Chapter 10: SQL Server Security Mode

Chapter 11: Encryption

Chapter 12: Backups and Restores

Chapter 13: High Availability and Disaster Recovery Concepts

Chapter 14: Implementing Always On Availability Groups

Chapter 15: Implementing Log Shipping

Chapter 16: Scaling Workloads

Chapter 17: SQL Server Metadata

Chapter 18: Locking and Blocking

Chapter 19: Extended Events

Chapter 20: Query Store

Chapter 21: Distributed Replay

Chapter 22: Automating Maintenance Routines

Chapter 23: Policy-Based Management

Chapter 24: Resource Governor

The Linux Programming Interface A Linux and UNIX System Programming Handbook

فهرست مطالب کتاب The Linux Programming Interface:

Preface

Chapter 1: History and Standards

Chapter 2: Fundamental Concepts .

Chapter 3: System Programming Concepts.

Chapter 4: File I/O: The Universal I/O Model

Chapter 5: File I/O: Further Details

Chapter 6: Processes

Chapter 7: Memory Allocation.

Chapter 8: Users and Groups

Chapter 9: Process Credentials

Chapter 10: Time.

Chapter 11: System Limits and Options

Chapter 12: System and Process Information

Chapter 13: File I/O Buffering.

Chapter 14: File Systems

Chapter 15: File Attributes

Chapter 16: Extended Attributes

Chapter 17: Access Control Lists

Chapter 18: Directories and Links

Chapter 19: Monitoring File Events

viii Brief Contents

Chapter 20: Signals: Fundamental Concepts

Chapter 21: Signals: Signal Handlers

Chapter 22: Signals: Advanced Features

Chapter 23: Timers and Sleeping

Chapter 24: Process Creation

Chapter 25: Process Termination

Chapter 26: Monitoring Child Processes

Chapter 27: Program Execution.

Chapter 28: Process Creation and Program Execution in More Detail.

Chapter 29: Threads: Introduction

Chapter 30: Threads: Thread Synchronization

Chapter 31: Threads: Thread Safety and Per-Thread Storage

Chapter 32: Threads: Thread Cancellation.

Chapter 33: Threads: Further Details

Chapter 34: Process Groups, Sessions, and Job Control

Chapter 35: Process Priorities and Scheduling

Chapter 36: Process Resources

Chapter 37: Daemons

Chapter 38: Writing Secure Privileged Programs

Chapter 39: Capabilities

Chapter 40: Login Accounting

Chapter 41: Fundamentals of Shared Libraries

Chapter 42: Advanced Features of Shared Libraries

Chapter 43: Interprocess Communication Overview

Chapter 44: Pipes and FIFOs

Chapter 45: Introduction to System V IPC

Chapter 46: System V Message Queues

Brief Contents ix

Chapter 47: System V Semaphores

Chapter 48: System V Shared Memory

Chapter 49: Memory Mappings

Chapter 50: Virtual Memory Operations

Chapter 51: Introduction to POSIX IPC.

Chapter 52: POSIX Message Queues

Chapter 53: POSIX Semaphores

Chapter 54: POSIX Shared Memory

Chapter 55: File Locking.

Chapter 56: Sockets: Introduction

Chapter 57: Sockets: UNIX Domain

Chapter 58: Sockets: Fundamentals of TCP/IP Networks

Chapter 59: Sockets: Internet Domains

Chapter 60: Sockets: Server Design

Chapter 61: Sockets: Advanced Topics

Chapter 62: Terminals

Chapter 63: Alternative I/O Models

Chapter 64: Pseudoterminals

Appendix A: Tracing System Calls

Appendix B: Parsing Command-Line Options

Appendix C: Casting the NULL Pointer

Appendix D: Kernel Configuration

Appendix E: Further Sources of Information

Appendix F: Solutions to Selected Exercises

Bibliography

Index

The LISP Network Evolution to the Next-Generation of Data Networks

فهرست مطالب کتاب The LISP Network:

Chapter 1: LISP and the Future of Networking

Chapter 2: LISP Architecture

Chapter 3: Data Center Trends

Chapter 4: The Wide­Area Network: Bringing Traffic from Access to the Data Center

Chapter 5: Mega­Scale Access Networks: LISP, User Access, and the Internet of Things

Chapter 6: Security

Chapter 7: LISP and the Next­Generation Mobile Network

Training Guide: Installing and Configuring Windows Server 2012 R2

فهرست مطالب کتاب Training Guide: Installing and Configuring Windows Server 2012 R2:

Introduction

CHAPTER 1 Preparing for Windows Server 2012 R2

CHAPTER 2 Deploying servers

CHAPTER 3 Server remote management

CHAPTER 4 Deploying domain controllers

CHAPTER 5 Active Directory administration

CHAPTER 6 Network administration

CHAPTER 7 Hyper-V virtualization

CHAPTER 8 File services and storage

CHAPTER 9 Print and document services

CHAPTER 10 Implementing Group Policy

CHAPTER 11 Configuring Windows Firewall and IPsec

Index

Ubuntu Linux Unleashed 2021 Edition

فهرست مطالب کتاب Ubuntu Linux Unleashed 2021 Edition:

Part I Getting Started

Part II Desktop Ubuntu

Part III System Administration

Part IV Ubuntu as a Server

Part V Programming Linux

Part VI Bonus Online Chapters

Windows Networking Troubleshooting

فهرست مطالب:

About the Authors

About the Technical Reviewer

Windows Troubleshooting Series

Chapter 1: Understanding Networks 1 Chapter 2: Managing Network Connections

Chapter 3: TCP/IP Networking

Chapter 4: What Causes Networking Problems

Chapter 5: Troubleshooting Networking 83 Chapter 6: Networking in a Virtual World

Chapter 7: Troubleshooting Mobile Worker and BYOD Networking Problems

Index

Windows Server 2016 The Administrator’s Reference

فهرست مطالب کتاب Windows Server 2016 The Administrator’s Reference:

How to Use This Guide

Print Readers

Digital Book Readers

Support Information

Conventions & Features

Share & Stay in Touch

Chapter 1. Welcome to Windows Server 2016

Chapter 2. Working with Windows Servers

Chapter 3. Configuring Server Settings

Chapter 4. Understanding Active Directory Connecting Network Resources

Chapter 5. Managing Active Directory

Chapter 6. Maintaining Active Directory

Chapter 7. Accounts: The Essentials

Chapter 8. Managing Account Policies

Chapter 9. Creating Accounts

Chapter 10. Working with Managed Accounts

Chapter 11. Managing Computers, Users and Groups

Chapter 12. Maintaining Your Servers

Chapter 13. Optimizing Server Performance

Chapter 14. Using Group Policy

Chapter 15. Maintaining and Troubleshooting Group Policy

Chapter 16. Optimizing Server Security

Chapter 17. Deploying Windows Server 2016

Chapter 18. Implementing TCP/IP Networking

Chapter 19. Data Storage: The Essentials

Chapter 20. Partitioning and Optimizing Drives

Chapter 21. Using TPM and BitLocker Drive Encryption

Chapter 22. Using Storage Spaces

Chapter 23. Using RAID

Chapter 24. Maintaining Partitions and Drives

Chapter 25. Implementing File Sharing

Chapter 26. Using Shadow Copies and Work Folders

Chapter 27. Managing Permissions and Auditing

Chapter 28. Configuring Disk Quotas

Chapter 29. Using Group Policy for Administration

Chapter 30. Implementing Print Services

Chapter 31. Configuring and Maintaining Print Services

Chapter 32. Implementing DHCP

Chapter 33. Managing and Maintaining DHCP

Chapter 34. Implementing DNS

Chapter 35. Managing and Maintaining DNS

Index