Catálogo de publicaciones

Compartir en
redes sociales


Navegación

Tipo

Acceso

Plataformas

Temática

Mostrando 10 de 10.062 registro(s)

Filtros plataforma quitar todos

How to Cheat at Administering Office Communications Server 2007

Más información

978-1-59749-212-6 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias agrícolas y veterinarias  

Microsoft Office Communications Server (OCS) 2007 is Microsoft’s latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM), Voice over IP (VoIP), and audio conferencing and videoconferencing. It will work with your company’s existing telecommunications systems without major hardware upgrades. This means your business can deploy advanced VoIP and conferencing without tearing out its preexisting legacy telephone network.
How to Cheat at Administering Microsoft Office Communicator 2007 provides the busy system administrator with any easy-to-access reference that provides step-by-step instructions on how to install, configure, manage and troubleshoot Communicator across the network. It is the perfect tool for those who simply need to complete a task without reading through lots of theory and principles.

• Get Inside Microsoft Office Communications Server 2007
Learn what’s new in OCS 2007, compare the previous editions, understand OCS 2007 server roles, plan an OCS 2007 installation.
• Install the First OCS 2007 Front-End Server
Address the prerequisites, prepare active directory, install and configure OCS 2007 Enterprise Edition, and verify the installation summary.
• Configure the Edge Server
Install the Edge Server, work with certificates, deal with security issues, and test the Edge Server.
• Configure the Mediation Server
Install the Configuration Server, configure dialing rules, configure users for voice functionality, and test voice functionality.
• Configure Archiving
Address compliance requirements, understand archiving topology, and install the Archiving Server.
• Configure Conference Servers
Understand on-premises conferencing, use on-premises conferencing, understand Microsoft RoundTable, and install conferencing.
• Integrate OCS with PBX and IP-PBX Systems
Use a gateway, configure Cisco CallManager as a Gateway, and understand CSTA/SIP gateways.
• Integrate OCS with Exchange 2007 Unified Messaging
Master Exchange 2007 Unified Messaging and architecture, Configure Exchange 2007 UM, and Combine OCS with Exchange 2007 UM.
• Upgrade to Office Communications Server 2007
Plan your migration from LCS 2005 to OCS 2007, upgrade perimeter servers, upgrade director servers, upgrade front-end servers, perform user migration, and remove LCS 2005 from the network environment.

How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access

Más información

978-1-59749-137-2 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias agrícolas y veterinarias  

The Perfect Reference for the Multitasked System Administrators
The new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat will help you get Exchange Server 2007 up and running as quickly and safely as possible.

• Understand Exchange 2007 Prerequisites
Review hardware and software requirements, Active Directory requirements, and more.
• Manage Recipient Filtering
Create a custom MMC that contains the Exchange 2007 Recipients work center, which can be used, for example, by the helpdesk staff in your organization.
• Manage Outlook Anywhere
Outlook Anywhere makes it possible for your end users to remotely access their mailboxes from the Internet using their full Outlook clients.
• Manage Outlook Web Access 2007
See how Outlook Web Access 2007 was completely rewritten in managed code to make it scale even better.
• Use the Exchange 2007 Queue Viewer
You can now view information about queues and examine the messages held within them.
• Master Powerful Out-of-the-Box Spam Protection
The Edge Transport server supports SMTP, provides several antispam filtering agents, and supports antivirus extensibility.
• Manage a Single-Copy Cluster-Based Setup
SCC-based cluster provides service failover and still has a single point of failure when it comes to the databases.
• Recover Mailbox Databases
Use the improved database portability feature to port and recover a Mailbox database to any server in the Exchange 2007 organization.

* Essential information for the multi-tasked System Administrator charged perform everyday tasks
* Includes the latest coverage of the major new release of Exchange Server
* Emphasizes best-practice security measures for all areas and in particular the area of remote access via Outlook

How to Cheat at Configuring Open Source Security Tools

Más información

978-1-59749-170-9 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ingeniería mecánica - Ingenieria ambiental - Otras ciencias sociales  

The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.

* Take Inventory
See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate.
* Use Nmap
Learn how Nmap has more features and options than any other free scanner.
* Implement Firewalls
Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable.
* Perform Basic Hardening
Put an IT security policy in place so that you have a concrete set of standards against which to measure.
* Install and Configure Snort and Wireshark
Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations.
* Explore Snort Add-Ons
Use tools like Oinkmaster to automatically keep Snort signature files current.
* Troubleshoot Network Problems
See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP.
* Learn Defensive Monitoring Considerations
See how to define your wireless network boundaries, and monitor to know if they’re being exceeded and watch for unauthorized traffic on your network.

*Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet
*Companion Web site contains dozens of working scripts and tools for readers
*Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't

How to Cheat at Configuring VmWare ESX Server

Más información

978-1-59749-194-5 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ingeniería civil  

A virtual evolution in IT shops large and small has begun. VMware’s ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress’ proven “How to Cheat” methodology to configure and build VMware’s ESX Server version 3. This clear, concise guide provides all the information you need to become a virtual whiz!
This book will detail the default and custom installation of VMware’s ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine templates. Best practices for securing and backing up your virtual environment are also provided. The book concludes with a series of handy, time-saving command and configuration for: bash shell keystrokes, Linux commands, configuration files, common/proc files, VMware ESX commands, and troubleshooting.

• Reap the Benefits of Server Virtualization
Realize improved ROI, ensure efficient mergers and acquisitions, and reduce compliance risk exposure through server virtualization and consolidation.
• Build a Virtual Machine
Create a Gold Master and use your VMlibrary to leverage the power and flexibility of VMware.
• Manage Your Virtual Infrastructure
Use VMware tools to partition physical servers and manage virtual machines.
• Set Up Scripted Installation
See how a scripted installation method can be a fast and efficient way to provision ESX hosts.
• Master ESX Native Tools
Use tools like Esxtop to diagnose performance issues and vmkfstools to import and export
• Install and Use VMware Scripting APIs
Develop programs to help automate and ease administration—even with a limited background in scripting or programming.
• Learn the Fundamentals of a VM Backup
VMware ESX ships with three scripts that work together to create a backup and restore system: vmsnap.pl, vmsnap_all.pl, and vmres.pl.
• Extend a Cloned Windows VM’s Root Partition
Use Microsoft’s Sysprep utility to extend a newly deployed virtual machine’s root partition from the original clone size to a larger size.

How to Cheat at Deploying and Securing RFID

Más información

978-1-59749-230-0 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ingeniería mecánica - Ingenieria ambiental - Otras ciencias sociales  

RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.

Major companies and countries around the world are adopting or considering whether to adopt RFID technologies. Visa and Wells Fargo are currently running tests with RFID, airports around the world are using RFID to track cargo and run customs departments, universities such as Slippery Rock are providing RFID-enabled cell phones for students to use for campus charges. According to the July 9 CNET article, RFID Tags: Big Brother in Small Packages?, "You should become familiar with RFID technology because you'll be hearing much more about it soon. Retailers adore the concept, and CNET News.com's own Alorie Gilbert wrote last week about how Wal-Mart and the U.K.-based grocery chain Tesco are starting to install "smart shelves" with networked RFID readers. In what will become the largest test of the technology, consumer goods giant Gillette recently said it would purchase 500 million RFID tags from Alien Technology of Morgan Hill, CA."

For security professionals needing to get up and running fast with the topic of RFID, this How to Cheat approach to the topic is the perfect "just what you need to know" book!

* For most business organizations, adopting RFID is a matter of when
* The RFID services market is expected to reach $4 billion by 2008
* Covers vulnerabilities and personal privacy--topics identified by major companies as key RFID issues

How to Cheat at IIS 7 Server Administration

Más información

978-1-59749-155-6 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Otras ciencias sociales  

According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new feature models that allow administrators to customize their settings, and a new set of administration tools. Administrators migrating from version 6 will find this How to Cheat book the perfect vehicle for getting up to speed fast on the new version.
IIS version 7 is the perfect product for the How to Cheat series. This new version from Microsoft is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average SysAdmin, it will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help get IIS 7 up and running as quickly and safely as possible.

*Provides the multi-tasked SysAdmin with the essential information needed to perform the daily tasks
*Emphasizes best-practice security measures
*Cover the major new release of IIS 7, which will create significant challenges for IT managers

How to Cheat at Microsoft Vista Administration

Más información

978-1-59749-174-7 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias sociales  

The Perfect Reference for the Multitasked SysAdmin
The Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and management consoles. It also enhances the system’s reliability, performance, and problem-solving tools. As administrators, Vista will sometimes look like its predecessor, Windows XP, and at other times, look like an all-new operating system. How to Cheat will help you get Vista up and running as quickly and safely as possible and provide you with a solid idea of all the important changes and improvements the new Microsoft Vista OS has to offer.

In the book you will:
* Automate Windows Vista Installation
See how Windows installations can be automated for large-scale deployments using the Windows Automated Installation Kit (WAIK).
* Install and Maintain Devices
Windows Vista contains device drivers for hundreds of PnP devices, and the Device Manager snap-in is the main utility on a local computer for managing them.
* Customize Appearances, Taskbars, and Toolbars
See how to use a personalization page, use the taskbar, and customize desktop themes.
* Manage File System Formats, Partitions, and Volumes
Learn how Windows Vista supports basic and dynamic volumes and two partition styles: MBR and GPT.
* Increase File System Performance
Learn how using tools such as disk defragging, cluster size adjustment, removing short filename support, and compression can help with performance.
* Administer via Remote
Remote Desktop and Windows Firewall can help administrators perform administrative tasks on remote computers.
* Managing Services
The Services utility allows you to view the status of services, as well as to disable nonessential services.
* Configure TCP/IP in Vista
See how to configure TCP/IP (both IPv4 and IPv6) via the user interface or via the netsh command.
* See What’s New with Wireless in Vista
Understand wireless security and learn how to install a wireless network.
* Optimize Windows Startup, the Hard Disk, and More
Optimize memory, applications, and the network connection, and see how to monitor performance.

Contents Include
Introducing and Installing Microsoft Vista
Installing and Maintaining Hardware Devices and Drivers
Customizing Desktop Properties
Managing File Systems and Disks
General Administration Tasks
Managing Local Networking Essentials
Managing the Wireless World and Its Security
Managing Security Essentials
Securing User Access
Tuning for Better Performance
Troubleshooting

*Provides the multi-tasked SysAdmin with the essential information needed to perform the daily tasks
*Covers the major new release of Windows, which will create significant challenges for IT managers
*Emphasizes best-practice security measures

How to Cheat at Securing Linux

Más información

978-1-59749-207-2 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2008 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias físicas  

Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system.

This book teaches Linux system administrators how to protect their servers from malicious threats.

As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. This was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact opposite story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers (Source: IDC).

This book covers Open Source security, implementing an intrusion detection system, unearthing Rootkits, defending against malware, creating Virtual Private Networks, and much more.

The Perfect Reference for the Multitasked SysAdmin
* Discover Why "Measure Twice, Cut Once" Applies to Securing Linux
* Complete Coverage of Hardening the Operating System, Implementing an Intrusion Detection System, and Defending Databases
* Short on Theory, History, and Technical Data that Is Not Helpful in Performing Your Job

How to Cheat at Securing SQL Server 2005: SQL Server 2005

Más información

978-1-59749-196-9 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Agricultura, silvicultura y pesca - Economía y negocios  

The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005.

SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help in order to get SQL Server secured as quickly and safely as possible.

* Provides the multi-tasked Sys Admin with the essential information needed to perform the daily tasks
* Covers SQL Server 2005, which is a massive product with significant challenges for IT managers
* Emphasizes best-practice security measures

How to Cheat at Securing Your Network

Más información

978-1-59749-231-7 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Agricultura, silvicultura y pesca  

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real world, step-by-step instruction.

The latest addition to the best selling "How to Cheat..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery.

* A concise information source - perfect for busy System Administrators with little spare time
* Details what to do when disaster strikes your network
* Covers the most likely threats to small to medium sized networks