In The Shortcut Guide to Securing Your Exchange Server and Unified Communications Infrastructure Using SSL, author Don Jones will show you how to use Subject Alternative Name (SAN) certificates to provide the security you need, with less cost and overhead. You’ll also learn about other best practices for securing Exchange and Unified Communications platforms, including Microsoft Lync Server, mobile device management, and more.
ebook
This book provides detailed step by step instructions on how to select, install and maintain SSL certificates in Microsoft environments. Whether you are just starting out and need to know how to acquire a certificate, or you are looking for tips on troubleshooting and maintaining existing certificate configurations, this guide has pragmatic and detailed information to help you.
In this ebook, you’ll see how application performance management techniques need to evolve to accommodate hybrid IT. You’ll learn about emerging techniques and technologies, and develop a “shopping list” of capabilities that your IT environment.
In The Definitive Guide to Cloud Computing, author Dan Sullivan provides IT managers, system architects, and IT service consumers with the information they need to understand the advantages of cloud computing, the options for deploying cloud infrastructure, and the means to transition to cloud-based service delivery.
In this book, You’ll learn how to optimize SharePoint for the inclusion of large content items, external content items (like databases, shared files, and media files), and even “dormant” content that you no longer actively need – but can’t afford to get rid of.
This book contains information about how to use Group Policy to deploy and configure an installation of Microsoft Office 2010. The audience for this book includes IT generalists, IT operations, help desk and deployment staff, IT messaging administrators, consultants, and other IT professionals.
IT expert and author Ken Hess, explains how to protect your clients from identity theft using new methods of verification and authentication. How to overcome regulatory compliance concerns surrounding knowledge-based authentication/verification.
The Essentials Series: New Techniques for Creating Better Backups takes a fresh look at backup technologies that address these challenges of virtualized servers, options and management of backup encryption, and the benefits of data deduplication for efficient use of backup resources.
In these articles you will learn how to Define the Peril of Application Downtime, the Power of Rapid Application Failover and the Critical Role of Failback in Application Disaster Recovery.
This book offers a detailed look at the essential components of external monitoring, a discussion of how to leverage external monitoring to protect your brand, and finally, a roadmap for implementing and maintaining an external monitoring process.