In The Shortcut Guide to Securing Your Exchange Server and Unified Communications Infrastructure Using SSL, author Don Jones will show you how to use Subject Alternative Name (SAN) certificates to provide the security you need, with less cost and overhead. You’ll also learn about other best practices for securing Exchange and Unified Communications platforms, including Microsoft Lync Server, mobile device management, and more.
Tag: ebook
How to Install SSL Certificates on Microsoft Servers – Free eBook
This book provides detailed step by step instructions on how to select, install and maintain SSL certificates in Microsoft environments. Whether you are just starting out and need to know how to acquire a certificate, or you are looking for tips on troubleshooting and maintaining existing certificate configurations, this guide has pragmatic and detailed information to help you.
Download Guide to Monitoring Data Center, Virtual Environments & Cloud
In this ebook, you’ll see how application performance management techniques need to evolve to accommodate hybrid IT. You’ll learn about emerging techniques and technologies, and develop a “shopping list” of capabilities that your IT environment.
Download Free 219-Page book on Cloud Computing from Realtime Nexus
In The Definitive Guide to Cloud Computing, author Dan Sullivan provides IT managers, system architects, and IT service consumers with the information they need to understand the advantages of cloud computing, the options for deploying cloud infrastructure, and the means to transition to cloud-based service delivery.
Download Free 69-Page Book on SharePoint Storage Optimization
In this book, You’ll learn how to optimize SharePoint for the inclusion of large content items, external content items (like databases, shared files, and media files), and even “dormant” content that you no longer actively need – but can’t afford to get rid of.
Free ebook – Customization Tool and Group Policy for MS Office 2010
This book contains information about how to use Group Policy to deploy and configure an installation of Microsoft Office 2010. The audience for this book includes IT generalists, IT operations, help desk and deployment staff, IT messaging administrators, consultants, and other IT professionals.
Ebook – Strengthening Application Security with Identity Fraud Prevention Systems
IT expert and author Ken Hess, explains how to protect your clients from identity theft using new methods of verification and authentication. How to overcome regulatory compliance concerns surrounding knowledge-based authentication/verification.
Free ebook on New Techniques for Creating Better Backups
The Essentials Series: New Techniques for Creating Better Backups takes a fresh look at backup technologies that address these challenges of virtualized servers, options and management of backup encryption, and the benefits of data deduplication for efficient use of backup resources.
Ebook – The Business Benefits of Rapid Application FailOver
In these articles you will learn how to Define the Peril of Application Downtime, the Power of Rapid Application Failover and the Critical Role of Failback in Application Disaster Recovery.
Shortcut Guide to Assuring Website Performance through External Web Monitoring
This book offers a detailed look at the essential components of external monitoring, a discussion of how to leverage external monitoring to protect your brand, and finally, a roadmap for implementing and maintaining an external monitoring process.