Mission-critical Microsoft Exchange 2000 :: building highly available messaging and knowledge management systems /
Mission-Critical Microsoft Exchange 2000 is the definitive book on how to design and maintain extremely reliable and adaptive Exchange Server messaging systems that rarely crash and that preserve valuable data and services in spite of technical disruptions. E-mail systems are now a primary means of...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston :
Digital Press,
©2001.
|
Schriftenreihe: | HP Technologies.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Mission-Critical Microsoft Exchange 2000 is the definitive book on how to design and maintain extremely reliable and adaptive Exchange Server messaging systems that rarely crash and that preserve valuable data and services in spite of technical disruptions. E-mail systems are now a primary means of communication for organizations, which can afford e-mail down-time no more than they can afford to be without phones. Further, messaging systems increasingly are supporting vital applications in addition to e-mail, such as workflow and knowledge management, making the data they store both voluminous. |
Beschreibung: | Includes index. Title from title screen. |
Beschreibung: | 1 online resource (xxi, 425 pages) : illustrations |
ISBN: | 9781429492096 1429492090 9781555582333 1555582338 9780080511740 0080511740 9786611024499 6611024492 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn183264090 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 020124s2001 maua o 001 0 eng d | ||
040 | |a COO |b eng |e pn |c COO |d OCLCG |d N$T |d YDXCP |d E7B |d OCLCQ |d VVN |d OCLCQ |d B24X7 |d OCLCQ |d AGLDB |d LIV |d OCLCF |d OCLCQ |d VTS |d BNG |d N$T |d COO |d OCL |d M8D |d VLY |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 48969623 |a 170884453 |a 648267908 |a 1161998310 |a 1241759517 |a 1300641215 | ||
020 | |a 9781429492096 |q (electronic bk.) | ||
020 | |a 1429492090 |q (electronic bk.) | ||
020 | |a 9781555582333 |q (electronic bk.) | ||
020 | |a 1555582338 |q (electronic bk.) | ||
020 | |a 9780080511740 |q (electronic bk.) | ||
020 | |a 0080511740 |q (electronic bk.) | ||
020 | |a 9786611024499 | ||
020 | |a 6611024492 | ||
020 | |z 1555582338 |q (pbk. ; |q alk. paper) | ||
035 | |a (OCoLC)183264090 |z (OCoLC)48969623 |z (OCoLC)170884453 |z (OCoLC)648267908 |z (OCoLC)1161998310 |z (OCoLC)1241759517 |z (OCoLC)1300641215 | ||
050 | 4 | |a QA76.9.C55 |b C63 2001b | |
072 | 7 | |a COM |x 060010 |2 bisacsh | |
082 | 7 | |a 005.7/13769 |2 21 | |
049 | |a MAIN | ||
100 | 1 | |a Cochran, Jerry, |d 1964- |1 https://id.oclc.org/worldcat/entity/E39PCjFcmk8VCKjPc8VCQWp49C |0 http://id.loc.gov/authorities/names/n00007833 | |
245 | 1 | 0 | |a Mission-critical Microsoft Exchange 2000 : |b building highly available messaging and knowledge management systems / |c Jerry Cochran. |
260 | |a Boston : |b Digital Press, |c ©2001. | ||
300 | |a 1 online resource (xxi, 425 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a HP Technologies | |
500 | |a Includes index. | ||
500 | |a Title from title screen. | ||
505 | 0 | |a Cover; Copyright Page; TOCContents; Foreword; Preface; CHChapter 1. Mission-Critical Exchange; 1.1 Mission-Critical Defined and Understood; 1.2 Assumptions about the Reader; 1.3 Inside Mission-Critical; 1.4 How This Book Is Organized; CHChapter 2. Analyzing Downtime Outages; 2.1 How Do You Measure Downtime?; 2.2 Step 1: What Is the Cost of Exchange Downtime?; 2.3 Step 2: Understand the Anatomy of Exchange Downtime; 2.4 Step 3: Assessing the Causes of Downtime for Exchange; 2.5 Step 4: Defining Mission-Critical Service-Level Agreements | |
505 | 8 | |a 2.6 The Final Step: Architecting Mission-Critical Exchange ServersCHChapter 3. Exchange Database Technology Foundations; 3.1 Storage Paradigms; 3.2 Redefining Storage in Exchange 2000; 3.3 Exchange Database Files; 3.4 Storage Group Allocation and Data Distribution; 3.5 Exchange Database Technology; 3.6 How Exchange 2000 Stores Incoming Data; CHChapter 4. Exchange Disaster Recovery Technology; 4.1 How Can an Exchange Server Fail?; 4.2 Logical Database Corruption; 4.3 JET/ESE Recovery Technology; 4.4 Exchange 2000 Backup Operation; 4.5 Exchange 2000 Restore Operation | |
505 | 8 | |a 4.6 Power with ResponsibilityCHChapter 5. Exchange 2000 Disaster Recovery Best Practices; 5.1 Best Practice #1: Understand Exchange Technology; 5.2 Best Practice #2: Plan and Partition Data; 5.3 Best Practice #3: Establish Disaster Recovery Service-Level Agreements; 5.4 Best Practice #4: Select the Right Disaster Recovery Technology; 5.5 Best Practice #5: Select the Right Backup and Recovery Strategy; 5.6 Best Practice #6: Look for Ways to Shrink Disaster Recovery Windows; 5.7 Best Practice #7: Develop an Exchange Disaster Recovery Plan | |
505 | 8 | |a 5.8 Best Practice #8: Train Personnel and Practice Disaster Recovery5.9 Best Practice #9: Disaster Recovery Management; 5.10 Best Practice #10: Plan for Growth Impacts on Disaster Recovery; CHChapter 6. Leveraging Storage Technology; 6.1 Storage Technology Basics; 6.2 Drive Technology; 6.3 Advanced Storage Functionality; CHChapter 7. Leveraging Cluster Technologies for Exchange; 7.1 High Availability Is A Key Concern; 7.2 The Problems Clustering Does and Doesn't Solve; 7.3 Windows NT/2000 Cluster Technology Fundamentals; 7.4 Cluster Support for Exchange 5.5 | |
505 | 8 | |a 7.5 Cluster Support in Exchange 20007.6 Decision Points for Deploying Exchange Clusters; 7.7 Deploying Exchange 2000 Clusters; CHChapter 8. Don't Overlook Security as a Powerful High-Availability Measure; 8.1 Threat: Denial of Service; 8.2 Threat: Viruses; 8.3 Threat: Unauthorized Access; 8.4 Threat: Forgery; 8.5 Threat: Mail Relaying; 8.6 Windows 2000 Security Enhancements; 8.7 Locking Down Exchange 2000; 8.8 Putting Security Together; CHChapter 9. Bringing It All Together With Proactive Management; 9.1 Proactive vs. Reactive Management; 9.2 Establishing Service-Level Agreements | |
520 | |a Mission-Critical Microsoft Exchange 2000 is the definitive book on how to design and maintain extremely reliable and adaptive Exchange Server messaging systems that rarely crash and that preserve valuable data and services in spite of technical disruptions. E-mail systems are now a primary means of communication for organizations, which can afford e-mail down-time no more than they can afford to be without phones. Further, messaging systems increasingly are supporting vital applications in addition to e-mail, such as workflow and knowledge management, making the data they store both voluminous. | ||
546 | |a English. | ||
630 | 0 | 0 | |a Microsoft Exchange server. |0 http://id.loc.gov/authorities/names/n96094622 |
630 | 0 | 7 | |a Microsoft Exchange server |2 fast |
650 | 0 | |a Client/server computing. |0 http://id.loc.gov/authorities/subjects/sh93000502 | |
650 | 6 | |a Architecture client-serveur (Informatique) | |
650 | 7 | |a COMPUTERS |x Web |x Browsers. |2 bisacsh | |
650 | 7 | |a Client/server computing |2 fast | |
776 | 0 | 8 | |i Print version: |a Cochran, Jerry, 1964- |t Mission-critical Microsoft Exchange 2000. |d Boston : Digital Press, ©2001 |z 1555582338 |z 9781555582333 |w (DLC) 00047512 |w (OCoLC)45136722 |
830 | 0 | |a HP Technologies. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=83554 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Books 24x7 |b B247 |n bks00001560 | ||
938 | |a ebrary |b EBRY |n ebr10179956 | ||
938 | |a EBSCOhost |b EBSC |n 83554 | ||
938 | |a YBP Library Services |b YANK |n 2704198 | ||
938 | |a YBP Library Services |b YANK |n 2613975 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn183264090 |
---|---|
_version_ | 1816881658598522880 |
adam_text | |
any_adam_object | |
author | Cochran, Jerry, 1964- |
author_GND | http://id.loc.gov/authorities/names/n00007833 |
author_facet | Cochran, Jerry, 1964- |
author_role | |
author_sort | Cochran, Jerry, 1964- |
author_variant | j c jc |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.C55 C63 2001b |
callnumber-search | QA76.9.C55 C63 2001b |
callnumber-sort | QA 276.9 C55 C63 42001B |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Copyright Page; TOCContents; Foreword; Preface; CHChapter 1. Mission-Critical Exchange; 1.1 Mission-Critical Defined and Understood; 1.2 Assumptions about the Reader; 1.3 Inside Mission-Critical; 1.4 How This Book Is Organized; CHChapter 2. Analyzing Downtime Outages; 2.1 How Do You Measure Downtime?; 2.2 Step 1: What Is the Cost of Exchange Downtime?; 2.3 Step 2: Understand the Anatomy of Exchange Downtime; 2.4 Step 3: Assessing the Causes of Downtime for Exchange; 2.5 Step 4: Defining Mission-Critical Service-Level Agreements 2.6 The Final Step: Architecting Mission-Critical Exchange ServersCHChapter 3. Exchange Database Technology Foundations; 3.1 Storage Paradigms; 3.2 Redefining Storage in Exchange 2000; 3.3 Exchange Database Files; 3.4 Storage Group Allocation and Data Distribution; 3.5 Exchange Database Technology; 3.6 How Exchange 2000 Stores Incoming Data; CHChapter 4. Exchange Disaster Recovery Technology; 4.1 How Can an Exchange Server Fail?; 4.2 Logical Database Corruption; 4.3 JET/ESE Recovery Technology; 4.4 Exchange 2000 Backup Operation; 4.5 Exchange 2000 Restore Operation 4.6 Power with ResponsibilityCHChapter 5. Exchange 2000 Disaster Recovery Best Practices; 5.1 Best Practice #1: Understand Exchange Technology; 5.2 Best Practice #2: Plan and Partition Data; 5.3 Best Practice #3: Establish Disaster Recovery Service-Level Agreements; 5.4 Best Practice #4: Select the Right Disaster Recovery Technology; 5.5 Best Practice #5: Select the Right Backup and Recovery Strategy; 5.6 Best Practice #6: Look for Ways to Shrink Disaster Recovery Windows; 5.7 Best Practice #7: Develop an Exchange Disaster Recovery Plan 5.8 Best Practice #8: Train Personnel and Practice Disaster Recovery5.9 Best Practice #9: Disaster Recovery Management; 5.10 Best Practice #10: Plan for Growth Impacts on Disaster Recovery; CHChapter 6. Leveraging Storage Technology; 6.1 Storage Technology Basics; 6.2 Drive Technology; 6.3 Advanced Storage Functionality; CHChapter 7. Leveraging Cluster Technologies for Exchange; 7.1 High Availability Is A Key Concern; 7.2 The Problems Clustering Does and Doesn't Solve; 7.3 Windows NT/2000 Cluster Technology Fundamentals; 7.4 Cluster Support for Exchange 5.5 7.5 Cluster Support in Exchange 20007.6 Decision Points for Deploying Exchange Clusters; 7.7 Deploying Exchange 2000 Clusters; CHChapter 8. Don't Overlook Security as a Powerful High-Availability Measure; 8.1 Threat: Denial of Service; 8.2 Threat: Viruses; 8.3 Threat: Unauthorized Access; 8.4 Threat: Forgery; 8.5 Threat: Mail Relaying; 8.6 Windows 2000 Security Enhancements; 8.7 Locking Down Exchange 2000; 8.8 Putting Security Together; CHChapter 9. Bringing It All Together With Proactive Management; 9.1 Proactive vs. Reactive Management; 9.2 Establishing Service-Level Agreements |
ctrlnum | (OCoLC)183264090 |
dewey-full | 005.7/13769 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.7/13769 |
dewey-search | 005.7/13769 |
dewey-sort | 15.7 513769 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06292cam a2200685 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn183264090</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr zn|||||||||</controlfield><controlfield tag="008">020124s2001 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">COO</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">COO</subfield><subfield code="d">OCLCG</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VVN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">BNG</subfield><subfield code="d">N$T</subfield><subfield code="d">COO</subfield><subfield code="d">OCL</subfield><subfield code="d">M8D</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">48969623</subfield><subfield code="a">170884453</subfield><subfield code="a">648267908</subfield><subfield code="a">1161998310</subfield><subfield code="a">1241759517</subfield><subfield code="a">1300641215</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429492096</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429492090</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555582333</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555582338</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080511740</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080511740</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611024499</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611024492</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1555582338</subfield><subfield code="q">(pbk. ;</subfield><subfield code="q">alk. paper)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)183264090</subfield><subfield code="z">(OCoLC)48969623</subfield><subfield code="z">(OCoLC)170884453</subfield><subfield code="z">(OCoLC)648267908</subfield><subfield code="z">(OCoLC)1161998310</subfield><subfield code="z">(OCoLC)1241759517</subfield><subfield code="z">(OCoLC)1300641215</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.C55</subfield><subfield code="b">C63 2001b</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060010</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.7/13769</subfield><subfield code="2">21</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cochran, Jerry,</subfield><subfield code="d">1964-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjFcmk8VCKjPc8VCQWp49C</subfield><subfield code="0">http://id.loc.gov/authorities/names/n00007833</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mission-critical Microsoft Exchange 2000 :</subfield><subfield code="b">building highly available messaging and knowledge management systems /</subfield><subfield code="c">Jerry Cochran.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Boston :</subfield><subfield code="b">Digital Press,</subfield><subfield code="c">©2001.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxi, 425 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">HP Technologies</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Copyright Page; TOCContents; Foreword; Preface; CHChapter 1. Mission-Critical Exchange; 1.1 Mission-Critical Defined and Understood; 1.2 Assumptions about the Reader; 1.3 Inside Mission-Critical; 1.4 How This Book Is Organized; CHChapter 2. Analyzing Downtime Outages; 2.1 How Do You Measure Downtime?; 2.2 Step 1: What Is the Cost of Exchange Downtime?; 2.3 Step 2: Understand the Anatomy of Exchange Downtime; 2.4 Step 3: Assessing the Causes of Downtime for Exchange; 2.5 Step 4: Defining Mission-Critical Service-Level Agreements</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.6 The Final Step: Architecting Mission-Critical Exchange ServersCHChapter 3. Exchange Database Technology Foundations; 3.1 Storage Paradigms; 3.2 Redefining Storage in Exchange 2000; 3.3 Exchange Database Files; 3.4 Storage Group Allocation and Data Distribution; 3.5 Exchange Database Technology; 3.6 How Exchange 2000 Stores Incoming Data; CHChapter 4. Exchange Disaster Recovery Technology; 4.1 How Can an Exchange Server Fail?; 4.2 Logical Database Corruption; 4.3 JET/ESE Recovery Technology; 4.4 Exchange 2000 Backup Operation; 4.5 Exchange 2000 Restore Operation</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.6 Power with ResponsibilityCHChapter 5. Exchange 2000 Disaster Recovery Best Practices; 5.1 Best Practice #1: Understand Exchange Technology; 5.2 Best Practice #2: Plan and Partition Data; 5.3 Best Practice #3: Establish Disaster Recovery Service-Level Agreements; 5.4 Best Practice #4: Select the Right Disaster Recovery Technology; 5.5 Best Practice #5: Select the Right Backup and Recovery Strategy; 5.6 Best Practice #6: Look for Ways to Shrink Disaster Recovery Windows; 5.7 Best Practice #7: Develop an Exchange Disaster Recovery Plan</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.8 Best Practice #8: Train Personnel and Practice Disaster Recovery5.9 Best Practice #9: Disaster Recovery Management; 5.10 Best Practice #10: Plan for Growth Impacts on Disaster Recovery; CHChapter 6. Leveraging Storage Technology; 6.1 Storage Technology Basics; 6.2 Drive Technology; 6.3 Advanced Storage Functionality; CHChapter 7. Leveraging Cluster Technologies for Exchange; 7.1 High Availability Is A Key Concern; 7.2 The Problems Clustering Does and Doesn't Solve; 7.3 Windows NT/2000 Cluster Technology Fundamentals; 7.4 Cluster Support for Exchange 5.5</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">7.5 Cluster Support in Exchange 20007.6 Decision Points for Deploying Exchange Clusters; 7.7 Deploying Exchange 2000 Clusters; CHChapter 8. Don't Overlook Security as a Powerful High-Availability Measure; 8.1 Threat: Denial of Service; 8.2 Threat: Viruses; 8.3 Threat: Unauthorized Access; 8.4 Threat: Forgery; 8.5 Threat: Mail Relaying; 8.6 Windows 2000 Security Enhancements; 8.7 Locking Down Exchange 2000; 8.8 Putting Security Together; CHChapter 9. Bringing It All Together With Proactive Management; 9.1 Proactive vs. Reactive Management; 9.2 Establishing Service-Level Agreements</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Mission-Critical Microsoft Exchange 2000 is the definitive book on how to design and maintain extremely reliable and adaptive Exchange Server messaging systems that rarely crash and that preserve valuable data and services in spite of technical disruptions. E-mail systems are now a primary means of communication for organizations, which can afford e-mail down-time no more than they can afford to be without phones. Further, messaging systems increasingly are supporting vital applications in addition to e-mail, such as workflow and knowledge management, making the data they store both voluminous.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Microsoft Exchange server.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n96094622</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Microsoft Exchange server</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Client/server computing.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh93000502</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Architecture client-serveur (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Web</subfield><subfield code="x">Browsers.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Client/server computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Cochran, Jerry, 1964-</subfield><subfield code="t">Mission-critical Microsoft Exchange 2000.</subfield><subfield code="d">Boston : Digital Press, ©2001</subfield><subfield code="z">1555582338</subfield><subfield code="z">9781555582333</subfield><subfield code="w">(DLC) 00047512</subfield><subfield code="w">(OCoLC)45136722</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">HP Technologies.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=83554</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00001560</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10179956</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">83554</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2704198</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2613975</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn183264090 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:13Z |
institution | BVB |
isbn | 9781429492096 1429492090 9781555582333 1555582338 9780080511740 0080511740 9786611024499 6611024492 |
language | English |
oclc_num | 183264090 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxi, 425 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Digital Press, |
record_format | marc |
series | HP Technologies. |
series2 | HP Technologies |
spelling | Cochran, Jerry, 1964- https://id.oclc.org/worldcat/entity/E39PCjFcmk8VCKjPc8VCQWp49C http://id.loc.gov/authorities/names/n00007833 Mission-critical Microsoft Exchange 2000 : building highly available messaging and knowledge management systems / Jerry Cochran. Boston : Digital Press, ©2001. 1 online resource (xxi, 425 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier HP Technologies Includes index. Title from title screen. Cover; Copyright Page; TOCContents; Foreword; Preface; CHChapter 1. Mission-Critical Exchange; 1.1 Mission-Critical Defined and Understood; 1.2 Assumptions about the Reader; 1.3 Inside Mission-Critical; 1.4 How This Book Is Organized; CHChapter 2. Analyzing Downtime Outages; 2.1 How Do You Measure Downtime?; 2.2 Step 1: What Is the Cost of Exchange Downtime?; 2.3 Step 2: Understand the Anatomy of Exchange Downtime; 2.4 Step 3: Assessing the Causes of Downtime for Exchange; 2.5 Step 4: Defining Mission-Critical Service-Level Agreements 2.6 The Final Step: Architecting Mission-Critical Exchange ServersCHChapter 3. Exchange Database Technology Foundations; 3.1 Storage Paradigms; 3.2 Redefining Storage in Exchange 2000; 3.3 Exchange Database Files; 3.4 Storage Group Allocation and Data Distribution; 3.5 Exchange Database Technology; 3.6 How Exchange 2000 Stores Incoming Data; CHChapter 4. Exchange Disaster Recovery Technology; 4.1 How Can an Exchange Server Fail?; 4.2 Logical Database Corruption; 4.3 JET/ESE Recovery Technology; 4.4 Exchange 2000 Backup Operation; 4.5 Exchange 2000 Restore Operation 4.6 Power with ResponsibilityCHChapter 5. Exchange 2000 Disaster Recovery Best Practices; 5.1 Best Practice #1: Understand Exchange Technology; 5.2 Best Practice #2: Plan and Partition Data; 5.3 Best Practice #3: Establish Disaster Recovery Service-Level Agreements; 5.4 Best Practice #4: Select the Right Disaster Recovery Technology; 5.5 Best Practice #5: Select the Right Backup and Recovery Strategy; 5.6 Best Practice #6: Look for Ways to Shrink Disaster Recovery Windows; 5.7 Best Practice #7: Develop an Exchange Disaster Recovery Plan 5.8 Best Practice #8: Train Personnel and Practice Disaster Recovery5.9 Best Practice #9: Disaster Recovery Management; 5.10 Best Practice #10: Plan for Growth Impacts on Disaster Recovery; CHChapter 6. Leveraging Storage Technology; 6.1 Storage Technology Basics; 6.2 Drive Technology; 6.3 Advanced Storage Functionality; CHChapter 7. Leveraging Cluster Technologies for Exchange; 7.1 High Availability Is A Key Concern; 7.2 The Problems Clustering Does and Doesn't Solve; 7.3 Windows NT/2000 Cluster Technology Fundamentals; 7.4 Cluster Support for Exchange 5.5 7.5 Cluster Support in Exchange 20007.6 Decision Points for Deploying Exchange Clusters; 7.7 Deploying Exchange 2000 Clusters; CHChapter 8. Don't Overlook Security as a Powerful High-Availability Measure; 8.1 Threat: Denial of Service; 8.2 Threat: Viruses; 8.3 Threat: Unauthorized Access; 8.4 Threat: Forgery; 8.5 Threat: Mail Relaying; 8.6 Windows 2000 Security Enhancements; 8.7 Locking Down Exchange 2000; 8.8 Putting Security Together; CHChapter 9. Bringing It All Together With Proactive Management; 9.1 Proactive vs. Reactive Management; 9.2 Establishing Service-Level Agreements Mission-Critical Microsoft Exchange 2000 is the definitive book on how to design and maintain extremely reliable and adaptive Exchange Server messaging systems that rarely crash and that preserve valuable data and services in spite of technical disruptions. E-mail systems are now a primary means of communication for organizations, which can afford e-mail down-time no more than they can afford to be without phones. Further, messaging systems increasingly are supporting vital applications in addition to e-mail, such as workflow and knowledge management, making the data they store both voluminous. English. Microsoft Exchange server. http://id.loc.gov/authorities/names/n96094622 Microsoft Exchange server fast Client/server computing. http://id.loc.gov/authorities/subjects/sh93000502 Architecture client-serveur (Informatique) COMPUTERS Web Browsers. bisacsh Client/server computing fast Print version: Cochran, Jerry, 1964- Mission-critical Microsoft Exchange 2000. Boston : Digital Press, ©2001 1555582338 9781555582333 (DLC) 00047512 (OCoLC)45136722 HP Technologies. FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=83554 Volltext |
spellingShingle | Cochran, Jerry, 1964- Mission-critical Microsoft Exchange 2000 : building highly available messaging and knowledge management systems / HP Technologies. Cover; Copyright Page; TOCContents; Foreword; Preface; CHChapter 1. Mission-Critical Exchange; 1.1 Mission-Critical Defined and Understood; 1.2 Assumptions about the Reader; 1.3 Inside Mission-Critical; 1.4 How This Book Is Organized; CHChapter 2. Analyzing Downtime Outages; 2.1 How Do You Measure Downtime?; 2.2 Step 1: What Is the Cost of Exchange Downtime?; 2.3 Step 2: Understand the Anatomy of Exchange Downtime; 2.4 Step 3: Assessing the Causes of Downtime for Exchange; 2.5 Step 4: Defining Mission-Critical Service-Level Agreements 2.6 The Final Step: Architecting Mission-Critical Exchange ServersCHChapter 3. Exchange Database Technology Foundations; 3.1 Storage Paradigms; 3.2 Redefining Storage in Exchange 2000; 3.3 Exchange Database Files; 3.4 Storage Group Allocation and Data Distribution; 3.5 Exchange Database Technology; 3.6 How Exchange 2000 Stores Incoming Data; CHChapter 4. Exchange Disaster Recovery Technology; 4.1 How Can an Exchange Server Fail?; 4.2 Logical Database Corruption; 4.3 JET/ESE Recovery Technology; 4.4 Exchange 2000 Backup Operation; 4.5 Exchange 2000 Restore Operation 4.6 Power with ResponsibilityCHChapter 5. Exchange 2000 Disaster Recovery Best Practices; 5.1 Best Practice #1: Understand Exchange Technology; 5.2 Best Practice #2: Plan and Partition Data; 5.3 Best Practice #3: Establish Disaster Recovery Service-Level Agreements; 5.4 Best Practice #4: Select the Right Disaster Recovery Technology; 5.5 Best Practice #5: Select the Right Backup and Recovery Strategy; 5.6 Best Practice #6: Look for Ways to Shrink Disaster Recovery Windows; 5.7 Best Practice #7: Develop an Exchange Disaster Recovery Plan 5.8 Best Practice #8: Train Personnel and Practice Disaster Recovery5.9 Best Practice #9: Disaster Recovery Management; 5.10 Best Practice #10: Plan for Growth Impacts on Disaster Recovery; CHChapter 6. Leveraging Storage Technology; 6.1 Storage Technology Basics; 6.2 Drive Technology; 6.3 Advanced Storage Functionality; CHChapter 7. Leveraging Cluster Technologies for Exchange; 7.1 High Availability Is A Key Concern; 7.2 The Problems Clustering Does and Doesn't Solve; 7.3 Windows NT/2000 Cluster Technology Fundamentals; 7.4 Cluster Support for Exchange 5.5 7.5 Cluster Support in Exchange 20007.6 Decision Points for Deploying Exchange Clusters; 7.7 Deploying Exchange 2000 Clusters; CHChapter 8. Don't Overlook Security as a Powerful High-Availability Measure; 8.1 Threat: Denial of Service; 8.2 Threat: Viruses; 8.3 Threat: Unauthorized Access; 8.4 Threat: Forgery; 8.5 Threat: Mail Relaying; 8.6 Windows 2000 Security Enhancements; 8.7 Locking Down Exchange 2000; 8.8 Putting Security Together; CHChapter 9. Bringing It All Together With Proactive Management; 9.1 Proactive vs. Reactive Management; 9.2 Establishing Service-Level Agreements Microsoft Exchange server. http://id.loc.gov/authorities/names/n96094622 Microsoft Exchange server fast Client/server computing. http://id.loc.gov/authorities/subjects/sh93000502 Architecture client-serveur (Informatique) COMPUTERS Web Browsers. bisacsh Client/server computing fast |
subject_GND | http://id.loc.gov/authorities/names/n96094622 http://id.loc.gov/authorities/subjects/sh93000502 |
title | Mission-critical Microsoft Exchange 2000 : building highly available messaging and knowledge management systems / |
title_auth | Mission-critical Microsoft Exchange 2000 : building highly available messaging and knowledge management systems / |
title_exact_search | Mission-critical Microsoft Exchange 2000 : building highly available messaging and knowledge management systems / |
title_full | Mission-critical Microsoft Exchange 2000 : building highly available messaging and knowledge management systems / Jerry Cochran. |
title_fullStr | Mission-critical Microsoft Exchange 2000 : building highly available messaging and knowledge management systems / Jerry Cochran. |
title_full_unstemmed | Mission-critical Microsoft Exchange 2000 : building highly available messaging and knowledge management systems / Jerry Cochran. |
title_short | Mission-critical Microsoft Exchange 2000 : |
title_sort | mission critical microsoft exchange 2000 building highly available messaging and knowledge management systems |
title_sub | building highly available messaging and knowledge management systems / |
topic | Microsoft Exchange server. http://id.loc.gov/authorities/names/n96094622 Microsoft Exchange server fast Client/server computing. http://id.loc.gov/authorities/subjects/sh93000502 Architecture client-serveur (Informatique) COMPUTERS Web Browsers. bisacsh Client/server computing fast |
topic_facet | Microsoft Exchange server. Microsoft Exchange server Client/server computing. Architecture client-serveur (Informatique) COMPUTERS Web Browsers. Client/server computing |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=83554 |
work_keys_str_mv | AT cochranjerry missioncriticalmicrosoftexchange2000buildinghighlyavailablemessagingandknowledgemanagementsystems |