Muutke küpsiste eelistusi

E-raamat: Windows Server 2012: Up and Running: Upgrading, Installing, and Optimizing Windows Server 2012

  • Formaat: PDF+DRM
  • Ilmumisaeg: 12-Nov-2012
  • Kirjastus: O'Reilly Media
  • Keel: eng
  • ISBN-13: 9781449333201
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 35,69 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 12-Nov-2012
  • Kirjastus: O'Reilly Media
  • Keel: eng
  • ISBN-13: 9781449333201
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Discusses how to configure and manage Microsoft Server 2012's expanded capabilities, covering data management, user permissions, networking tools, and data integrity.

With Windows Server 2012 moving into the realm of cloud computing, this book provides a practical guide to installing and configuring this updated operating system. Lynn (networking and business analysis, PC Magazine) gives guidance on topics ranging from managing user permissions through dynamic access control to the set up of virtual environments with Hyper V R3. Written for the professional Windows administrator, it is filled with helpful screen shots. Annotation ©2013 Book News, Inc., Portland, OR (booknews.com)

If your organization plans to move to a cloud infrastructure from a LAN or WAN, this book shows you how to do it efficiently with Windows Server 2012. Experienced Windows administrators will learn how to deploy, configure, and manage the server’s expanded capabilities and features step-by-step, using clear examples and numerous screen shots. You’ll also discover how to integrate employees’ private mobile devices into your corporate network.

Whether you intend to take your infrastructure to a public, private, or hybrid cloud environment, Windows Server 2012 provides the virtualization technology to get you there. This book helps you put it to work.

  • Control your entire Windows infrastructure from the Server Manager console
  • Learn how Active Directory Domain Services provide more centralized network administration
  • Use Dynamic Access Control to manage data and user permissions
  • Provide data integrity and fault tolerance with Storage Spaces and ReFS
  • Gain robust management of virtual environments with Hyper V R3
  • Master networking tools such as IPAM to help you move to the cloud
  • Connect clients to network resources through Unified Remote Access
Preface vii
1 Windows Server 2012: Overview
1(10)
Introducing Windows Server 2012
1(1)
New Capabilities and Updated Features
2(1)
Installation and Interface
2(1)
Management
3(1)
Windows PowerShell 3.0
4(1)
Storage
5(1)
Remote Access
5(1)
Networking
5(1)
Hyper-V 3.0
6(2)
IIS 8
8(1)
Security
9(1)
Clustering
9(1)
Requirements
10(1)
Summary
10(1)
2 Windows Server 2012 Requirements and Installation
11(28)
Server 2012 Editions
11(1)
Server 2012 Datacenter
12(1)
Server 2012 Standard
12(1)
Server 2012 Essentials
13(1)
Server 2012 Foundation
13(1)
Server 2012 Requirements
13(1)
Hyper-V 3.0 Requirements
14(1)
Installing Server 2012
14(2)
Server Core Install
16(9)
Server with a GUI Install
25(3)
Switching Between Install Modes
28(1)
Converting Server Core to Server with a GUI
29(4)
Converting Server with a GUI to Server Core
33(1)
Deploying Minimal Server Interface
34(1)
Customizing the Interface with Features on Demand
35(2)
Summary
37(2)
3 Managing Server 2012
39(28)
Server 2012's Interface
40(2)
Navigating the Tiled Interface
42(3)
Accessing and Running Management Tools
45(1)
Customizing the Interface
46(4)
Logging Off, Restarting, and Shutting Down
50(1)
Performing Searches
51(1)
Server Manager
52(1)
Launching and Working with Server Manager
52(9)
Managing Server 2012 Remotely
61(1)
Installing RSAT
62(3)
Summary
65(2)
4 Active Directory
67(26)
Deploying Active Directory Domain Services
68(1)
Installing Active Directory
68(6)
Adding Machines to a Server 2012 Domain
74(1)
Joining Windows 7 to a Server 2012-Level Domain
74(3)
Joining Windows 8 to a Server 2012-Level Domain
77(2)
Joining Server 2012 to a Server 2008 R2-Level Domain
79(1)
Managing Active Directory
79(1)
Navigating ADAC
80(4)
AD Recycle Bin
84(2)
Performing Searches in ADAC
86(2)
Windows PowerShell History
88(1)
Using PowerShell to Deploy Active Directory
89(2)
Summary
91(2)
5 Managing Users and Data with Dynamic Access Control
93(20)
The Building Blocks of DAC
94(1)
Requirements and Predeployment Pointers
95(1)
Deploying DAC
96(1)
Preparing Claims
96(1)
Configuring Resource Property for Files
97(2)
Adding a Resource Property to the Global Resource Property List
99(1)
Creating a New Central Access Rule
99(2)
Creating a Central Access Policy
101(1)
Publishing a Central Access Policy
101(1)
Configuring the File Server
102(1)
Adding the Central Access Policy to the Folder
102(1)
Validating the Configuration
102(3)
Access Denied Remediation
105(1)
Deploying Access Denied Remediation
106(1)
Auditing
107(2)
Automatic File Classification
109(2)
Encrypting Classified Data
111(1)
Summary
111(2)
6 Storage Management and Clustering
113(18)
ReFS Versus NTFS
114(1)
Creating a Storage Space
115(2)
Clustering
117(2)
Installing Failover Clustering
119(1)
Creating a Cluster
119(7)
Cluster-Aware Updating
126(2)
Summary
128(3)
7 Hyper-V
131(24)
Requirements
133(1)
Installing the Hyper-V Role
134(3)
Creating and Configuring Virtual Machines
137(1)
Configuring Virtual Disks
137(2)
Creating Virtual Machines
139(2)
Managing Virtual Machines and Virtual Disks
141(1)
Live-Migrating Virtual Machines
141(3)
Hyper-V Replica
144(2)
Cloning Virtual Domain Controllers
146(3)
Merging Snapshots
149(1)
Performance and Virtual Network Management
150(1)
Resource Metering
150(3)
Summary
153(2)
8 Networking
155(30)
IPAM
157(1)
Installing IPAM
157(1)
Configuring IPAM
158(5)
Using IPAM
163(12)
NIC Teaming
175(3)
Quality of Service
178(2)
QoS Policies
180(1)
Hyper-V Extensible Network Switch
180(1)
Configuring Private VLANs
180(3)
Summary
183(2)
9 Remote Access
185(32)
Unified Remote Access
185(2)
Requirements
187(1)
DirectAccess
187(1)
Deploying DirectAccess
188(1)
Configuring DirectAccess
189(6)
BranchCache
195(1)
Requirements
196(1)
Deploying BranchCache
196(3)
Configuring the Windows Firewall
199(1)
Deploying the BranchCache Role via Server Manager
200(1)
Deploying the BranchCache Role with PowerShell
200(2)
Prepping and Testing Client Connectivity
202(1)
Virtual Desktop Infrastructure
202(3)
Remote Desktop Services (RDS)
205(1)
Remote Desktop Services Install
205(5)
Remote Desktop Services Management
210(2)
Associating Apps to a Collection and Publishing Remote Apps
212(1)
Adding Published Apps to the RD Web Folder
213(1)
Connecting Clients to Remote Apps
214(2)
Installing RemoteFX
216(1)
Summary
216(1)
10 Troubleshooting, Securing, and Monitoring
217(16)
Server Manager
218(1)
Adding a Server
218(2)
Creating Server Groups
220(2)
The Alert Flag
222(1)
Best Practices Analyzer
223(1)
Windows PowerShell 3.0
224(5)
Security
229(1)
BitLocker
229(2)
Other Security Enhancements
231(1)
Summary
232(1)
Index 233
Samara Lynn has over fifteen years experience in Information Technology; most recent as IT Director at a major New York City healthcare facility. She is a Lead Networking and Business Analyst at PCMag.com. She has several technology certifications, a Bachelor's degree from Brooklyn College and was a Technology Editor for the CRN Test Center.