The SysAdmin Handbook
The Best of Simple-Talk
Book Details
| Author | Various |
| Publisher | Red Gate |
| Published | 2010 |
| Edition | 1st |
| Paperback | 514 pages |
| Language | English |
| ISBN-13 | 9781906434434, 9781906434427 |
| ISBN-10 | 1906434433, 1906434425 |
| License | Open Access |
Book Description
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unified Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fifty articles packed into this book, it will be an essential reference for any Systems Administrator, whether you have years of experience or are just starting out.
- Message Hygiene in Exchange Server 2007
- Using Exchange 2007 for Resource Booking
- Microsoft Exchange Server 2007: Controlling Email Messages using Exchange's Transport Rules
- Exchange Database Technologies
- Message Classifications in Exchange 2007
- Deploying Exchange 2007 on Windows Server 2008
- Reporting on Mobile Device Activity Using Exchange 2007 ActiveSync Logs
- Online Exchange Backups
- Optimizing Exchange Server 2007
- Exchange Recovery Storage Groups
- Exchange Email Addresses and the Outlook Address Cache
- Goodbye Exchange ExMerge, Hello Export-Mailbox
- Determining MS Exchange Disk Performance
- Message Tracking in Exchange 2007
- Emulating the Exchange 2003 RUS for Out-of-Band Mailbox Provisioning in Exchange 2007
- Using Exchange 2007 Transport Rules to Protect the First Entry in the Address Book
- An Introduction to Messaging Records Management
- Restricting Outlook Client Versions in Exchange 2007
- Exchange Backups on Windows Server 2008
- Monitoring and Scheduling Exchange 2007 Database Online Maintenance
- Exchange 2010 High Availability
- Implementing Cluster Continuous Replication: Part 1
- The Active Directory Recycle Bin in Windows Server 2008 R2
- Using Group Policy to Restrict the Use of PST Files
- Introduction to Exchange Server 2010
- Implementing Windows Server 2008 File System Quotas
- Implementing Cluster Continuous Replication: Part 2
- Active Directory Management with PowerShell in Windows Server 2008 R2
- Upgrade Exchange 2003 to Exchange 2010: Part 1
- Customizing the Outlook Address Book
- Virtual Exchange Servers
- Virtualizing Exchange: Points for Discussion
- Build Your Own Virtualized Test Lab
- A Beginner's Guide to Virtualizing Exchange Server: Part 1
- Windows Server Virtualisation: Introduction to Hyper-V
- Windows Server Virtualisation: Installing Hyper-V and Beyond
- A Beginner's Guide to Virtualizing Exchange Server: Part 2
- Increasing the Availability of Virtualized Applications and Services
This book is published as open-access, which means it is freely available to read, download, and share without restrictions.
If you enjoyed the book and would like to support the author, you can purchase a printed copy (hardcover or paperback) from official retailers.
Download and Read Links
Share this Book
[localhost]# find . -name "*Similar_Books*"
97 Things Every SRE Should Know
Site reliability engineering (SRE) is more relevant than ever. Knowing how to keep systems reliable has become a critical skill. With this practical book, newcomers and old hats alike will explore a broad range of conversations happening in SRE. You'll get actionable advice on several topics, including how to adopt SRE, why SLOs matter, when you ne
The Computers That Made Britain
The home computer boom of the 1980s brought with it now iconic machines such as the ZX Spectrum, BBC Micro, and Commodore 64. Those machines would inspire a generation. Written by Tim Danton. The Computers That Made Britain (300 pages, hardback) tells the story of 19 of those computers - and what happened behind the scenes. With dozens of new inter
The Shallow and the Deep
The Shallow and the Deep is a collection of lecture notes that offers an accessible introduction to neural networks and machine learning in general. However, it was clear from the beginning that these notes would not be able to cover this rapidly changing and growing field in its entirety. The focus lies on classical machine learning techniques, wi
Gaming Rhythms
This book is about digital games, the people who play digital games, and how they play them. This poses a large problem: even when discussing one game, each instance of play is different. Combine this with the thousands of digital games, and the millions of players, and it is apparent that the number of individual instances of game play is unfathom
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written i
The DSC Book
The DSC Book is a comprehensive and continually evolving guide to Microsoft's Desired State Configuration (DSC) technology. Authored by Don Jones and Steve Murawski, this mini book demystifies the powerful declarative platform designed for automating the configuration and management of infrastructure across on-premises and cloud environments. It co