Mission-critical Microsoft Exchange 2000 : building highly available messaging and knowledge management systems /
Mission-Critical Microsoft Exchange 2000 is the definitive book on how to design and maintain extremely reliable and adaptive Exchange Server messaging systems that rarely crash and that preserve valuable data and services in spite of technical disruptions. E-mail systems are now a primary means of...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boston :
Digital Press,
©2001.
|
Colección: | HP Technologies.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Copyright Page; TOCContents; Foreword; Preface; CHChapter 1. Mission-Critical Exchange; 1.1 Mission-Critical Defined and Understood; 1.2 Assumptions about the Reader; 1.3 Inside Mission-Critical; 1.4 How This Book Is Organized; CHChapter 2. Analyzing Downtime Outages; 2.1 How Do You Measure Downtime?; 2.2 Step 1: What Is the Cost of Exchange Downtime?; 2.3 Step 2: Understand the Anatomy of Exchange Downtime; 2.4 Step 3: Assessing the Causes of Downtime for Exchange; 2.5 Step 4: Defining Mission-Critical Service-Level Agreements
- 2.6 The Final Step: Architecting Mission-Critical Exchange ServersCHChapter 3. Exchange Database Technology Foundations; 3.1 Storage Paradigms; 3.2 Redefining Storage in Exchange 2000; 3.3 Exchange Database Files; 3.4 Storage Group Allocation and Data Distribution; 3.5 Exchange Database Technology; 3.6 How Exchange 2000 Stores Incoming Data; CHChapter 4. Exchange Disaster Recovery Technology; 4.1 How Can an Exchange Server Fail?; 4.2 Logical Database Corruption; 4.3 JET/ESE Recovery Technology; 4.4 Exchange 2000 Backup Operation; 4.5 Exchange 2000 Restore Operation
- 4.6 Power with ResponsibilityCHChapter 5. Exchange 2000 Disaster Recovery Best Practices; 5.1 Best Practice #1: Understand Exchange Technology; 5.2 Best Practice #2: Plan and Partition Data; 5.3 Best Practice #3: Establish Disaster Recovery Service-Level Agreements; 5.4 Best Practice #4: Select the Right Disaster Recovery Technology; 5.5 Best Practice #5: Select the Right Backup and Recovery Strategy; 5.6 Best Practice #6: Look for Ways to Shrink Disaster Recovery Windows; 5.7 Best Practice #7: Develop an Exchange Disaster Recovery Plan
- 5.8 Best Practice #8: Train Personnel and Practice Disaster Recovery5.9 Best Practice #9: Disaster Recovery Management; 5.10 Best Practice #10: Plan for Growth Impacts on Disaster Recovery; CHChapter 6. Leveraging Storage Technology; 6.1 Storage Technology Basics; 6.2 Drive Technology; 6.3 Advanced Storage Functionality; CHChapter 7. Leveraging Cluster Technologies for Exchange; 7.1 High Availability Is A Key Concern; 7.2 The Problems Clustering Does and Doesn't Solve; 7.3 Windows NT/2000 Cluster Technology Fundamentals; 7.4 Cluster Support for Exchange 5.5
- 7.5 Cluster Support in Exchange 20007.6 Decision Points for Deploying Exchange Clusters; 7.7 Deploying Exchange 2000 Clusters; CHChapter 8. Don't Overlook Security as a Powerful High-Availability Measure; 8.1 Threat: Denial of Service; 8.2 Threat: Viruses; 8.3 Threat: Unauthorized Access; 8.4 Threat: Forgery; 8.5 Threat: Mail Relaying; 8.6 Windows 2000 Security Enhancements; 8.7 Locking Down Exchange 2000; 8.8 Putting Security Together; CHChapter 9. Bringing It All Together With Proactive Management; 9.1 Proactive vs. Reactive Management; 9.2 Establishing Service-Level Agreements