Skip to content

Best Damn Windows Server 2008 Book Period

ISBN-10: 1597492736

ISBN-13: 9781597492737

Edition: 2nd 2008

Authors: Anthony Piltzecker, Susan Snedaker

List price: $62.95
Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!
Buy eBooks
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller. Bonus coverage includes securing IIS, Exchange Server and SQL Server. Access to a free downloadable version of the book is included. New to this Edition: * Web server management with Internet Information Services 7.0 * Virtualize multiple operating systems on a single server * Hardening Security, including Network Access Protection, Federated Rights Management, and Read-Only Domain Controller
Customers also bought

Book details

List price: $62.95
Edition: 2nd
Copyright year: 2008
Publisher: Elsevier Science & Technology Books
Publication date: 7/4/2008
Binding: Paperback
Pages: 824
Size: 7.50" wide x 9.25" long x 2.00" tall
Weight: 3.630
Language: English

Susan Snedaker, currently Director of IT and Information Security Officer at a large community hospital in Arizona, which has achieved HIMSS Analytics Stage 7 (EMR) certification and has been voted 100 Most Wired Hospitals two years in a row. Susan has over 20 years' experience working in IT in both technical and executive positions including with Microsoft, Honeywell, and VirtualTeam Consulting. Her experience in executive roles has honed her extensive strategic and operational experience in managing data centers, core infrastructure, hardware, software and IT projects involving both small and large teams. Susan holds a Master's degree in Business Administration (MBA) and a Bachelors degree in Management. She is a Certified Professional in Healthcare Information Management Systems (CPHIMS), Certified Information Security Manager (CISM), and was previously certified as a Microsoft Certified Systems Engineer (MCSE), a Microsoft Certified Trainer (MCT). Susan also holds a certificate in Advanced Project Management from Stanford University and an Executive Certificate in International Management from Thunderbird University's Garvin School of International Management. She is the author of six books and numerous chapters on a variety of technical and IT subjects.

Configuring Network Access
Configure Remote Access
Configure Network Access Protection (NAP) components
Configure Network Authentication
Configure data transmission protocols
Configure wireless access
Configure certificate services
Configure DHCP
Configure IPv4 and IPv6 addressing
Configure routing; Configuring the Domain Name System (DNS)
Configure zones
Configure zone resolution
Configure DNS client settings
Configure DHCP and WINS for DNS; Deploying Servers
Configure Windows Deployment Services (WDS)
Capture WDS images
Deploy WDS images
Configure Windows activation
Create virtual machines
Configure Virtual Server settings
Install Windows Server Enterprise
Install server core; Configuring Server Roles
Implement server roles by using Server Manager
Configure ADLDS
Configure ADRMS
Configure the AD server core
Configure the read-only domain controller (RODC)
Configure AD Certificate Services and PKI
Configure Active Directory Federation Services (ADFS); Maintaining the Active Directory Environment
Configure backup and recovery
Perform offline maintenance
Configure custom application directory partitions
Configure AD DS auditing
Configure audit policy by using GPOs
Monitor Active Directory; Configuring the Active Directory Infrastructure
Configure communication security for Active Directory
Configure authentication