As communications networks grow in size and complexity, it becomes increasingly difficult to locally manage and control all of the devices (e.g., routers, servers, and workstations) on those networks. SNMP (Simple Network Management Protocol) gives you a way to manage network devices remotely. Y
Windows NT Backup & Restore
โ Scribed by Jody Leber
- Publisher
- O'Reilly Media
- Year
- 1998
- Tongue
- English
- Edition
- 1st ed
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
As the number of mission-critical applications running on Windows NT grows, it becomes vital for administrators to safeguard data from loss or corruption. While a myriad of Microsoft and third-party software and hardware solutions are currently available (and more are becoming available every day), there is very little guidance for the administrator faced with the problem.Beginning with a discussion of the need for a workable recovery policy and ways to translate that policy into requirements, Windows NT Backup & Restore presents the reader with practical guidelines for setting up an effective backup system in both small and large environments. This book covers the native NT utilities and also includes a discussion of major third-party hardware and software. Numerous checklists help guide you through the various decisions you need to make to implement an effective backup system.Contents include: Introduction to recovery concepts Policy and requirements definition Special NT requirements Software options Hardware considerations Administrators will want to have this book handy at each step as they plan and implement their recovery plans.
๐ SIMILAR VOLUMES
This text discusses the undocumented Windows NT API calls the authors have investigated in two years of research and consulting on installations running Windows NT versions 5.51, 4 and 2000 betas. These undocumented APIs not only show how NT works, but also reveal the security risks inherent in NT.
Windows NT User Administration covers everyday problems faced by system administrators and goes beyond the GUI to describe the tools you need to solve them. The book covers the whole spectrum of user management: user security, user customization, and system resource auditing. You'll find real-w