Servers Books
Pearson Education (US) Professional Scrum Development with Azure DevOps
Book Synopsis RICHARD HUNDHAUSEN is the president of Accentient, a company that helps software organizations and teams deliver better products by understanding and leveraging Azure DevOps and Scrum. He is a Professional Scrum Trainer and co-creator of the Nexus Scaled Scrum framework. As a software developer, consultant, and trainer with nearly 40 years of experience, he understands that software is built and delivered by people and not by processes or tools. You can reach Richard at richard@accentient.com. Table of ContentsPART I SCRUMDAMENTALS CHAPTER 1 Professional Scrum CHAPTER 2 Azure DevOps CHAPTER 3 Azure Boards PART II PRACTICING PROFESSIONAL SCRUM CHAPTER 4 The Pre-game CHAPTER 5 The Product Backlog CHAPTER 6 The Sprint CHAPTER 7 Planning with Tests CHAPTER 8 Effective Collaboration PART III IMPROVING CHAPTER 9 Improving Flow CHAPTER 10 Continuous Improvement CHAPTER 11 Scaled Professional Scrum
£23.99
Pearson Education (US) Exam Ref AZ104 Microsoft Azure Administrator
Book SynopsisHARSHUL PATEL is a technology enthusiast formerly from India who currently lives in Canada. He has been a cloud consultant with Microsoft Services for more than six year. He drives the adoption of Microsoft's cloud platforms for enterprise customers. He is thoroughly knowledgeable across various virtualization and cloud technologies. Harshul is an experienced author and an early adopter of many Microsoft products. He is a frequent speaker at various user group gatherings and a co-founder of a few global user groups. Apart from work, Harshul is a happy-go-lucky guy. He loves to travel and spend time with his family and friends. Harshul and his wife, Divya, had a baby boy during the production of this book; they call him Rivan.Table of Contents1 Manage Azure identities and governance 2 Implement and manage storage 3 Deploy and manage Azure compute resources 4 Configure and manage virtual networking 5 Monitor and back up Azure resources
£30.59
Pearson Education (US) Microsoft Azure Data Solutions An Introduction
Book SynopsisDaniel A. Seara is an experienced software developer. He has more than 20 years as a technical instructor, developer, and development consultant. Daniel has worked as a software consultant in a wide range of companies in Argentina, Spain, and Peru. He has been asked by Peruvian Microsoft Consulting Services to help several companies in their migration path to .NET development. Daniel was Argentina's Microsoft regional director for four years and was the first nominated global regional director, a position he held for two years. He also was the manager of the Desarrollador Cinco Estrellas I (Five Star Developer) program, one of the most successful training projects in Latin America. Daniel held Visual Basic MVP status for more than 10 years, as well as SharePoint Server MVP status from 2008 until 2014. Additionally, Daniel is the founder and dean of Universidad. NET, the most-visited Spanish-Table of Contents1. Understanding Azure Data Solutions 2. Implementing Azure Data Storage Solutions 3. Managing and Developing Data Processing for Azure Data Solutions 4. Monitoring and Optimizing Azure Data Solutions
£30.59
Cengage Learning, Inc HandsOn Microsoft Windows Server 2019 Looseleaf
Book Synopsis
£96.80
Pearson Education MCSA 70410 Cert Guide R2
Book SynopsisDon Poulton (A+, Network+, Security+, MCSA, MCSE) is an independent consultantwho has been involved with computers since the days of 80-column punch cards. After more than 20 years in environmental science, Don switched careers and trained as a Windows NT 4.0 MCSE. He has been involved in consulting with a couple of small training providers as a technical writer, during which time he wrote training and exam prep materials for Windows NT 4.0, Windows 2000, and Windows XP. Don has written or contributed to several titles, including Security+ Lab Manual (Que, 2004); MCSA/MCSE 70-299 Exam Cram 2: Implementing and Administering Security in a Windows 2003 Network (Exam Cram 2) (Que, 2004); MCSE 70-294 Exam Prep: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure (Que, 2006); MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring (Que, 2008); MCTS 70-680 Cert Guide: Microsoft Windows 7, C
£37.80
Pearson It Certification McSa 70740 Installation Storage and Compute with
Book Synopsis
£144.00
John Wiley & Sons Inc Windows Server 2012 HyperV Installation and
Book SynopsisGo-to guide for using Microsoft''s updated Hyper-V as a virtualization solution Windows Server 2012 Hyper-Voffers greater scalability, new components, and more options than ever before for large enterprise systems and small/medium businesses. Windows Server 2012 Hyper-V Installation and Configuration Guide is the place to start learning about this new cloud operating system. You''ll get up to speed on the architecture, basic deployment and upgrading, creating virtual workloads, designing and implementing advanced network architectures, creating multitenant clouds, backup, disaster recovery, and more. The international team of expert authors offers deep technical detail, as well as hands-on exercises and plenty of real-world scenarios, so you thoroughly understand all features and how best to use them. Explains how to deploy, use, manage, and maintain the Windows Server 2012 Hyper-V virtualization solutions in large enterprises and small- to mTable of ContentsIntroduction xxv Part 1 • The Basics 1 Chapter 1 • Introducing Windows Server 2012 Hyper-V 3 Virtualization and Cloud Computing 4 Computing of the Past: Client/Server 4 Computing of the Recent Past: Virtualization 5 Computing of the Present: Cloud Computing 8 Windows Server 2012: Beyond Virtualization 9 Windows Server 2012 Hyper-V 11 The Technical Requirements of Hyper-V 11 The Architecture of Hyper-V 12 Maximum Scalability 15 Supported Guest Operating Systems 18 Licensing Windows Server 2012 in Virtualization 18 Common Misunderstandings in Licensing 19 Windows Server 2012 Licensing 20 Hyper-V Server 2012 23 Virtualization Scenarios 24 VMware 26 Migrating from VMware 27 Transferring Skills to Hyper-V 27 Other Essential Knowledge 28 Microsoft Assessment and Planning Toolkit 28 PowerShell 29 Chapter 2 • Deploying Hyper-V 33 Preparing a Hyper-V Deployment 33 Design and Architecture 33 Hardware 36 Operating System 39 Don’t Forget the Documentation 41 Windows PowerShell 42 Building the First Hyper-V Host 43 Preparing Windows Server 43 Installing the Hyper-V Role 47 Configuring the Hyper-V Host 48 Providing Security 54 Managing Hyper-V 56 Hyper-V Management Console 57 Hyper-V PowerShell 57 Server Core 59 Upgrading Hyper-V 61 Performing In-Place Migration 62 Using the Windows Server Migration Tools 62 Exporting and Importing Virtual Machines 62 Upgrading Integration Services 64 Real World Solutions 65 Chapter 3 • Managing Virtual Machines 71 Creating Virtual Machines 71 Create a Virtual Machine by Using the New Virtual Machine Wizard 72 Create a Virtual Machine by Using PowerShell 77 Designing Virtual Machines 78 Virtual Machine Maximums 78 Auto-Start and Auto-Stop Actions 81 Dynamic Memory 83 Processors 95 Virtual Storage 100 Network Adapters 111 Performing Virtual Machine Operations 117 Adding and Removing Virtual Hardware 117 Working with Snapshots 118 Using Live Migration 124 Importing and Exporting Virtual Machines 138 Installing Operating Systems and Applications 140 Installing Operating Systems 140 Using Virtual Machine Templates 142 Designing Virtual Machines for Applications 143 Performance Monitoring of Guest Operating Systems 143 Real World Solutions 144 Replacing Virtual Switches 144 Performing Simultaneous Live Migration 144 Rapid Virtual Machine Creation 146 Part 2 • Advanced Networking and Cloud Computing 153 Chapter 4 • Networking 155 Basic Hyper-V Networking 155 Using the Hyper-V Extensible Virtual Switch 156 Supporting VLANs 166 Supporting NIC Teaming 171 Networking Hardware Enhancements 183 Single-Root I/O Virtualization 183 Receive-Side Scaling 187 Dynamic Virtual Machine Queuing 190 IPsec Task Offload 191 Advanced Networking 191 Quality of Service 191 Converged Fabrics 201 Real World Solutions 210 Implementing RSS and DVMQ 210 Creating Converged Fabrics with Isolated SMB Storage 213 Creating Converged Fabrics with DCB and SR-IOV 216 Chapter 5 • Cloud Computing 219 Clouds, Tenants, and Segregation 220 The Multi-Tenancy Era 220 Segregation by Isolation 221 Microsoft Network Virtualization 223 Encapsulated Network Virtualization 224 Network Virtualization Abstraction 225 Network Virtualization at Work 232 Network Virtualization Gateways 251 PVLANs 252 Understanding PVLAN Structure 254 Understanding How PVLANs Work 255 Configuring Private VLANs 259 Summary 263 Port Access Control Lists 263 How ACLs Work 263 Extensible Switch Packet Filter 264 DHCP Guard 266 Router Advertisement Guard 267 Hyper-V Virtual Machine Metrics 268 Real World Solutions 270 Part 3 • Storage and High Availibility 273 Chapter 6 • Microsoft iSCSI Software Target 275 Introducing the Microsoft iSCSI Software Target 275 The Microsoft iSCSI Solution 276 Changes in Windows Server 2012 278 Design and Architecture 280 Building the iSCSI Target 283 Installing a Stand-Alone iSCSI Target 283 Installing a Clustered iSCSI Target 284 Transforming a Stand-Alone to a Clustered iSCSI Target 285 Configuring the iSCSI Target 286 Connecting the Initiator 288 Managing the iSCSI Target Server 289 Storage Providers 289 iSCSI Target SMI-S Provider 289 Best Practice Analyzer 292 PowerShell 293 Migrating 295 Migration to Windows Server 2012 295 VHD Conversion 295 Chapter 7 • Using File Servers 297 Introducing Scale-Out File Servers 298 Limitations in Availability and Performance with Windows Server 2008 R2 299 Technical Overview of the Key Changes 300 Installing and Configuring Scale-Out File Servers 309 Complying with Installation Prerequisites 310 Configuring Failover Clustering 311 Configuring Scale-Out File Services 315 Configuring a Continuously Available File Share 316 Windows Server 2012 SMB PowerShell 318 Windows Server 2012 Hyper-V over SMB 30 319 Some Real-World Examples 320 Configuring Windows Server 2012 Hyper-V to Use Scale-Out File Server Cluster 322 Configuring SQL Server to Use Scale-Out File Server Cluster 325 Troubleshooting Scale-Out File Servers 329 Using Troubleshooting Tools 329 Troubleshooting Client Network Connectivity Issues 332 Troubleshooting Access Denied Issues 333 Troubleshooting Cluster Resource Issues 333 Real World Solutions 333 Chapter 8 • Building Hyper-V Clusters 335 Introduction to Building Hyper-V Clusters 335 Active Directory Integration 337 Failover Clustering Installation 337 Performing Validation 338 Running Cluster Validation 338 Creating a Failover Cluster 342 Adding Disks 344 Configuring Network Prioritization 345 Cluster Shared Volumes 346 Cluster Shared Volumes Compatibility 346 Prerequisites 347 Enabling Cluster Shared Volumes 348 CSV Namespace 348 CSV Resiliency 348 CSV Optimizations 349 CSV Best Practices 350 BitLocker 351 Prerequisites 351 Installing BitLocker 351 Configuring BitLocker on Cluster Shared Volumes 352 Cluster-Aware Updating 357 Prerequisites 359 Installing and Configuring CAU 360 Highly Available Virtual Machine 370 Implementing a Highly Available Virtual Machine 370 Examining the Virtual Machine Role 371 Virtual Machine Mobility 375 Live-Migrating Virtual Machines 376 Using Live Storage Migration 376 Real World Solutions 378 Chapter 9 • Virtual SAN Storage and Guest Clustering 379 Introduction to Virtual SAN Storage 379 Overview of Virtual Fibre Channel 380 Guest Clustering 388 Guest Clustering on a Single Host 388 Guest Clustering across Physical Hosts 389 Guest Clustering across Physical Hosts and Virtual Machines 390 Creating a Guest-Based Cluster 391 Virtual Machine Preparation 391 Virtual Machine Monitoring 393 Configuring Virtual Machine Monitoring 395 Real World Solutions 399 Part 4 • Advanced Hyper-V 401 Chapter 10 • Backup and Recovery 403 How Backup Works with Hyper-V 403 Volume Shadow Copy Service Framework 403 Virtual Machine Backup Strategies 406 Choosing a Backup Strategy 409 Improvements in Windows Server 2012 Hyper-V Backup 410 Incremental Backup 410 Windows Server Backup 411 Distributed CSV Snapshots 412 VSS for SMB File Shares 414 Using Windows Server Backup 418 Installing Windows Server Backup 419 Protecting Nonclustered Hyper-V Hosts 419 Protecting Hyper-V Clusters 425 The Impact of Backup on the Network 426 Real World Solutions 427 Using WSB to Back up a Hyper-V Host and Retain Backup Data 427 Performing Automated WSB Backup of a Hyper-V Cluster 429 Chapter 11 • Disaster Recovery 431 Introducing Disaster Recovery 431 The Evolution of Disaster Recovery 432 Virtualization Simplifies DR 433 DR Architecture for Windows Server 2012 Hyper-V 434 DR Requirements 435 Synchronous and Asynchronous Replication 436 DR Architectures 438 DR Replication Solutions 440 Virtual Machine Connectivity 446 Implementation of a Hyper-V Multi-site Cluster 456 Replication Link Networking 456 Multi-site Cluster Quorum 457 Tuning Cluster Heartbeat 462 Preferred Owners (Hosts) 463 Summarizing Multi-site Clusters 465 Real World Solutions 465 Designing Hybrid DR 465 Designing Hosted Disaster Recovery 466 Chapter 12 • Hyper-V Replica 469 Introducing Hyper-V Replica 469 How Hyper-V Replica Works 470 Target Markets for Hyper-V Replica 471 Hyper-V Replica Requirements 472 Bandwidth Requirements 472 What Can You Replicate Between? 473 Enabling Hyper-V Replica between Nonclustered Hosts 475 Enabling Virtual Machine Replication 478 Understanding Copy Methods 479 Replicating a Virtual Machine with Network Copy 480 Replicating a Virtual Machine with Removable Media 486 Replicating a Virtual Machine with Offsite Recovery 488 Using Authentication with Certificates 489 Understanding Certificate Requirements 489 Enabling Hyper-V Replica with HTTPS 490 Replicating Virtual Machines via HTTPS 491 Using Advanced Authorization and Storage 491 Using Hyper-V Replica with Clusters 493 Understanding the Hyper-V Replica Broker 493 Creating the Hyper-V Replica Broker 495 Allowing Replication from a Cluster 497 Allowing Replication to a Cluster 498 Exploring Hyper-V Replica in Greater Detail 498 Hyper-V Replica Logging and Swapping 499 Resynchronization 499 The Performance Impact of Hyper-V Replica 500 Managing Hyper-V Replica 501 Monitoring Replication 501 Managing Replication 504 Setting Up Failover Networking 505 Failover TCP/IP 505 Test Failover Virtual Switch 506 Failing Over Virtual Machines 508 Performing a Test Failover 508 Returning to the Production Site 510 Performing a Planned Failover 510 Performing an Unplanned Failover 512 Summarizing Hyper-V Replica 513 Real World Solutions 514 Enabling Replication for Lots of Virtual Machines 514 Running a Planned Failover 515 Scripting an Ordered Unplanned Failover 517 Chapter 13 • Using Hyper-V for Virtual Desktop Infrastructure 521 Using Virtual Desktops, the Modern Work Style 521 What Is VDI? 521 The Benefits of Using Hyper-V for VDI 522 Changes in Windows Server 2012 523 Design and Architecture 524 Building a Microsoft VDI Environment 529 Installing Remote Desktop Services 529 Installing RD Virtualization Hosts 534 Deploying Virtual Guests 536 Connecting to the VDI Environment 539 Real World Solutions 541 Index 543
£42.75
John Wiley & Sons Inc Mastering Windows Server 2016 HyperV
Book SynopsisBuild a seamless, flexible, full-service datacenter solution Microsoft Windows Server 2016 Hyper-V is the IT administrator''s guide to this rising datacenter solution. Hyper-V has already surpassed VMWare in datacenter management, identity service for multiple devices, and more; this book shows you how to harness the power of this hypervisor to simplify the infrastructure, reduce costs, improve productivity, and better manage system resources. From a tour of the technology through architecture, deployment, and integration of System Center, Microsoft Azure, and Microsoft Azure Stack, the discussion illustrates the skills you need to create a complete solution for optimum enterprise management. Coverage includes Windows Azure capabilities for virtual machines, managing a hybrid cloud, IaaS, storage capabilities, PowerShell, and more, with practical real-world guidance from a leading authority in the field. Hyper-V has recently undergone improvements in scalability andTable of ContentsIntroduction xix Chapter 1 • Introduction to Virtualization and Microsoft Solutions 1 The Evolution of the Datacenter 1 One Box, One Operating System 1 How Virtualization Has Changed the Way Companies Work and Its Key Values 5 History of Hyper-V 10 Windows Server 2008 Hyper-V Features 12 Windows Server 2008 R2 Changes 13 Windows Server 2008 R2 Service Pack 115 Windows Server 2012 Hyper-V Changes 16 Windows Server 2012 R2 22 Windows Server 2016 24 Licensing of Hyper-V 26 One Operating System (Well Two, but Really One) with Windows Server 2012 and 2012 R2 26 Windows Server 2016 Changes to Licensing and Versions 29 Choosing the Version of Hyper-V 31 The Role of System Center with Hyper-V 32 System Center Confi guration Manager33 System Center Virtual Machine Manager and App Controller 34 System Center Operations Manager 34 System Center Data Protection Manager 35 System Center Service Manager 35 System Center Orchestrator 36 Clouds and Services 36 The Bottom Line 38 Chapter 2 • Virtual Machine Resource Fundamentals 41 Understanding VMBus 41 The Anatomy of a Virtual Machine 44 Generation 1 Virtual Machine 45 Generation 2 Virtual Machine 50 VMCX Configuration File 53 VM Configuration Versions 54 Processor Resources 55 Virtual Processor to Logical Processor Scheduling 58 Processor Assignment 60 NUMA Support 66 Memory Resources 69 Dynamic Memory 69 Runtime Memory Resize 75 Virtual Storage 77 VHD 78 VHDX 79 Creating a Virtual Hard Disk 80 Pass-Through Storage 83 Discrete Device Assignment 83 The Bottom Line 86 Chapter 3 • Virtual Networking 89 Virtual Switch Fundamentals 89 Three Types of Virtual Switches 89 Creating a Virtual Switch 92 Extensible Switch 94 VLANs and PVLANS 99 Understanding VLANs 99 VLANs and Hyper-V 102 PVLANs 104 How SCVMM Simplifies Networking with Hyper-V 107 SCVMM Networking Architecture 108 Deploying Networking with SCVMM 2016 114 Network Virtualization 129 Network Virtualization Overview 130 Network Controller 135 Software Load Balancer 137 Gateways 140 Datacenter Firewall 141 UDR, Port Mirroring, and Virtual Appliances 144 Implementing Network Virtualization 145 Summary 147 VMQ, RSS, and SR-IOV 148 SR-IOV 148 VMQ 151 RSS and vRSS 154 NIC Teaming 157 Host Virtual Adapters and Types of Networks Needed in a Hyper-V Host 160 Types of Guest Network Adapters 165 Monitoring Virtual Traffic 169 The Bottom Line 171 Chapter 4 • Storage Configurations 173 Storage Fundamentals and VHDX 173 Types of Controllers 176 Common VHDX Maintenance Actions 177 Dynamic VHDX Resize 179 Storage Spaces and Windows as a Storage Solution 180 Storage Space Basics 181 Using Storage Spaces 182 Windows Server 2012 R2 Storage Space Changes 184 Windows Server 2016 Storage Space Changes 186 Storage Replica 193 Storage Spaces Direct and Storage Replica Together 197 Server Message Block Usage 197 SMB Technologies 198 SMB for Hyper-V Storage 203 iSCSI with Hyper-V 205 Using the Windows iSCSI Target 206 Using the Windows iSCSI Initiator 207 Considerations for Using iSCSI 209 Understanding Virtual Fibre Channel 209 Leveraging Shared VHDX and VHD Sets 216 Data Deduplication and Hyper-V 220 Storage Quality of Service 222 SAN Storage and SCVMM 227 The Bottom Line 229 Chapter 5 • Managing Hyper-V 231 Installing Hyper-V231 Using Configuration Levels 233 Windows Server 2016 and Nano Server 235 Enabling the Hyper-V Role 243 Actions after Installation of Hyper-V 245 Deploying Hyper-V Servers with SCVMM 247 Hyper-V Management Tools 248 Using Hyper-V Manager 250 Core Actions Using PowerShell 255 VM Groups 259 PowerShell Direct 260 Securing the Hyper-V Server 261 Creating and Managing a Virtual Machine 262 Shielded VMs and Host Guardian Service 266 Review of Shielded VMs and Host Guardian Service 267 Deploying Shielded VMs 269 Creating and Using Hyper-V Templates 278 Hyper-V Integration Services and Supported Operating Systems 287 Migrating Physical Servers and Virtual Machines to Hyper-V Virtual Machines 291 Upgrading and Migrating from Previous Versions 293 Stand-Alone Hosts 294 Clusters 294 The Bottom Line 298 Chapter 6 • Maintaining a Hyper-V Environment 299 Patch Planning and Implementation 299 Leveraging WSUS 300 Patching Hyper-V Clusters 301 Malware Configurations 304 Backup Planning 305 Defragmentation with Hyper-V 309 Using Checkpoints 312 Using Service Templates 317 Performance Tuning and Monitoring with Hyper-V 320 Resource Metering 324 Monitoring 329 The Bottom Line 330 Chapter 7 • Failover Clustering and Migration Technologies 333 Failover Clustering Basics 333 Understanding Quorum and Why It’s Important 335 Quorum Basics 336 Modifying Cluster Vote Configuration 343 Advanced Quorum Options and Forcing Quorums 345 Geographically Distributed Clusters 347 Why Use Clustering with Hyper-V? 350 Service Monitoring 351 Protected Network 353 Cluster-Aware Updating 354 Where to Implement High Availability 356 Configuring a Hyper-V Cluster 358 Cluster Network Requirements and Configurations 359 Performing Cluster Validation 369 Creating a Cluster 373 Creating Clusters with SCVMM 373 Using Cluster Shared Volumes 376 Making a Virtual Machine a Clustered Virtual Machine 381 Live Migration 383 Windows Server 2012 Live Migration Enhancements 386 Live Storage Move 388 Shared Nothing Live Migration 392 Configuring Constrained Delegation 394 Initiating Simultaneous Migrations Using PowerShell 397 Windows Server 2012 R2 Live Migration Enhancements 397 Dynamic Optimization and Resource Balancing 398 The Bottom Line 405 Chapter 8 • Hyper-V Replica and Cloud Orchestration 407 The Need for Disaster Recovery and DR Basics 407 Asynchronous vs Synchronous Replication 409 Introduction to Hyper-V Replica 410 Enabling Hyper-V Replica 412 Configuring Hyper-V Replica 414 Using Hyper-V Replica Broker 421 Performing Hyper-V Replica Failover 422 Sizing a Hyper-V Replica Solution 428 Using Hyper-V Replica Cloud Orchestration for Automated Failover with Azure Site Recovery 430 Overview of Hyper-V Protection with Azure Site Recovery 431 Getting Started with ASR R 434 Architecting the Right Disaster-Recovery Solution 435 The Bottom Line436 Chapter 9 • Implementing the Private Cloud, SCVMM, and Microsoft Azure Stack 437 The Benefits of the Private Cloud 437 Private Cloud Components 442 SCVMM Fundamentals 444 Major New Capabilities in SCVMM 2016 444 Installation 445 SCVMM Management Console 448 Libraries 452 Creating a Private Cloud by Using System Center Virtual Machine Manager 455 Granting Users Access to the Private Cloud 463 Enabling Workflows and Advanced Private Cloud Concepts by Using Service Manager and Orchestrator 463 Utilizing Windows Azure Pack 466 How the Rest of System Center Fits into Your Private Cloud Architecture 468 Understanding Microsoft Azure Stack 471 Architecture 473 Types of Deployment 476 What Does Azure Stack Mean? 476 Where Does System Center and Operations Management Suite Fit with Azure Stack 477 The Bottom Line 477 Chapter 10 • Containers and Docker 479 Challenge of Application Deployment 479 Hyper-V Nested Virtualization 480 Windows Container Fundamentals 481 Windows Server Containers vsHyper-V Containers 484 Docker 486 Installing the Container Feature 488 Creating and Managing Containers 490 Configuring Networking 490 Creating and Interacting with Containers 498 Understanding Storage for Containers 503 Integrating Active Directory 504 Working with Image Registries 504 Patching and Updating 505 Using Containers in Your Organization 505 The Bottom Line 506 Chapter 11 • Remote Desktop Services 507 Remote Desktop Services and Bring Your Own Device 507 Microsoft Desktop and Session Virtualization Technologies 512 RD Web Access 514 RD Connection Broker 515 RD Virtualization Host 516 RD Gateway 516 Requirements for a Complete Desktop Virtualization Solution 517 Creating the VDI Template 522 Deploying a New VDI Collection Using Scenario-Based Deployment 524 Personal Session Desktops 530 Using RemoteFX 532 Remote Desktop Protocol Capabilities 538 Using Multipoint Services 541 Choosing the Right Desktop Virtualization Technology 542 The Bottom Line 546 Chapter 12 • Microsoft Azure IaaS, Storage, and Networking 547 Understanding Public Cloud “as a Service” 547 When Are Public Cloud Services the Best Solution? 549 Microsoft Azure 101 553 Microsoft Azure Compute 554 Capabilities of Azure IaaS and How It Is Purchased 555 Creating Virtual Machines in Azure IaaS 566 Availability Sets 568 Azure Storage 570 Virtual Networks 576 Linking On-Premises Networks with Azure IaaS 578 Managing with PowerShell 580 Migrating Virtual Machines Between Hyper-V and Azure IaaS 584 The Bottom Line 585 Chapter 13 • Bringing It All Together with a Best-of-Breed Cloud Solution 587 Which Is the Right Technology to Choose? 587 Consider the Public Cloud 588 Decide If a Server Workload Should Be Virtualized 593 Do I Want a Private Cloud? 595 Enabling Single-Pane-of-Glass Management 596 The Bottom Line 598 Appendix • The Bottom Line 599 Chapter 1: Introduction to Virtualization and Microsoft Solutions 599 Chapter 2: Virtual Machine Resource Fundamentals 600 Chapter 3: Virtual Networking 601 Chapter 4: Storage Confi gurations 602 Chapter 5: Managing Hyper-V 603 Chapter 6: Maintaining a Hyper-V Environment 604 Chapter 7: Failover Clustering and Migration Technologies 605 Chapter 8: Hyper-V Replica and Cloud Orchestration 605 Chapter 9: Implementing the Private Cloud, SCVMM, and Microsoft Azure Stack 606 Chapter 10: Containers and Docker 607 Chapter 11: Remote Desktop Services 608 Chapter 12: Microsoft Azure IaaS, Storage, and Networking 609 Chapter 13: Bringing It All Together with a Best-of-Breed Cloud Solution 610 Index 611
£35.62
John Wiley & Sons Inc Windows Server 2019 PowerShell AllinOne For
Book SynopsisTable of ContentsIntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 2 Beyond the Book 3 Where to Go from Here 3 Book 1: Installing and Setting Up Windows Server 2019 5 Chapter 1: An Overview of Windows Server 2019 7 Extra! Extra! Read All About It! Seeing What’s New in Windows Server 2019 8 Deciding Which Windows Server 2019 Edition Is Right for You 12 Essentials 12 Standard 13 Datacenter 13 Walking the Walk: Windows Server 2019 User Experiences 13 Desktop Experience 13 Server Core 14 Nano 15 Seeing What Server Manager Has to Offer 15 Windows Admin Center: Your New Best Friend 17 Chapter 2: Using Boot Diagnostics 21 Accessing Boot Diagnostics 21 From the DVD 22 From the boot menu 24 Using a Special Boot Mode 25 Safe Mode 25 Enable Boot Logging 27 Enable Low-Resolution Video 27 Last Known Good Configuration 27 Directory Services Restore Mode 28 Debugging Mode 28 Disable Automatic Restart on System Failure 29 Disable Driver Signature Enforcement 29 Disable Early Launch Anti-Malware Driver 29 Performing a Memory Test 30 Using the Command Prompt 32 Working with Third-Party Boot Utilities 32 Chapter 3: Performing the Basic Installation 35 Making Sure You Have What It Takes 36 Central processing unit 36 Random access memory 38 Storage 38 Network adapter 39 DVD drive 39 UEFI-based firmware 39 Trusted Platform Module 39 Monitor 39 Keyboard and mouse 40 Performing a Clean Install 40 Upgrading Windows 43 Performing a Network Install with Windows Deployment Services 46 Chapter 4: Performing Initial Configuration Tasks 47 Understanding Default Settings 48 Getting an Overview of the Configuration Process 49 Providing Computer Information 50 Windows Server 2019 with Desktop Experience 50 Windows Server 2019 Core 54 Updating Windows Server 2019 60 Windows Server 2019 with Desktop Experience 60 Windows Server 2019 Core 62 Customizing Windows Server 2019 64 Windows Server 2019 with Desktop Experience 64 Windows Server 2019 Core 67 Configuring Startup Options with BCDEdit 70 Book 2: Configuring Windows Server 2019 73 Chapter 1: Configuring Server Roles and Features 75 Using Server Manager 75 Roles and features 76 Diagnostics 77 Configuration tasks 78 Configure and Manage Storage 79 Understanding Server Roles 80 Active Directory Certificate Services 80 Active Directory Domain Services 81 Active Directory Federation Services 81 Active Directory Lightweight Directory Services 81 Active Directory Rights Management Services 82 Device Health Attestation 82 Dynamic Host Configuration Protocol 82 Domain Name System 83 Fax Server 83 File and Storage Services 84 Host Guardian Service 84 Hyper-V 85 Network Controller 85 Network Policy and Access Services 85 Print and Document Services 86 Remote Access 86 Remote Desktop Services 86 Volume Activation Services 86 Web Services 87 Windows Deployment Services 87 Windows Server Update Services 87 Understanding Server Features 87 .NET 3.5 88 .NET 4.7 88 Background Intelligent Transfer Service 88 BitLocker Drive Encryption 88 BitLocker Network Unlock 89 BranchCache 89 Client for NFS 89 Containers 89 Data Center Bridging 90 Direct Play 90 Enhanced Storage 90 Failover Clustering 90 Group Policy Management 91 Host Guardian Hyper-V Support 91 I/O Quality of Service 91 IIS Hostable Web Core 91 Internet Printing Client 91 IP Address Management Server 92 Internet Storage Name Server Service 92 LPR Port Monitor 92 Management OData IIS Extension 92 Media Foundation 92 Message Queueing 93 Multipath I/O 93 Multipoint Connector 93 Network Load Balancing 93 Network Virtualization 93 Peer Name Resolution Protocol 94 Quality Windows Audio Video Experience 94 RAS Connection Manager Administration Kit 94 Remote Assistance 94 Remote Differential Compression 94 Remote Server Administration Tools 94 RPC over HTTP Proxy 95 Setup and Boot Event Collection 95 Simple TCP/IP Services 95 SMB 1.0/CIFS File Sharing Support 95 SMB Bandwidth Limit 96 SMTP Server 96 Simple Network Management Protocol Service 96 Software Load Balancer 96 Storage Migration Service 97 Storage Migration Service Proxy 97 Storage Replica 97 System Data Archiver 97 System Insights 98 Telnet Client 98 TFTP Client 98 VM Shielding Tools for Fabric Management 98 WebDAV Redirector 98 Windows Biometric Framework 99 Windows Defender Antivirus 99 Windows Identity Foundation 3.5 99 Windows Internal Database 99 Windows PowerShell 99 Windows Process Activation Service 99 Windows Search Service 100 Windows Server Backup 100 Windows Server Migration Tools 100 Windows Standards-Based Storage Management 100 Windows Subsystem for Linux 101 Windows TIFF IFilter 101 WinRM IIS Extension 101 WINS Server 101 Wireless LAN Service 101 WoW64 Support 101 XPS Viewer 102 Chapter 2: Configuring Server Hardware 103 Working with Device Manager 104 Opening Device Manager 104 Configuring how Device Manager displays 104 Viewing devices that are not working properly 106 Understanding resources 107 Viewing hidden devices 108 Scanning for new devices 109 Working with older devices 109 Viewing individual device settings 109 Updating drivers 111 Configuring power management 111 Using the Add Hardware Wizard 112 Performing Hard-Drive-Related Tasks 113 Choosing basic or dynamic disks 114 Using multipath I/O 115 Working with storage area networks 116 Understanding Storage Spaces Direct 117 Working with Storage Replica 123 Using Storage Quality of Service 124 Encrypting with BitLocker 124 Performing Printer-Related Tasks 134 Using the Printer Install Wizard 134 Configuring print options 136 Configuring the Print Server role 137 Connecting to a Printer on a Print Server 140 Performing Other Configuration Tasks 141 Keyboard 141 Mouse 141 Power management 142 Sound 143 Language 143 Fonts 143 Chapter 3: Using the Control Panel 145 Accessing the Control Panel 145 Configuring the Control Panel 146 Understanding Control Panel Items 148 Chapter 4: Working with Workgroups 157 Knowing What a Workgroup Is 158 Knowing If a Workgroup Is Right for You 158 Comparing Centralized and Group Sharing 159 Configuring a Server for a Workgroup 159 Changing the name of your workgroup 160 Adding groups 161 Creating users and adding users to the group 162 Adding shared resources 164 Managing Workgroups 168 The Computer Management console 168 The User Account window 169 PowerShell 170 Examining the Peer Name Resolution Protocol 172 Chapter 5: Promoting Your Server to Domain Controller 173 Understanding Domains 173 What is a domain? 174 Forests and domains and OUs, oh my! 174 Understanding privileged domain groups 175 Examining Flexible Single Master Operation roles on domain controllers 175 Preparing to Create a Domain 177 Functional levels 178 Forest functional level 179 Domain functional level 179 Performing Domain Configuration Prerequisites 179 Checking for unsupported roles and features 180 Installing and configuring Domain Name System 180 Installing and configuring Dynamic Host Configuration Protocol 183 Configuring the Server as a Domain Controller 187 Installing Active Directory Domain Services 188 Configuring Active Directory Domain Services 188 Converting your DNS Zone to an Active Directory Integrated Zone 190 Authorizing your DHCP Server for your Active Directory environment 193 Configuring the user accounts 194 Sharing resources on a domain 196 Joining clients to the domain 197 Wrapping Things Up 202 Chapter 6: Managing DNS and DHCP with IP Address Management 205 Installing IP Address Management 206 Configuring IP Address Management 206 Using IP Address Management 210 Overview 210 Server Inventory 211 IP Address Space 211 Monitor and Manage 213 Event Catalog 215 Access Control 215 Book 3: Administering Windows Server 2019 217 Chapter 1: An Overview of the Tools Menu in Server Manager 219 Accessing the Server Manager Tools Menu 219 Working with Common Administrative Tools 222 Computer Management 222 Defragment and Optimize Drives 222 Disk Cleanup 223 Event Viewer 224 Local Security Policy 224 Registry Editor 226 Services 226 System Configuration 228 Task Scheduler 228 Installing and Using Remote Server Administration Tools 229 Installing Remote Server Administration Tools 229 Using Remote Server Administration Tools 230 Chapter 2: Setting Group Policy 233 Understanding How Group Policy Works 234 Starting the Group Policy Editor 235 Performing Computer Management 236 Modifying computer software settings 238 Modifying computer settings 239 Using Administrative Templates 240 Performing User Configuration 241 Modifying user software settings 241 Modifying a user’s Windows Settings 242 Using user Administrative Templates 244 Viewing Resultant Set of Policy 244 Chapter 3: Configuring the Registry 247 Starting Registry Editor 248 Importing and Exporting Registry Elements 248 Exporting Registry elements 249 Importing Registry elements 249 Finding Registry Elements 250 Understanding Registry Data Types 251 Understanding the Hives 252 HKEY_CLASSES_ROOT 252 HKEY_CURRENT_USER 253 HKEY_LOCAL_MACHINE 254 HKEY_USERS 255 HKEY_CURRENT_CONFIG 256 Loading and Unloading Hives 256 Connecting to Network Registries 258 Setting Registry Security 259 Setting permissions in the Windows Registry 259 Disabling Remote Registry access 259 Securing remote administration 260 Chapter 4: Working with Active Directory 263 Active Directory 101 263 Configuring Objects in Active Directory 264 Using Active Directory Domains and Trusts 264 Using Active Directory Sites and Services 269 Using Active Directory Users and Computers 270 Using Active Directory Administrative Center 274 Chapter 5: Performing Standard Maintenance 277 Activating Windows 277 Through the graphical user interface 278 Through the command line 278 Configuring the User Interface 280 Working with the Folder Options dialog box 280 Setting your Internet Options 282 Focusing on your Personalization settings 284 Reporting problems 286 Setting your Regional and Language Options 286 Working with the Performance Options dialog box 287 Understanding How User Access Control Affects Maintenance Tasks 288 Adding and Removing Standard Applications 289 Measuring Reliability and Performance 290 Performance Monitor 290 Resource Monitor 292 Task Manager 293 Protecting the Data on Your Server 294 System Backup 295 System Restore 297 Performing Disk Management Tasks 298 Managing storage 299 Managing disks 299 Defragmenting drives 300 Automating Diagnostic Tasks with Task Scheduler 301 Discovering task status 301 Using preconfigured tasks 302 Creating your own tasks 304 Working with Remote Desktop 305 Working with Remote Server Administration Tools 306 Figuring out firewall rules 306 Connecting to the server 306 Managing your servers 307 Working with Admin Center 308 Focusing on firewall rules 309 Connecting to a server 309 Using Windows Admin Center to manage your servers 309 Creating a Windows Recovery Drive 311 Chapter 6: Working at the Command Line 313 Opening an Administrative Command Prompt 313 Configuring the Command Line 314 Customizing how you interact with the Command Prompt 314 Changing the font 316 Choosing your window layout 317 Defining text colors 318 Setting Environmental Variables 319 Getting Help at the Command Line 320 Understanding Command Line Symbols 322 Chapter 7: Working with PowerShell 323 Opening an Administrative PowerShell Window 324 Configuring PowerShell 325 Options 325 Font 327 Layout 328 Colors 328 Using a Profile Script 330 Setting Environmental Variables 330 Getting Help in PowerShell 332 Understanding PowerShell Punctuation 334 Book 4: Configuring Networking in Windows Server 2019 337 Chapter 1: Overview of Windows Server 2019 Networking 339 Getting Acquainted with the Network and Sharing Center 340 Using the Network Connections Tools 342 Status 342 Ethernet 343 Dial-up 344 VPN 344 Proxy 344 Configuring TCP/IP 346 Understanding DHCP 349 Defining DNS 350 Creating a DNS zone 352 DNS and Active Directory 353 Making DNS fault tolerant 354 Chapter 2: Performing Basic Network Tasks 355 Viewing Network Properties 355 Connecting to Another Network 357 Connecting to the Internet 358 Setting up a dial-up connection 359 Connecting to a virtual private network 360 Managing Network Connections 361 Understanding the Client for Microsoft Networks feature 362 Configuring the Internet Protocol 362 Installing network features 364 Uninstalling network features 364 Chapter 3: Accomplishing Advanced Network Tasks 367 Working with Remote Desktop Services 367 Installing Remote Desktop Services 368 Configuring user-specific settings 369 Configuring apps 371 Using RD Web Access 372 Configuring and using RDS licensing 374 Working with Network Policy and Access Services 376 Network Policy Server 377 Troubleshooting at the Command Line 381 Chapter 4: Diagnosing and Repairing Network Connection Problems 383 Using Windows Network Diagnostics 384 Repairing Individual Connections 386 Network Troubleshooting at the Command Line 388 Working with Windows Firewall 389 Making Sense of Common Configuration Errors 391 Duplicate IP addresses 391 No gateway address 391 No DNS servers set 392 An application is experiencing network issues 392 Everything should be working, but it’s not 392 Working with Other Troubleshooting Tools 392 Book 5: Managing Security with Windows Server 2019 395 Chapter 1: Understanding Windows Server 2019 Security 397 Understanding Basic Windows Server Security 397 The CIA triad: Confidentiality, integrity, and availability 398 Authentication, authorization, and accounting 399 Access tokens 399 Security descriptors 399 Access control lists 400 Working with Files and Folders 403 Setting file and folder security 403 Creating a Local Security Policy 406 Paying Attention to Windows Security 408 Virus & Threat Protection 408 Firewall & Network Protection 408 App & Browser Control 410 Device Security 411 Chapter 2: Configuring Shared Resources 413 Comparing Share Security with File System Security 413 Shared folder permissions 414 File system security 415 Effective permissions validation 415 Sharing Resources 417 Storage media 417 Printers 418 Other resources 419 Configuring Access with Federated Rights Management 419 Working with Active Directory Federation Services 420 Working with Active Directory Rights Management Services 424 Chapter 3: Configuring Operating System Security 433 Understanding and Using User Account Control 433 Using User Account Control to protect the server 434 Running tasks as administrator 434 Watching out for automatic privilege elevation 435 Overriding User Account Control settings 435 Managing User Passwords 438 Understanding Credential Guard 439 How Credential Guard works 440 Credential Guard Hardware Requirements 440 How to enable Credential Guard 441 Configuring Startup and Recovery Options 444 Chapter 4: Working with the Internet 447 Firewall Basics 447 Getting acquainted with the Windows Defender Firewall profiles 448 Enabling and disabling the Windows Defender Firewall 448 Configuring Windows Defender Firewall with Advanced Security 451 Working with profile settings 452 Working with inbound/outbound rules 454 Understanding IPSec 457 Configuring the IPSec settings 458 Chapter 5: Understanding Digital Certificates 461 Certificates in Windows Server 2019 462 Cryptography 101 462 Certificate-specific concepts 464 Types of Certificates in Active Directory Certificate Services 465 User certificates 465 Computer 466 Chapter 6: Installing and Configuring AD CS 469 Introducing Certificate Authority Architecture 470 Root certificate authorities 470 Issuing certificate authorities 471 Policy certificate authorities 471 Installing a Certificate Authority 471 Creating the CAPolicy.inf file 471 Installing the root certificate authority 473 Installing the issuing certificate authority 477 Enrolling for certificates 478 Setting up web enrollment 481 Installing Online Certificate Status Protocol 482 Configuring Certificate Auto-Enrollment 485 Configuring the template 485 Configuring Group Policy 486 Chapter 7: Securing Your DNS Infrastructure 489 Understanding DNSSEC 489 The basics of DNSSEC 490 Records used for DNSSEC 490 Configuring DNSSEC 491 Understanding DANE 495 The basics of DANE 495 Configuring DANE 496 Book 6: Working with Windows PowerShell 501 Chapter 1: Introducing PowerShell 503 Understanding the Basics of PowerShell 503 Objects 504 Pipeline 504 Providers 505 Variables 506 Sessions 506 Comments 507 Aliases 507 Cmdlets 507 Using PowerShell 509 Writing PowerShell commands and scripts 509 Working with objects 513 Working with the pipeline 514 Working with modules 516 Working with comparison operators 518 Getting information out of PowerShell 519 Scripting logic 521 Other cool tricks 522 Running PowerShell Remotely 527 Invoke-Command 527 New-PSSession 527 Enter-PSSession 527 Getting Help in PowerShell 528 Update-Help 528 Get-Help 529 -Detailed and -Full 529 Identifying Security Issues with PowerShell 530 Execution Policy 530 Code signing 531 Firewall requirements for PowerShell remoting 534 Chapter 2: Understanding the NET Framework 535 Introducing the Various Versions of NET Framework 535 Focusing on New Features in NET 4.7 538 Viewing the Global Assembly Cache 539 Understanding assembly security 540 Identifying the two types of assembly privacy 540 Viewing assembly properties 541 Understanding NET Standard and NET Core 541 .NET Core 542 .NET Standard 542 Tying it all together: NET and PowerShell 542 Chapter 3: Working with Scripts and Cmdlets 543 Introducing Common Scripts and Cmdlets 543 Executing Scripts or Cmdlets 544 Working with COM objects 545 Combining multiple cmdlets 545 Working from Another Location 546 Performing Simple Administrative Tasks with PowerShell Scripts 548 Adding users in Active Directory 548 Creating a CSV file and populating it with data from Active Directory 548 Checking to see if a patch is installed 550 Checking running processes or services 550 Chapter 4: Creating Your Own Scripts and Advanced Functions 551 Creating a PowerShell Script 552 Creating a simple script 552 Running the script 557 Defining a Script Policy 558 Signing a PowerShell Script 559 Creating a PowerShell Advanced Function 559 Playing with parameters 560 Creating the advanced function 561 Using the advanced function 563 Chapter 5: PowerShell Desired State Configuration 567 Getting an Overview of PowerShell Desired State Configuration 567 Configurations 568 Resources 569 Local Configuration Manager 571 Creating a PowerShell Desired State Configuration Script 572 Applying the PowerShell Desired State Configuration Script 573 Compiling into MOF 574 Applying the new configuration 575 Push and Pull: Using PowerShell Desired State Configuration at Scale 575 Push mode 576 Pull mode 577 Book 7: Installing and Administering Hyper-V 579 Chapter 1: What Is Hyper-V? 581 Introduction to Virtualization 581 Type 1 and Type 2 Hypervisors 582 Type 1 hypervisors 583 Type 2 hypervisors 583 Installing and Configuring Hyper-V 583 Installing Hyper-V 584 Configuring Hyper-V 586 Virtual Switch Manager 591 Virtual SAN Manager 591 Chapter 2: Virtual Machines 593 Creating a Virtual Machine 593 Configuring a Virtual Machine 597 Add Hardware 598 Firmware 598 Security 598 Memory 599 Processor 600 SCSI Controller 601 Network Adapter 602 Name 603 Integration Services 603 Checkpoints 603 Smart Paging File Location 603 Automatic Start Action 604 Automatic Stop Action 604 Shielded Virtual Machines 604 Chapter 3: Virtual Networking 605 Identifying the Types of Virtual Switches 606 External 606 Internal 606 Private 606 Creating a Virtual Switch 607 Hyper-V Manager 607 PowerShell 608 Getting into Advanced Hyper-V Networking 610 Virtual local area network tagging 610 Bandwidth management 613 Network interface card teaming 614 Looking at single-root I/O virtualization 619 Chapter 4: Virtual Storage 621 Understanding Virtual Disk Formats 621 Considering Types of Disks 622 Fixed 622 Dynamic 622 Differencing 623 Pass-through 623 Adding Storage to the Host 623 Adding the drives 623 Changing the default save locations of virtual disk files 625 Adding Storage to the Virtual Machine 626 Adding a new virtual drive 626 Expanding a disk drive 629 Adding a pass-through disk 630 Converting a VHD disk file to a VHDX disk file 631 Attaching the converted drive to the virtual machine 632 Chapter 5: High Availability in Hyper-V 635 Hyper-V Replica 635 Setting up Hyper-V Replica on the Hyper-V hosts 636 Setting up replication on the virtual machines 638 Live Migration 640 Setting up live migration 641 Kicking off a live migration 643 Storage Migration 644 Failover Clustering 645 Installing Failover Clustering 645 Configuring Failover Clustering 646 Configuring a witness for your failover cluster 647 Book 8: Installing, Configuring, and Using Containers 649 Chapter 1: Introduction to Containers in Windows Server 2019 651 Understanding Containers 652 Knowing what a container looks like 652 Defining important container terms 653 Seeing how containers run on Windows 653 Considering Use Cases for Containers 654 Developers 654 System administrators 654 Deciding What Type of Containers You Want to Use 655 Windows Server containers 655 Hyper-V containers 655 Managing Containers at Scale 656 Chapter 2: Docker and Docker Hub 657 Introduction to Docker 657 Docker architecture 658 Basic Docker commands 658 Introduction to Docker Hub 659 Finding public images 659 Creating a private repository 662 Using a private repository 664 Chapter 3: Installing Containers on Windows Server 2019 667 Installing Windows Containers 668 Installing Hyper-V Containers 669 Installing Docker 670 Testing Your Container Installation 672 Windows container 672 Hyper-V container 672 Chapter 4: Configuring Docker and Containers on Windows Server 2019 675 Working with Dockerfile 675 Applying Custom Metadata to Containers and Other Objects 678 Creating labels 679 Viewing labels 679 Configuring Containers 680 Starting containers automatically 680 Limiting a container’s resources 681 Configuring the Docker Daemon with daemon.json 682 Chapter 5: Managing Container Images 685 Making Changes to Images and Saving the Changes You Make 685 Pushing Images to Docker Hub 689 Pulling Images from Docker Hub 691 Handling Image Versioning 693 Chapter 6: Container Networking 695 Considering the Different Types of Network Connections 696 Viewing Your Network Adapters and Virtual Switches 697 Configuring a Network Address Translation Network Connection 698 Configuring a Transparent Network Connection 699 Configuring an Overlay Network Connection 700 Configuring an l2bridge Network Connection 701 Configuring an l2tunnel Network Connection 702 Connecting to a Network 703 Chapter 7: Container Storage 705 Getting Acquainted with Container Storage 705 Creating a Volume Inside of a Container 706 Working with Persistent Volumes 709 Looking at volume types 709 Removing volumes 712 Index 713
£23.79
John Wiley & Sons Inc Windows Operating System Fundamentals
Book SynopsisA clear and concise resource, the ideal guide to Windows for IT beginners Windows Operating System Fundamentals covers everything you need to know about Windows 10. Learn to master the installation process and discover the cool new features of Windows 10, including Edge, Cortana, and more. And because this book follows the Windows Server Operating System Fundamentals MTA Certification, it is perfect for IT professionals who are new to the industry and need an entry point into IT certification. This book covers the basics of the Windows operating system, from setting up user accounts to using the start menu, running applications, and setting up internet access. You'll be prepared to upgrade a computer to Windows 10 and to master the basic tools necessary to work effectively within the OS. Each chapter closes with a quiz so you can test your knowledge before moving to the next section. Learn to configure your Windows 10 operating system, optimize account controls, configure user prTable of ContentsIntroduction xix Lesson 1 Installing and Upgrading Client Systems 1 Understanding Windows Systems 3 Understanding User Interfaces 4 Determining Appropriate Editions Per Device Type 5 Understanding Processor and Memory Architecture 10 Understanding Drivers 12 Understanding Windows 10 System Requirements 13 Understanding Installation Types 17 Installing Windows 10 18 Performing a Clean Install of Windows 10 20 Upgrading to Windows 10 23 Migrating to Windows 10 from Previous Versions of Windows 26 Skill Summary 31 Knowledge Assessment 32 Multiple Choice 32 Fill in the Blank 34 True/False 34 Case Scenarios 34 Scenario 1-1: Troubleshooting a Compatibility Problem 35 Scenario 1-2: Converting a Small Office to Windows 10 35 Scenario 1-3: Selecting the Right Computer and Operating System 35 Scenario 1-4: Installing Windows 10 35 Lesson 2 Understanding Operating System Configurations 37 Understanding User Accounts 39 Create a User Account 40 Configuring and Optimizing User Account Control (UAC) 42 Review UAC Settings 44 Configuring Windows 10 45 Introducing Windows 10 Settings 47 Using Control Panel 50 Configuring System Options 53 Changing the Date and Time 56 Configuring the Desktop and Taskbar Settings 56 Configuring the Start Menu 60 Configuring File Explorer Settings 60 Configuring User Profiles 62 Configuring Folder Locations 63 Configuring Libraries 65 Configuring Display Settings 67 Configuring Power Settings 70 Configuring Accessibility Options 74 Creating and Managing Shortcuts 78 Configuring Hyper-V 80 Enable the Hyper-V Feature 80 Creating and Configuring Virtual Machines 82 Creating and Managing Virtual Switches 87 Creating and Managing Virtual Disks 90 Creating and Managing Checkpoints 91 Skill Summary 92 Knowledge Assessment 94 Multiple Choice 94 Fill in the Blank 95 True/False 96 Case Scenarios 96 Scenario 2-1: Getting Administrative-Level Privileges 96 Scenario 2-2: Configuring Accessibility Features 96 Scenario 2-3: Running a Legacy Application 96 Scenario 2-4: Creating a Better User Experience 96 Lesson 3 Understanding Native Applications, Tools, Mobility, and Remote Management and Assistance 97 Configuring Internet Explorer 99 Managing Cookies and Privacy Settings 99 Configuring Security Zones 104 Using Dynamic Security and Protected Mode 106 Configuring the SmartScreen Filter and Phishing 108 Managing Add-Ons 109 Configuring Compatibility Mode 111 Configuring Secure Sockets Layer (SSL) and Certificates 112 Managing Favorites 113 Managing LAN Settings 114 Configuring Microsoft Edge 116 Configuring Cortana 118 Introducing Accessory Programs 119 Using Snip & Sketch 120 Using Windows Media Player 12 125 Supporting Mobile Access and Data Synchronization 130 Synchronizing Your PC Settings 130 Configuring Offline Files 132 Using Windows Mobility Center 136 Change Mobility Center Settings 138 Accessing a Computer Remotely 138 Configuring Remote Desktop 139 Configuring Remote Assistance 144 Configuring Remote Management Settings 148 Using the Microsoft Management Console to Manage Systems Remotely 149 Using Windows Remote Management 153 Using WinRS.exe 155 Introducing Windows PowerShell 155 Using Remote Windows PowerShell 160 Skill Summary 162 Knowledge Assessment 163 Multiple Choice 163 Fill in the Blank 164 True/False 165 Case Scenarios 165 Scenario 3-1: Securing Internet Explorer 11 165 Scenario 3-2: Offering Remote Assistance 165 Scenario 3-3: Viewing Logs Remotely 166 Scenario 3-4: Creating a Playlist 166 Lesson 4 Managing Applications, Services, and Disks 167 Configuring Applications 169 Configuring Desktop Apps 169 Configuring Windows Features 171 Supporting Desktop Application Co-Existence 172 Troubleshooting Program Compatibility 172 Configuring Startup Options 174 Managing Windows Store Apps 176 Configuring the Windows Store 176 Implementing Windows Store Apps 178 Understanding Group Policy and Network Application Installation 180 Understanding Services 181 Understanding Service Startup Types 183 Using MSConfig (System Configuration Utility) 189 Change System Configuration Settings 193 Managing Processes and Applications with Task Manager 194 Understanding Storage 198 Understanding Storage Device Types 198 Understanding Disk and Drive Types 201 Understanding File Systems 203 Using Disk Management to Configure Disks, Volumes, and File Systems 205 Encrypting and Compressing Files and Folders 212 Understanding Encrypting File System (EFS) 213 Understanding BitLocker 217 Skill Summary 220 Knowledge Assessment 222 Multiple Choice 222 Fill in the Blank 223 True/False 224 Case Scenarios 224 Scenario 4-1: Providing Redundancy on a Client Computer 224 Scenario 4-2: Protecting Laptop Computers 225 Scenario 4-3: Uninstalling Local Software 225 Scenario 4-4: Running a Windows 7 Application on Windows 10 225 Lesson 5 Managing Devices 227 Understanding Cloud Storage 228 Using OneDrive to Manage Files and Folders 229 Understanding Printing Devices 232 Understanding Local Printers 232 Understanding Network Printers 236 Printing a Document 237 Understanding Print Queues 239 Understanding Internet Printing 241 Understanding System Devices and Device Drivers 242 Managing Devices 243 Using the Devices and Printers Folder 245 Using Device Manager 247 Troubleshooting Problem Devices 252 Skill Summary 255 Knowledge Assessment 256 Multiple Choice 256 Fill in the Blank 257 True/False 258 Case Scenarios 258 Scenario 5-1: Troubleshooting Print Jobs 258 Scenario 5-2: Troubleshooting a Printer Driver 258 Scenario 5-3: Changing Print Drivers 259 Scenario 5-4: Using Cloud Services 259 Lesson 6 Understanding File and Print Sharing 261 Understanding File and Printer Sharing Basics 263 Configuring HomeGroup Connections 266 Creating Shares 271 Configuring Public Folders 271 Configuring File Sharing 272 Configuring File System Permissions 276 Understanding Effective NTFS Permissions 279 Viewing Effective Permissions on a Resource 283 Combining NTFS and Share Permissions 285 Mapping Drives 285 Configuring Printer Sharing 288 Skill Summary 290 Knowledge Assessment 291 Multiple Choice 291 Fill in the Blank 292 True/False 293 Case Scenarios 293 Scenario 6-1: Picking an Appropriate File Sharing Method 293 Scenario 6-2: Creating and Configuring a Homegroup 294 Scenario 6-3: Restricting Permissions 294 Scenario 6-4: Mapping a Network Drive 294 Lesson 7 Maintaining, Updating, and Protecting Windows 10 295 Exploring Built-in Maintenance Tools 297 Using Disk Defragmenter 297 Using Disk Cleanup 300 Using Task Scheduler 301 Using Security and Maintenance (formerly called Action Center) 308 Using System Information 310 Maintaining the Windows Registry 312 Browse and Back Up the Windows Registry 314 Configuring and Managing Updates 315 Configuring Windows Update Options 316 Managing Update History and Rolling Back Updates 319 Implementing Insider Preview 320 Implementing Semi-Annual Channel, Semi-Annual Channel (Targeted), & Long-Term Servicing Branch (LTSB) Scenarios 320 Defending Your System from Malicious Software 322 Understanding Windows Firewall 324 Managing Client Security Using Windows Defender 326 Skill Summary 331 Knowledge Assessment 332 Multiple Choice 332 Fill in the Blank 333 True/False 334 Case Scenarios 334 Scenario 7-1: Automating Computer Maintenance and Program Launching 334 Scenario 7-2: Removing Viruses Safely 334 Scenario 7-3: Gathering System Information 335 Scenario 7-4: Distributing Windows Updates Across a Network 335 Lesson 8 Understanding Backup and Recovery Methods 337 Understanding Local, Network, and Automated Backup Methods 338 Restoring Previous Versions of Files and Folders 339 Schedule a Windows 10 Backup to Include a System Image 340 Restore a File from a Windows 10 Backup 342 Configuring System Recovery 343 Configuring a System Restore 343 Configuring a Windows 10 File Recovery Drive 346 Configuring File History 347 Performing Recovery Operations Using Windows Recovery 351 Skill Summary 358 Knowledge Assessment 360 Multiple Choice 360 Fill in the Blank 361 True/False 362 Case Scenarios 362 Scenario 8-1: Scheduling File Backups 362 Scenario 8-2: Installing from an Image 363 Scenario 8-3: Creating a System Repair Disc 363 Scenario 8-4: Resolving a Driver Problem Using Recovery Boot Options 363 Appendix Answer Key 365 Lesson 1: Installing and Upgrading Client Systems 366 Answers to Knowledge Assessment 366 Answers to Business Case Scenarios 367 Lesson 2: Understanding Operating System Configurations 367 Answers to Knowledge Assessment 367 Answers to Business Case Scenarios 368 Lesson 3: Understanding Native Applications, Tools, Mobility, and Remote Management and Assistance 369 Answers to Knowledge Assessment 369 Answers to Business Case Scenarios 370 Lesson 4: Managing Applications, Services, Folders, and Libraries 371 Answers to Knowledge Assessment 371 Answers to Business Case Scenarios 372 Lesson 5: Managing Devices 372 Answers to Knowledge Assessment 372 Answers to Business Case Scenarios 373 Lesson 6: Understanding File and Print Sharing 374 Answers to Knowledge Assessment 374 Answers to Business Case Scenarios 375 Lesson 7: Maintaining, Updating, and Protecting Windows 10 376 Answers to Knowledge Assessment 376 Answers to Business Case Scenarios 377 Lesson 8: Understanding Backup and Recovery Methods 378 Answers to Knowledge Assessment 378 Answers to Business Case Scenarios 379 Index 381
£24.79
John Wiley & Sons Inc Windows Server Administration Fundamentals
Book SynopsisDid you know, 91% of hiring managers consider certification as part of their hiring requirements? IT Professionals who are new to the industry need a strong foundational understanding of the fundamentals before moving on towards more challenging technology certifications. This book covers everything you need to know about understanding how to manage windows servers and storage along with monitoring and troubleshooting servers as well. Written to the Windows Server Administration Fundamentals MTA Certification, it is a recommended entry point into IT certification. This book covers the basics of Windows Server Administration. Each chapter closes with a quiz to make sure you can practice exam questions and test your knowledge begore moving to the next section. We start by discussing what a server is and does by providing an in-depth overview including installation of Windows Server 2016. There are sections dedicated to the following: Preforming configurations and managing your WindowsTable of ContentsIntroduction xv Lesson 1 Server Overview 1 Understanding What a Server Does 3 Installing Windows Server 2016 31 Skill Summary 53 Knowledge Assessment 55 Competency Assessment 57 Proficiency Assessment 58 Lesson 2 Managing Windows Server 2016 59 Configuring Windows Server 2016 60 Configuring and Optimizing User Account Control (UAC) 69 Networking with Windows Server 2016 72 Managing Devices and Device Drivers 78 Managing Through Group Policies 86 Using Microsoft Management Console and Administrative Tools 86 Installing Programs, Roles and Features 91 Managing Services 94 Understanding the Registry 121 Managing Server Core 124 Summary Skill Matrix 126 Knowledge Assessment 128 Competency Assessment 130 Proficiency Assessment 131 Lesson 3 Managing Storage 133 Identifying Storage Technologies 134 Looking at Network Attached Storage and Storage Area Networks 140 Understanding Disk Structure 145 Using Disk Management Tools 149 Understanding Distributed File System (DFS) 159 Skill Summary 161 Knowledge Assessment 163 Competency Assessment 165 Proficiency Assessment 166 Lesson 4 Monitoring and Troubleshooting Servers 167 Managing IT 169 Introducing Troubleshooting Methodology 172 Using the Event Viewer 175 Booting the System 178 Understanding Performance 188 Introducing Business Continuity 200 Understanding Backups 204 Recovering Servers with WinRE 214 Skill Summary 219 Knowledge Assessment 222 Competency Assessment 224 Proficiency Assessment 224 Lesson 5 Essential Services 227 Naming Resolution 229 DHCP Services 234 Introducing Directory Services with Active Directory 237 Skill Summary 262 Knowledge Assessment 264 Competency Assessment 266 Proficiency Assessment 266 Lesson 6 File and Print Services 269 Introducing NTFS 270 Sharing Drives and Folders 282 Looking at Printers 286 Enabling Auditing 295 Skill Summary 299 Knowledge Assessment 302 Competency Assessment 304 Proficiency Assessment 305 Lesson 7 Popular Windows Network Services and Applications 307 Introducing the Web Server 309 Understanding Remote Access 324 Introducing Remote Administration 329 Understanding Server Virtualization 332 Skill Summary 342 Knowledge Assessment 344 Competency Assessment 346 Proficiency Assessment 347 Appendix Answer Key 349 Lesson 1: Server Overview 350 Lesson 2: Managing Windows 2016 352 Lesson 3: Managing Storage 354 Lesson 4: Monitoring and Troubleshooting Servers 357 Lesson 5: Essential Services 359 Lesson 6: File and Print Services 362 Lesson 7: Popular Windows Network Services and Applications 364 Index 369
£24.79
APress Azure ArcEnabled Kubernetes and Servers
Book SynopsisWelcome to this introductory guide to using Microsoft''s Azure Arc service, a new multi-cloud management platform that belongs in every cloud or DevOps estate. As many IT pros know, servers and Azure Kubernetes Service drive a huge amount of consumption in Azure-so why not extend familiar management tools proven in Azure to on-premises and other cloud networks? This practical guide will get you up to speed quickly, with instruction that treads light on the theory and heavy on the hands-on experience to make setting up Azure Arc servers and Kubernetes across multiple clouds a lot less complex. Azure experts and MVPs Buchanan and Joyner provide just the right amount of context so you can grasp important concepts, and get right to the business of using and gaining value from Azure Arc. If your organization has resources across hybrid cloud, multi-cloud, and edge environments, then this book is for you. You will learn how to configure and use Azure Arc to uniformly manage workloads across all of these environments.What You Will Learn Introduces the basics of hybrid, multi-cloud, and edge computing and how Azure Arc fits into that IT strategy Teaches the fundamentals of Azure Resource Manager, setting the reader up with the knowledge needed on the technology that underpins Azure Arc Offers insights into Azure native management tooling for managing on-premises servers and extending to other clouds Details an end-to-end hybrid server monitoring scenario leveraging Azure Monitor and/or Azure Sentinel that is seamlessly delivered by Azure Arc Defines a blueprint to achieve regulatory compliance with industry standards using Azure Arc, delivering Azure Policy from Azure Defender for Servers Explores how Git and GitHub integrate with Azure Arc; delves into how GitOps is used with Azure Arc Empowers your DevOps teams to perform tasks that typically fall under IT operations Dives into how to best use Azure CLI with Azure Arc Who This Book Is ForDevOps, system administrators, security professionals, and IT workers responsible for servers both on-premises and in the cloud. Some experience in system administration, DevOps, containers, and use of Git/GitHub is helpful.Table of Contents1. Azure Arc as Extension of the Azure Control Plane 2. Azure Resource Manager Insights 3. Azure Management Insights 4. Azure Arc Servers: Getting Started 5. Azure Arc Servers: Using at Scale 6. Hybrid Server Monitoring Solution 7. Regulatory and Security Compliance for Azure Arc Servers 8. GitOps Insights9. Azure Arc Enabled Kubernetes: Getting Started
£33.99
APress Serverless Beyond the Buzzword
Book SynopsisKnow how Serverless and cloud-native systems work, their benefits and roles in automating and optimizing organizations, and the challenges to be considered. Anyone interested in Serverless architecture will benefit from this book, regardless of their level of technical understanding.This revised and expanded new edition explains many related terms, such as microservices, cloud-native, architecture, several relevant AWS services, and how it all works together to produce cost-effective, scalable solutions in the cloud. The book starts at a high level and gradually gets more in-depth and technical.The less technical decision maker will learn how Serverless can affect finance, security, people, and compliance. The book touches on important decisions, such as selecting and working with external or internal specialists and teams; finding, evaluating, and training them; and the flexibility and dynamics available within digital projects.Deployment automation and DevOps Table of ContentsAbout the author Acknowledgements Prologue Who is this book for? Technical levels used in this book What will you learn? Amazon Web Services (AWS) Second edition Chapter 1: Serverless basics What is Serverless architecture? Microservices Serverless example History of Serverless Types of projects Key challenges Key benefits Common objections Public case studies Chapter 2: Strategy Introduction Traditional organization structure vs Serverless Cloud Centre of Excellence (CCoE) Cloud controls as compliance guardrails Supporting tools Serverless adoption: current state Serverless adoption: desired state Serverless adoption: gap analysis Application suitability for Serverless Event Storming Public case studies Chapter 3: Finances Total Cost of Ownership (TCO) The value of paying for utilization The cost to develop Serverless The cost of migrating applications The cost of maintenance and operations Estimating the cloud operational costs Collecting the input data for an estimate Calculating the estimate Cost management Cost optimization Chapter 4: Security Shared responsibility Serverless security Principle of Least Privilege IAM Policy tips Security for cloud users Security for microservices User input validation Storing credentials Encryption Protecting Data Securing Databases Privacy and GDPR Security monitoring with ElectricEye Chapter 5: People Serverless roles Serverless roles: Solution Architect Serverless Roles: Cloud Security Engineer Serverless Roles: Deployment Automation Engineer Serverless roles: Full Stack Developer Serverless roles: Database Engineer Serverless training Serverless team structure Working with Serverless vendors Vetting Serverless capabilities Chapter 6: DevOps & Tooling What is DevOps? Infrastructure as Code AWS CloudFormation AWS CloudFormation planning Terraform AWS Serverless Application Model (SAM) AWS Amplify AWS Cloud Development Kit (CDK) CDK technical considerations Serverless Framework Code Repositories GIT Submodules Developer Tooling Code quality assurance Chapter 7: Data Data is a valuable asset Database selection Event Sourcing Data tenancy Relational Database Service (RDS) Redshift Serverless DynamoDB NoSQL Serverless NoSQL databases Managed NoSQL databases NoSQL databases comparison In-memory databases AppSync Simple Storage Solution (S3) Elastic File System (EFS) Chapter 8: Logging & Testing Logging Reactive Logging Proactive Logging Logging format and content Log types in the cloud Cloud logging services CloudWatch Exporting logs to S3 CloudWatch Subscriptions Managed services for proactive logging Error Monitoring Performance Optimisation Cost Tracking Security Monitoring Logging Best Practices Testing Testing Challenges in Serverless Types of Tests Asynchronous Testing Risk Assessment for Testing Test Pyramid vs Test Honeycomb Contract Testing for Serverless Deployment Pipeline AWS Testing Services Chapter 9: Architecture Challenges & mitigations AWS: Microservices AWS: Application Programming Interface (API) Design patterns Microservice example architectures Stateless architecture Decoupling microservices AWS: Decoupling Event-driven architecture Asynchronous design pattern Containers AWS: Edge AWS: Internet of Things (IoT) AWS: Managed Machine Learning (ML) AWS: Ledger Technology AWS: Call Centre Well-Architected Framework Serverless tips Chapter 10: Case studies Introduction Proactive logging Serverless data lake Video analysis Serverless Minecraft Dynamic live streaming SEO-friendly website and CMS Virtual host True Serverless containers Epilogue References
£41.24
O'Reilly Media Learning GraphQL
Book SynopsisWith this practical guide, Alex Banks and Eve Porcello deliver a clear learning path for frontend web developers, backend engineers, and project and product managers looking to get started with GraphQL.
£27.74
O'Reilly Media Building Serverless Applications with Google
Book SynopsisThis hands-on guide shows you how to get started with Cloud Run, a container-based serverless product on Google Cloud. Through the course of this book, you'll learn how to deploy several example applications that highlight different parts of the serverless stack on Google Cloud.
£39.74
Manning Publications Programmer's Guide to Apache Thrift
Book SynopsisProgrammer's Guide to Apache Thrift provides comprehensive coverage of the Apache Thrift framework along with a developer's-eye view of modern distributed application architecture. Packed with complete code examples and pragmatic discussion, this book lays the best practices for multi-language distributed application development. You'll take a guided tour through transports, protocols, IDL and servers as you explore complete example programs in C++, Java and Python. You'll also learn how to work with platforms ranging from enterprise servers to mobile clients. About the technology Any distributed application includes individual components, often written in different languages and hosted in multiple locations, which must communicate quickly and efficiently. Apache Thrift is a communication framework that enables cross-language remote procedure calls and serialization. Apache Thrift supports embedded, mobile, web, and server environments and a host of languages ranging from JavaScript to C++. It's perfect for back end services and embedded systems where size, scalability and performance are mission critical. Key Features Clear, concise coverage of all of the primary Apache Thrift features Complete coverage of the Apache Thrift Interface Definition Language Building and serializing complex user defined types Working with plug in serialization protocols and data compression Creating cross-language services Tools and features to enable interface evolution Randy Abernethy is an active Apache Thrift contributor and can be found on the dev and user email lists. A serial entrepreneur, Randy founded Hollywood's first all hard disk recording studio in the early 90s, a direct market access institutional brokerage in the 2000s, and has recently focused on the development of proprietary automated trading systems using Apache Thrift for interoperability.Table of ContentsPART 1 APACHE THRIFT OVERVIEW READ IN LIVEBOOK1. INTRODUCTION TO APACHE THRIFT 1.1. Polyglotism, the pleasure and the pain 1.2. Application integration with Apache Thrift 1.2.1. Type serialization 1.2.2. Service implementation 1.3. Building a simple service 1.3.1. The Hello IDL 1.3.2. The Hello server 1.3.3. A Python client 1.3.4. A C++ client 1.3.5. A Java client 1.4. The communications toolkit landscape 1.4.1. SOAP 1.4.2. REST 1.4.3. Protocol Buffers 1.4.4. Apache Avro 1.4.5. Strengths of Apache Thrift 1.4.6. Take away 1.5. Summary READ IN LIVEBOOK2. APACHE THRIFT ARCHITECTURE 2.1. Transports 2.1.1. The Transport interface 2.1.2. End point transports 2.1.3. Layered transports 2.1.4. Server transports 2.2. Protocols 2.3. Apache Thrift IDL 2.3.1. User-defined types and serialization 2.3.2. RPC services 2.4. Servers 2.5. Security 2.6. Summary READ IN LIVEBOOK3. BUILDING, TESTING, AND DEBUGGING 3.1. Installing the Apache Thrift IDL Compiler 3.1.1. Platform installers 3.1.2. VMs and containers 3.1.3. Building from source 3.2. The Apache Thrift source tree 3.3. Apache Thrift tests 3.4. Debugging RPC services 3.4.1. Examining packets on the wire 3.4.2. Unbuffered interfaces 3.4.3. Interface misalignment 3.4.4. I/O stack misalignment 3.4.5. Instrumenting code 3.4.6. Additional techniques 3.5. Summary PART 2 PROGRAMMING APACHE THRIFT READ IN LIVEBOOK4. MOVING BYTES WITH TRANSPORTS 4.1. End point transports ? part 1: memory & disk 4.1.1. Programming with memory transports 4.1.2. Programming with file transports 4.2. The transport interface 4.2.1. Basic transport operations 4.3. End point transports ? Part 2: networks 4.3.1. Network programming with TSocket 4.4. Server transports 4.4.1. Programming network servers with server transports 4.4.2. The Server Transport interface 4.5. Layered transports 4.5.1. Message framing 4.6. Summary READ IN LIVEBOOK5. SERIALIZING DATA WITH PROTOCOLS 5.1. Basic serialization with the binary protocol 5.1.1. Using the C++ TBinaryProtocol 5.1.2. Using the Java TBinaryProtocol 5.1.3. Using the Python TBinaryProtocol 5.1.4. Takeaway 5.2. The TProtocol interface 5.2.1. Apache Thrift serialization 5.2.2. C++ TProtocol 5.2.3. Java TProtocol 5.2.4. Python TProtocolBase 5.3. Serializing objects 5.3.1. Struct serialization 5.3.2. Struct deserialization 5.3.3. Struct evolution 5.4. TCompactProtocol 5.5. TJSONProtocol 5.6. Selecting a protocol 5.7. Summary READ IN LIVEBOOK6. APACHE THRIFT IDL 6.1. Interfaces 6.2. Apache Thrift IDL 6.2.1. IDL file names 6.2.2. Element names 6.2.3. Keywords 6.3. The IDL compiler 6.3.1. Compilation phases and error messages 6.3.2. Command line switches 6.4. Comments and documentation 6.5. Namespaces 6.6. Built-in types 6.6.1. Base types 6.6.2. Container types 6.6.3. Literals 6.7. Constants 6.7.1. C++ interface constant implementation 6.7.2. Java interface constant implementation 6.7.3. Python interface constant implementation
£47.99
Packt Publishing Limited Raspberry Pi Server Essentials
Book SynopsisThis is an engaging, easy to follow guide for developing a wide range of server projects with Raspberry Pi This book is targeted towards all Raspberry Pi enthusiasts who are interested in exploring the potential of Pi as a server. Even if you have no prior experience with the Raspberry Pi, you can pick up this book and develop a wide range of projects.
£23.99
ISTE Ltd and John Wiley & Sons Inc Quality of Experience for Multimedia: Application
Book SynopsisBased on a convergence of network technologies, the Next Generation Network (NGN) is being deployed to carry high quality video and voice data. In fact, the convergence of network technologies has been driven by the converging needs of end-users.The perceived end-to-end quality is one of the main goals required by users that must be guaranteed by the network operators and the Internet Service Providers, through manufacturer equipment. This is referred to as the notion of Quality of Experience (QoE) and is becoming commonly used to represent user perception. The QoE is not a technical metric, but rather a concept consisting of all elements of a user's perception of the network services. The authors of this book focus on the idea of how to integrate the QoE into a control-command chain in order to construct an adaptive network system. More precisely, in the context of Content-Oriented Networks used to redesign the current Internet architecture to accommodate content-oriented applications and services, they aim to describe an end-to-end QoE model applied to a Content Distribution Network architecture. About the Authors Abdelhamid Mellouk is Full Professor at University of Paris-Est C-VdM (UPEC), Networks & Telecommunications (N&T) Department and LiSSi Laboratory, France. Head of several executive national and international positions, he was the founder of the Network Control Research activity at UPEC with extensive international academic and industrial collaborations. His general area of research is in adaptive real-time control for high-speed new generation dynamic wired/wireless networks in order to maintain acceptable Quality of Service/Experience for added-value services. He is an active member of the IEEE Communications Society and has held several offices including leadership positions in IEEE Communications Society Technical Committees.Said Hoceini is Associate Professor at University of Paris-Est C-VdM (UPEC), Networks & Telecommunications (N&T) Department and LiSSi Laboratory, France. His research focuses on routing algorithms, quality of service, quality of experience, and wireless sensor networks, as well as bio-inspired artificial intelligence approaches. His work has been published in several international conferences and journals and he serves on several TPCs.Hai Anh Tran is Associate Professor at the Hanoi University of Science and Technology (HUST), Vietnam. His research focuses on QoE aspects, QoS adaptive control/command mechanisms, wired routing, as well as bio-inspired artificial intelligence approaches.Table of ContentsList of Figures ix Preface xiii Introduction xv Chapter 1 Network Control Based on Smart Communication Paradigm 1 1.1. Motivation 1 1.2. General framework 3 1.3. Main innovations 6 1.3.1. User perception metrics and affective computing 6 1.3.2. Knowledge dissemination 8 1.3.3. Bio-inspired approaches and control theory 9 1.4. Conclusion 10 Chapter 2 Quality of Experience 11 2.1. Motivation 11 2.2. QoE concept 12 2.3. Importance of QoE 14 2.4. QoE metrics 16 2.5. QoE measurement methods 20 2.6. QoS/QoE relationship 23 2.7. Impact of networking on QoE 26 2.7.1. Layered classification of impacts on QoE 26 2.7.2. Impact of user mobility on QoE 28 2.7.3. Impact of network resource utilization and management on QoE 29 2.7.4. Impact of billing and pricing 30 2.8. Conclusion 31 Chapter 3 Content Distribution Network 33 3.1. Motivation 33 3.2. Routing layer 36 3.2.1. Routing in telecommunication network 36 3.2.2. Classical routing algorithms 37 3.2.3. QoS-based routing 38 3.3. Meta-routing layer 42 3.3.1. Server placement 43 3.3.2. Cache organization 45 3.3.3. Server selection 47 3.4. Conclusion 49 Chapter 4 User-driven Routing Algorithm Application for CDN Flow 51 4.1. Introduction 51 4.2. Reinforcement learning and Q-routing 53 4.2.1. Mathematical model of reinforcement learning 56 4.2.2. Value functions 57 4.3. Q-learning 60 4.4. Q-routing 61 4.5. Related works and motivation 62 4.6. QQAR routing algorithm 63 4.6.1. Formal parametric model 64 4.6.2. QQAR algorithm 65 4.6.3. Learning process 68 4.6.4. Simple use case-based example of QQAR 71 4.6.5. Selection process 78 4.7. Experimental results 79 4.7.1. Simulation setup 79 4.7.2. Experimental setup 89 4.7.3. Average MOS score 90 4.7.4. Convergence time 97 4.7.5. Capacity of convergence and fault tolerance 100 4.7.6. Control overheads 102 4.7.7. Packet delivery ratio 103 4.8. Conclusion 104 Chapter 5 User-driven Server Selection Algorithm for CDN Architecture 105 5.1. Introduction 105 5.2. Multi-armed bandit formalization 108 5.2.1. MAB paradigm 108 5.2.2. Applications of MAB 112 5.2.3. Algorithms for MAB 113 5.3. Server selection schemes 119 5.4. Our proposal for QoE-based server selection method 122 5.4.1. Proposed server selection scheme 122 5.4.2. Proposed UCB1-based server selection algorithm 125 5.5. Experimental results 126 5.5.1. Simulation results 126 5.5.2. Real platform results 132 5.6. Acknowledgment 133 5.7. Conclusion 135 Conclusion 137 Bibliography 141 Index 155
£125.06