Archive for August, 2021

Book Review : Practical Digital Forensic

August 31, 2021

If you are Digital Forensic Analyst and want to read about Digital Forensic, check it out this book:

Title : Practical Digital Forensic
Author : Richard Boddington
ISBN : ISBN 978-1-78588-710-9
Publisher : Packt
Pages : 372
Year : 2016

Here is the details of this book.

Chapter 1: The Role of Digital Forensics and Its Environment
Understanding the history and purpose of forensics – specifically, digital forensics
The origin of forensics
Locard’s exchange principle
The evolution of fingerprint evidence
DNA evidence
The basic stages of forensic examination
Defining digital forensics and its role
Definitions of digital forensics
Looking at the history of digital forensics
The early days
A paucity of reliable digital forensic tools
The legal fraternity’s difficulty understanding digital evidence
More recent developments in digital forensics
Studying criminal investigations and cybercrime
Outlining civil investigations and the nature of e-discovery
The role of digital forensic practitioners and the challenges they face
The unique privilege of providing expert evidence and opinion
Issues faced by practitioners due to inadequate forensics processes
Inferior forensics tools confronting practitioners
The inadequate protection of digital information confronting practitioners
The tedium of forensic analysis
Qualities of the digital forensic practitioner
Determining practitioner prerequisites

Chapter 2: Hardware and Software Environments
Describing computers and the nature of digital information
Magnetic hard drives and tapes
Optical media storage devices
Random-access memory (RAM)
Solid-state drive (SSD) storage devices
Network-stored data
The cloud
Operating systems
Connecting the software application to the operating system
Connecting the software application to the operating system and a device
Describing filesystems that contain evidence
The filesystem category
The filename category
The metadata category
The content category
Locating evidence in filesystems
Determining the means of transgression
Determining opportunity to transgress
Determining the motive to transgress
Deciding where to look for possible evidence
Indexing and searching for files
Unallocated data analysis
Explaining password security, encryption, and hidden files
User access to computer devices
Understanding the importance of information confidentiality
Understanding the importance of information integrity
Understanding the importance of information availability
User access security controls
Encrypted devices and files
Case study – linking the evidence to the user

Chapter 3: The Nature and Special Properties of Digital Evidence
Defining digital evidence
The use of digital evidence
The special characteristics of digital evidence
The circumstantial nature of digital evidence
File metadata and correlation with other evidence
The technical complexities of digital evidence
The malleability of digital evidence
Metadata should not be taken at face value
Recovering files from unallocated space (data carving)
Date and time problems
Determining the value and admissibility of digital evidence
Explaining the evidentiary weight of digital evidence
Understanding the admissibility of digital evidence
Defining the lawful acquisition of digital evidence
Emphasizing the importance of relevance in terms of digital evidence
Outlining the reliability of digital evidence
The importance of the reliability of forensic tools and processes
Evaluating computer/network evidence preservation
Corroborating digital evidence

Chapter 4: Recovering and Preserving Digital Evidence
Understanding the chain of custody
Describing the physical acquisition and safekeeping of digital evidence
Explaining the chain of custody of digital evidence
Outlining the seizure and initial inspection of digital devices
Recovering digital evidence through forensic imaging processes
Dead analysis evidence recovery
Write-blocking hardware
Write-blocking software
Enhancing data preservation during recovery
Recovering remnants of deleted memory
Acquiring digital evidence through live recovery processes
The benefits of live recovery
The challenges of live recovery
The benefits of volatile memory recovery
Isolating the device from external exploits
Outlining the efficacy of existing forensic tools and the emergence of enhanced processes and tools
Standards for digital forensic tools
The reliability of forensic imaging tools to recover and protect digital evidence
Case studies – linking the evidence to the user

Chapter 5: The Need for Enhanced Forensic Tools
Digital forensics laboratories
The purpose of digital forensics laboratories
Acceptance of, consensus on, and uptake of digital forensics standards
Best practices for digital forensics laboratories
The physical security of digital forensic laboratories
Network and electronic requirements of digital forensic laboratories
Dilemmas presently confronting digital forensics laboratories
Emerging problems confronting practitioners because of increasingly large and widely dispersed datasets
Debunking the myth of forensic imaging
Dilemmas presently confronting digital forensics practitioners
Processes and forensic tools to assist practitioners to deal more effectively with these challenges
E-discovery evidence recovery and preservation
Enhanced digital evidence recovery and preservation
The benefits of enhanced recovery tools in criminal investigations
Empowering non-specialist law enforcement personnel and other stakeholders to become more effective first respondents at digital crime scenes
The challenges facing non-forensic law enforcement agents
Enhancing law enforcement agents as first respondents
The challenges facing IT administrators, legal teams, forensic auditors, and other first respondents
Enhancing IT administrators, legal team members, and other personnel as first respondents

Chapter 6: Selecting and Analyzing Digital Evidence
Structured processes to locate and select digital evidence
Locating digital evidence
Search processes
Searching desktops and laptops
Selecting digital evidence
Seeking the truth
More effective forensic tools
Categorizing files
Eliminating superfluous files
Deconstructing files
Searching for files
The Event Analysis tool
The Cloud Analysis tool
The Lead Analysis tool
Analyzing e-mail datasets
Detecting scanned images
Volume Shadow Copy analysis tools
Timelines and other analysis tools

Chapter 7: Windows and Other Operating Systems as Sources of Evidence
The Windows Registry and system files and logs as resources of digital evidence
Seeking useful leads within the Registry
Mapping devices through the Registry
Detecting USB removable storage
User activity
Reviewing Most Recently Used and Jump List activity
Detecting wireless connectivity
Observing Windows Event Viewer logs
Recovery of hidden data from a VSS
Examining prefetch files
Pagefiles
Hibernation and sleep files
Detecting steganography
Apple and other operating system structures
Examining Apple operating systems
The Linux operating system
Remote access and malware threats
Remote access
Detecting malware attacks and other exploits
The prevalence of anti-forensics processes and tools

Chapter 8: Examining Browsers, E-mails, Messaging Systems,and Mobile Phones
Locating evidence from Internet browsing
Typical web-browsing behavior
Recovering browsing artifacts from slack and unallocated space
Private browsing
Messaging systems
Examining Skype and chat room artifacts
The invisible Internet
E-mail analysis and the processing of large e-mail databases
Recovering e-mails from desktop and laptop computers
Recovering and analyzing e-mails from larger datasets
Searching for scanned files
The growing challenge of evidence recovery from mobile phones
and handheld devices
Extracting data from mobile devices
Managing evidence contamination
Concealing illegal activities
Extracting mobile data from the cloud
Analyzing GPS devices and other handheld devices

Chapter 9: Validating the Evidence
The nature and problem of unsound digital evidence
Challenges explaining the complexity of digital evidence
The immaturity of the forensic subdiscipline
The ineffective security integrity of computers and networks
Evidence contamination
Impartiality in selecting evidence
Meaning is only clear in context
Faulty case management and evidence validation
The structured and balanced analysis of digital evidence
Developing hypotheses
Modeling arguments
The Toulmin model of argumentation
Formalizing the validation of digital evidence
The perceived benefits of a formalized validation process
Rationale for selection
The conceptual framework of the model
The validation process
Applying Bayesian reasoning to the analysis of validation
The comparative simplicity of the analysis of legal admissibility
More complex components requiring scientific measurement
Determining prior probability
Setting post probabilities
Checking whether the remote access application was running at the
time of the transgression
Present limitations and scoping
The presentation of digital evidence
Preparing digital forensics reports
Court appearances
Ethical issues confronting digital forensics practitioners

Chapter 10: Empowering Practitioners and Other Stakeholders
The evolving nature of digital evidence vis-à-vis the role of the practitioner
Solutions to the challenges posed by new hardware and software
More efficacious evidence recovery and preservation
Challenges posed by communication media and the cloud
Mobile phone evidence recovery
The cloud – convenient for users but problematic for practitioners
The need for effective evidence processing and validation
Contingency planning

This book contains 10 Chapters. The Role of Digital Forensics and Its Environment is explaining in Chapter 1. Chapter 2 from this book talking about Hardware and Software Environments. The Nature and Special Properties of Digital Forensic is described in Chapter 3. Chapter 4 explore about Recovering and Preserving Digital Evidence. The Need for Enhanced Forensic Tools is explain in Chapter 5. Selecting and Analyzing Digital Evidence explain in Chapter 6. Chapter 7 described about Windows and Other Operating Systems as Sources of Evidence. Chapter 8 describe about Examining Browsers, E-mails, Messaging Systems. Chapter 9 explain about Validating the Evidence. The last chapter, Chapter 10 exploring how to Empowering Practitioners and Other Stakeholders.

Richard Boddington commenced general policing with the London Metropolitan Police in 1968 and joined the Royal Hong Kong Police in 1971, later serving as a chief inspector in the Special Branch. In 1980, Richard moved to Australia and worked as a desk officer and case officer with the Australian Security Intelligence Organization. He later worked in several federal and state government agencies, including the Western Australia Department of Treasury and Finance, as a senior intelligence officer.

In 2008, he commenced developing and coordinating information security and digital forensics undergraduate and postgraduate courses at Murdoch University, where he was responsible for the creation of a digital forensic and information security degree offering. He provided a unique online virtual digital forensics
unit for postgraduate students at the University of Western Australia in 2014.

Between 1991 and 2015, Richard was a security analyst and digital forensic practitioner, providing independent consultancy services for legal practitioners and organizations requiring independent digital forensic examinations and reports. This included analyzing case evidence in criminal and civil cases heard at Magistrate, District and Commonwealth Courts. His work included the compilation of digital forensic reports and testifying as an expert witness on complex technical matters to assist the jury in understanding digital evidence presented during trial. Recent forensic examinations undertaken by him include analyzing digital
evidence recovered from computers, mobile phones, and other digital devices and then preparing expert testimony relating to a broad range of criminal and civil cases, including: Child pornography and child exploitation, Cyberstalking, Aggravated burglary and false imprisonment, Analysis of CCTV video digital evidence of assault and rape cases, Alleged homicide, suicide, and other crimes of violence.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

For IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Book Review : Windows Server 2016 Inside Out

August 29, 2021

If you are Systems Engineer, Systems Administrator and want to read about Windows Server, check it out this book:

Title : Windows Server 2016 Inside Out
Author : Orin Thomas
ISBN-13 : 978-1509302482
ISBN-10 : 1509302484
Publisher : Microsoft Press
Pages : 720

Year : 2017

Here is the details of this book.

Chapter 01 Administration Tools
Remote not local
Privileged Access Workstations
Remote Server Administration Tools
RSAT consoles
Server Manager console
PowerShell
Modules
PowerShell Gallery
Remoting
One to many remoting
PowerShell ISE
PowerShell Direct
Remote Desktop

Chapter 02 Installation Options
Windows Server 2016 editions
Windows Server servicing branches
LTSB
CBB
Server Core
Server Core interface
Server Core Roles
When to deploy Server Core
Server with GUI
Roles and Features
Nano Server
Nano Server Console
Supported Roles and Features
Domain Join
Creating Nano Server Images

Chapter 03 Deployment and configuration
Bare metal versus virtualized
Windows images
Modifying Windows images
Servicing Windows images
Mounting images
Adding drivers and updates to images
Adding roles and features
Committing an image
Build and capture
Answer files
Windows Deployment Services
WDS requirements
Managing images
Configuring WDS
Configuring transmissions
Driver groups and packages
Virtual Machine Manager
Virtual machine templates
VMM storage
VMM networking
Adding a WDS to VMM
VMM host groups
Infrastructure configuration as code
Desired State Configuration
DSC configuration files
Local Configuration Manager
DSC resources
DSC push model
DSC pull server
Chef
Chef servers
Chef Development Kit
Deploying Chef agents
Deploying Chef cookbooks and recipes
Puppet
Puppet master server
Deploying Puppet agent to Windows Server
Managing Windows Server Configuration
Puppet Windows module pack
Package management utilities
PowerShell Gallery
Nano Server package provider
Chocolatey

Chapter 04 Active Directory
Managing Active Directory
Remote rather than local administration
Active Directory Administrative Center
Active Directory Users and Computers
Active Directory Sites and Services
Active Directory Domains and Trusts
Domain Controllers
Deployment
Server Core
Global catalog servers
Read Only Domain Controllers
Virtual domain controller cloning
AD DS Structure
Domains
Domain functional levels
Forests
Account and resource forests
Organizational Units
Flexible Single Master Operations (FSMO) roles
Accounts
User accounts
Computer accounts
Group accounts
Default groups
Service accounts
Group policy
GPO Management
Policy processing
Group Policy Preferences
Administrative templates
Restoring deleted items
Active Directory Recycle Bin
Authoritative restore
Active Directory snapshots
Managing AD DS with PowerShell
Active Directory module
Group Policy module
ADDSDeployment module

Chapter 05 DNS, DNS and IPAM
DNS
DNS zone types
Zone delegation
Forwarders and conditional forwarders
Stub zones
GlobalNames zones
Peer Name Resolution Protocol
Resource records
Zone aging and scavenging
DNSSEC
DNS event logs
DNS options
Delegated administration
Managing DNS with PowerShell
DHCP
Scopes
Server and scope options
Reservations
DHCP filtering
Superscopes
Multicast scopes
Split scopes
Name protection
DHCP failover
Administration
IPAM
Deploy IPAM
Configure server discovery
IPAM administration
Managing IPAM with PowerShell

Chapter 6 Hyper-V
Dynamic Memory
Smart paging
Resource metering
Guest integration services
Generation 2 VMs
Enhanced Session Mode
RemoteFX
Nested virtualization
Nested virtualization dynamic memory
Nested virtualization networking
PowerShell Direct
Virtual hard disks
Fixed sized disks
Dynamically expanding disks
Differencing disks
Differencing drives
Modifying virtual hard disks
Pass through disks
Managing checkpoints
Virtual Fibre Channel adapters
Storage QoS 200
Hyper-V storage optimization
Deduplication
Storage tiering
Hyper-V virtual switches
External switches
Internal switches
Private switches
Virtual machine network adapters
Optimizing network performance
Bandwidth management
SR-IOV
Dynamic Virtual Machine Queue
Virtual machine NIC teaming
Virtual Machine MAC addresses
Network isolation
Hyper-V Replica
Configuring Hyper-V replica servers
Configuring VM replicas
Replica failover
Hyper-V replica broker
Hyper-V failover clusters
Hyper-V host cluster storage
Cluster quorum
Cluster networking
Force Quorum Resiliency
Cluster Shared Volumes
Active Directory detached clusters
Preferred owner and failover settings
Hyper-V guest clusters
Hyper-V guest cluster storage
Shared virtual hard disk
Live migration
Storage migration
Exporting, importing and copying VMs
VM Network Health Detection
VM drain on shutdown
Domain controller cloning
Shielded virtual machines
Managing Hyper-V using PowerShell

Chapter 07 Storage Services
Storage spaces and storage pools
Storage pools
Storage space resiliency
Storage space tiering
Thin Provisioning and Trim
Creating virtual disks
Storage Spaces Direct
Storage Replica
Supported configurations
Configuring replication
SMB 3.1.1
iSCSI
iSNS Server
Scale Out File Servers
NFS
Deduplication
Storage Quality of Service
ReFS
Storage related PowerShell cmdlets
Deduplication
iSCSI
iSCSITarget
NFS
Storage
StorageReplica

Chapter 08 File servers
Shared folder permissions
Using File Explorer
Server Manager
File Server Resource Manager
Folder level quotas
File screens
Storage reports
File classification
File management tasks
Distributed File System
DFS namespace
DFS replication
BranchCache
PowerShell commands
Shared Folder cmdlets
File Server Resource Manager cmdlets
BranchCache Cmdlets
DFS Cmdlets
Dynamic Access Control cmdlets

Chapter 9 Internet Information Services
Managing sites
Adding websites
Virtual directories
Adding web applications
Configuring TLS certificates
Site authentication
Modifying custom error response
Adding or disabling the default document
Directory browsing
IP address and domain name filtering
URL authorization rules
Request filters
Application pools
Creating application pools
Configuring application pool recycling settings
IIS users and delegation
IIS user accounts
Delegating administrative permissions
Managing FTP
Managing IIS using PowerShell

Chapter 10 Containers
Container concepts
Container types
Windows Server Containers
Hyper-V Containers
Server Core and Nano images
Managing Containers with Docker
Installing Docker
Demon.json
Retrieving Container OS image
Container registries and images
Managing containers
Starting a container
Modifying a running container
Creating a new image from a container
Using dockerfiles
Managing container images
Service accounts for Windows containers
Applying updates
Container networking
NAT
Transparent
Overlay
Layer 2 Bridge
Swarm mode
Creating swarm clusters
Creating overlay networks
Deploying and scaling swarm service

Chapter 11 Clustering and High Availability
Failover clustering
Cluster quorum modes
Cluster Storage and Cluster Shared Volumes
Cluster Networks
Cluster Aware Updating
Failover and Preference Settings
Multi-site clusters and Cloud Witness
Virtual Machine Failover Clustering
Rolling upgrades
Managing Failover clustering with PowerShell
Network Load Balancing
Network Load Balancing prerequisites
NLB cluster operation modes
Managing cluster hosts
Port rules
Filtering and Affinity
Managing NLB with PowerShell

Chapter 12 Active Directory Certificate Services
CA types
Enterprise CA
Standalone CAs
Certificate revocation lists
CRL distribution points
Authority Information Access
Revoking a certificate
Publishing CRLs and delta-CRLs
Certificate services role services
Certificate Templates
Template properties
Adding and editing templates
Certificate autoenrollment and renewal
CA management
Handling certificate requests
CA backup and recovery
Key archiving and recovery
CAPolicy.inf
Managing Certificate Services using PowerShell
Managing certificate services using Certutil.exe and Certreq.exe

Chapter 13 Active Directory
Federation Services
AD FS components
Claims, claim rules, and attribute stores
Claims provider
Relying party
Relying party trust
Claims provider trust
Configuring certificate relationship
Attribute stores
Claim rules
Relying party trust claim rules
Claims provider trust claim rules
Configure web application proxy
Workplace Join
Multi-factor authentication
Managing AD FS with PowerShell
Managing Web Application Proxy with PowerShell

Chapter 14 Dynamic Access Control and Active Directory Rights
Management Services
Dynamic Access Control
Configuring Group Policy to support DAC
Configuring User and Device Claims
Configuring Resource Properties
Central Access Rules
Central Access Policies
Staging
Access Denied Assistance
Installing AD RMS
AD RMS certificates and licenses
AD RMS Templates
AD RMS administrators and super users
Trusted User and Publishing Domains
Exclusion policies
Apply AD RMS templates automatically
Managing AD RMS with Windows PowerShell

Chapter 15 Network Policy and Access Services
Remote Desktop Gateway
RD Gateway connection and resource policies
Configuring server settings
Configuring clients to use RD Gateway
Virtual Private Networks
IKEv2 VPN protocol
SSTP VPN protocol
L2TP/IPsec protocols
PPTP VPN protocol
VPN authentication
Deploying a VPN server
Disable VPN protocols
Granting Access to a VPN server
LAN routing
Network Address Translation (NAT)
DirectAccess
DirectAccess topologies
DirectAccess server
Network Location Server
Configuring DirectAccess
Managing Remote Access using PowerShell

Chapter 16 Remote Desktop Services
Deployment
Remote Desktop Connection Broker
Deployment properties
Remote Desktop Session Host
Session collection settings
Personal session desktops
RemoteApp
Group Policy configuration
Remote Desktop Virtualization Host
Virtual machine preparation
Virtual desktop collections
Pooled virtual desktops
Personal virtual desktops
RemoteFX
Remote Desktop Web Access
Remote Desktop Licensing
Installing RDS CALs
Activating a license server
Managing Remote Desktop Services Using PowerShell

Chapter 17 Windows Server 2016 and Azure IaaS
Understanding IaaS
Resource groups
Storage accounts
Azure virtual networks
VM types
Deploying an IaaS VM
IP addressing
Network security groups
Remote Desktop
Azure AD Domain Join
Encrypted VMs
High Availability
Monitoring and diagnostics
VPN and ExpressRoute
Azure site-to-site VPN
Azure point-to-site VPN
ExpressRoute
Importing virtual machine images
Azure Site Recovery

Chapter 18 Security
Least privilege
Role Based Access Control
Password policies
User rights
Service accounts
Protected accounts
Authentication policies and silos
Credential Guard
Just Enough Administration
Role-capability files
Session-configuration files
JEA endpoints
Enhanced Security Administrative Environment forest
Privileged Access Management
PAM benefits
PAM components
PAM users and groups
PAM roles
Local Administrator Password Solution
WSUS
Products, security classifications, and languages
Autonomous and replica modes
Update files
WSUS security roles
WSUS groups
WSUS policies
Deploying updates
Automatic approval rules
Device Guard
Shielded VMs
Guarded fabric
Windows Defender
Windows Firewall with Advanced Security
Firewall profiles
Inbound rules
Creating outbound rules
Configuring IPsec
Connection security rules

Chapter 19 Monitoring and maintenance
Data collector sets
Alerts
Event Viewer
Event log filters
Event log views
Event subscriptions
Event-driven tasks
Network monitoring
Resource Monitor
Message Analyzer
Advanced auditing
Expression-based audit policies
File and folder auditing
Using auditpol with auditing
Windows Server Backup
Backup locations
Backing up data
Role- and application-specific backups
Restore from backups
Restore to an alternative location
Azure Backup Agent
Preparing for Azure Backup Agent
Backing up data to Azure Backup Agent
Restore from Azure Backup
Vssadmin
Safe Mode and Last Known Good Configuration
Configure the Boot Configuration Data store
Monitoring and maintenance related PowerShell cmdlets

Chapter 20 Upgrade and Migration
Supported Upgrade and Migration paths
Upgrading Roles and Features
Converting evaluation version to licensed version
Upgrading editions
Windows Server Migration Tools
Active Directory
FRS to DFSR migration
Migrating to a new forest
Active Directory Certificate Services
Preparation
Migration
Verification and post migration tasks
DNS
DHCP
Preparing to migrate DHCP
Migration
Verification and Post Migration Tasks
File and Storage Servers
Migration permissions
Preparing to migrate
Migrating File and Storage Services
Microsoft Server application compatibility

Chapter 21 Troubleshooting
Troubleshooting methodology
Redeployment
Symptoms and diagnosis
Ranking hypothetical solutions
Applying solutions
Operations Management Suite Log Analytics
Sysinternals tools
Process Explorer
Process Monitor
ProcDump
PsTools
VMMap
SigCheck
AccessChk
Sysmon
AccessEnum
ShellRunAs
LogonSessions
Active Directory Explorer
Insight for Active Directory
PsPing

This book contains 21 Chapters. Chapter 1 is talking about Administration Tools. Chapter 2 is explain about Installation Options for Winows Server 2016. Chapter 3 is describe about Deployment and configuration Windows Server 2016. Chapter 4 is talking about Active Directory. Chapter 5 contents are DNS, DNS and IPAM. Hyper-V Virtualization is exploring in Chapter 6. Chapter 7 describe about Storage Services. Chapter 8 is talking about File servers in Windows Server 2016. Web Server Internet Information Services is explain in Chapter 9. Chapter 10 is about Containers. For Clustering and High Availability you can find it in Chapter 11. Chapter 12 is described about Active Directory Certificate Services. Chapter 13 content is Active Directory Domain Services. Chapter 14 is explore Dynamic Access Control and Active Directory Rights. Chapter 15 is talking about Network Policy and Access Services. Chapter 16 is describe about Remote Desktop Services. Chapter 17 contents are Windows Server 2016 and Azure IaaS. Chapter 18 exploring about Security. Chapter 19 is describe about Monitoring and maintenance. Chapter 20 talking about Upgrade and Migration. The last chapter in this book is Chapter 21 and it is explaining about Troubleshooting.

Orin Thomas is an MVP, a Microsoft Regional Director, an MCT, and has a string of Microsoft MCSE and MCITP certifications. He has written more than 3 dozen books for Microsoft Press on topics including Windows Server, Windows Client, Azure, System Center, Exchange Server, Security, and SQL Server. He is an author at PluralSight and is a candidate in the Doctor of Information Technology program at Charles Sturt University. You can follow him on twitter at http://twitter.com/orinthomas

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

For IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Book Review : Mastering VMWare NSX for VSphere

August 26, 2021

If you are Systems Engineer and/or Systems Administrator and want to read about Virtualization, check it out this book:

Title : Mastering VMWare NSX for VSphere
Author : Elver Sena Sosa et. al.
ISBN : ISBN: 978-1-119-51354-4
Publisher : Sybex
Pages : 320
Year : 2020

Here is the details of this book.

Chapter 1 Abstracting Network and Security
Networks: 1990s
Colocation
Workload-to-Server Ratio
Inefficient Resource Allocation
The Long Road to Provisioning
Data Centers Come of Age
Data Center Workloads
Workloads Won’t Stay Put
VMware
Virtualization
What Is Happening in There?
Portability
Virtualize Away
Extending Virtualization to Storage
Virtual Networking and Security
NSX to the Rescue

Chapter 2 NSX Architecture and Requirements
NSX Network Virtualization
Planes of Operation
NSX Manager Role and Function
ESXi Hosts
vCenter Server
vSphere Distributed Switch
NSX VIBs
Competitive Advantage: IOChain
IOChain Security Features
NSX Controllers
NSX Controller Clustering
NSX Controller Roles
NSX Edge
ESG Sizing
NSX Role-Based Access Control
Overlay and Underlay Networks
Replication Modes for Traffic Going to Multiple Destinations

Chapter 3 Preparing NSX
NSX Manager Prerequisites
Open Ports and Name Resolution
Minimum Resource Requirements for NSX Data Center Appliances
vSphere HA and DRS
IP Addressing and Port Groups
Installing the Client Integration Plug-in
Installing NSX Manager
Associating NSX Manager to vCenter
Adding AD/LDAP to NSX
Linking Multiple NSX Managers Together
(Cross-vCenter NSX)
Multi-site Consistency with Universal Components
Primary and Secondary NSX Managers
Preparing ESXi Clusters for NSX
Creating a Universal Transport Zone on the Primary NSX Manager
vSphere Distributed Switches Membership
Adding Secondary NSX Managers

Chapter 4 Distributed Logical Switch
vSphere Standard Switch (vSS)
Traffic Shaping
Understanding Port Groups
NIC Teaming
Ensuring Security
Virtual Distributed Switch (vDS)
Virtual eXtensible LANs (VXLANs)
Employing Logical Switches
Three Tables That Store VNI Information
Collecting VNI Information
Centralized MAC Table
VTEP Table
We Might as Well Talk about ARP Now
Filling In the L2 and L3 Headers
Switch Security Module
Understanding Broadcast, Unknown Unicast, and Multicast
Layer 2 Flooding
Replication Modes
Deploying Logical Switches
Creating a Logical Switch

Chapter 5 Marrying VLANs and VXLANs
Shotgun Wedding: Layer 2 Bridge Architecture
Deployment
Under the Hood
Layer 2 VPN 102
NSX Native L2 Bridging
Hardware Switches to the Rescue
Hardware VTEPs
Deployment
Under the Hood

Chapter 6 Distributed Logical Router
Distributed Logical Router (DLR)
Control Plane Smarts
Logical Router Control Virtual Machine
Understanding DLR Efficiency
Another Concept to Consider
Let’s Get Smart about Routing
OSPF
Border Gateway Protocol (BGP)
Oh Yeah, Statics Too
Deploying Distributed Logical Routers

Chapter 7 NFV: Routing with NSX Edges
Network Function Virtualization: NSX Has It Too
This Is Nice: Edge HA
Adding HA
Let’s Do Routing Like We Always Do
Deploying the Edge Services Gateway
Configuring BGP
Configuring OSPF
Configuring Static Routes
Routing with the DLR and ESG
Using CLI Commands
Default Behaviors to Be Aware Of
Equal Cost Multi-Path Routing

Chapter 8 More NVF: NSX Edge Services Gateway
ESG Network Placement
Network Address Translation
Configuring Source NAT
Configuring Destination NAT
Configuring SNAT on the ESG
Configuring DNAT on the ESG
ESG Load Balancer
Configuring an ESG Load Balancer
Layer 2 VPN (If You Must)
Secure Sockets Layer Virtual Private Network
Split Tunneling
Configuring SSL VPN 180
Internet Protocol Security VPN
Understanding NAT Traversal
Configuring IPsec Site-to-Site VPN with the ESG
Round Up of Other Services
DHCP Service
Configuring the ESG as a DHCP Server
DHCP Relay
Configuring the DLR for DHCP Relay
DNS Relay
Configuring DNS Relay on the ESG

Chapter 9 NSX Security, the Money Maker
Traditional Router ACL Firewall
I Told You about the IOChain
Slot 2: Distributed Firewall
Under the Hood
Adding DFW Rules
Segregating Firewall Rules
IP Discovery
Gratuitous ARP Used in ARP Poisoning Attacks
Why Is My Traffic Getting Blocked?
Great, Now It’s Being Allowed
Identity Firewall: Rules Based on Who Logs In
Distributing Firewall Rules to Each ESXi Host: What’s Happening?

Chapter 10 Service Composer and Third-Party Appliances
Security Groups
Dynamic Inclusion
Static Inclusion
Static Exclusion
Defining a Security Group through Static Inclusion
Defining a Security Group through Dynamic Inclusion
Customizing a Security Group with Static Exclusion
Defining a Security Group Using Security Tags
Adding to DFW Rules
Service Insertion
IOChain, the Gift that Keeps on Giving
Layer 7 Stuff: Network Introspection
Guest Introspection
Service Insertion Providers
Security Policies
Creating Policies
Enforcing Policies

Chapter 11 vRealize Automation and REST APIs
vRealize Automation Features
vRA Editions
Integrating vRA and NSX
vRealize Automation Endpoints
Associating NSX Manager with vRealize Automation
Network Profiles
vRA External, Routed, and NAT Network Profiles
Reservations
vRealize Orchestrator Workflows
Creating a Blueprint for One Machine
Adding NSX Workflow to a Blueprint
Creating a Request Service in the vRA Catalog
Configuring an Entitlement
Deploying a Blueprint that Consumes NSX Services
REST APIs
NSX REST API GET Request
NSX REST API POST Request
NSX REST API DELETE Request

This book contains 11 Chapters. Chapter 1 from this book is talking about Abstracting Network and Security. Chapter 2 is describe about NSX Architecture and Requirements. Chapter 3 is exploring Preparing NSX. Chapter 4 is explain about Distributed Logical Switch. Chapter 5 is describe about Marrying VLANs and VXLANs. Chapter 6 is talking about Distributed Logical Router. Chapter 7 is exploring about NFV: Routing with NSX Edges.Chapter 8 is talking about More NVF: NSX Edge Services Gateway. Chapter 9 is talking about NSX Security, the Money Maker. Chapter 10 is describe about Service Composer and Third-Party Appliances. The last chapter from this book is Chapter 11 that is explain about vRealize Automation and REST APIs.

Elver Sena Sosa is a Data Center Solutions Architect who specializes in Software Defined Data Center technologies. Over the past 20 years, Elver has driven the presales, design, and deployment of projects throughout APAC, EMEA, and APAC. Elver has been the go-to partner for helping VMware evangelize NSX, vSAN, and VCF, VMware’s Software Defined products and solutions. Elver is a skilled communicator who enjoys sharing his experience on the interdependencies of technology to audiences around the world. Elver has continued working in SDDC with his company, Hydra 1303, Inc, where he published his first book, the NSX exam study guide,
VCP6-NV Official Cert Guide, and the YouTube vSAN Architecture 100 series.

Trey McMahon is based out of Richmond, Virginia, and is a Cloud Data Engineer on the Hydra 1303 team. Trey has been in networking since 1997, writing authorized courses and exams for Cisco, developing instructor readiness programs and labs for EMC and Cisco, teaching network engineering in over 30 countries, and supporting VMware customer enablement. These days at Hydra 1303, he specializes in cloudy things.

Zac Smith is a lead Data Center Solutions Engineer at Hydra 1303. He specializes in providing automated data center solutions. Zac has been in the IT industry for 20 years and has been a part of many enterprise solution designs and deployments. Zac has also been involved in writing numerous courses for VMware and Cisco, as well as providing partner and customer enablement sessions on a global scale.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

For IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Book Review : Network Automation Cookbook

August 23, 2021

If you are Network Engineer and want to read about Network Automation, check it out this book:

Title : Network Automation Cookbook : Proven and actionable recipes to automate and manage network devices using Ansible
Author : Karim Okasha

ISBN : 978-1-78995-648-1
Publisher : Packt Publishing
Pages : 482
Year : 2020

Here is the details of this book.

Chapter 1: Building Blocks of Ansible
Technical requirements
Installing Ansible
Building Ansible’s inventory
Using Ansible’s variables
Building Ansible’s playbook
Using Ansible’s conditionals
Using Ansible’s loops
Securing secrets with Ansible Vault
Using Jinja2 with Ansible
Using Ansible’s filters
Using Ansible Tags
Customizing Ansible’s settings
Using Ansible Roles

Chapter 2: Managing Cisco IOS Devices Using Ansible
Technical requirements
Building an Ansible network inventory
Connecting to Cisco IOS devices
Configuring basic system information
Configuring interfaces on IOS devices
Configuring L2 VLANs on IOS devices
Configuring trunk and access interfaces
Configuring interface IP addresses
Configuring OSPF on IOS devices
Collecting IOS device facts
Validating network reachability on IOS devices
Retrieving operational data from IOS devices
Validating network states with pyATS and Ansible

Chapter 3: Automating Juniper Devices in the Service Providers Using Ansible
Technical requirements
Building the network inventory
Connecting and authenticating to Juniper devices
Enabling NETCONF on Junos OS devices
Configuring generic system options on Juniper devices
Configuring interfaces on Juniper devices
Configuring OSPF on Juniper devices
Configuring MPLS on Juniper devices
Configuring BGP on Juniper devices
Deploying configuration on Juniper devices
Configuring the L3VPN service on Juniper devices
Gathering Juniper device facts using Ansible
Validating network reachability on Juniper devices
Retrieving operational data from Juniper devices
Validating the network state using PyEZ operational tables

Chapter 4: Building Data Center Networks with Arista and Ansible
Technical requirements
Building the Ansible network inventory
Connecting to and authenticating Arista devices from Ansible
Enabling eAPI on Arista devices
Configuring generic system options on Arista devices
Configuring interfaces on Arista devices
Configuring the underlay BGP on Arista devices
Configuring the overlay BGP EVPN on Arista devices
Deploying the configuration on Arista devices
Configuring VLANs on Arista devices
Configuring VXLANs tunnels on Arista devices
Gathering Arista device facts
Retrieving operational data from Arista devices

Chapter 5: Automating Application Delivery with F5 LTM and Ansible
Technical requirements
Building an Ansible network inventory
Connecting and authenticating to BIG-IP devices
Configuring generic system options on BIG-IP devices
Configuring interfaces and trunks on BIG-IP devices
Configuring VLANs and self-IPs on BIG-IP devices
Configuring static routes on BIG-IP devices
Deploying nodes on BIG-IP devices
Configuring a load balancing pool on BIG-IP devices
Configuring virtual servers on BIG-IP devices
Retrieving operational data from BIG-IP nodes

Chapter 6: Administering a Multi-Vendor Network with NAPALM and Ansible
Technical requirements
Installing NAPALM and integrating with Ansible
Building an Ansible network inventory
Connecting and authenticating to network devices using Ansible
Building the device configuration
Collecting device facts with NAPALM
Validating network reachability using NAPALM
Validating and auditing networks with NAPALM

Chapter 7: Deploying and Operating AWS Networking Resources with Ansible
Technical requirements
Installing the AWS SDK
Building an Ansible inventory
Authenticating to your AWS account
Deploying VPCs using Ansible
Deploying subnets using Ansible
Controlling routing within a VPC using Ansible
Deploying network ACLs using Ansible
Deployment validation using Ansible
Decommissioning resources on AWS using Ansible

Chapter 8: Deploying and Operating Azure Networking Resources with Ansible
Technical requirements
Installing the Azure SDK
Building an Ansible inventory
Authenticating to your Azure account
Creating a resource group
Creating virtual networks
Creating subnets
Building user-defined routes
Deploying network security groups
Deployment validation using Ansible
Decommissioning Azure resources using Ansible

Chapter 9: Deploying and Operating GCP Networking Resources with Ansible
Technical requirements
Installing the GCP SDK
Building an Ansible inventory
Authenticating to your GCP account
Creating GCP VPC networks
Creating subnets
Deploying firewall rules in GCP
Deploying VMs in GCP
Adjusting routing within a VPC
Validating GCP deployment using Ansible
Decommissioning GCP resources using Ansible

Chapter 10: Network Validation with Batfish and Ansible
Technical requirements
Installing Batfish
Integrating Batfish with Ansible
Generating the network configuration
Creating a network snapshot for Batfish
Initializing the network snapshot with Ansible
Collecting network facts from Batfish
Validating traffic forwarding with Batfish
Validating ACLs with Batfish

Chapter 11: Building a Network Inventory with Ansible and NetBox
Technical requirements
Installing NetBox
Integrating NetBox with Ansible
Populating sites in NetBox
Populating devices in NetBox
Populating interfaces in NetBox
Populating IP addresses in NetBox
Populating IP prefixes in NetBox
Using NetBox as a dynamic inventory source for Ansible
Generating a configuration using NetBox

Chapter 12: Simplifying Automation with AWX and Ansible
Technical requirements
Installing AWX
Managing users and teams on AWX
Creating a network inventory on AWX
Managing network credentials on AWX
Creating projects on AWX
Creating templates on AWX
Creating workflow templates on AWX
Running automation tasks using the AWX API

Chapter 13: Advanced Techniques and Best Practices for Ansible
Technical requirements
Installing Ansible in a virtual environment
Validating YAML and Ansible playbooks
Calculating the execution time for Ansible playbooks
Validating user input using Ansible
Running Ansible in check mode
Controlling parallelism and rolling updates in Ansible
Configuring fact caching in Ansible
Creating custom Python filters for Ansible

This book contains 13 Chapters. Chapter 1 contents is Building Blocks of Ansible. Chapter 2 from this book is describe about Managing Cisco IOS Devices Using Ansible. Chapter 3 is talking about Automating Juniper Devices in the Service Providers Using Ansible. Chapter 4 is explain about Building Data Center Networks with Arista and Ansible. Chapter 5 is explore how to Automating Application Delivery with F5 LTM and Ansible.
Chapter 6 describe about Administering a Multi-Vendor Network with NAPALM and Ansible. Chapter 7 is talking about : Deploying and Operating AWS Networking Resources with Ansible. Chapter 8 is explore how to Deploying and Operating Azure Networking Resources with Ansible. Chapter 9 is explore how to Deploying and Operating GCP Networking Resources with Ansible. Chapter 10 is describe about Network Validation with Batfish and Ansible.
Chapter 11 explore how to Building a Network Inventory with Ansible and NetBox. Chapter 12 describe about how to Simplifying Automation with AWX and Ansible. Chapter 13 is talking about Advanced Techniques and Best Practices for Ansible.

Karim Okasha is a network consultant with over 15 years of experience in the ICT industry. He is specialized in the design and operation of large telecom and service provider networks and has lots of experience in network automation. Karim has a bachelor’s degree in telecommunications and holds several expert-level certifications, such as CCIE, JNCIE, and RHCE. He is currently working in Red Hat as a network automation consultant, helping large telecom and service providers to design and implement innovative network automation solutions. Prior to joining Red Hat, he worked for Saudi Telecom Company as well as Cisco and Orange S.A.

I would like to thank my wife and kids for providing me with the freedom and understanding needed to focus on this dream; without their support, this book wouldn’t be possible. I would like to thank the Packt Publishing team and my technical reviewers, for making my dream of writing this book a reality.
Finally, I would like to thank my mentor and best friend, Mohammed Mahmoud, for all his support and encouragement during all these years.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

For IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Book Review : Big Data Fundamental

August 20, 2021

If you are Data Analyst and want to read about Big Data, check it out this book:

Title : Big Data Fundamentals
Author : Thomas Erl, Wajid Khattak, Paul Buhler
ISBN-13 : 978-0-13-429107-9
ISBN-10 : 0-13-429107-7
Publisher : Prentice Hall
Pages : 240
Year : 2016

Here is the details of this book.

Part I: THE FUNDAMENTALS OF BIG DATA
Chapter 1: Understanding Big Data
Concepts and Terminology
Datasets
Data Analysis
Data Analytics
Descriptive Analytics
Diagnostic Analytics
Predictive Analytics
Prescriptive Analytics
Business Intelligence (BI)
Key Performance Indicators (KPI)
Big Data Characteristics
Volume
Velocity
Variety
Veracity
Value
Different Types of Data
Structured Data
Unstructured Data
Semi-structured Data
Metadata
Case Study Background
History
Technical Infrastructure and Automation Environment
Business Goals and Obstacles
Case Study Example
Identifying Data Characteristics
Volume
Velocity
Variety
Veracity
Value
Identifying Types of Data

Chapter 2: Business Motivations and Drivers for Big Data Adoption
Marketplace Dynamics
Business Architecture
Business Process Management
Information and Communications Technology
Data Analytics and Data Science
Digitization
Affordable Technology and Commodity Hardware
Social Media
Hyper-Connected Communities and Devices
Cloud Computing
Internet of Everything (IoE)
Case Study Example

Chapter 3: Big Data Adoption and Planning Considerations
Organization Prerequisites
Data Procurement
Privacy
Security
Provenance
Limited Realtime Support
Distinct Performance Challenges
Distinct Governance Requirements
Distinct Methodology
Clouds
Big Data Analytics Lifecycle
Business Case Evaluation
Data Identification
Data Acquisition and Filtering
Data Extraction
Data Validation and Cleansing
Data Aggregation and Representation
Data Analysis
Data Visualization
Utilization of Analysis Results
Case Study Example
Big Data Analytics Lifecycle
Business Case Evaluation
Data Identification
Data Acquisition and Filtering
Data Extraction
Data Validation and Cleansing
Data Aggregation and Representation
Data Analysis
Data Visualization
Utilization of Analysis Results

Chapter 4: Enterprise Technologies and Big Data Business Intelligence
Online Transaction Processing (OLTP)
Online Analytical Processing (OLAP)
Extract Transform Load (ETL)
Data Warehouses
Data Marts
Traditional BI
Ad-hoc Reports
Dashboards
Big Data BI
Traditional Data Visualization
Data Visualization for Big Data
Case Study Example
Enterprise Technology
Big Data Business Intelligence

Part II: STORING AND ANALYZING BIG DATA
Chapter 5: Big Data Storage Concepts
Clusters
File Systems and Distributed File Systems
NoSQL
Sharding
Replication
Master-Slave
Peer-to-Peer
Sharding and Replication
Combining Sharding and Master-Slave Replication
Combining Sharding and Peer-to-Peer Replication
CAP Theorem
ACID
BASE
Case Study Example

Chapter 6: Big Data Processing Concepts
Parallel Data Processing
Distributed Data Processing
Hadoop
Processing Workloads
Batch
Transactional
Cluster
Processing in Batch Mode
Batch Processing with MapReduce
Map and Reduce Tasks
Map
Combine
Partition
Shuffle and Sort
Reduce
A Simple MapReduce Example
Understanding MapReduce Algorithms
Processing in Realtime Mode
Speed Consistency Volume (SCV)
Event Stream Processing
Complex Event Processing
Realtime Big Data Processing and SCV
Realtime Big Data Processing and MapReduce
Case Study Example
Processing Workloads
Processing in Batch Mode
Processing in Realtime

Chapter 7: Big Data Storage Technology
On-Disk Storage Devices
Distributed File Systems
RDBMS Databases
NoSQL Databases
Characteristics
Rationale
Types
Key-Value
Document
Column-Family
Graph
NewSQL Databases
In-Memory Storage Devices
In-Memory Data Grids
Read-through
Write-through
Write-behind
Refresh-ahead
In-Memory Databases
Case Study Example

Chapter 8: Big Data Analysis Techniques
Quantitative Analysis
Qualitative Analysis
Data Mining
Statistical Analysis
A/B Testing
Correlation
Regression
Machine Learning
Classification (Supervised Machine Learning)
Clustering (Unsupervised Machine Learning)
Outlier Detection
Filtering
Semantic Analysis
Natural Language Processing
Text Analytics
Sentiment Analysis
Visual Analysis
Heat Maps
Time Series Plots
Network Graphs
Spatial Data Mapping
Case Study Example
Correlation
Regression
Time Series Plot
Clustering
Classification
APPENDIX A: Case Study Conclusion
About the Authors

This book contains only 2 Parts and 8 Chapters. Part 1 from this book talking about The Fundamentals of Big Data, these includes Understanding Big Data, Business Motivations and Drivers for Big Data Adoption, Big Data Adoption and Planning Considerations and Enterprise Technologies and Big Data Business Intelligence.

Part contents is Storing And Analyzing Big Data. These includes Big Data Storage Concepts, Big Data Processing Concepts, Big Data Storage Technology, and Big Data Analysis Techniques.

Thomas Erl
Thomas Erl is a top-selling IT author, founder of Arcitura Education and series editor of the Prentice Hall Service Technology Series from Thomas Erl. With more than 200,000 copies in print worldwide, his books have become international bestsellers and have been formally endorsed by senior members of major IT organizations, such as IBM, Microsoft, Oracle, Intel, Accenture, IEEE, HL7, MITRE, SAP, CISCO, HP and many others. As CEO
of Arcitura Education Inc., Thomas has led the development of curricula for the internationally recognized Big Data Science Certified Professional (BDSCP), Cloud Certified Professional (CCP) and SOA Certified Professional (SOACP) accreditation programs, which have established a series of formal, vendor-neutral industry certifications obtained by thousands of IT professionals around the world. Thomas has toured more than
20 countries as a speaker and instructor. More than 100 articles and interviews by Thomas have been published in numerous publications, including The Wall Street Journal and CIO Magazine.

Wajid Khattak
Wajid Khattak is a Big Data researcher and trainer at Arcitura Education Inc. His areas of interest include Big Data engineering and architecture, data science, machine learning, analytics and SOA. He has extensive .NET software development experience in the domains of business intelligence reporting solutions and GIS.
Wajid completed his MSc in Software Engineering and Security with distinction from Birmingham City University in 2008. Prior to that, in 2003, he earned his BSc (Hons) degree in Software Engineering from Birmingham City University with first-class recognition. He holds MCAD & MCTS (Microsoft), SOA Architect, Big Data Scientist,
Big Data Engineer and Big Data Consultant (Arcitura) certifications.

Paul Buhler
Dr. Paul Buhler is a seasoned professional who has worked in commercial, government and academic environments. He is a respected researcher, practitioner and educator of service-oriented computing concepts, technologies and implementation methodologies. His work in XaaS naturally extends to cloud, Big Data and IoE areas. Dr. Buhler’s more recent work has been focused on closing the gap between business strategy and process
execution by leveraging responsive design principles and goal-based execution. As Chief Scientist at Modus21, Dr. Buhler is responsible for aligning corporate strategy with emerging trends in business architecture and process execution frameworks. He also holds an Affiliate Professorship at the College of Charleston, where he teaches both graduate and undergraduate computer science courses. Dr. Buhler earned his Ph.D. in Computer Engineering at the University of South Carolina. He also holds an MS degree in Computer Science from Johns Hopkins University and a BS in Computer Science from The Citadel.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Book Review : SQL Server 2019 Administration Inside Out

August 17, 2021

If you are Database Administrator (DBA) and Database Developer want to read about SQL Server, check it out this book:

Title : SQL Server 2019
Author : Randolph West et. al.
ISBN-13 : 978-0135561089
ISBN-10 : 0135561086
Publisher : Microsoft Press
Pages : 990
Year : 2020

Here is the details of this book.

Part I. Introduction
Chapter 1. Getting started with SQL Server tools

  1. SQL Server setup
  2. Tools and services installed with the SQL Server Database Engine
  3. Performance and reliability monitoring tools
  4. SQL Server Reporting Services
  5. SQL Server Management Studio (SSMS)
  6. Azure Data Studio
  7. SQL Server Data Tools
  8. A note on discontinued and deprecated features

Chapter 2. Introducing database server components

  1. Memory
  2. Central Processing Unit
  3. Storing your data
  4. Connecting to SQL Server over the network
  5. High availability concepts
  6. Securing SQL Server
  7. Understanding virtualization and containers

Chapter 3. Designing and implementing an on-premises database infrastructure

  1. Introduction to SQL Server database architecture
  2. Data files and filegroups
  3. Recording changes in the transaction log
  4. Table partitioning
  5. Compressing data
  6. Managing the temporary database
  7. Configuration settings
  8. Container orchestration with Kubernetes

Part II. Deployment
Chapter 4. Installing and configuring SQL Server instances and features

  1. What to do before installing SQL Server
  2. Installing a new instance
  3. Post-installation server configuration
  4. Post-installation configuration of other features

Chapter 5. Installing and configuring SQL Server on Linux

  1. What is Linux?
  2. Considerations for installing SQL Server on Linux
  3. Installing SQL Server on Linux
  4. Configuring SQL Server for Linux
  5. Caveats of SQL Server on Linux

Chapter 6. Provisioning and configuring SQL Server databases

  1. Adding databases to a SQL Server instance
  2. Moving and removing databases

Chapter 7. Understanding table features

  1. Reviewing table design
  2. Special table types
  3. Storing BLOBs
  4. Table partitioning
  5. Capturing modifications to data

Part III. SQL Server management

Chapter 8. Maintaining and monitoring SQL Server

  1. Detecting, preventing, and responding to database corruption
  2. Maintaining indexes and statistics
  3. Managing database file sizes
  4. Monitoring activity by using DMOs
  5. Monitoring with the SQL Assessment API
  6. Utilizing extended events
  7. Capturing performance metrics with DMOs and Data Collectors
  8. Protecting important workloads by using Resource Governor
  9. Understanding the new servicing model

Chapter 9. Automating SQL Server administration

  1. Components of SQL Server automated administration
  2. Maintaining SQL Server
  3. Using SQL Server Maintenance Plans
  4. Strategies for administering multiple SQL Servers
  5. Using PowerShell to automate SQL Server administration

Chapter 10. Developing, deploying, and managing data recovery

  1. Preparing for data recovery
  2. Understanding different types of backups
  3. Understanding backup devices
  4. Creating and verifying backups
  5. Restoring a database
  6. Defining a recovery strategy

Chapter 11. Implementing high availability and disaster recovery

  1. Overview of high availability and disaster recovery technologies in SQL Server
  2. Configuring failover cluster instances
  3. Designing availability groups solutions
  4. Configuring availability groups in SQL Server on Linux
  5. Administering availability groups

Part IV. Security
Chapter 12. Administering security and permissions

  1. Authentication modes
  2. Security principals
  3. Permissions
  4. Common security administration tasks

Chapter 13. Protecting data through encryption, privacy and auditing

  1. Privacy in the modern era
  2. Introducing security principles and protocols
  3. Protecting the data platform
  4. Auditing with SQL Server and Azure SQL Database
  5. Securing Azure infrastructure as a service

Part V. Performance
Chapter 14. Performance tuning SQL Server

  1. Understanding isolation levels and concurrency
  2. Understanding durability settings for performance
  3. Understanding how SQL Server executes yourquery
  4. Understanding advanced engine features for tuning queries

Chapter 15. Understanding and designing indexes

  1. Designing clustered indexes
  2. Designing rowstore nonclustered indexes
  3. Understanding columnstore indexes
  4. Understanding indexing in memory-optimized tables
  5. Understanding index statistics
  6. Understanding other types of indexes

Part VI. Cloud
Chapter 16. Designing and implementing hybrid and Azure
database infrastructure

  1. Cloud computing and Microsoft Azure
  2. Cloud models and SQL Server
  3. Cloud security
  4. Other data services in Azure

Chapter 17. Provisioning Azure SQL Database

  1. Provisioning a logical SQL server
  2. Provisioning a database in Azure SQL Database
  3. Provisioning an elastic pool
  4. Managing database space
  5. Security in Azure SQL Database
  6. Preparing Azure SQL Database for disaster recovery

Chapter 18. Provisioning Azure SQL Database managed
instance

  1. What is a Managed Instance?
  2. Creating a managed instance
  3. Establishing a connection
  4. Migrating data to Managed Instance
  5. Deleting a Managed Instance
  6. Network requirements for Managed Instances
  7. Managed Instance administration features
  8. Azure SQL Analytics
  9. Security of Managed Instance
  10. Data protection features

Chapter 19. Migrating to SQL Server solutions in Azure

  1. Migration Services Options
  2. Common causes for migration failures
  3. Integration Runtime options for Migration Services
  4. Best Practices for security and resiliency during migration

Part VII. Big Data and Machine Learning
Chapter 20. Leveraging big data and machine learning

  1. A big data primer
  2. Introducing Big Data Clusters
  3. Deploying Big Data Clusters
  4. Benefits of PolyBase
  5. Operationalizing analytics with Machine Learning Server
  6. Launchpad service

This book contains 7 Parts and 20 Chapters.

Part 1 from this book talking about Introduction. These includes Getting started with SQL Server tools, Introducing database server components and Designing and implementing an on-premises database infrastructure.

Part 2 is describing about Deployment. These includes Installing and configuring SQL Server instances and features, Installing and configuring SQL Server on Linux, Provisioning and configuring SQL Server databases and
Understanding table features.

Part 3 talking about SQL Server management. These includes Maintaining and monitoring SQL Server, Automating SQL Server administration, Developing, deploying, and managing data recovery, and Implementing high availability and disaster recovery.

Part 4 is talking about Security. These includes Administering security and permissions and Protecting data through encryption, privacy and auditing.

Part 5 is about Performance. These includes Performance tuning SQL Server and Understanding and designing indexes.

Part 6 describe about Cloud. These includes Designing and implementing hybrid and Azure database infrastructure, Provisioning Azure SQL Database, Provisioning Azure SQL Database managed instance and Migrating to SQL Server solutions in Azure.

The last part, Part 7 is explain about Big Data and Machine Learning that is Leveraging big data and machine learning.

Randolph West is a technologist and Data Platform MVP from Calgary, Alberta, Canada, and hates writing in the third person because pronouns suck. Randolph is the founder of the Calgary Data User Group, and leader of the Calgary PASS User Group. You can see Randolph presenting at various conferences around the world, and acting on stage and screen. Randolph specializes in implementing best practices, performance tuning, disaster recovery, cloud migrations, software development, and yelling at Microsoft Word. If you’re interested in becoming a public speaker, check out SpeakingMentors.com. Blog: bornsql.ca/blog. Twitter: @_randolph_west. Not to be trusted around chocolate.

Melody Zacharias has worked with SQL Server since version 7, and she is very passionate about all things data! As a Microsoft MVP Melody loves to share her passion with users around the world by teaching at events, working within the SQL community, and mentoring. When not working with data she loves to hike with her dog in the Canadian Rockies. You can find her on her blog at SQLMelody.com where she shares musings on how to make SQL sing, or sometimes just carry a tune, or on Twitter @SQLMelody.

William Assaf is a Microsoft SQL Server consultant, speaker, and manager, and blogs about SQL at sqltact.com. William has been a developer, admin, and consultant for databases around the world, having launched from in-house DBA to consulting DBA thanks to the recession. He has helped develop Microsoft SQL Server certification exams since 2012, has been a Regional Mentor for PASS since 2015, and just stepped down from being the lead organizer of SQLSaturday Baton Rouge after a decade leading one of the largest SQLSat events in the world, and the only one with jambalaya. William enjoys volunteering for STEM initiatives as well as guest lecturing at LSU and SELU, where he gives a shoutout to all the ISDS and CIS students. William lives in continuous awe of his far more accomplished high school sweetheart Christine, and they would like to say that empty nesting is pretty great. Both of them hope to see you at PASS Summit and a future SQLSaturday event.

Sven Aelterman started with SQL Server when he first deployed version 2000 in a failover cluster scenario. Since then, he has worked as IT manager, principal consultant, and IT director. He currently serves the Trojans (students) of Troy University as a lecturer in information systems in the Sorrell College of Business and as director of IT for the College. In addition, he is cloud software architect for Sorrell Solutions, a business services nonprofit through which Trojans can gain real-world business and IT experience. In a fledgling attempt to give back to the community, he has spoken at many SQL Saturdays and code camps in the southeastern United States since 2005. He spoke about SSIS 2012 at Microsoft TechEd 2012. In 2012, he co-authored a book dedicated to SQL Server FILESTREAM. He was a co-author on the 2017 edition of this text. His involvement with Microsoft Azure resulted in the organization of four Global Azure Bootcamp events at Troy University. Sven blogs about a variety of Microsoft technologies at blog.aelterman.com and tweets and retweets about technology @svenaelterman.

Louis Davidson is a data architect for CBN in Virginia Beach, VA; telecommuting from Cleveland, TN (which is not even as glamorous as it sounds.) Louis has written and contributed to many books on SQL Server topics over the past 20 years. His most prominent work has been five editions of his book entitled: Pro SQL Server Relational Database Design and Implementation for Apress in 2016, with a new version forthcoming in 2020. Louis has been a speaker at many SQL Saturday events, and has helped organize events in Nashville and Chattanooga, TN. He blogs on Red-Gate’s Simple-Talk website here: https://www.red-gate.com/simple-talk/author/louis-davidson/ and you can visit his website at http://drsql.org.

Joseph D’Antoni is a Principal Consultant and Microsoft Data Platform MVP with over 20 years of experience working in both Fortune 500 and smaller firms. He has worked with SQL Server and Oracle since version 7 of each database and has specific expertise in performance tuning, infrastructure, and disaster recovery.

Meagan Longoria is a Microsoft Data Platform MVP living in Denver, Colorado. She is an experienced consultant who has worked in business intelligence, data warehousing, and database development for over a decade. She enjoys creating solutions in Azure and SQL Server that make data useful for decision makers. Meagan enjoys sharing her knowledge with the technical community by speaking at conferences, blogging (Datasavvy.me), and sharing tips and helpful links on twitter (@mmarie).

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Book Review : Windows Server 2016 Unleashed

August 14, 2021

If you are Systems Administrator or Systems Engineer and want to read about Windows Server, check it out this book:

Title : Windows Server 2016 Unleashed
Author : Rand Morimoto et. al.
ISBN-13 : 978-0-13-458375-4
ISBN-10 : 0-13-458375-2
Publisher : Sybex
Pages : xxii + 1549
Year : 2017

Here is the details of this book.

Part I Windows Server 2016 Overview
1 Windows Server 2016 Technology Primer
Windows Server 2016 Defined
When Is the Right Time to Migrate?
Versions of Windows Server 2016
Improvements for Continuous Availability
Enhancements for Flexible Identity and Security
Enabling Users to Work Anywhere
Simplifying the Datacenter
Addition of Migration Tools
Identifying Which Windows Server 2016 Service to Install or Migrate to First

2 Planning, Prototyping, Migrating, and Deploying Windows Server 2016
Determining the Scope of Your Project
Identifying the Business Goals and Objectives to Implement Windows Server
Identifying the Technical Goals and Objectives to Implement Windows Server
The Discovery Phase: Understanding the Existing Environment
The Design Phase: Documenting the Vision and the Plan
The Migration Planning Phase: Documenting the Process for Migration
The Prototype Phase: Creating and Testing the Plan
The Pilot Phase: Validating the Plan to a Limited Number of Users
The Migration/Implementation Phase: Conducting the Migration
or Installation

3 Installing Windows Server 2016 and Server Core
Planning for a Server Installation
Installing a Clean Version of Windows Server 2016 Operating System
Upgrading to Windows Server 2016
Understanding Server Core Installation
Managing and Configuring a Server Core Installation
Performing an Unattended Windows Server 2016 Installation
Nano Server

Part II Windows Server 2016 Active Directory
4 Active Directory Domain Services Primer
The Evolution of Directory Services
Understanding the Development of AD DS
AD DS Structure
Outlining AD DS Components
Understanding Domain Trusts
Defining Organizational Units
Outlining the Role of Groups in an AD DS Environment
Understanding AD DS Replication
Outlining the Role of DNS in AD DS
Outlining AD DS Security
Getting Familiar with AD DS Features in Windows Server 2016

5 Designing a Windows Server 2016 Active Directory
Understanding AD DS Domain Design
Choosing a Domain Namespace
Examining Domain Design Features
Choosing a Domain Structure
Understanding the Single-Domain Model
Understanding the Multiple-Domain Model
Understanding the Multiple Trees in a Single-Forest Model
Reviewing the Federated-Forests Model
Understanding the Empty-Root Domain Model
Understanding the Placeholder Domain Model
Understanding the Special-Purpose Domain Model
Renaming an AD DS Domain

6 Designing Organizational Unit and Group Structure
Defining Organizational Units in AD DS
Defining AD Groups
OU and Group Design
Starting an OU Design
Using OUs to Delegate Administration
Group Policies and OU Design
Understanding Group Design
Exploring Sample Design Models

7 Active Directory Infrastructure
Understanding AD DS Replication in Depth
Understanding Active Directory Sites
Planning Replication Topology
Windows Server 2016 IPv6 Support
Detailing Real-World Replication Designs
Deploying Read-Only Domain Controllers
Deploying a Clone Virtualized DC

8 Creating Federated Forests and Lightweight Directories
Keeping a Distributed Environment in Sync
Active Directory Federation Services
Synchronizing Directory Information with Microsoft
Identity Manager
Harnessing the Power and Potential of MIM

Part III Networking Services
9 Domain Name System, WINS, and DNSSEC 259
The Need for DNS
Getting Started with DNS on Windows Server 2016
Resource Records
Understanding DNS Zones
Performing Zone Transfers
Understanding DNS Queries
Other DNS Components
Understanding the Evolution of Microsoft DNS
viii Windows Server 2016 Unleashed
DNS in Windows Server 2016
DNS in an Active Directory Domain Services Environment
Troubleshooting DNS
Secure DNS with DNSSEC
Reviewing the Windows Internet Naming Service
Installing and Configuring WINS
Planning, Migrating, and Maintaining WINS

10 DHCP, IPv6, IPAM
Understanding the Components of an Enterprise Network
Exploring DHCP
Exploring DHCP Changes in Windows Server 2016
Enhancing DHCP Reliability
Exploring Advanced DHCP Concepts
Securing DHCP
IPv6 Introduction
Configuring IPv6 on Windows Server 2016
IP Address Management
Installing the IPAM Server and Client Features
Exploring the IPAM Console

11 Internet Information Services
Understanding Internet Information Services 10
Planning and Designing IIS 10
Installing and Upgrading IIS 10
Installing and Configuring Websites
Installing and Configuring FTP Services
Securing IIS 10

Part IV Security
12 Server-Level Security
Defining Windows Server 2016 Security
Deploying Physical Security
Using the Integrated Windows Firewall with Advanced Security
Hardening Servers
Examining File-Level Security
Malware and Backup Protection
Windows Server Update

13 Securing Data in Transit 463
Introduction to Securing Data in Transit in Windows Server 2016
Deploying a Public Key Infrastructure with Windows Server 2016
Understanding Active Directory Certificate Services in Windows Server 2016
Active Directory Rights Management Services
Using IPsec Encryption with Windows Server 2016

14 Network Policy and Access Services, Routing and Remote
Access and DirectAccess
Installing a Network Policy Server
Deploying a Virtual Private Network Using RRAS
Configuring DirectAccess

Part V Migrating to Windows Server 2016
15 Migrating to Active Directory 2016
Beginning the Migration Process
Big Bang Migration
Phased Migration
Multiple Domain Consolidation Migration

16 Compatibility Testing
The Importance of Compatibility Testing
Preparing for Compatibility Testing
Researching Products and Applications
Verifying Compatibility with Vendors
Microsoft Assessment and Planning Toolkit
Lab-Testing Existing Applications
Documenting the Results of the Compatibility Testing
x Windows Server 2016 Unleashed
Determining Whether a Prototype Phase Is Required

Part VI Windows Server 2016 Administration and Management
17 Windows Server 2016 Administration
Defining the Administrative Model
Examining Active Directory Site Administration
Configuring Sites
Windows Server 2016 Active Directory Groups
Creating Groups
Managing Users with Local Security and Group Policies
Managing Printers with the Print Management Console

18 Windows Server 2016 Group Policies and Policy Management
Group Policy Overview
Group Policy Processing: How Does It Work?
Local Group Policies
Domain-Based Group Policies
Security Templates
Understanding Group Policy
Group Policy Policies Nodes
Group Policy Preferences Node
Policy Management Tools
Designing a Group Policy Infrastructure
GPO Administrative Tasks

19 Windows Server 2016 Management and Maintenance Practices
Going Green with Windows Server 2016
Server Manager Dashboard
Managing Windows Server 2016 Roles and Features
Creating a Server Group
Viewing Events
Server Manager Storage Page
Auditing the Environment
Managing Windows Server 2016 Remotely
Common Practices for Securing and Managing Windows Server 2016
Keeping Up with Service Packs and Updates
Maintaining Windows Server 2016

20 Automating Tasks Using PowerShell Scripting
Understanding Shells
Introduction to PowerShell
Understanding PowerShell Fundamentals
Using Windows PowerShell

21 Documenting a Windows Server 2016 Environment
Benefits of Documentation
Types of Documents
Planning to Document the Windows Server 2016 Environment
Knowledge Sharing and Knowledge Management
Windows Server 2016 Project Documents
Administration and Maintenance Documents
Network Infrastructure
Disaster Recovery Documentation
Change Management Procedures
Performance Documentation
Baselining Records for Documentation Comparisons
Routine Reporting
Security Documentation

Part VII Remote and Mobile Technologies
22 Server-to-Client Remote and Mobile Access
Remote Access in Windows Server 2016
VPN in Windows Server 2016
RAS System Authentication Options
VPN Protocols
DirectAccess in Windows Server 2016
Choosing Between Traditional VPN Technologies and DirectAccess
Setting Up the Unified Remote Access Role
DirectAccess Scenario
VPN Scenario
Monitoring the Remote Access Server

23 Remote Desktop Services
Why Implement Remote Desktop Services?
How Remote Desktop Works
Understanding the Name Change
RDS Roles
Configuration Options and Fine-Tuning Terminology
Planning for RDS
Deploying RDS
Deploying Virtual Desktops
Enabling RemoteFX
Securing and Supporting RDS

Part VIII Desktop Administration
24 Windows Server 2016 Administration Tools for Desktops
Managing Desktops and Servers
Operating System Deployment Options
Windows Server 2016 Windows Deployment Services
Installing Windows Deployment Services
Customizing Boot Images
Creating Discover Images
Pre-Creating Active Directory Computer Accounts for (Prestaged Systems)
Creating Custom Installations Using Capture Images
Automating Image Deployment Using Unattend Files
General Desktop Administration Tasks

25 Group Policy Management for Network Client
The Need for Group Policies
Windows Group Policies
Group Policy Feature Set
Planning Workgroup and Standalone Local Group
Policy Configuration
Planning Domain Group Policy Objects
Managing Computers with Domain Policies
Configuring Preference Item-Level Targeting
Managing Users with Policies
Managing Active Directory with Policies

26 Storage
Storage Spaces and Storage Pools
Managing Windows Server 2016 Disks
Configuring Storage Spaces Direct

Part IX Fault-Tolerance Technologies
27 File System Management
File System Access Services and Technologies
Adding the File and Storage Services Role
Managing Data Access Using Windows Server 2016 Shares
File Server Resource Manager
The Distributed File System
Planning a DFS Deployment
Installing and Configuring DFS
Using the Volume Shadow Copy Service
Configuring Data Deduplication
Dynamic Access Control

28 Operational Fault Tolerance (Clustering/Network Load Balancing)
Building Fault-Tolerant Windows Server 2016 Systems
Windows Server 2016 Clustering Technologies
Determining the Correct Clustering Technology
Overview of Failover Clusters
Deploying Failover Clusters
Backing Up and Restoring Failover Clusters
Deploying Network Load-Balancing Clusters
Managing NLB Clusters
Network Teaming

29 Backing Up the Windows Server 2016 Environment
Understanding Your Backup and Recovery Needs and Options
Creating the Disaster Recovery Solution
Documenting the Enterprise
Developing a Backup Strategy
Windows Server Backup Overview
Using Windows Server Backup
Managing Backups Using the Command-Line Utility
Wbadmin.exe and Windows PowerShell Cmdlets
Backing Up Active Directory
Backing Up Windows Server 2016 Roles
Volume Shadow Copy Service
Extending Server Backup to the Enterprise with Data
Protection Manager 2016

30 Recovering from a Disaster
Ongoing Backup and Recovery Preparedness
When Disasters Strike
Disaster Scenario Troubleshooting
Recovering from a Server or System Failure
Managing and Accessing Windows Server Backup Media
Windows Server Backup Volume Recovery
Recovering Role Services and Features

Part X Optimizing, Tuning, Debugging, and Problem Solving
31 Optimizing Windows Server 2016 for Branch Office Communications
Key Branch Office Features in Windows Server 2016
Understanding Read-Only Domain Controllers
Using BitLocker with Windows Server 2016
BranchCache in Windows Server 2016
Printing with Branch Office Direct Printing

32 Logging and Debugging
Using the Task Manager for Logging and Debugging
Using Event Viewer for Logging and Debugging
Performance Monitoring
Setting Baseline Values
Using the Debugging Tools Available in Windows Server
Task Scheduler

33 Capacity Analysis and Performance Optimization
Defining Capacity Analysis
Using Capacity-Analysis Tools
Monitoring System Performance
Optimizing Performance by Server Roles

Part XI Integrated Windows Application Services
34 SharePoint 2016 Products
History of SharePoint Technologies
Identifying the Need for SharePoint 2016 Products
Designing a SharePoint 2016 Farm
Exploring a Basic SharePoint 2016 Site
Lists and Libraries in SharePoint 2016
Managing the Site Collection

35 Windows Server Virtualization 1357
Understanding Microsoft’s Virtualization Strategy
Integration of Hypervisor Technology in Windows Server
Windows Containers and Hyper-V Containers in Windows Server 2016
Planning Your Implementation of Hyper-V
Installing the Microsoft Hyper-V Role
Becoming Familiar with the Hyper-V Administrative Console
Installing a Guest Operating System Session
Modifying Guest Session Configuration Settings
Launching a Hyper-V Guest Session
Using Snapshots of Guest Operating System Sessions
Quick Migration and Live Migration
Utilizing Hyper-V Replica for Site-to-Site Redundancy
Hyper-V Containers in Windows Server 2016
Windows Docker Containers

36 Integrating System Center Operations Manager 2016 with Windows Server 2016 1417
Windows Server 2016 Monitoring
Understanding How OpsMgr Works
OpsMgr Architecture Components
Securing OpsMgr
Fault Tolerance and Disaster Recovery
Understanding OpsMgr Components
Putting it All Together in a Design

This book contains 11 Parts and 36 Chapters. Part 1 talking about Windows Server 2016 Overview. These includes Windows Server 2016 Technology Primer, Planning, Prototyping, Migrating, and Deploying Windows Server 2016, Installing Windows Server 2016 and Server Core.

Part 2 describe about Windows Server 2016 Active Directory. These includes Active Directory Domain Services Primer, Designing a Windows Server 2016 Active Directory, Designing Organizational Unit and Group Structure, Active Directory Infrastructure, Creating Federated Forests and Lightweight Directories.

In Part 3 authors talk about Networking Services. These includes Domain Name System, WINS, and DNSSEC, DHCP, IPv6, IPAM, Internet Information Services.

In Part 4 this is for Security. These includes Server-Level Security, Securing Data in Transit, Network Policy and Access Services, Routing and Remote.

In Part 5 is Migrating to Windows Server 2016 these includes Migrating to Active Directory 2016 and Compatibility Testing.

Part 6 from this book talk Windows Server 2016 Administration and Management. These includes Windows Server 2016 Administration, Windows Server 2016 Group Policies and Policy Management, Windows Server 2016 Management and Maintenance Practices, Automating Tasks Using PowerShell Scripting and also Documenting a Windows Server 2016 Environment

Part 7 is Remote and Mobile Technologies Server-to-Client Remote and Mobile Access and Remote Desktop Services.

Part 8 talking about Desktop Administration. These includes Windows Server 2016 Administration Tools for Desktops, Group Policy Management for Network Client, and Storage.

Part 9 is area Fault-Tolerance Technologies. These includes File System Management, Operational Fault Tolerance (Clustering/Network Load Balancing), Backing Up the Windows Server 2016 Environment, Recovering from a Disaster

Part 10 are Optimizing, Tuning, Debugging, and Problem Solving. Optimizing Windows Server 2016 for Branch Office Communications, Logging and Debugging, Capacity Analysis and Performance Optimization.

The last part from this book, Part 11 talking about Integrated Windows Application Services. These includes SharePoint 2016 Products and Windows Server Virtualization. Also Integrating System Center Operations Manager 2016 with Windows Server 2016 1417
Putting it All Together in a Design.

Rand Morimoto, Ph.D., MCSE, CISSP, has been in the computer industry for more than 30 years and has authored, coauthored, or been a contributing writer for dozens of books on Windows, Security, Exchange, Office 365, and Microsoft Azure. Rand is the president of Convergent Computing, an IT-consulting firm in the San Francisco Bay area that has been one of the key early adopter program partners with Microsoft. Convergent Computing
implements the latest Microsoft technologies, including Microsoft Windows Server 2016,
System Center 2016, Windows 10, Azure Stack, Office 365, and Azure (public) in production environments months before the initial product releases to the general public.

Jeffrey Shapiro, MCSE, MCT, leads MISIQ, a technical consulting company specializing in all areas of Microsoft systems, including Windows Server, SQL Server, IIS, PKI, all aspects of .NET software development, and Microsoft’s Azure cloud services. He helps CIOs and CTOs plan, architect, and manage their network and IT operations assets. He has nearly 30 years’ experience in all aspects of information technology and has authored
and co-authored more than 20 books from software engineering to IT infrastructure and computer and network systems. He began architecting Windows Client-Server systems as early as 1993 and supported numerous Windows NT networks for most of the 1990s. A prolific IT writer, he was one of the first authors to cover the advent of Active Directory in 1999, and has written extensively on Windows Server technology. His books cover
Windows Server NT, and Windows Server 2000 through Windows Server 2016. Jeffrey is also a high-availability expert and has architected some of the world’s largest Windows Server networks, some of them consisting of 100s of servers and server clusters all over the world. He has consulted for some of the United States’ largest corporations, such as Blue Cross Blue Shield, Con Edison, Disney, Universal Studios, and several
counties and cities across North America. He is an expert SQL Server DBA and .NET
Programmer.

Guy Yardeni, MCITP, CISSP, MVP, is an accomplished infrastructure architect, author, and overall geek-for-hire. Guy has been working in the IT industry for more than 16 years and has extensive experience designing, implementing, and supporting enterprise technology solutions. Guy is an expert at connecting business requirements to technology solutions and driving to successful completion the technical details of the effort while maintaining overall goals and vision. Guy maintains a widely read technical blog at
http://www.rdpfiles.com and is a Windows MVP.

Omar Droubi, MCTS, has maintained a successful career and delivered quality work as a senior Information Technology professional for more than 20 years by keeping current with the latest technological developments and trends. As a writer, he has co-authored several Sams Publishing best-selling books, including Microsoft Windows Server 2003 Unleashed through Windows Server 2012 Unleashed. Omar has also been a
contributing writer and technical reviewer on several Microsoft Exchange Server books and publications. He has been deeply involved in testing, designing, and prototyping Windows 10 and Windows Server 2016 for the past few years, and has assisted organizations in getting the most out of the latest features included in these products.

Michael Noel, MVP, is an internationally recognized technology expert, bestselling author, and well-known public speaker on a broad range of IT topics. He has authored more than 20 major industry books that have been translated into more than a dozen languages worldwide. In addition, Michael has presented at more than 200 technical and business conferences in more than 70 countries around the world. Currently a partner at
Convergent Computing (cco.com) in the San Francisco Bay area, Michael’s writing and extensive public-speaking experience across all seven continents leverage his real-world expertise in helping organizations realize business value from Information Technology infrastructure.

Andrew Abbate, MCITP, enjoys the position of principal consultant and partner at Convergent Computing. With more than 20 years of experience in IT, Andrew’s area of expertise is understanding a business’s needs and translating that to process and technologies to solve real problems. Having worked with companies from the Fortune Ten to companies of 10, Andrew has a unique perspective on IT and a grasp on “big picture”
consulting. Andrew has also written eight industry books on varying technologies ranging
from Windows to Security to Unified Communications.

Chris Amaris, MCITP, MCTS, CISSP/ISSAP, CHS III, is the chief technology officer and cofounder of Convergent Computing. He has more than 30 years’ experience consulting for Fortune 500 companies, leading companies in the technology selection, architecture, design, and deployment of complex enterprise and hosted cloud integration projects. Chris specializes in leveraging Microsoft Azure, Windows 2016, and System Center to
achieve a high degree of on-premise to cloud integration, automation, and self-service, reducing the level of effort and time-to-market for organizations while providing high levels of fault tolerance and availability. Chris is also an author, writer, and technical editor for a number of IT books, including System Center 2012 Unleashed, and conducts trainings and seminars on Azure, Windows, and System Center technologies worldwide.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Book Review: Mastering Microsoft Exchange Server 2016

August 11, 2021

If you are Systems Administrator or Systems Engineer and want to read about Exchange Server Messaging, check it out this book:

Title : Mastering Microsoft Exchange Server 2016
Author : Clifton Leonard, Brian Svidergol,Byron Wright, Vladimir Meloski
ISBN : 978-1-119-23205-6
Publisher : Sybex
Pages : 987
Year : 2016

Here is the details of this book.

Part 1: Exchange Fundamentals
Chapter 1: Putting Exchange Server 2016 in Context
Email’s Importance
What Is Exchange Server?
Things Every Email Administrator Should Know

Chapter 2: Introducing the Changes in Exchange Server 2016
Getting to Know Exchange Server 2016
Exchange Server Architecture
Now, Where Did That Go?
Clearing Up Some Confusion

Chapter 3: Understanding Availability, Recovery, and Compliance
Changing from a Technology to a Business Viewpoint
What’s in a Name?
A Closer Look at Availability
Storage Availability
Compliance and Governance

Chapter 4: Virtualizing Exchange Server 2016
Virtualization Overview
Effects of Virtualization
Virtualization Requirements
Operations
Deciding When to Virtualize
Deciding What to Virtualize
Possible Virtualization Scenarios

Chapter 5: Introduction to PowerShell and the Exchange Management Shell
Why Use PowerShell?
Understanding the Command Syntax
Object-Oriented Use of PowerShell
PowerShell v3, v4, and v5
Tips and Tricks
Getting Help

Chapter 6: Understanding the Exchange Autodiscover Process
Autodiscover Concepts
Planning Certificates for Autodiscover

Part 2: Getting Exchange Server Running
Chapter 7: Exchange Server 2016 Quick Start Guide
Server Sizing Quick Reference
Configuring Windows
Installing Exchange Server 2016
Post-installation Configuration Steps
Configuring Recipients

Chapter 8: Understanding Server Roles and Configurations
The Roles of Server Roles
Exchange Server 2016 Server Roles
Possible Role Configurations

Chapter 9: Exchange Server 2016 Requirements
Getting the Right Server Hardware
Software Requirements
Additional Requirements

Chapter 10: Installing Exchange Server 2016
Before You Begin
Preparing for Exchange 2016
Graphical User Interface Setup
Command-Line Setup
Removing Exchange Server

Chapter 11: Upgrades and Migrations to Exchange Server 2016 or Office 365
Upgrades, Migrations, Cross-Forest Migrations, and Deployments
Factors to Consider before Upgrading
Choosing Your Strategy
Office 365
Performing a Cross-Forest Migration
Moving Mailboxes
Importing Data from PSTs
Tasks Required Prior to Removing Legacy Exchange Servers
Exchange Server Deployment Assistant

Part 3: Recipient Administration
Chapter 12: Management Permissions and Role-Based Access Control
RBAC Basics
Managing RBAC
Defining Roles
Distributing Roles
Auditing RBAC

Chapter 13: Basics of Recipient Management
Understanding Exchange Recipients
Defining Email Addresses

Chapter 14: Managing Mailboxes and Mailbox Content
Managing Mailboxes
Moving Mailboxes
Deleting Mailboxes
Bulk Manipulation of Mailboxes Using the EMS
Managing Mailbox Content
Getting Started with Messaging Records Management

Chapter 15: Managing Mail-Enabled Groups, Mail Users, and Mail Contacts
Understanding Mail-Enabled Groups
Creating and Managing Mail Contacts and Mail Users

Chapter 16: Managing Resource Mailboxes
The Unique Nature of Resource Mailboxes
Exchange 2016 Resource Mailbox Features
Creating Resource Mailboxes
Creating Room Lists
Converting Resource Mailboxes

Chapter 17: Managing Modern Public Folders
Understanding Architectural Changes for Modern Public Folders
Moving Public Folders to Exchange Server 2016
Managing Public Folder Mailboxes
Managing Public Folders
Understanding the Public Folder Hierarchy
Comparing Public Folders, Site Mailboxes, and Shared Mailboxes

Chapter 18: Managing Archiving and Compliance
Introduction to Archiving
Benefits of Archiving
Industry Best Practices
Archiving with Exchange Server 2016
Enabling In-Place Archiving
Understanding Litigation and In-Place Hold
Requirements and Considerations

Part 4: Server Administration
Chapter 19: Creating and Managing Mailbox Databases
Getting to Know Exchange Server Databases
Planning Mailbox Database Storage
Managing Mailbox Databases

Chapter 20: Creating and Managing Database Availability Groups
Understanding Database Replication in Exchange Server 2016
Managing a Database Availability Group
Understanding Active Manager
DAG and Database Maintenance
Understanding Site Resiliency for Exchange Server 2016

Chapter 21: Understanding the Client Access Services
Client Access Services Overview
Namespace Planning
Connectivity for Outlook Clients
Connectivity for Non-Outlook Clients
Sharing between Organizations
Securing External Access
Coexisting with Previous Exchange Server Versions

Chapter 22: Managing Connectivity with Transport Services
Understanding the Transport Improvements in Exchange Server 2016
Message Routing in the Organization
Sending and Receiving Email
Messages in Flight
Using Exchange Server 2016 Antispam/Anti-Malware Tools
Troubleshooting Email Routing

Chapter 23: Managing Transport, Data Loss Prevention, and Journaling Rules
Introducing the Exchange 2016 Transport Architecture
Setting Up Message Classifications
Setting Up Mail Flow (Transport) Rules
Introducing Data Loss Prevention
Introducing Journaling

Part 5: Troubleshooting and Operating
Chapter 24: Troubleshooting Exchange Server 2016
Basic Troubleshooting Principles
General Server Troubleshooting Tools
Troubleshooting Mailbox Servers
Troubleshooting Mail Flow
Troubleshooting Client Connectivity

Chapter 25: Backing Up and Restoring Exchange Server
Backing Up Exchange Server
Preparing to Back Up and Recover the Exchange Server
Using Windows Server Backup to Back Up the Exchange Server
Using Windows Server Backup to Recover the Data
Recover Exchange Server Data Using Alternative Methods
Recovering the Entire Exchange Server

This book contains 5 Parts and 25 Chapters. In the part 1, the authors explain about Exchange Server Fundamentals. The topics in Part 1 are Putting Exchange Server 2016 in Context, Introducing the Changes in Exchange Server 2016, Understanding Availability, Recovery, and Compliance. Also Virtualizing Exchange Server 2016, Introduction to PowerShell and the Exchange Management Shell and Understanding the Exchange Autodiscover Process.

In Part 2 inside this book, they talking about Getting Exchange Server Running. These includes Exchange Server 2016 Quick Start Guide, Understanding Server Roles and Configurations, and Exchange Server 2016 Requirements. Also Installing Exchange Server 2016 and Upgrades and Migrations to Exchange Server 2016 or Office 365.

Part 3 from this book explaining about Recipient Administration. These includes Management Permissions and Role-Based Access Control, Basics of Recipient Management, Managing Mailboxes and Mailbox Content, Managing Mail-Enabled Groups, Mail Users, and Mail Contacts. Also Managing Resource Mailboxes, Managing Modern Public Folders and Managing Archiving and Compliance.

In the Part 4 of this book, the authors talking about Server Administration. These contents include Creating and Managing Mailbox Databases, Creating and Managing Database Availability Groups, Understanding the Client Access Services, Managing Connectivity with Transport Services and Managing Transport, Data Loss Prevention, and Journaling Rules.

Last but not least in Part 5 they write about how to Troubleshooting and Operating Exchange Server 2016. These includes Troubleshooting Exchange Server 2016 and Backing Up and Restoring Exchange Server.

Clifton Leonard, MCSE: Exchange Server, has more than 25 years’ experience in the IT industry as an engineer, architect, consultant, trainer, and author. Clifton has extensive experience consulting on Active Directory, Exchange Server, Lync and Skype for Business Server, Identity Management, Office 365, and Azure cloud solutions. His clients include large energy corporations, K-12 schools, universities, technology
manufacturers, financial institutions, the United States Air Force, and the Department of Defense. While Clifton cut his teeth on Microsoft Mail on Novell Netware and Exchange Server 5.0 on DEC Alpha, he has worked with every version of Exchange Server since then. He has also contributed as a subject matter expert to multiple Microsoft courses including Windows Desktop, Windows Server, Exchange Server,
SharePoint Server, HyperV, Identity Management, Office 365, and Azure. Helping organizations migrate to the latest versions of Microsoft Exchange Server has always been a key focus of Clifton’s consulting commitments.

Brian Svidergol builds Microsoft infrastructure and cloud solutions with Windows, Microsoft Exchange, Active Directory, Office 365, and related technologies. He holds the Microsoft Certified Trainer (MCT), Microsoft Certified Solutions Expert (MCSE) – Server Infrastructure, and several other Microsoft and industry certifications. Brian has authored books on Active Directory, Windows Server, Exchange Server, and
related infrastructure technologies. He served as an MCT Ambassador at TechEd North America 2013 and at Microsoft Ignite 2015. Brian works as a subject matter expert (SME) on many Microsoft Official Curriculum courses, edX courses, and Microsoft certification exams. He has authored a variety of training content, blog
posts, and practice test questions and has been a technical reviewer for a large number
of books.

Byron Wright is the owner of BTW Technology Solutions where he provides, designs, and implements solutions using Exchange Server and Office 365. He has been a consultant, author, and instructor for 20 years, specializing in Exchange Server, Windows Server, Office 365, network design, network security, and related
technologies. Byron has been a Microsoft MVP for Exchange Server since 2012.

Vladimir Meloski is a Microsoft Most Valuable Professional on Office Server and Services, Microsoft Certified Trainer, and consultant, providing unified communications and infrastructure solutions based on Microsoft Exchange Server, Skype for Business, Office 365, and Windows Server. With a bachelor’s degree in computer sciences, Vladimir has devoted more than 20 years of professional experience to information technology. Vladimir has been involved in Microsoft conferences in Europe and in the United States as a speaker, moderator, proctor for hands-on labs, and technical expert. He also has been involved as an author and technical reviewer for Microsoft official courses, including Exchange Server 2016, 2013, 2010, and 2007; Office 365; and Windows Server 2012. As a skilled IT professional and trainer, Vladimir shares his best practices, real-world experiences, and knowledge with his students and colleagues and is devoted to IT community development by collaborating with IT Pro and developer user groups worldwide.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Books Review: Getting Started with SQL Server 2014 Administration

August 8, 2021

If you are Database Administrator or DBA and Database Developer and want to read about SQL Server DBMS, this book may suitable for you:

Title : Getting Started with SQL Server 2014 Administration
Author : Gethyn Ellis
ISBN : 978-1-78217-241-3
Publisher : Packt Publishing
Pages : 106
Year : 2014

Here is the details of this book.

Chapter 1: SQL Server 2014 and Cloud
Windows Azure SQL Database
Creating a Windows Azure SQL database
Connecting to a Windows Azure SQL database with
Management Studio
Migrating an existing database to Microsoft Azure
Integrating Microsoft Azure Storage
Creating a database that uses the Microsoft Azure Storage integration
Creating a Microsoft Azure Storage account and container
The container policy and Shared Access Signature
Creating a credential
Creating a database using Microsoft Azure Storage
Microsoft Azure Virtual Machines
Creating a Microsoft Azure Virtual Machine

Chapter 2: Backup and Restore Improvements
Database backups to a URL and Microsoft Azure Storage
Backing up a SQL Server database to a URL
Restoring a backup stored on Windows Azure Storage
SQL Server Managed Backup to Microsoft Azure
Configuring SQL Server-managed backups to Microsoft Azure
Encryption
Creating an encrypted backup
Creating a database master key for the master database
Creating a certificate or asymmetric key
Creating an encrypted database backup

Chapter 3: In-Memory Optimized Tables
Requirements
Virtualized environments
Memory-optimized tables
Memory-optimized tables and indexes
Transact-SQL and natively compiled stored procedures
Concurrency
Some concurrency terminologies

Chapter 4: Delayed Durability
Understanding the full transaction durability
Understanding the delayed transaction durability
Full Durability versus Delayed Durability
Using delayed transaction durability
Transaction level Delayed Durability – Transact-SQL
Delayed Durability and Natively Compiled Stored Procedures
Delayed Durability and transaction log flush
Delayed Durability and potential data loss
Delayed Durability and other SQL Server components
Summary

Chapter 5: AlwaysOn Availability Groups
Introducing AlwaysOn Availability Groups
Enhancements in AlwaysOn Availability Groups
Using Microsoft Azure Virtual Machines as replicas
The commit mode
Reporting and administrating on secondary replicas
Building AlwaysOn Availability Groups
Windows Server Failover Cluster
Configuring the instance service
The Availability Group listener
Creating Availability Group
Troubleshooting Availability Groups
Creating a cloud-based AlwaysOn Availability Group
Creating an AlwaysOn Availability Group in Microsoft Azure
Creating a Hybrid Availability Group

Chapter 6: Performance Improvements
Partition switching and indexing
Columnstore indexes
Creating a clustered columnstore index
Updating a table with a clustered columnstore index
Buffer pool extensions
Cardinality estimator and query plans
Statistics
Resource Governor

This book only contains 6 Chapters. Chapter 1 from this book describe about SQL Server 2014 and Cloud. In Chapter 2 Ellis explained about Backup and Restore Improvements. Chapter 3 is talking about In-Memory Optimized Tables. Chapter 4 from this book explain about Delayed Durability. High Availability is describe in Chapter 5 using AlwaysOn Availability Groups. And the last chapter in this book, Chapter 6 is talking about Performance Improvements in SQL Server.

Gethyn Ellis is a SQL Server consultant and trainer with clients in Europe and North America. His client base includes both public and private sector clients that range from large financial firms to departments of the UK government. Specialized in database administration, virtualization, and performance, he has been involved
in several large projects that involve migration of large SQL Server estates to the latest version of SQL Server and also migrated that infrastructure to a virtualized platform. He is also an instructor with Learning Tree and teaches several courses on the Learning Tree SQL Server curriculum. You can follow Gethyn’s blog
at http://www.gethynellis.com.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Books Review : Operating System Concept Based Approach

August 1, 2021

If you are Computer Student or Engineer and want to read about operating System theory, this book may suitable for you:

Title : Operating Systems: A Concept-Based Approach
Author : Dhananjay M. Dhamdhere
ISBN : ISBN 978–0–07–295769–3— ISBN 0–07–295769–7 (hard copy : alk. paper) 1. Operating systems
Publisher : McGraw-Hill
Pages : xx + 828
Year : 2009

Here is the details of this book.

Part 1 : Overview
1 Introduction
2 The OS, the Computer, and User Programs
3 Overview of Operating Systems
4 Structure of Operating Systems

Part 2 Process Management
5 Processes and Threads
6 Process Synchronization
7 Scheduling
8 Deadlocks
9 Message Passing
10 Synchronization and Scheduling in Multiprocessor Operating Systems

Part 3 : Memory Management
11 Memory Management
12 Virtual Memory

Part 4 : File Systems and I/O Management
13 File Systems
14 Implementation of File Operations
15 Security and Protection

Part 5 : Distributed Operating Systems
16 Distributed Operating Systems
17 Theoretical Issues in Distributed Systems
18 Distributed Control Algorithms
19 Recovery and Fault Tolerance
20 Distributed File Systems
21 Distributed System Security

This book contain 5 parts and 21 Chapters.
Part 1 from this book is Overview about the operating system. Part 2 is describe about Process Management, one of the operating systems tasks. Part 3 from this book explained about Memory Management in the operating systems. Part 4 from this book talking about File Systems and I/O Management. The last part from this book, Part 5 is talking about Distributed Operating Systems.

Prof. Dhananjay Madhav Dhamdhere passed away on 28 Nov 2020 at his home in Nasik due to a massive cardiac arrest. This was a sudden and totally unexpected event leaving no time for any medical help to be provided to him. He is survived by his wife Mrs. Lata Dhamdhere and two sons Ashay and Amogh (both Ph.D.s) and their families. He was born on 7 March 1949. He finished B.Tech., M.Tech, and Ph.D., all from IIT Bombay in 1970, 1972, and 1979, respectively. He joined IIT Bombay as a Research Associate in 1972, and became an Assistant Professor in 1974, Associate Professor in 1983, and a Professor in 1985. He led the CSE department as its Head from 1997 to 2000. He retired from regular service in 2014 but continued as an Emeritus Fellow until 2017. After leaving the institute in 2017, he moved to Thane and had a house in Nasik too.

Prof. Dhamdhere, fondly known as DMD, was associated with the Department of Computer Science since its inception and has played a major role in shaping the department into what it is today. Old timers in the department recall that in the early days of the department, he was the first person to emphasize research, and more importantly, publishing research results. His students fondly recall his admonishment: “As a society, we are second rate only because we believe we are second rate’’. It was his firm opinion that we are much more capable than what we seem to have accomplished. It is out of this belief that he kept the bar of his expectations from people around him, rather high. It is no wonder that he was a tough task master and was quite intolerant of sloppiness and dishonesty. Many of us owe our growth to DMD’s pushing us. Although he was a strict disciplinarian, he was also very jovial and witty — all one had to do to enjoy this side of his, was to avoid sloppiness and dishonesty.

DMD earned his right of high expectations from people from the exacting standards that he used for himself too and believed in leading by example. He was very meticulous, hardworking, punctual, and regular in his work. He worked on difficult research problems and pushed his students and collaborators and took a major share of responsibilities. He was very articulate and expressed his opinions only when he was crystal clear about what he wanted to say. As a consequence, his opinions used to be based on deep thoughts and hence usually were strong and unwavering. He never hesitated in taking an uncompromising stand on the matters that he believed strongly in. Even in the case of difference of opinion with him, people would unhesitatingly concede that he had the interest of the department and the institute uppermost in his mind. He is famously known to have taken servious view of cheating even before official rules came into existence. He spearheaded the efforts in the institute for creation of rules governing academic malpractices.

DMD was known to be a captivating teacher. He had an uncanny ability to bring out the nuts and bolts of a topic and lay the matter threadbare in front of his class. This often led to the “Aha” moments for many of his students. His lectures were very carefully planned and he always knew exactly what he wanted to cover and how he wanted to cover it. He was equally concerned about the students outside of IITs and wrote the following books: Compiler Construction — Principles and Practice; Introduction to System Software; Systems Programming and Operating Systems; and Operating Systems, a Concept-Based Approach. They were published by Tata McGraw Hill and Macmillan India. Together, there were over 50 (yes, over fifty!) reprints of the books! Some of them were also translated into Chinese and Korean languages. These books continue to be in print and almost every student who did his undergraduate education in India has used one of these books.

DMD’s main areas of interest were Optimizing Compilers, Data Flow Analysis, and Distributed Systems. He published in top avenues in these areas such as TOPLAS, PoPL, and PLDI. In fact his paper in PoPL 1993 was the first ever paper from researchers working in India in this premier conference, no one before him reached this pinnacle of research in India. The most interesting aspect is that his research was motivated by his strong hold on practice: He wrote a FORTRAN compiler called IITFORT for EC1030 computer at IIT Bombay, way back in 1977. It was primarily motivated from the fact that the existing compiler was muti-pass and required loading card decks multiple times for compilation. Besides, the error reporting was not very precise leading to many compilation runs of the program. DMD was unhappy with the state of the affairs and hence he led a team that developed a fast single-pass compile-link-and-go compiler system with excellent diagnostics in the form of error detection and reporting. The compilation by IITFORT was about 10 times faster than the compiler supplied by the manufacturer of EC1030 but the exhaustive checks for run time errors slowed down the execution a bit. Thus on the whole, the system processed (i.e. compiled and executed) student jobs (i.e. programs) 6 to 10 times faster. It was an engineering feat and clever design that allowed him to keep all the tables in the main memory so that the compilation is fast.

Interestingly, for all his deep focus on academics, DMD was physically very fit; it is rather ironic that such a fit person should pass away in this manner at the age of 71. In fact he was one of the fittest persons in the department among all faculty and students. He used to play cricket and some colleagues still recall his square cut off fast balls. He was an avid trekker. He introduced many colleagues and students to trekking in the Sahyadris and also took them to advanced treks. He was fond of rich Indian culture and had a lot of knowledge about local traditions as well as about Mumbai city. Those were the pre-google days and his presence was very useful for the people in the department, most of whom came from outside of Mumbai.

Closer to his retirement, DMD launched the Forum for Academic Culture (FAC) at IIT Bombay. He was convinced that as the size of the institute was increasing, the communication between people was reducing. He felt that it was very important for people to keep talking about academics: the process of academics, various forces and expectations influencing academics, about the teaching methods as the class size grew, about the motivation of students and teachers alike. FAC provided a platform for people to come together and share their concerns and opinions.

On the whole, DMD was a towering and yet very down-to-earth personality and is remembered for his incredibly high standards of excellence, integrity, honesty, and his dedication to IIT Bombay. We are happy that we crossed paths with DMD and could walk some distance with him. Although we will miss him, the principles that he held dearly will continue to guide us in future too and we will continue to strive to live up to the expectations that he had from us.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

IT Tutorial video watch here:

https://www.youtube.com/channel/UCikwGDYfTFWQxdiCqKvx6_w

Have a nice day

Regards

Nanang