PowerShell 4.0 introduces desired state configuration (DSC), a powerful new feature that makes it easier than ever to manage your Windows infrastructure, whether on-premise or in the cloud. Starting with a little PowerShell scripting knowledge, Windows PowerShell Desired State Configuration Revealed will take you through this new technology from start to finish.
This book covers every aspect of using the Windows Installerthe underlying installer technology in Windows. A valuable tool for software developers, this book will help you ensure thorough and reliable installation for your customers, and make a favorable lasting impression.
Pro SharePoint Migration is designed from the ground up to be your companion as your organization migrates your current SharePoint 2007 deployment to SharePoint 2010. The book provides detailed strategies and tools to assess, plan and execute a SharePoint 2010 migration that is efficient and cost-effective.
Pro Exchange 2013 SP1 PowerShell Administration is your one-stop resource for both basic and advanced administration of Exchange Server 2003 Service Pack 1 and Exchange Online, Microsoft's best-selling hosted Exchange service.
Hardware isn't becoming that much faster, and Practical Load Balancing helps out by offering a complete survey of network load balancing. It undergirds most scalability and high performance software today, making the book relevant to everyonefrom single server administrators to cloud application developers.
Microsoft Operations Manager 2005 Field Guide is a quick reference for resolving problems that intermediate-to-advanced Microsoft Operations Manager administrators are likely to face. All of the solutions and troubleshooting tips get right to the point. And the chapters stand alone and may be read in any order you choose.
This invaluable guide will provide you with a problem/solution-oriented approach to solving common administrative issues with Windows Script Host (WSH), complete with ready-to-use, real-world examples.
This guide is designed to provide a quick and easy checklist-style reference to the steps system administrators need to take to anticipate attacks and compromises, and to "harden" Windows NT, 2000, XP, and Server 2003 against them.