Kategorien
E-Books
-
Wirtschaft
- Bitcoin
- Geschäftsfrau
- Coaching
- Controlling
- E-Business
- Ökonomie
- Finanzen
- Börse und Investitionen
- Persönliche Kompetenzen
- Computer im Büro
- Kommunikation und Verhandlungen
- Kleines Unternehmen
- Marketing
- Motivation
- Multimedia-Training
- Immobilien
- Überzeugung und NLP
- Steuern
- Sozialpolitik
- Handbȕcher
- Präsentationen
- Führung
- Public Relation
- Berichte, Analysen
- Geheimnis
- Social Media
- Verkauf
- Start-up
- Ihre Karriere
- Management
- Projektmanagement
- Personal (HR)
-
Für Kinder
-
Für Jugendliche
-
Bildung
-
Enzyklopädien, Wörterbücher
-
E-Presse
- Architektura i wnętrza
- Biznes i Ekonomia
- Haus und Garten
- E-Business
- Finanzen
- Persönliche Finanzen
- Unternehmen
- Fotografie
- Informatik
- HR und Gehaltsabrechnung
- Computer, Excel
- Buchhaltung
- Kultur und Literatur
- Wissenschaftlich und akademisch
- Umweltschutz
- meinungsbildend
- Bildung
- Steuern
- Reisen
- Psychologie
- Religion
- Landwirtschaft
- Buch- und Pressemarkt
- Transport und Spedition
- Gesundheit und Schönheit
-
Geschichte
-
Informatik
- Office-Programme
- Datenbank
- Bioinformatik
- IT Branche
- CAD/CAM
- Digital Lifestyle
- DTP
- Elektronik
- Digitale Fotografie
- Computergrafik
- Spiele
- Hacking
- Hardware
- IT w ekonomii
- Wissenschaftliche Pakete
- Schulbücher
- Computergrundlagen
- Programmierung
- Mobile-Programmierung
- Internet-Server
- Computernetzwerke
- Start-up
- Betriebssysteme
- Künstliche Inteligenz
- Technik für Kinder
- Webmaster
-
Andere
-
Fremdsprachen lernen
-
Kultur und Kunst
-
Lektüre
-
Literatur
- Anthologien
- Ballade
- Biografien und Autobiografien
- Für Erwachsene
- Drama
- Tagebücher, Memoiren, Briefe
- Epos
- Essay
- Science Fiction
- Felietonys
- Fiktion
- Humor, Satire
- Andere
- Klassisch
- Krimi
- Sachbücher
- Belletristik
- Mity i legendy
- Nobelpreisträger
- Kurzgeschichten
- Gesellschaftlich
- Okultyzm i magia
- Erzählung
- Erinnerungen
- Reisen
- Gedicht
- Poesie
- Politik
- Populärwissenschaftlich
- Roman
- Historischer Roman
- Prosa
- Abenteuer
- Journalismus
- Reportage
- Romans i literatura obyczajowa
- Sensation
- Thriller, Horror
- Interviews und Erinnerungen
-
Naturwissenschaften
-
Sozialwissenschaften
-
Schulbücher
-
Populärwissenschaft und akademisch
- Archäologie
- Bibliotekoznawstwo
- Filmwissenschaft
- Philologie
- Polnische Philologie
- Philosophie
- Finanse i bankowość
- Erdkunde
- Wirtschaft
- Handel. Weltwirtschaft
- Geschichte und Archäologie
- Kunst- und Architekturgeschichte
- Kulturwissenschaft
- Linguistik
- Literaturwissenschaft
- Logistik
- Mathematik
- Medizin
- Geisteswissenschaften
- Pädagogik
- Lehrmittel
- Populärwissenschaftlich
- Andere
- Psychologie
- Soziologie
- Theatrologie
- Teologie
- Theorien und Wirtschaftswissenschaften
- Transport i spedycja
- Sportunterricht
- Zarządzanie i marketing
-
Handbȕcher
-
Spielanleitungen
-
Professioneller und fachkundige Leitfaden
-
Jura
- Sicherheit und Gesundheit am Arbeitsplatz
- Geschichte
- Verkehrsregeln. Führerschein
- Rechtswissenschaften
- Gesundheitswesen
- Allgemeines. Wissenskompendium
- akademische Bücher
- Andere
- Bau- und Wohnungsrecht
- Zivilrecht
- Finanzrecht
- Wirtschaftsrecht
- Wirtschafts- und Handelsrecht
- Strafrecht
- Strafrecht. Kriminelle Taten. Kriminologie
- Internationales Recht
- Internationales und ausländisches Recht
- Gesundheitsschutzgesetz
- Bildungsrecht
- Steuerrecht
- Arbeits- und Sozialversicherungsrecht
- Öffentliches, Verfassungs- und Verwaltungsrecht
- Familien- und Vormundschaftsrecht
- Agrarrecht
- Sozialrecht, Arbeitsrecht
- EU-Recht
- Industrie
- Agrar- und Umweltschutz
- Wörterbücher und Enzyklopädien
- Öffentliche Auftragsvergabe
- Management
-
Führer und Reisen
- Afrika
- Alben
- Südamerika
- Mittel- und Nordamerika
- Australien, Neuseeland, Ozeanien
- Österreich
- Asien
- Balkan
- Naher Osten
- Bulgarien
- China
- Kroatien
- Tschechische Republik
- Dänemark
- Ägypten
- Estland
- Europa
- Frankreich
- Berge
- Griechenland
- Spanien
- Niederlande
- Island
- Litauen
- Lettland
- Mapy, Plany miast, Atlasy
- Miniführer
- Deutschland
- Norwegen
- Aktive Reisen
- Polen
- Portugal
- Andere
- Russland
- Rumänien
- Slowakei
- Slowenien
- Schweiz
- Schweden
- Welt
- Türkei
- Ukraine
- Ungarn
- Großbritannien
- Italien
-
Psychologie
- Lebensphilosophien
- Kompetencje psychospołeczne
- zwischenmenschliche Kommunikation
- Mindfulness
- Allgemeines
- Überzeugung und NLP
- Akademische Psychologie
- Psychologie von Seele und Geist
- Arbeitspsychologie
- Relacje i związki
- Elternschafts- und Kinderpsychologie
- Problemlösung
- Intellektuelle Entwicklung
- Geheimnis
- Sexualität
- Verführung
- Aussehen ind Image
- Lebensphilosophien
-
Religion
-
Sport, Fitness, Diäten
-
Technik und Mechanik
Hörbücher
-
Wirtschaft
- Bitcoin
- Geschäftsfrau
- Coaching
- Controlling
- E-Business
- Ökonomie
- Finanzen
- Börse und Investitionen
- Persönliche Kompetenzen
- Kommunikation und Verhandlungen
- Kleines Unternehmen
- Marketing
- Motivation
- Immobilien
- Überzeugung und NLP
- Steuern
- Handbȕcher
- Präsentationen
- Führung
- Public Relation
- Geheimnis
- Social Media
- Verkauf
- Start-up
- Ihre Karriere
- Management
- Projektmanagement
- Personal (HR)
-
Für Kinder
-
Für Jugendliche
-
Bildung
-
Enzyklopädien, Wörterbücher
-
Geschichte
-
Informatik
-
Andere
-
Fremdsprachen lernen
-
Kultur und Kunst
-
Lektüre
-
Literatur
- Anthologien
- Ballade
- Biografien und Autobiografien
- Für Erwachsene
- Drama
- Tagebücher, Memoiren, Briefe
- Epos
- Essay
- Science Fiction
- Felietonys
- Fiktion
- Humor, Satire
- Andere
- Klassisch
- Krimi
- Sachbücher
- Belletristik
- Mity i legendy
- Nobelpreisträger
- Kurzgeschichten
- Gesellschaftlich
- Okultyzm i magia
- Erzählung
- Erinnerungen
- Reisen
- Poesie
- Politik
- Populärwissenschaftlich
- Roman
- Historischer Roman
- Prosa
- Abenteuer
- Journalismus
- Reportage
- Romans i literatura obyczajowa
- Sensation
- Thriller, Horror
- Interviews und Erinnerungen
-
Naturwissenschaften
-
Sozialwissenschaften
-
Populärwissenschaft und akademisch
- Archäologie
- Philosophie
- Wirtschaft
- Handel. Weltwirtschaft
- Geschichte und Archäologie
- Kunst- und Architekturgeschichte
- Kulturwissenschaft
- Literaturwissenschaft
- Mathematik
- Medizin
- Geisteswissenschaften
- Pädagogik
- Lehrmittel
- Populärwissenschaftlich
- Andere
- Psychologie
- Soziologie
- Teologie
- Zarządzanie i marketing
-
Handbȕcher
-
Professioneller und fachkundige Leitfaden
-
Jura
-
Führer und Reisen
-
Psychologie
- Lebensphilosophien
- zwischenmenschliche Kommunikation
- Mindfulness
- Allgemeines
- Überzeugung und NLP
- Akademische Psychologie
- Psychologie von Seele und Geist
- Arbeitspsychologie
- Relacje i związki
- Elternschafts- und Kinderpsychologie
- Problemlösung
- Intellektuelle Entwicklung
- Geheimnis
- Sexualität
- Verführung
- Aussehen ind Image
- Lebensphilosophien
-
Religion
-
Sport, Fitness, Diäten
-
Technik und Mechanik
Videokurse
-
Datenbank
-
Big Data
-
Biznes, ekonomia i marketing
-
Cybersicherheit
-
Data Science
-
DevOps
-
Für Kinder
-
Elektronik
-
Grafik / Video / CAX
-
Spiele
-
Microsoft Office
-
Entwicklungstools
-
Programmierung
-
Persönliche Entwicklung
-
Computernetzwerke
-
Betriebssysteme
-
Softwaretest
-
Mobile Geräte
-
UX/UI
-
Web development
-
Management
Podcasts
- E-Books
- Informatik
- Internet-Server
- Microsoft Exchange 2013 Cookbook. Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise
Details zum E-Book
Einloggen, wenn Sie am Inhalt des Artikels interessiert sind.
Microsoft Exchange 2013 Cookbook. Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise
Michael Van Horenbeeck, Peter De Tender
E-book
- Microsoft Exchange 2013 Cookbook
- Table of Contents
- Microsoft Exchange 2013 Cookbook
- Credits
- About the Author
- Acknowledgments
- About the Author
- Acknowledgments
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers, and more
- Why Subscribe?
- Free Access for Packt account holders
- Instant Updates on New Packt Books
- Support files, eBooks, discount offers, and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- 1. Planning an Exchange Server 2013 Infrastructure
- Introduction
- Gathering the business requirements
- Getting ready
- How to do it
- Theres more...
- Sizing Exchange 2013
- Getting ready
- How to do it
- Step 1Gathering the data
- Step 2Calculating the requirements
- There's more...
- Preparing for Exchange 2013
- Getting ready
- How to do it...
- Supported coexistence scenarios
- Hardware requirements
- Operating system requirements
- How it works...
- Designing storage for Exchange
- Getting ready
- How to do it...
- How it works...
- There's more...
- Understanding Active Directory and DNS dependencies
- Getting ready
- How to do it...
- Active Directory system requirements
- DNS infrastructure requirements
- Troubleshooting DNS
- Logging events and debugging
- Basic DNS commands
- How it works...
- Planning related platform components
- How to do it...
- Firewall and/or reverse proxy
- SMTP gateway/Anti-Spam/Malware/Virus appliance
- Telephony system or Microsoft Lync Server for voice or unified messaging integration
- SharePoint
- Faxing solution
- Backup and restore
- Custom developed and other third-party applications
- Software-based anti-virus
- There's more...
- How to do it...
- 2. Installing Exchange Server 2013
- Introduction
- Preparing the Active Directory
- Getting ready
- How to do it
- Active Directory schema extension
- Preparing Active Directory, groups and permissions
- How it works...
- There's more
- Installing Exchange 2013 prerequisites
- Getting ready
- How to do it
- Windows Server 2008 R2 Service Pack 1 (or higher)
- Windows Server 2012
- How it works
- Installing Exchange 2013 using the Setup Wizard
- How to do it
- Installing Exchange 2013 from the command line
- How to do it
- There's more...
- Verifying the Exchange 2013 installation
- How to do it
- Get-ExchangeServer
- Setup Log file and Event Viewer
- How it works...
- There's more...
- How to do it
- Introducing the Exchange Admin Center
- Getting ready
- How to do it
- There's more
- Uninstalling an Exchange 2013 Server or Server role
- Getting ready
- How to do it
- By using the Setup Wizard
- By using the command line
- How it works...
- There's more
- 3. Configuring the Client Access Server Role
- Introduction
- Configuring certificates
- Getting ready
- How to do it
- Creating a shared network folder
- Creating a certificate request
- Completing a certificate request
- Exporting a certificate
- Importing a certificate
- Enabling a certificate
- How it works
- Wildcard certificates
- See also
- Configuring Autodiscover
- How to do it...
- Configuring the AutodiscoverServiceInternalURI
- Configuring the AutodiscoverSiteScope
- How it works
- See also
- Configuring Outlook Anywhere
- How to do it...
- How it works...
- See also
- Configuring Outlook Web App
- Getting ready
- How to do it...
- Configuring Access to OWA
- Enabling/Disabling OWA
- Controlling OWA features globally
- OWA Mailbox Policies
- Configuring Exchange Web Services
- How to do it...
- Configuring Exchange ActiveSync
- How to do it...
- See also
- Configuring ActiveSync Device Access
- Getting ready
- How to do it...
- Defining the default access level for the entire organization
- Blocking specific devices
- Explicitly allowing or blocking devices for an individual user
- Configuring ActiveSync Auto-Block Thresholds
- How it works...
- Device Access evaluation
- ActiveSync Device Auto-Block Thresholds
- Configuring SMTP
- How to do it...
- Creating Receive Connectors
- Configuring Logging
- How it works...
- See also
- How to do it...
- Configuring POP and IMAP
- How to do it...
- How it works...
- See also
- Using non-Microsoft clients with Exchange Server 2013
- 4. Configuring and Managing the Mailbox Server Role
- Introduction
- Creating and removing mailbox databases
- How to do it...
- Creating a new mailbox database
- Removing a mailbox database
- How it works...
- There's more...
- How to do it...
- Mounting and dismounting mailbox databases
- Getting ready
- How to do it...
- Mounting a database
- Dismounting a database:
- How it works...
- There's more...
- See also
- Moving database files to another location
- Getting ready
- How to do it...
- There's more...
- Configuring circular logging
- Getting ready
- How to do it...
- How it works...
- See also
- Creating and removing mailboxes
- Getting ready
- How to do it...
- Creating a new user with mailbox
- Enabling a mailbox for an existing user
- Removing a mailbox
- Disabling a mailbox
- How it works...
- There's more...
- Working with disabled mailboxes
- Managing resource mailboxes
- Getting ready
- How to do it...
- Creating a new room mailbox
- Configuring booking options
- How it works...
- There's more...
- Defining additional custom resource properties
- Adding custom properties to a resource
- See also
- Configuring mailbox size limits
- Getting ready
- How to do it...
- Configuring mailbox sizes at database level
- Configuring mailbox sizes at user level
- How it works...
- Managing personal archives
- Getting ready
- How to do it...
- How it works...
- See also
- Assigning mailbox permissions
- Getting ready
- How to do it...
- Assigning full access permissions to a mailbox
- Assigning send-as or send on behalf of permissions
- Granting receive-as permission
- How it works...
- There's more...
- See also
- Moving mailboxes to another database
- Getting ready
- How to do it...
- Moving mailboxes using migration batches
- Moving mailboxes using move requests
- Checking the progress of a mailbox move
- Checking the status of a migration batch
- Removing completed move request
- How it works...
- There's more...
- Synchronous mailbox moves
- Bad item limit
- See also
- Managing public folders
- Getting ready
- How to do it...
- Creating new public folder mailboxes
- Creating public folders
- Managing public folder permissions
- How it works...
- See also
- Configuring outbound mail flow
- Getting ready
- How to do it...
- How it works...
- There's more...
- Send connector costs
- Configure a send connector to route e-mails through the Client Access Server
- See also
- Configuring accepted domains
- Getting ready
- How to do it...
- How it works...
- There's more...
- Configuring e-mail address policies
- See also
- Configuring message size limits
- Getting ready
- How to do it...
- Configuring message size limits at organizational level
- Configuring message size limits at connector level
- Configuring message size limits at mailbox level
- How it works...
- See also
- 5. Configuring External Access
- Introduction
- Configuring Exchange workloads for external access
- How to do it...
- Configuring Outlook Web App
- Configuring the Exchange Admin Center
- Configuring Exchange Web Services
- Configuring the Offline Address Book
- Configuring ActiveSync
- How it works...
- There's more...
- Turning off the Exchange Admin Center
- See also
- How to do it...
- Configuring Autodiscover
- Getting ready
- How to do it...
- Configuring Autodiscover redirection when using multiple primary e-mail domains through IIS
- Using SRV records record
- How it works...
- See also
- Configuring Outlook Anywhere to support external access
- How to do it...
- How it works...
- See also
- Publishing Exchange onto the Internet through TMG 2010
- Getting ready
- How to do it...
- Creating a publishing rule for ActiveSync
- Creating a publishing rule for OWA
- Creating a publishing rule for Outlook Anywhere
- Publishing Autodiscover
- Configuring basic authentication
- How it works...
- Publishing Exchange onto the Internet through UAG 2010 SP3
- Getting ready
- How to do it...
- Creating a new HTTPS-trunk
- Configuring Outlook Anywhere and Exchange ActiveSync
- Configuring Exchange for basic authentication
- How it works...
- Publishing Exchange 2013 to the Internet without using a reverse proxy solution
- Getting ready
- How to do it...
- How it works...
- 6. Implementing and Managing High Availability
- Introduction
- Designing for high availability
- How to do it...
- Creating a highly available Client Access Server infrastructure
- Load balancing at layer 4 using DNS round robin
- Getting ready
- How to do it...
- How it works...
- Load balancing at layer 4 using a single IP address and a load balancer
- Getting ready
- How to do it...
- How it works...
- Load balancing at layer 4 using multiple IP addresses and a load balancer
- Getting ready
- How to do it...
- How it works...
- Load balancing at layer 7 using a load balancer
- Getting ready
- How to do it...
- How it works...
- There's more...
- Creating a highly available mailbox server infrastructure
- Configuring a DAG
- Getting ready
- How to do it...
- How it works...
- Managing a DAG
- Getting ready
- How to do it...
- Adding database copies
- Moving database paths
- Checking replication status
- Testing Replication Health
- How it works...
- There's more...
- Configuring transport high availability
- How to do it...
- Configuring safety net parameters
- How it works...
- Shadow Redundancy
- Safety net
- How to do it...
- Configuring redundant inbound mail delivery
- Getting ready
- How to do it...
- How it works...
- There's more...
- Performing maintenance in a highly available environment
- Getting ready
- How to do it...
- Starting maintenance on Mailbox or multi-role servers
- Starting maintenance on Client Access Servers
- Stopping maintenance
- How it works...
- There's more...
- 7. Transitioning to Exchange Server 2013
- Introduction
- Installing Exchange 2013 in an existing Exchange organization
- Getting ready
- How to do it...
- Preparing the existing Exchange Organization
- Preparing Active Directory
- Check whether an Offline Address Book has been defined
- Configuring an OAB for a mailbox database
- Installing Exchange 2013 CU2
- Performing Exchange 2013 post installation steps
- Getting ready
- How to do it...
- Accessing the Exchange Admin Center
- Configuring virtual directories
- Configuring Autodiscover
- Configuring certificates
- Configuring Outlook Anywhere
- Configuring a Legacy Namespace (Exchange 2007 only)
- Pointing DNS to Exchange 2013
- There's more...
- Moving mailboxes to Exchange 2013
- Getting ready
- How to do it...
- Determining migration batches
- Creating migration batches
- Scheduling migration batches
- There's more...
- Synchronizing data ahead of time
- Moving Public Folders to Exchange 2013
- Getting ready
- How to do it...
- Gathering Public Folder statistics
- Preparing Exchange 2007/2010 for the migration
- Preparing Exchange 2013 for the migration
- Generating the CSV files for migration
- Changing Public Folder names
- Creating Public Folders
- Initiating the Public Folder move request
- Locking existing Public Folders
- Completing the Public Folder migration request
- Verifying the migration
- Finalizing and cleaning up
- There's more...
- Performing delta synchronizations
- Rolling back a migration
- Post migration steps
- Getting ready
- How to do it
- Configuring send connectors
- Performing maintenance in a co-existence scenario
- Getting ready
- How to do it
- How it works...
- There's more...
- 8. Configuring Security and Compliance Features
- Introduction
- Configuring In-Place Archiving
- How to do it...
- Enabling an in-place Archive for a mailbox
- Creating policy tags
- Applying personal tags
- Creating retention policies
- Adding retention policy tag links to an existing retention policy
- Assigning retention policies
- Configuring the Managed Folder Assistant (MFA)
- Enabling or disabling retention hold
- How it works...
- There's more...
- Delegating access to an archive
- Exchange Online Archiving (EOA)
- How to do it...
- Enabling In-Place Hold for a mailbox
- Getting ready
- How to do it...
- How it works...
- There's more...
- Time and query based hold
- Litigation hold
- eDiscovery in SharePoint 2013
- Retrieving Discovery Search results
- Getting ready
- How to do it...
- Retrieving search results
- There's more...
- Searching and deleting e-mails
- Unsearchable items
- Configuring Transport rules
- Getting ready
- How to do it...
- Creating Transport rules
- Enabling/disabling Transport rules
- Testing Transport rules
- How it works...
- There's more...
- Supported file types
- Working with Data Loss Prevention policies
- Getting ready
- How to do it...
- Creating a custom DLP policy
- Creating custom policy tip messages
- How it works...
- Using mailbox audit logging
- How to do it...
- Auditing for specific events
- Configuring an audit log age
- Searching the audit logs
- Generating audit reports
- How it works...
- There's more...
- How to do it...
- 9. Performing Backup, Restore, and Disaster Recovery
- Introduction
- Defining backup objectives
- How to do it
- How it works
- There's more
- Creating a new backup job with Windows Server Backup
- How to do it
- There's more
- Inspect the Event Viewer
- Inspect the Windows Server Backup tool
- Investigating database properties
- Restoring an Exchange Server Database
- Getting ready
- How to do it...
- Performing a full Exchange 2013 database restore
- Setup and usage of an Exchange 2013 Recovery Database
- Performing ESEUTIL /R on a restored Exchange database
- Restoring mailbox data from a Recovery Database into the active Mailbox Database
- How it works
- There's more...
- Recovering a failed Exchange server
- Getting ready
- How to do it
- Resetting a computer account in Active Directory
- Recovering a failed exchange server using the /m:recoverserver switch
- Executing post-installation tasks
- How it works
- 10. Implementing Security
- Introduction
- Configuring role-based access control
- How to do it...
- Adding members to a role group
- Creating a custom role group and limit the write-scope to an organizational unit
- Creating a role group from scratch
- Creating a new management role assignment with a limited scope
- There's more...
- How to do it...
- Configuring administrator audit logging
- How to do it...
- Configuring the auditing of specific events
- Configuring the audit log age
- Generating the audit log reports
- How it works...
- How to do it...
- Configuring anti-spam and anti-malware features
- Getting ready
- How to do it...
- Installing anti-spam agents
- Enabling or disabling anti-malware scanning
- Updating the anti-malware engine
- Verifying the installed updates
- How it works...
- There's more...
- Connection filtering and RBL
- A. Getting to Know Exchange Server 2013
- Exchange, then and now
- Exploring some new features in Exchange Server 2013
- The new public folders
- Outlook Web App
- Data Loss Prevention
- Anti-malware
- Messaging security
- Site Mailboxes
- Understanding the new system architecture
- The old architecture
- The new architecture
- Database Availability Groups
- There's more
- Features removed from Exchange Server 2013
- Understanding Exchange 2013 hybrid deployments
- Secure mail flow
- Federation
- Cross-premises mailbox moves
- Index
- Titel: Microsoft Exchange 2013 Cookbook. Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise
- Autor: Michael Van Horenbeeck, Peter De Tender
- Originaler Titel: Microsoft Exchange 2013 Cookbook. Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise.
- ISBN: 9781782170631, 9781782170631
- Veröffentlichungsdatum: 2013-09-20
- Format: E-book
- Artikelkennung: e_3cyb
- Verleger: Packt Publishing