1. Trang chủ
  2. » Công Nghệ Thông Tin

Enterprise applications administration the definitive guide to implementation and operations

401 103 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 401
Dung lượng 40,24 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

xi CHAPTER 1 Introduction to Enterprise Applications Administration.... 1 Defining Enterprise Applications Administration .... Finally, I want to thank all of the individuals that have w

Trang 2

Enterprise Applications

Administration

Trang 3

This page intentionally left blank

Trang 6

To My Wife, Christina Faircloth

I don’t think you expected this when you said “for better or for worse,” but

you’ve stuck with me through all of it anyway Thank you, Chris, for

support-ing me, lovsupport-ing me, and puttsupport-ing up with the life of an“IT Widow.”

v

Trang 7

This page intentionally left blank

Trang 8

ACKNOWLEDGMENTS ix

PREFACE xi

CHAPTER 1 Introduction to Enterprise Applications Administration 1

Purpose of This Book 1

Defining Enterprise Applications Administration 7

Enterprise Applications Administrators 14

Summary 26

CHAPTER 2 Networks 27

Network Fundamentals 27

Network Troubleshooting 64

Summary 79

CHAPTER 3 Servers 81

Hardware 81

Windows 95

*NIX 118

Summary 128

CHAPTER 4 Databases 131

Basic Concepts 131

Database Design 151

Access Control 159

Troubleshooting 163

Summary 172

CHAPTER 5 Information Security 175

Basic Concepts 175

Authentication, Authorization, and Audit 182

Administration of Access Control 195 Assessment 199 vii

Trang 10

A full year went into this book and I still feel that I could have spent another

year working on it to make it right Three laptops met their doom, multiple

mice met walls in frustration, and there is now a permanent dent in both my

desk and my forehead Through all of that, there are many people who still

decided it was worth sticking through this with me and supporting this effort

along the way

My family, as always, are my greatest fans, best supporters, and the people

that suffer the most when I’m running behind schedule I’d like to thank my

wife Christina and my son Austin for all of their support year after year as I

continue to try to get the words out of my head and onto paper Thank you

both so much for everything that you do to support me and keep this dream

of mine alive

I’d also like to thank all of my other family members who helped and

sup-ported me with this in some way or another: Jeff Landreth (I can never call

you Scott), Joann Faircloth, John and Mary Faircloth, Barbara Landreth, and

all the rest of you good folks I’d list you all, but I only have so much space

and there are so many of you that I appreciate! Thank you all so much!

A big thank you also to Steve Elliot and Kaitlin Herbert, my editor and

proj-ect manager with Elsevier You really helped keep me on track and keep this

moving even when the going got rough Your support through this project is

very much appreciated and none of us authors could be successful without a

great team like you guys

Finally, I want to thank all of the individuals that have worked with me in

supporting enterprise applications through the years There have been great

times, huge challenges, and many surprises that have affected all of us

Through it all, we have all learned a lot and I appreciate all of the things that

each one of you has taught me through the years Chuck Chilton, Mark

Seely, Scott Bilyeu, Travis Perry, Mike Mashburn, Mike Angeloff, Christina

Angeloff, Albert Zhu, and so many more of you all taught me many things

ix

Trang 12

BOOK OVERVIEW AND KEY LEARNING POINTS

This book addresses a need within the information technology field to bring

back a level of generalization needed to support today’s enterprise

applica-tions Over the years, there has been a trend toward technology specialization

to such a high degree that many information technology professionals no

longer have the breadth of skills necessary to support multiple technology

disciplines with the same level of expertise This trend is acceptable when

dealing with silos of technology but begins to be an issue when working

with large, complex enterprise applications

Enterprise applications administration is the skill and art of working in a

cross-discipline role with a holistic view of the enterprise application and all of its

component technologies in mind This book is intended to provide a knowledge

base to the reader that covers the primary technologies that enterprise

applica-tions administrators work with on a daily basis In addition, some of the softer

skills needed within this role are covered so that there are no gaps in the basic

knowledge necessary to become or lead enterprise applications administrators

BOOK AUDIENCE

The intended audience for this book is any technical professional who has

an interest in working with enterprise applications, any instructor who is

teaching the skills needed to become an enterprise applications

administra-tor, and any manager who needs to manage high-performing enterprise

applications administration teams In addition, technical experts specialized

in any technical area will find value here by learning the basics of other

disci-plines and better understanding the entire ecosystem utilized by enterprise

applications Database administrators can learn about server hardware and

operating systems Security professionals can learn about networks and

appli-cations Developers can learn about databases and architecture All technical

specialties associated with enterprise applications are discussed and present

learning opportunities to any technical professional

xi

Trang 93

This page intentionally left blank

Trang 394

Note: Page numbers followed by “f” and “t” refer to figures and tables, respectively.

32 bit processor architecture, 83

64 bit processor architectures, 83

Active active clustering, 262

Active passive clustering, 262

213 214 Application layer protocols, 45 55 Architecture, 25 26

concepts, 221 222 ARP (Address Resolution Protocol),

39 40 spoofing, 206 Assessment, 199 208 vulnerabilities, 200 208 buffer and stack overflows,

204 205 cross site scripting (XSS) vulnerabilities, 203 204 denial of service (DoS) attack,

205 206 man in the middle attack, 207f password attacks, 201 202 spoofing, 206 208 SQL injection, 202 203 Attack signatures, 211 Audit, 194 195 Authentication, 182 190 authenticating identity, 183 184 centralized access control system,

185 190 Active Directory services,

186 187 Kerberos, 187 188

Lightweight Directory Access Protocol (LDAP), 186 Security Assertion Markup Language (SAML), 190 single sign on, 189 190 X.509, 188 189 decentralized or local access control, 184 185 establishing identity, 183 Authorization, 191 194 discretionary access control (DAC),

191 192 mandatory access control (MAC), 192

nondiscretionary access control,

192 194 role based access control (RBAC),

193 194, 193f Automatable process, defining,

319 321 Automation See Process automation Availability, 180

as an architecture concept, 258 263 monitoring, 11

B

Backups, 217 Bare metal hypervisor, 254 Batch integrations, 267 268 BETWEEN operator, 138 139 Big data, 153

Brute force attack, 201 202 Buffer and stack overflows, 204 205 Bus topology, 29 30 381

Ngày đăng: 02/03/2019, 10:06

TỪ KHÓA LIÊN QUAN