1. Trang chủ
  2. » Công Nghệ Thông Tin

Enterprise applications administration the definitive guide to implementation and operations

401 101 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 401
Dung lượng 40,24 MB

Nội dung

Enterprise Applications Administration This page intentionally left blank Dedication To My Wife, Christina Faircloth I don’t think you expected this when you said “for better or for worse,” but you’ve stuck with me through all of it anyway Thank you, Chris, for supporting me, loving me, and putting up with the life of an “IT Widow.” v This page intentionally left blank Contents ACKNOWLEDGMENTS ix PREFACE xi CHAPTER Introduction to Enterprise Applications Administration Purpose of This Book Defining Enterprise Applications Administration Enterprise Applications Administrators 14 Summary 26 CHAPTER Networks 27 Network Fundamentals 27 Network Troubleshooting 64 Summary 79 CHAPTER Servers 81 Hardware 81 Windows 95 *NIX 118 Summary 128 CHAPTER Databases 131 Basic Concepts 131 Database Design 151 Access Control 159 Troubleshooting 163 Summary 172 CHAPTER Information Security 175 Basic Concepts 175 Authentication, Authorization, and Audit 182 Administration of Access Control 195 Assessment 199 vii Acknowledgments A full year went into this book and I still feel that I could have spent another year working on it to make it right Three laptops met their doom, multiple mice met walls in frustration, and there is now a permanent dent in both my desk and my forehead Through all of that, there are many people who still decided it was worth sticking through this with me and supporting this effort along the way My family, as always, are my greatest fans, best supporters, and the people that suffer the most when I’m running behind schedule I’d like to thank my wife Christina and my son Austin for all of their support year after year as I continue to try to get the words out of my head and onto paper Thank you both so much for everything that you to support me and keep this dream of mine alive I’d also like to thank all of my other family members who helped and supported me with this in some way or another: Jeff Landreth (I can never call you Scott), Joann Faircloth, John and Mary Faircloth, Barbara Landreth, and all the rest of you good folks I’d list you all, but I only have so much space and there are so many of you that I appreciate! Thank you all so much! A big thank you also to Steve Elliot and Kaitlin Herbert, my editor and project manager with Elsevier You really helped keep me on track and keep this moving even when the going got rough Your support through this project is very much appreciated and none of us authors could be successful without a great team like you guys Finally, I want to thank all of the individuals that have worked with me in supporting enterprise applications through the years There have been great times, huge challenges, and many surprises that have affected all of us Through it all, we have all learned a lot and I appreciate all of the things that each one of you has taught me through the years Chuck Chilton, Mark Seely, Scott Bilyeu, Travis Perry, Mike Mashburn, Mike Angeloff, Christina Angeloff, Albert Zhu, and so many more of you all taught me many things ix This page intentionally left blank Index Note: Page numbers followed by “f” and “t” refer to figures and tables, respectively 32 bit processor architecture, 83 64 bit processor architectures, 83 A Access control, 159 163 groups, 161 162 permissions, 162 163 roles, 160 161 users, 160 administration of, 195 199 account administration, 196 197 rights and permissions, determining, 197 access control objects, 198 199 Account administration, 196 197 Accuracy requirements, 311 Active Directory, 101 104, 186 187 group policies, 103 hierarchy, 102f Active active clustering, 262 Active passive clustering, 262 Address Record, 46 Address Resolution Protocol (ARP), 66 67 Address Space Layout Randomization (ASLR), 97 Agent based monitoring systems, 343 Agent less monitoring, 343 Alerting, 349 353 ALTER COLUMN modifier, 149 ALTER statements, 148 150 AND modifier, 140 Apache, 236 238, 244 Application architecture, 233 235 Application filtering, 213 214 Application layer, 70 78 additional tools, 78 Application layer gateways, 60, 213 214 Application layer protocols, 45 55 Architecture, 25 26 concepts, 221 222 ARP (Address Resolution Protocol), 39 40 spoofing, 206 Assessment, 199 208 vulnerabilities, 200 208 buffer and stack overflows, 204 205 cross site scripting (XSS) vulnerabilities, 203 204 denial of service (DoS) attack, 205 206 man in the middle attack, 207f password attacks, 201 202 spoofing, 206 208 SQL injection, 202 203 Attack signatures, 211 Audit, 194 195 Authentication, 182 190 authenticating identity, 183 184 centralized access control system, 185 190 Active Directory services, 186 187 Kerberos, 187 188 Lightweight Directory Access Protocol (LDAP), 186 Security Assertion Markup Language (SAML), 190 single sign on, 189 190 X.509, 188 189 decentralized or local access control, 184 185 establishing identity, 183 Authorization, 191 194 discretionary access control (DAC), 191 192 mandatory access control (MAC), 192 nondiscretionary access control, 192 194 role based access control (RBAC), 193 194, 193f Automatable process, defining, 319 321 Automation See Process automation Availability, 180 as an architecture concept, 258 263 monitoring, 11 B Backups, 217 Bare metal hypervisor, 254 Batch integrations, 267 268 BETWEEN operator, 138 139 Big data, 153 Brute force attack, 201 202 Buffer and stack overflows, 204 205 Bus topology, 29 30 381 ... with enterprise applications, any instructor who is teaching the skills needed to become an enterprise applications administrator, and any manager who needs to manage high-performing enterprise applications. .. large, complex enterprise applications Enterprise applications administration is the skill and art of working in a crossdiscipline role with a holistic view of the enterprise application and all of... the most when I’m running behind schedule I’d like to thank my wife Christina and my son Austin for all of their support year after year as I continue to try to get the words out of my head and

Ngày đăng: 02/03/2019, 10:06