Atjaunināt sīkdatņu piekrišanu

E-grāmata: Virtualization, A Beginner's Guide

3.40/5 (10 ratings by Goodreads)
  • Formāts: 464 pages
  • Sērija : Beginner's Guide
  • Izdošanas datums: 31-Mar-2009
  • Izdevniecība: Osborne/McGraw-Hill
  • Valoda: eng
  • ISBN-13: 9780071614023
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,19 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 464 pages
  • Sērija : Beginner's Guide
  • Izdošanas datums: 31-Mar-2009
  • Izdevniecība: Osborne/McGraw-Hill
  • Valoda: eng
  • ISBN-13: 9780071614023
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Danielle Ruest (senior enterprise architect and consultant) and Nelson Ruest (senior enterprise infrastructure architect) demonstrate how to take advantage of and maximize the most current technologies from Citrix, Microsoft when planning and implementing virtual computing environments. The guide includes a thorough explanation of how to use a five-step process to make the move to virtualization, build a virtualization infrastructure, build a business continuity strategy, update management structure, and secure and protect the infrastructure. The book combines clear writing with thorough and methodical explanations. Annotation ©2009 Book News, Inc., Portland, OR (booknews.com)

Migrate to a dynamic, on-demand data delivery platform

"If you're looking to hit the ground running with any virtualization project, large or small, this book is going to give you the start you need, and along the way will offer you some cautionary tales that will even take some seasoned virtualization veterans by surprise." --From the foreword by Chris Wolf, Senior Analyst, Burton Group

Transform your IT infrastructure into a leaner, greener datacenter with expert guidance from a pair of industry professionals. Through clear explanations, examples, and a five-step deployment plan, Virtualization: A Beginner's Guide shows you how to maximize the latest technologies from Citrix, Microsoft, and VMware. Consolidate your servers, set up virtual machines and applications, and manage virtual desktop environments. You'll also learn how to implement reliable security, monitoring, and backup procedures.

  • Select a virtualization platform and develop rollout plans
  • Perform pre-deployment network and workstation tests
  • Configure virtual machines, storage devices, and workloads
  • Set up and secure a fully virtualized and highly available server environment
  • Manage a centralized, on-demand application delivery framework
  • Handle volatile and persistent desktop virtualization
  • Use hypervisors to facilitate workload delivery
  • Implement failsafe system backup and recovery strategies
Foreword xv
Acknowledgments xvii
Introduction xix
Part I Architect for Virtualization
The Move to Virtualization
3(10)
In Comes Virtualization
5(6)
Before You Begin
8(3)
Use a Five-Step Process
11(2)
Begin the Five-Step Process
13(32)
Discovery
14(9)
Inventory, Inventory, Inventory
15(1)
Scan for Potential Virtualization Candidates
16(5)
Categorize Server Resources
21(2)
Rationalize Everything
23(1)
Virtualization
23(20)
Defining Virtualization
25(5)
What Is a Virtual Machine?
30(2)
Server Virtualization Models
32(2)
Major Server Virtualization Vendors
34(5)
Desktop Virtualization
39(1)
Application Virtualization
40(3)
Work with the First Two Steps
43(2)
Complete the Five-Step Process
45(20)
Hardware Maximization
46(9)
Move to 64-Bit
46(3)
Rely on Shared Storage
49(2)
Be Aware of Licensing Costs
51(2)
Rely on New Server Form Factors
53(2)
Architectures
55(2)
Manage Virtualization
57(3)
Focus on VM Management
59(1)
Rely on the Virtualization Decision Flowchart
60(5)
Part II Build Your Virtualization Infrastructure
Perform a Comprehensive Analysis
65(26)
Begin the Analysis
67
Perform a Comprehensive Analysis
65(2)
Begin the Analysis
67(4)
Perform a Storage Consolidation Study
71(10)
Rely on Other Tools
81(4)
Perform a Server Consolidation Study
85(3)
Identify Appropriate Performance Metrics
86(2)
Interpret the Results
88(1)
Rationalize Everything Again
88(3)
Build the Resource Pool
91(28)
Planning and Preparation
92(3)
What to Virtualize
92(2)
Replace Anything Beige
94(1)
Choose the Implementation Method
95(1)
Prepare the Network Layer
95(4)
Networking in Virtual Layers
97(2)
Prepare Storage
99(8)
Prepare Storage Configurations
102(1)
Virtualize Storage
103(3)
Create a Backup Plan
106(1)
Best-in-Breed Storage
106(1)
Prepare Host Servers
107(10)
Server Sizing for Resource Pools
110(3)
Sizing Recommendations for Resource Pools
113(1)
Upgrading Host Servers
114(1)
Rely on Hardware-Integrated Hypervisors
114(2)
Build Your Own Hypervisor Hardware
116(1)
The Next Step
117(2)
Begin with the Testing Environment
119(34)
Work with Different Testing Levels
122(2)
Rely on Virtual Machine Software
124(1)
Physical Versus Logical Workspaces
125(1)
Define Lab Requirements
126(7)
Host Server Configurations
126(1)
Virtual Machine Configurations
127(2)
VM User Accounts
129(1)
Required Server and Workstation Roles
129(3)
Requirements for Each Testing Level
132(1)
Create the Lab Environment
133(9)
Virtual Machines and Software Licensing
135(2)
Build Complete Environments
137(1)
Virtual Laboratory Deliverables
138(4)
Reuse of the Lab Deliverables
142(3)
Core Machines
142(1)
Depersonalized Machines
142(2)
The Base Environment
144(1)
The Core Environment
144(1)
Virtual Infrastructure Laboratory Management Practices
145(4)
Security Practices
146(1)
Special Build Procedures
147(1)
Backup and Disaster Recovery
147(1)
Lab Maintenance Procedures
148(1)
Virtual Lab Best Practices Summary
149(2)
Move On to the Virtual Datacenter
151(2)
Work with Server Virtualization
153(40)
Choose a Server Virtualization Technology
155(1)
Technologies and Scenarios
156(29)
Server Virtualization Scenarios
158(2)
Other Vendor Offerings
160(1)
VMware Technology Components
161(12)
Citrix Virtualization Technologies
173(3)
Microsoft Virtualization Technologies
176(4)
Virtual Machine Formats
180(2)
VM Disk Types
182(3)
Virtualization Technology Pricing
185(2)
Market-Leader Hypervisor Metrics
187(6)
Market-Leader Hypervisor Positioning
191(2)
Work with Virtual Workloads
193(16)
The Server Virtualization Decision Process
194(3)
Virtual Service Offerings Structure
197(3)
Virtual Resource Allocation Rules
200(7)
Rely on Placement Rules
202(2)
Single Versus Multi-VM Hosts
204(2)
Work with the Network Layer
206(1)
Best Practices in Server Virtualization
207(2)
Provision Virtual Machines
209(24)
Before You Begin
213(2)
Provision New Virtual Machines
215(8)
Create Seed Virtual Machines
216(1)
Provision Using Seed Machines
216(1)
Physical Versus Virtual Provisioning
217(1)
Rely on Virtual Appliances
218(3)
Virtual Appliance Benefits
221(1)
Create Virtual Applicances of Your Own
222(1)
Perform Physical-to-Virtual Conversions
223(8)
P2V Preparation Tasks
223(2)
Perform the P2V
225(1)
Work with VMware Converter
226(2)
Work with PlateSpin PowerConvert
228(1)
Rely on the Ultimate-P2V Plug-in for BartPE
229(1)
Microsoft Conversion Tools
229(2)
Provisioning Best Practices
231(2)
Work with Desktop Virtualization
233(32)
Work with a System Stack
234(3)
Desktop Management Issues
237(2)
Vista State of the Union
237(1)
The Anatomy of a Desktop
238(1)
Move to Desktop Virtualization
239(9)
Available Desktop Virtualization Products
240(1)
Virtual Desktop Licensing
241(2)
Potential Desktop Virtualization Scenarios
243(3)
Identify Desktop Virtualization Audiences
246(2)
Centralized Desktop Virtualization Infrastructures
248(14)
VMware Virtual Desktop Manager
250(7)
Citrix XenDesktop
257(3)
Other Technologies
260(2)
Profit from VDI
262(3)
Major Vendor Positioning
264(1)
Make the Desktop Virtualization Decision
264(1)
Work with Application Virtualization
265(20)
Application Management Issues
266(6)
Traditional Application Management Solutions
267(5)
Redesign Application Management
272(11)
Work with a Virtualization Layer
273(8)
Application Streaming: A New Distribution Strategy
281(2)
Benefits of App V for the Organization
283(2)
Work with AppV
285(28)
Compare Application Virtualization Products
286(8)
Citrix XenApp
290(1)
InstallFree Bridge
290(1)
Microsoft Application Virtualization
291(1)
Symantec SVS Pro
291(1)
VMware ThinApp
292(1)
Major Vendor Positioning
293(1)
Use the AppV Decision Process
293(1)
Key Points on AppV
294(2)
Integrate Application, Profile, and Desktop Virtualization
296(14)
Assign Applications on Demand
297(1)
Use a Volatile Desktop VM
298(1)
Virtualize User Profiles
299(2)
Create the Personality Protection Strategy
301(9)
Finalize the Personality Protection Strategy
310(1)
Key Points on the Perfect Desktop
310(3)
Part III Consolldate the Benefits
Secure Your Virtual Infrastructure
313(42)
The Castle Defense System
315(12)
Resource Pools Versus Virtual Service Offering
317(2)
Secure Resource Pools
319(3)
Secure Virtual Service Offerings
322(5)
Apply the Castle Defense System to the Resource Pool
327(25)
Critical Information
327(3)
Physical Protection
330(2)
Operating System Hardening
332(10)
Information Access
342(4)
External Access
346(6)
Complete the Resource Pool Security Policy
352(3)
Protect Your Virtual Infrastructure
355(14)
Develop your System Protection Strategies
356(12)
Use Standard System Recovery Strategies
357(2)
Hypervisor Manufacturer Offering
359(7)
Data Protection Strategies for Virtual Service Offering
366(1)
Select a Third-Party Backup Tool
367(1)
Complete the Recovery Strategy
368(1)
Prepare for Business Continuity
369(34)
Business Continuity Essentials
370(24)
Make the Resource Pool Highly Available
372(8)
Protect Your Virtual Service Offerings
380(7)
Make Virtual Desktops Highly Available
387(5)
Make Virtual Applications Highly Available
392(2)
Make Profiles Highly Available
394(1)
Build Your Business Continuity Strategy
394(9)
Provide Multisite Redundancy
395(1)
Adjust Your Service Level Agreements
396(1)
Business Continuity Management Through Replication
397(2)
Choose the Proper Replication Tool
399(2)
Prepare for Site-Based Disasters
401(2)
Update Your Management Structure
403(16)
Look to New Administative Roles
404(1)
Move to Policy-Based Workloads
404(4)
Policy-Based Resource Management
408(6)
Look to Third-Party Management Tools
414(3)
Update Your Management Practices
417(2)
Afterword 419(2)
Calculate Your Return on Investment 421(2)
Index 423
McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide





McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide