IT Bookworm Blog


April 14, 2009  5:00 AM

The department previously known as IT

BrentSheets Brent Sheets Profile: BrentSheets

Overview: “There is a fundamental dilemma in the world of IT: the technical challenges and opportunities have never been greater, but at the same time the role of IT and the role of the CIO has never been questioned more. The relationship between business and IT is in many companies at an all-time low. The model of Alignment that we’ve pursued for more than 20 years in IT doesn’t work anymore. It’s time for change. It’s time for a radical change in the relationship between business and IT. It’s time for Fusion.”

This free chapter has been selected from Business/IT Fusion: How to move beyond Alignment and transform IT in your organization by Mach Media. Enjoy the chapter and be sure to check out the related IT/Business Alignment resources listed below. Voice your feedback on this chapter or let us know of other books you’d like to see featured on the IT Bookworm Blog by leaving a comment below. Thanks.

Signature
Community Manager

Business/IT Fusion Written by
Title
Published by
Published on
ISBN-10
ISBN-13
Peter Hinssen
Business/IT Fusion
Mach Media
December 16, 2008
9081324233
978-9081324236

Download the chapter DOWNLOAD THE CHAPTER
Chapter 1: The department previously known as IT

RELATED PEER ADVICE
→ Visit our CIO community
→ Need answers? Ask your own Business/IT alignment question

RELATED RESOURCES
→ Visit the TotalCIO blog
→ Visit the CIO Symmetry blog
→ Browse these resources for IT and business alignment
→ Browse these resources for IT and business management
→ Visit the SearchCIO.com website
→ Visit the SearchCIO-midmarket.com website

RELATED CONTENT
→ IT Definitions: Business/IT alignment (visit the Business Terms Glossary for more)
→ Article: How collaboration tools bring cost savings, business alignment
→ Article: Business intelligence strategy success a matter of alignment
→ Trends: Looking forward: Trends in IT management and budgeting for 2009
→ Briefing: IT and business management: Service, process and project performance
→ Briefing: Strategic IT and business alignment for the midmarket

April 9, 2009  5:00 AM

Using SSH to automate system administration securely

BrentSheets Brent Sheets Profile: BrentSheets

Overview: “This book is for Linux system administrators who want to learn about the software and methodology to automate repetitive tasks – regardless of network or datacenter size – in one place. System managers will also find it much easier to think about network technology and automation projects if they read this book. This book is also for anyone who is interested in repeatable and secure infrastructure.”

This free chapter has been selected from Automating Linux and Unix System Administration, 2nd Edition by Apress, Inc. Enjoy the chapter and be sure to check out the related enterprise Linux resources listed below. If you have feedback about this chapter or would like to suggest a book to be featured here on IT Bookworm Blog — then please leave a comment. Thanks.

Signature
Community Manager

Automating Linux and Unix System Administration Written by
Title
Published by
Published on
ISBN-10
ISBN-13
Kirk Bauer and Nathan Campi
Automating Linux and Unix System Administration, Second Edition
Apress
December 15, 2008
1-4302-1059-1
978-1-4302-1059-7

Download the chapter DOWNLOAD THE CHAPTER
Chapter 3: Using SSH to Automate System Administration Securely

RELATED PEER ADVICE
→ Visit our Linux community
→ Need answers? Ask your own SSH or Linux question

RELATED RESOURCES
→ Visit the Enterprise Linux Log blog
→ Visit the Open Source Software and Linux blog
→ Browse these resources for Linux Administration
→ Visit the SearchEnterpriseLinux.com website

RELATED CONTENT
→ IT Definitions: SSH and Linux (visit the Linux Glossary for more)
→ Technical Tip: Using OpenSSH for secure network tunnels on Linux
→ Author Q&A: Building a Linux infrastructure with maximum automation
→ Expert Answer: Hardening Linux servers for remote access
→ Technical Guide: 77 useful Linux commands and utilities
→ Quiz: Linux lore


April 7, 2009  5:00 AM

Configuring a VPN using IPSec

BrentSheets Brent Sheets Profile: BrentSheets

Overview: “Cisco Routers for the Small Business provides in plain English a no-nonsense approach to setting up all the features of the Cisco IOS for a small business using broadband technologies. This book explains how to use a Cisco router to setup cable modems, DSL and PPPoE, and explains how to configure NAT, Access Control Lists, Firewalls, DMZs and an IPSec VPN between two sites using advanced encryption.”

This free chapter has been selected from Cisco Routers for the Small Business by Apress, Inc. Enjoy the chapter and be sure to check out the related VPN and networking resources listed below. If you have feedback about this chapter or would like to suggest a book to be featured here on IT Bookworm Blog — then please leave a comment. Thanks.

Signature
Community Manager

Cisco Routers for the Small Business Written by
Title
Published by
Published on
ISBN-10
ISBN-13
Jason Neumann
Cisco Routers for the Small Business
Apress
January 2, 2009
1-4302-1851-7
978-1-4302-1851-7

Download the chapter DOWNLOAD THE CHAPTER
Chapter 4: Configuring a VPN using IPSec

RELATED PEER ADVICE
→ Visit our Networking community
→ Need answers? Ask your own VPN or Cisco IOS question

RELATED RESOURCES
→ Visit the The Network Hub blog
→ Visit David’s Cisco Networking Blog
→ Visit the SearchEnterpriseWAN.com website
→ Visit the SearchNetworking.com website
→ Browse these VPN design and VPN configuration resources
→ Browse these Network Administration resources

RELATED CONTENT
→ IT Definitions: VPN and IPSec (visit the Network Administration Glossary for more)
→ FAQ: Troubleshooting VPN connections
→ How-To: Direct transport VPN configuration
→ How-To: IPsec VPN router configuration: The ISAKMP policy
→ Learning Guide: Network administration guide


April 1, 2009  5:00 AM

Configuring the Hub Transport Role

BrentSheets Brent Sheets Profile: BrentSheets

Overview: “This book is for Exchange professionals who want to learn how to use PowerShell to effectively manage, automate, and streamline their Exchange 2007 organization. This book walks you through the ins and outs of PowerShell, showing you how to take full advantage of this scripting language for deploying, configuring, managing, and maintaining your Exchange environment.”

This free chapter has been selected from Professional Windows PowerShell for Exchange Server 2007 Service Pack 1 by Wrox. Enjoy the chapter and be sure to check out the related Exchange Server resources listed below. Voice your feedback on this chapter or let us know of other books you’d like to see featured on the IT Bookworm Blog by leaving a comment below. Thanks.

Signature
Community Manager

Professional Windows PowerShell for Exchange Server 2007 SP1 Written by Joezer Cookey-Gam, Brendan Keane, Jeffrey Rosin, Jonathan Runyon, Joel Stidley
Title Professional Windows PowerShell for Exchange Server 2007
Published by Wrox
Published on January 22, 2008
ISBN-10 0470226447
ISBN-13 978-0470226445

Download the chapter DOWNLOAD THE CHAPTER
Chapter Seven: Configuring the Hub Transport Role

RELATED PEER ADVICE
→ Visit our Exchange Server community
→ Visit our Windows Server community
→ Need answers? Ask your own Exchange or Windows Server question

RELATED RESOURCES
→ Visit the SearchExchange.com website
→ Visit the SearchWindowsServer.com website
→ Visit the The VBScript Network and Systems Administrator’s Cafe blog
→ Browse these resources for Microsoft Exchange Server Scripts
→ Browse these resources for Microsoft Scripting

RELATED CONTENT
→ IT Definition: PowerShell (visit the Email and Messaging Glossary for more)
→ Crash Course: A primer on the Exchange Server 2007 Exchange Management Shell
→ Tutorial: How to uninstall Exchange Server 2007 and individual server roles
→ Step-by-Step Guide: How an Edge Transport server works
→ Learning Center: Windows PowerShell for beginners
→ Scripting School: Extending your toolset with Windows PowerShell


March 25, 2009  8:00 AM

Booting and configuring a Xen Host

BrentSheets Brent Sheets Profile: BrentSheets

Overview: “Provides a complete foundation in virtualization, XEN, and competing approaches with in-depth discussions of installing, configuring, and using XEN, including detailed examples of XEN configuration files, system configuration files, and system-level configuration information.”

This free chapter has been selected from Professional Xen Virtualization by Wrox. Enjoy the chapter and be sure to check out the related Xen resources listed below. Voice your feedback on this chapter or let us know of other books you’d like to see featured on the IT Bookworm Blog by leaving a comment below to let us know. Thanks.

Signature
Community Manager

Professional Xen Virtualization Written by
Title
Published by
Published on
ISBN-10
ISBN-13
William von Hagen
Professinal Xen Virtualization
Wrox
January 29, 2008
0470138114
978-0470138113

Download the chapter DOWNLOAD THE CHAPTER
Chapter Four: Booting and configuring a Xen Host

RELATED PEER ADVICE
  → Visit our Virtualization community
  → Need answers? Then ask your own Xen question

RELATED RESOURCES
  → Visit the SearchServerVirtualization Blog
  → Visit the Virtualization Pro blog
  → Visit the SearchServerVirtualization.com website
  → Browse these Xen and Citrix XenServer resources

RELATED CONTENT
  → IT Definition: Xen (visit the Virtualization Glossary for more)
  → Learning Guide: Introduction to Xen
  → Special Report: VMware vs. Microsoft vs. Xen: An expert face-off


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: