Skip to main content
Taylor & Francis Group Logo
    Advanced Search

    Click here to search products using title name,author name and keywords.

    • Login
    • Hi, User  
      • Your Account
      • Logout
      Advanced Search

      Click here to search products using title name,author name and keywords.

      Breadcrumbs Section. Click here to navigate to respective pages.

      Book

      Handbook of Data Center Management, 1998 edition
      loading

      Book

      Handbook of Data Center Management, 1998 edition

      DOI link for Handbook of Data Center Management, 1998 edition

      Handbook of Data Center Management, 1998 edition book

      Handbook of Data Center Management, 1998 edition

      DOI link for Handbook of Data Center Management, 1998 edition

      Handbook of Data Center Management, 1998 edition book

      Edited ByAuerbach
      Edition 1st Edition
      First Published 2000
      eBook Published 21 April 2014
      Pub. Location New York
      Imprint Auerbach Publications
      DOI https://doi.org/10.1201/9781482287813
      Pages 672
      eBook ISBN 9780429257209
      Subjects Computer Science, Engineering & Technology
      Share
      Share

      Get Citation

      Auerbach, (Ed.). (2000). Handbook of Data Center Management, 1998 edition (1st ed.). Auerbach Publications. https://doi.org/10.1201/9781482287813

      ABSTRACT

      The Enterprise Operations Management Handbook provides the expert advice and guidance of hundreds of leading computing practitioners and consultants. Covering all major areas of enterprise operations management, this edition provides essential information for managing a modern, evolving data center. Topics include business issues, technology issues

      TABLE OF CONTENTS

      chapter |4 pages

      Introduction

      part |2 pages

      SECTION I IT MANAGEMENT

      chapter 1|9 pages

      Strategic Planning: Business and Technology Issues

      ByLayne C. Bradley

      chapter 2|16 pages

      The Corporate Information and Communications Hierarchy: Technological Management in Modern Enterprises

      chapter 3|7 pages

      Developing People Skills: A New IT Priority

      chapter 4|12 pages

      Professional Consulting: The Analysis Methodology

      ByCharles V. Breakfield, Roxanne E. Burkey

      chapter 5|8 pages

      Pricing Methods Across Linked Networks

      ByKeith A. Jones

      chapter 6|14 pages

      Enterprise Modeling for Strategic Support

      ByMichael E. Whitman, Michael L. Gibson

      part |2 pages

      SECTION II DATA CENTER MANAGEMENT

      chapter 7|9 pages

      Reverting to Centralized Data Center Management

      ByC. Warren Axelrod

      chapter 8|7 pages

      Acquiring and Using a UPS System

      ByGilbert Held

      chapter 9|10 pages

      Providing Quality Information Services to the Customer

      ByJoe R. Briones

      chapter 10|10 pages

      Evaluating a Job Scheduler in the Open Systems Arena

      ByRandy Keck

      chapter 11|7 pages

      Help Desk Technology

      ByNathan J. Muller

      chapter 12|9 pages

      Call Center Computer Telephony Integration: A Case Study

      ByCharles V. Breakfield, Roxanne E. Burkey

      part |2 pages

      SECTION III APPLICATION INFRASTRUCTURE AND OPERATIONS

      chapter 13|7 pages

      Maintaining Data in Mainframe and Network Environments

      ByRoxanne E. Burkey

      chapter 14|7 pages

      Managing Data Storage and Distribution

      ByRoxanne E. Burkey

      chapter 15|15 pages

      The Data Center Manager’s Guide to Networked Imaging Systems

      ByNathan J. Muller

      chapter 16|5 pages

      Collaborative Applications

      ByS. Ann Earon

      chapter 17|5 pages

      Supporting Legacy Systems

      chapter 18|16 pages

      Client/Server Architecture and Implementation

      ByNathan J. Muller

      part |2 pages

      SECTION IV ENTERPRISE NETWORK MANAGEMENT

      chapter 19|9 pages

      TCP/IP Network Management: A Case Study

      ByVishal Desai

      chapter 20|10 pages

      Trends in Data Communications Services

      ByNathan J. Muller

      chapter 21|10 pages

      The Emerging Advantage of xDSL Technology

      ByAndres Llana, Jr.

      chapter 22|8 pages

      LAN Printing Techniques

      ByGilbert Held

      chapter 23|7 pages

      Preparing for Cable Modems

      ByGilbert Held

      chapter 24|12 pages

      LAN-WAN Interconnection Requirements and Implementation Considerations

      chapter 25|6 pages

      Enterprise Deployment: Building an IP PBX Telephony Network

      ByJohn Fiske

      part |2 pages

      SECTION V DESKTOP COMPUTING

      chapter 26|8 pages

      A Quick Overview of Linux

      ByRaj Rajagopal

      chapter 27|8 pages

      Evaluating the Performance of NT-Based Systems

      ByGilbert Held

      chapter 28|10 pages

      Configuring TCP/IP on a Windows NT Computer

      chapter 29|10 pages

      More Productive User Interfaces

      ByPaul Nisenbaum, Robert E. Umbaugh

      chapter 30|14 pages

      Creating GUIs Users Can Use: Usability Analysis

      ByLuke Hohmann

      chapter 31|8 pages

      Building GUIs Users Can Use: Usability Development

      ByLuke Hohmann

      part |3 pages

      SECTION VI EQUIPMENT ASSET MANAGEMENT

      chapter 32|9 pages

      Reducing the Cost of PC Connectivity

      BySalvatore Salamone

      chapter 33|8 pages

      Evaluating Equipment: A Methodology for Success

      ByGilbert Held

      chapter 34|6 pages

      Understanding the Desktop Management Interface

      ByGilbert Held

      chapter 35|19 pages

      Managing the IT Procurement Process

      ByRobert L. Heckman

      chapter 36|7 pages

      An IT Asset Management Toolkit

      ByMartin F.Medeiros II

      chapter 37|5 pages

      How to Do Better Deals in Leasing

      ByJoe Auer

      part |2 pages

      SECTION VII CUSTOMER SUPPORT OPERATIONS

      chapter 38|8 pages

      Managing the User Interface

      ByAnn S. Angel

      chapter 39|7 pages

      Managing End-User Development

      ByJohn Windsor, Leon A. Kappelman, Carl Stephen Guynes

      chapter 40|7 pages

      Helping Users Help Themselves

      ByJames A. Larson, Carol L. Larson

      chapter 41|10 pages

      The Consultative Approach to Client Support

      ByKate Nasser

      chapter 42|11 pages

      End-User Computing Control Guidelines

      ByRon Hale

      chapter 43|18 pages

      Reviewing End-User Applications

      BySteven M. Williford

      part |3 pages

      SECTION VIII QUALITY CONTROL AND COMPUTER SECURITY

      chapter 44|12 pages

      The Basics of Computer System and Data Network Security

      ByC. Warren Axelrod

      chapter 45|9 pages

      Achieving Quality in Data Center Operations

      ByJeff Murrell

      chapter 46|9 pages

      Evaluating Platform Reliability and Measuring Its Dollar Value

      ByChris Rooke

      chapter 47|10 pages

      Understanding the Virus Threat

      ByGilbert Held

      chapter 48|7 pages

      E-Mail Security and Privacy

      ByStewart S. Miller

      chapter 49|17 pages

      Internet Security and Firewall Policies

      ByWilliam Hugh Murray

      chapter 50|23 pages

      Improving Quality with Software Metrics

      ByIan S. Hayes

      part |3 pages

      SECTION IX CONTINGENCY PLANNING

      chapter 51|10 pages

      Introduction to Data Center Recovery Planning

      ByEdward S.Devlin, Cole H.Emerson, and Leo A.Wrobel, Jr.

      chapter 52|15 pages

      Developing a Data Center Recovery Plan: Part I

      ByEdward S.Devlin, Cole H.Emerson, and Leo A.Wrobel, Jr.

      chapter 53|12 pages

      Developing a Data Center Recovery Plan: Part II

      ByEdward S.Devlin, Cole H.Emerson, and Leo A.Wrobel, Jr.

      chapter 54|7 pages

      Integrating LANs Into the Disaster Recovery Plan

      ByGilbert Held

      chapter 55|6 pages

      The Legal Issues of Disaster Recovery Planning

      ByTari Schreider

      chapter 56|5 pages

      Using Televaulting and Hot and Cold Sites for Disaster Recovery

      ByGilbert Held

      chapter 57|9 pages

      Data Processing and Communications Security During Recovery and Repair

      ByC. Warren Axelrod
      T&F logoTaylor & Francis Group logo
      • Policies
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
      • Journals
        • Taylor & Francis Online
        • CogentOA
        • Taylor & Francis Online
        • CogentOA
      • Corporate
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
      • Help & Contact
        • Students/Researchers
        • Librarians/Institutions
        • Students/Researchers
        • Librarians/Institutions
      • Connect with us

      Connect with us

      Registered in England & Wales No. 3099067
      5 Howick Place | London | SW1P 1WG © 2022 Informa UK Limited