ISBN | 9780735708785(0735708789) |
---|---|
Âʼö | ÁغñÁß |
¾ð¾î | English |
Å©±â | 152(W) X 222(H) X 32(T) (mm) |
Á¦º»ÇüÅ | Paperback |
Textual Format | Computer Applications |
¸®µùÁö¼ö Level | Professional |
Introduction | p. 1 |
Who Should Read This Book | p. 1 |
How This Book Helps You | p. 1 |
How To Use This Book | p. 1 |
What the Exams Cover | p. 2 |
Hardware and Software Recommended for Preparation | p. 3 |
What's Important to Know about the Exams | |
Maintaining Domino R5 Servers and Users: Exam 520 | |
Monitoring, Maintaining, and Troubleshooting Domino Applications | p. 9 |
Working with Domino Databases | p. 10 |
Upgrading Databases | p. 10 |
Adding and Moving Databases | p. 13 |
Deleting Databases | p. 16 |
Monitoring and Repairing Databases | p. 18 |
Backing Up and Restoring Databases | p. 25 |
Monitoring, Modifying, and Troubleshooting Database Access Control | p. 29 |
Optimizing and Troubleshooting Application Performance Problems | p. 33 |
Working with Domino Agents | p. 38 |
Controlling Agent Execution | p. 38 |
Understanding the Agent Manager | p. 42 |
Improving Agent Manager Performance | p. 42 |
Tools for Troubleshooting the Agent Manager and Agents | p. 46 |
Monitoring, Maintaining, and Troubleshooting Calendaring and Scheduling | p. 47 |
The Domino Server Tasks that Make Calendaring and Scheduling Run | p. 48 |
Troubleshooting Calendaring and Scheduling Problems | p. 48 |
Working with Domino Log Files | p. 50 |
Working with the Domino Web Server Log (DOMLOG.NSF) | p. 53 |
Monitoring, Maintaining, and Troubleshooting Domino Directories, Users, and Groups | p. 59 |
Localizing Address Books in Multi-Cultural Settings | p. 60 |
Maintaining a Directory Configuration | p. 60 |
Using the Domino Directory Profile | p. 61 |
Maintaining Groups | p. 64 |
Editing a Group | p. 64 |
How to Delete a Group | p. 66 |
Using the Manage Groups Tool to Manage Groups | p. 66 |
Maintaining Notes User IDs | p. 68 |
Re-Certifying a User ID | p. 68 |
Using the Tools Pane to Move a User's Mail File | p. 70 |
Renaming Users | p. 70 |
Recovering IDs or Passwords | p. 71 |
Obtaining an Administration Password for ID File Recovery | p. 72 |
Monitoring/Maintaining Users | p. 73 |
Defining Default Settings for Users | p. 73 |
Registering Users | p. 73 |
Migrating Users from External Mail Systems or Directories | p. 75 |
Deleting a User Name | p. 75 |
Upgrading a User's Mail File | p. 77 |
Troubleshooting Directory Problems | p. 78 |
Replication Conflicts | p. 78 |
Save Conflicts | p. 78 |
Stopping the Occurrence of Conflicts | p. 79 |
Conflict Management | p. 79 |
Using Conflict Documents | p. 80 |
Troubleshooting User Problems | p. 80 |
Monitoring, Maintaining, and Troubleshooting Domino Messaging and Replication | p. 85 |
Monitoring and Maintaining Replication | p. 86 |
Using the Notes Log | p. 86 |
Viewing the Database Replication History | p. 86 |
Creating Replication Monitors | p. 87 |
Using the Database Analysis Tool to Monitor Replication | p. 88 |
How to Force Replication | p. 90 |
Using the Server Console | p. 90 |
Using the Replicate Command Within the Domino Administrator | p. 90 |
Forcing Replication from Within the Database | p. 91 |
Replicating Design Changes | p. 91 |
Refreshing or Replacing a Database Design | p. 91 |
Using Replication to Update a Database's Design | p. 92 |
Resolving Replication and Save Conflicts | p. 93 |
How Conflicts Occur | p. 93 |
Consolidating Replication or Save Conflicts | p. 94 |
Preventing Replication or Save Conflicts | p. 95 |
Troubleshooting Replication Problems | p. 95 |
Total Replication Failure | p. 95 |
A Database Replica Does Not Contain All the Documents It Should | p. 96 |
Database Replicas Are Different Sizes | p. 97 |
Deleted Documents Reappear | p. 99 |
Monitoring and Maintaining Mail Routing | p. 100 |
Tracking Mail Messages | p. 100 |
Generating Mail Usage Reports | p. 102 |
Creating a Mail Probe | p. 103 |
How to Force Mail Routing | p. 105 |
Using the Route Command at the Server Console | p. 105 |
Routing Mail with the Domino Administrator | p. 105 |
Troubleshooting Mail Routing Problems | p. 106 |
Checking Mail Routing Topology Maps | p. 106 |
Analyzing Delivery Failure Reports | p. 106 |
Tracing the Mail Delivery Route | p. 107 |
Checking the Domino Directory for Errors that Affect Mail Routing | p. 107 |
Checking the Workstations of Users Involved in Sending and/or Receiving Mail | p. 109 |
Checking the Server for Errors that Affect Mail | p. 109 |
Checking the Shared Mail Setup | p. 110 |
Migrating to Domino from Other Mail Systems | p. 111 |
Importing Users from a Foreign Directory | p. 111 |
Case Study: Migrating Microsoft Exchange Users | p. 113 |
Monitoring, Maintaining, and Troubleshooting Domino Servers | p. 119 |
Maintaining Domino Server IDs | p. 120 |
Monitoring Server Resources | p. 120 |
Monitoring Server Tasks | p. 121 |
Monitoring/Maintaining Servers | p. 123 |
The Monitoring Tab | p. 123 |
The Status Tab | p. 126 |
Monitoring/Maintaining Web Services | p. 128 |
Monitoring/Maintaining/Modifying Server Access Control | p. 130 |
Reconfiguring/Remapping Directories and Links | p. 131 |
Running Program Documents | p. 133 |
Troubleshooting Administration Process Problems | p. 134 |
Troubleshooting Cluster Problems | p. 136 |
Troubleshooting Partition Problems | p. 138 |
Troubleshooting Server Access Problems | p. 139 |
Monitoring, Maintaining, and Troubleshooting Domino Systems | p. 145 |
Maintenance of Domino Certifier IDs | p. 146 |
Certifier ID Location | p. 146 |
Certifier ID Properties | p. 146 |
Change Certifier ID Password | p. 147 |
Recertifying the Certifier ID | p. 147 |
Add Multiple Passwords to the Certifier ID | p. 148 |
Editing Multiple Passwords on the Certifier ID | p. 149 |
Deleting Multiple Passwords on the Certifier ID | p. 149 |
Recovery Information | p. 150 |
Modification and Maintenance of Connectivity | p. 151 |
Configure Port Information from Domino Administrator | p. 151 |
Monitor Connectivity | p. 154 |
Probes | p. 154 |
ISpy Server Task | p. 155 |
Monitoring and Maintenance of Domain Access | p. 156 |
Physical Security | p. 156 |
Operating System Level Security | p. 157 |
Controlling Access to the Domino Server | p. 157 |
User and Group Types | p. 160 |
Monitoring Domain Access | p. 162 |
Tools to Monitor Domain Access | p. 163 |
Monitoring and Maintaining Domains | p. 164 |
Administration Preferences | p. 164 |
Domino Administrator Database | p. 165 |
Administration Execution Control List | p. 165 |
Signing Design Elements | p. 166 |
Data Backup | p. 166 |
Transaction Logging | p. 167 |
Database Instance ID | p. 167 |
Actions Affecting Transaction Logging | p. 168 |
Advanced Database Properties and DBIID | p. 169 |
Editing the Transaction Logging Tab | p. 170 |
Setting Up Transaction Logging | p. 171 |
Establish Backup Policy | p. 173 |
Monitoring and Maintenance of the Domino System | p. 173 |
Domino Integration with the NT Operating System | p. 173 |
Basic System Monitoring Using Native Notes Tools | p. 174 |
Log Analysis | p. 175 |
Server Properties | p. 176 |
Domino Server Monitor | p. 176 |
The Administration Client Server, Statistics Tab | p. 177 |
Components of Active System Monitoring | p. 178 |
Statistic Collector Task | p. 178 |
Event Monitor Task | p. 179 |
Configuring Active System Monitoring | p. 181 |
Configuring the Statistic Collector | p. 182 |
Statistic Thresholds | p. 183 |
Configuring Event Notification Documents | p. 183 |
Monitors | p. 185 |
Web Administrator | p. 186 |
Troubleshooting Domain Access Problems | p. 187 |
Troubleshooting Network and Protocol Problems | p. 189 |
Testing OS Connectivity | p. 189 |
Testing Connectivity from Within an R5 Client | p. 191 |
Troubleshooting Modem Problems | p. 192 |
Implementing a Domino R5 Infrastructure: Exam | p. 521 |
Creating/Registering System Resources | p. 199 |
Creating/Registering Certificates | p. 200 |
International Versus North American IDs | p. 200 |
Hierarchical Versus Flat IDs | p. 200 |
Making the Organizational Certifier | p. 201 |
Organizational Units | p. 202 |
The Cert Log | p. 203 |
Creating OUs | p. 203 |
Creating Groups | p. 205 |
Creating/Registering Servers | p. 206 |
Creating/Registering Users | p. 208 |
Basics | p. 210 |
p. 211 | |
ID Info | p. 213 |
Groups | p. 213 |
Other | p. 214 |
Three Buttons | p. 214 |
More Efficient Registration | p. 215 |
Duplicate Names in the Directory | p. 216 |
Re-Certifying an ID | p. 216 |
ID Recovery | p. 217 |
Alternate Name Certifier | p. 217 |
Renaming Users | p. 217 |
Moving a Mail File | p. 218 |
Installation | p. 221 |
Installing Servers | p. 222 |
Installing Software | p. 222 |
Setting Up a First Server | p. 229 |
Setting Up Additional Servers | p. 230 |
Functions at Server Startup | p. 231 |
Server Tasks | p. 232 |
The NOTES.INI File Defined | p. 233 |
The Server Record | p. 238 |
Installing Clients | p. 239 |
Installing the Software | p. 239 |
Connecting to a server | p. 240 |
Further Settings | p. 241 |
Creating Additional Connections | p. 242 |
Changing Port Settings | p. 242 |
Location Record | p. 242 |
Connection Record | p. 244 |
Setting Up Infrastructure, Servers, and Workstations | p. 247 |
Setting Up Infrastructure Domains | p. 248 |
Setting Up Infrastructure Domino Named Networks | p. 250 |
Setting Up Infrastructure Protocols/Ports | p. 251 |
Setting Up Servers for Different Functions | p. 253 |
Mail Server | p. 253 |
Applications Server | p. 253 |
Passthru Server | p. 254 |
Hub Server | p. 255 |
External Communication Server | p. 256 |
Setting Up Servers for Load Balancing and Failover | p. 256 |
Setting Up Servers for Web/Internet Connectivity | p. 256 |
Setting Up Servers of Different Types | p. 259 |
Domino Mail Server | p. 260 |
Domino Application Server | p. 260 |
Domino Enterprise Server | p. 261 |
Running Programs Automatically | p. 261 |
Setting Up Workstations for Different Clients | p. 262 |
Setting Up Workstations for Different Locations | p. 262 |
Standard Locations for the Client | p. 262 |
Adding New Location Records | p. 264 |
Directory Catalog | p. 265 |
Setting Up/Configuring Database Resources | p. 267 |
Setting Up/Configuring Directories (Domino, Catalog, Assistance) | p. 268 |
The Domino Directory | p. 268 |
The Directory Catalog | p. 268 |
Directory Assistance | p. 272 |
Setting Up/Configuring Calendaring and Scheduling | p. 272 |
Setting Up/Configuring ID Backup and Recovery | p. 274 |
Setting Up/Configuring License Tracking (Certlog) | p. 277 |
Setting Up/Configuring Transaction Logging | p. 278 |
There Is an Invalid Transaction Log Path | p. 282 |
Transaction Log Is Damaged or Corrupt | p. 282 |
Setting Up/Configuring Distribution and Monitoring | p. 285 |
Setting Up/Configuring Message Distribution Performance Enhancements (Multiple Routers, Multiple Mail.Box Files) | p. 286 |
Setting Up/Configuring Message Distribution Tracking | p. 289 |
Setting Up Message Tracking | p. 290 |
Setting Up/Configuring Message Distribution Using Force | p. 293 |
Setting Up/Configuring Message Distribution Using Non-Notes/Internet-Based Mail | p. 294 |
Setting Up/Configuring Message Distribution Using Notes-Based Mail (Shared, Message-Based) | p. 295 |
Setting Up/Configuring Message Distribution Using Schedules | p. 296 |
Setting Up/Configuring Messaging Distribution Using a Mixed Messaging System | p. 297 |
Setting Up/Configuring Monitoring Administration Tools (Preferences, Logs, Web-Based, Remote) | p. 298 |
Setting Up/Configuring Monitoring Monitors (ACL, File, STAT, Probes) | p. 300 |
ACL Change Monitor | p. 300 |
Statistics Monitor | p. 301 |
Replication Monitor | p. 302 |
File Monitor | p. 303 |
Setting Up/Configuring Monitoring Statistics (STATS) | p. 304 |
Setting Up/Configuring Replication Distribution Through Force | p. 305 |
Setting Up/Configuring Replication Distribution Through Scheduling | p. 306 |
Setting Up/Configuring Domino Infrastructure Security | p. 309 |
Setting Up Authentication | p. 310 |
Setting Up/Configuring Agent Access | p. 310 |
The Access Control List | p. 311 |
The Server Document | p. 312 |
Setting Up/Configuring Database Access | p. 312 |
Setting Up/Configuring Forms and Views Access | p. 318 |
Setting Up/Configuring Document Access | p. 319 |
Setting Up/Configuring File Security | p. 319 |
Setting Up/Configuring Server Access | p. 321 |
Security Settings | p. 322 |
Web Security Access | p. 322 |
Server Access | p. 323 |
Passthru Use | p. 324 |
Setting Up/Configuring User Access | p. 325 |
Setting Up/Configuring Security for the Domino Directory | p. 325 |
Deploying Domino R5 Applications: Exam | p. 522 |
Database Architecture | p. 331 |
Deploy Applications Based on Backward Compatibility | p. 333 |
Deploy Applications Based on Coding | p. 333 |
Deploy Applications Based on Coding: Formula Language | p. 335 |
Deploy Applications Based on Coding: JavaScript | p. 335 |
Deploy Applications Based on Coding: Java | p. 336 |
Deploy Applications Based on Coding: LotusScript | p. 337 |
Deploy Applications Based on Design Elements | p. 337 |
Deploy Applications Based on Design Elements: Actions | p. 338 |
Deploy Applications Based on Design Elements: Fields | p. 338 |
Deploy Applications Based on Design Elements: Forms and Subforms | p. 340 |
Deploy Applications Based on Design Elements: Graphics | p. 340 |
Deploy Applications Based on Design Elements: OLE | p. 341 |
Deploy Applications Based on Design Elements: Sections | p. 342 |
Deploy Applications Based on Design Elements: Shared Versus Non-Shared | p. 342 |
Deploy Applications Based on How Attachments Are Handled | p. 342 |
Deploy Applications Based on Why Elements Are in the NSF | p. 343 |
Deploy Applications Based on Document Characteristics | p. 343 |
Deploy Applications Based on Document Characteristics: Archiving | p. 343 |
Deploy Applications Based on Document Characteristics: Author Access | p. 344 |
Deploy Applications Based on Document Characteristics: Reader Access | p. 344 |
Deploy Applications Based on Document Characteristics: View Hierarchies | p. 344 |
Deploy HTML-Based Applications | p. 345 |
Integrate with Host Data | p. 345 |
Design Secure Applications | p. 346 |
Secure Applications, User Authentication: Notes ID | p. 346 |
Secure Applications, User Authentication: Web | p. 346 |
Secure Applications: ACLs for Replication | p. 347 |
Secure Applications: Consistent ACLs | p. 348 |
Secure Applications: Authors | p. 348 |
Secure Applications: Groups | p. 348 |
Secure Applications: Read Only Views | p. 349 |
Secure Applications: Readers Fields | p. 349 |
Secure Applications: Roles | p. 349 |
Secure Applications: Sections | p. 349 |
Secure Applications: Security Versus Deterrence | p. 350 |
Secure Applications: Web Users | p. 350 |
Domino Infrastructure | p. 353 |
Capacity Plan Based on Application Size | p. 355 |
Capacity Plan Based on Indexes | p. 356 |
Capacity Plan Based on Performance | p. 358 |
Capacity Plan Based on Server Size | p. 360 |
Capacity Plan Based on Sorting, Categorizing | p. 360 |
Deploy Applications Based on Access | p. 361 |
Deploy Applications Based on Connectivity | p. 361 |
Deploy Applications Based on Replication Fundamentals | p. 362 |
Deploy Applications Based on Routing Fundamentals | p. 363 |
Sending Routed Documents | p. 363 |
Receiving Routed Documents | p. 363 |
Deploy Based on Impact of Replication on ACLs | p. 364 |
Deploy Based on Impact of Routing on Remotes Users | p. 364 |
Deploy Based on License Types | p. 365 |
Deploy Based on Server's Involvement in Replication | p. 366 |
Deploy for Web Integration | p. 367 |
Deploy Server-Based Applications | p. 367 |
Deploy Server-Based Applications: HTML | p. 368 |
Deploy Server-Based Applications: Running Background Agents | p. 369 |
Deploy Server-Based Applications: Securing Agents | p. 370 |
Distribute Application Design Changes Based on Design | p. 370 |
Distribute Application Design Changes Based on Impact on ACL | p. 372 |
Distribute Application Design Changes | p. 372 |
Distribute Application Design Changes Based on Replication | p. 373 |
Secure Domino Applications Based on Notes Authentication | p. 373 |
Secure Domino Applications Based on Web Authentication | p. 374 |
Inside Exams 520, 521, 522 | p. 377 |
Insider's Spin | p. 379 |
Preparing for the Exam Content: Being as Prepared as Possible | p. 382 |
Preparing for Exam Content: The Louts Vantage Point | p. 383 |
The Timeframe of the Exam | p. 384 |
Familiarize Yourself with All Available Resources | p. 386 |
Booking and Sitting the Exam | p. 386 |
Getting Inside the Questions | p. 388 |
A Few Last Thoughts | p. 389 |
Sample Test Questions: Exam 520 | p. 391 |
Questions | p. 392 |
Answers and Explanations | p. 401 |
Sample Test Questions: Exam 521 | p. 409 |
Questions | p. 410 |
Answers and Explanations | p. 419 |
Sample Test Questions: Exam 522 | p. 427 |
Questions | p. 428 |
Answers and Explanations | p. 437 |
Index | p. 445 |
Table of Contents provided by Syndetics. All Rights Reserved. |
¡Ø »óǰ ¼³¸í¿¡ ¹Ýǰ/±³È¯ °ü·ÃÇÑ ¾È³»°¡ ÀÖ´Â °æ¿ì ±× ³»¿ëÀ» ¿ì¼±À¸·Î ÇÕ´Ï´Ù. (¾÷ü »çÁ¤¿¡ µû¶ó ´Þ¶óÁú ¼ö ÀÖ½À´Ï´Ù.)
¹Ýǰ/±³È¯¹æ¹ý | ¸¶ÀÌ·ë > ÁÖ¹®°ü¸® > ÁÖ¹®/¹è¼Û³»¿ª > ÁÖ¹®Á¶È¸ > ¹Ýǰ/±³È¯½Åû , [1:1»ó´ã>¹Ýǰ/±³È¯/ȯºÒ] ¶Ç´Â °í°´¼¾ÅÍ (1544-1900) ¡Ø ¿ÀǸ¶ÄÏ, ÇØ¿Ü¹è¼ÛÁÖ¹®, ±âÇÁÆ® ÁÖ¹®½Ã [1:1»ó´ã>¹Ýǰ/±³È¯/ȯºÒ] ¶Ç´Â °í°´¼¾ÅÍ (1544-1900) |
---|---|
¹Ýǰ/±³È¯°¡´É ±â°£ | º¯½É¹ÝǰÀÇ °æ¿ì ¼ö·É ÈÄ 7ÀÏ À̳», »óǰÀÇ °áÇÔ ¹× °è¾à³»¿ë°ú ´Ù¸¦ °æ¿ì ¹®Á¦Á¡ ¹ß°ß ÈÄ 30ÀÏ À̳» |
¹Ýǰ/±³È¯ºñ¿ë | º¯½É ȤÀº ±¸¸ÅÂø¿À·Î ÀÎÇÑ ¹Ýǰ/±³È¯Àº ¹Ý¼Û·á °í°´ ºÎ´ã |
¹Ýǰ/±³È¯ ºÒ°¡ »çÀ¯ |
|
»óǰ ǰÀý | °ø±Þ»ç(ÃâÆÇ»ç) Àç°í »çÁ¤¿¡ ÀÇÇØ ǰÀý/Áö¿¬µÉ ¼ö ÀÖÀ¸¸ç, ǰÀý ½Ã °ü·Ã »çÇ׿¡ ´ëÇØ¼´Â À̸ÞÀϰú ¹®ÀÚ·Î ¾È³»µå¸®°Ú½À´Ï´Ù. |
¼ÒºñÀÚ ÇÇÇØº¸»ó ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó |
|