Administration: Configuration and Security Administration: Configuration and Security

Administration: Configuration and Security

Publisher Description

The MicroStrategy Administration: Configuration and Security course provides an overview of the administrative tasks involved in configuring and securing a MicroStrategy environment and all the administration tasks a MicroStrategy administrator usually performs. The students will learn about topics such as connectivity, security, authentication, in-memory storage, clustering, and MicroStrategy Health Center. Students will also learn about the tuning and the basics of managing Intelligence Server memory usage.

GENRE
Computers & Internet
RELEASED
2013
September 25
LANGUAGE
EN
English
LENGTH
300
Pages
PUBLISHER
MicroStrategy Inc.
SELLER
MicroStrategy, Inc.
SIZE
11.4
MB

More Books Like This

System Administration Guide for MicroStrategy 10 System Administration Guide for MicroStrategy 10
2015
IBM FileNet Content Manager Implementation Best Practices and Recommendations IBM FileNet Content Manager Implementation Best Practices and Recommendations
2013
Microsoft System Center Operations Manager Field Experience Microsoft System Center Operations Manager Field Experience
2015
IBM Systems Director Navigator for i IBM Systems Director Navigator for i
2009
IBM FileNet P8 Platform and Architecture IBM FileNet P8 Platform and Architecture
2011
Getting Started with the IBM Smart Analytics System 9600 Getting Started with the IBM Smart Analytics System 9600
2011

More Books by MicroStrategy University

Freeform SQL Essentials Freeform SQL Essentials
2013
Advanced Data Warehousing Advanced Data Warehousing
2013
Project Design Essentials for MicroStrategy Architect Project Design Essentials for MicroStrategy Architect
2013
Document Essentials for MicroStrategy Report Services Document Essentials for MicroStrategy Report Services
2013
Advanced Project Design for MicroStrategy Architect Advanced Project Design for MicroStrategy Architect
2013
Mobile for App Developers Mobile for App Developers
2013

Customers Also Bought

The Myth of the Secure OS The Myth of the Secure OS
2012
Creating a Trusted Network for Homeland Security Creating a Trusted Network for Homeland Security
2012
Security Vs. Convenience Security Vs. Convenience
2012
Information Security Management - ITP 370 Information Security Management - ITP 370
2014
The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
2012
The State of Risk-Based Security Management The State of Risk-Based Security Management
2012