Administration: Configuration and Security Administration: Configuration and Security

Administration: Configuration and Security

وصف الناشر

The MicroStrategy Administration: Configuration and Security course provides an overview of the administrative tasks involved in configuring and securing a MicroStrategy environment and all the administration tasks a MicroStrategy administrator usually performs. The students will learn about topics such as connectivity, security, authentication, in-memory storage, clustering, and MicroStrategy Health Center. Students will also learn about the tuning and the basics of managing Intelligence Server memory usage.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠١٣
٢٥ سبتمبر
اللغة
EN
الإنجليزية
عدد الصفحات
٣٠٠
الناشر
MicroStrategy Inc.
البائع
MicroStrategy, Inc.
الحجم
١١٫٤
‫م.ب.‬
Building Cloud Apps with Microsoft Azure Building Cloud Apps with Microsoft Azure
٢٠١٤
Evolve the Monolith to Microservices with Java and Node Evolve the Monolith to Microservices with Java and Node
٢٠١٦
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
٢٠١٣
Microservices Best Practices for Java Microservices Best Practices for Java
٢٠١٧
Introducing Windows Server 2016 Technical Preview, 1/e Introducing Windows Server 2016 Technical Preview, 1/e
٢٠١٦
Accelerating Modernization with Agile Integration Accelerating Modernization with Agile Integration
٢٠٢٠
Freeform SQL Essentials Freeform SQL Essentials
٢٠١٣
Advanced Data Warehousing Advanced Data Warehousing
٢٠١٣
Project Design Essentials for MicroStrategy Architect Project Design Essentials for MicroStrategy Architect
٢٠١٣
Document Essentials for MicroStrategy Report Services Document Essentials for MicroStrategy Report Services
٢٠١٣
Advanced Project Design for MicroStrategy Architect Advanced Project Design for MicroStrategy Architect
٢٠١٣
Mobile for App Developers Mobile for App Developers
٢٠١٣
The Myth of the Secure OS The Myth of the Secure OS
٢٠١٢
The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
٢٠١٢
Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
٢٠١٢
Network Centric Warfare Network Centric Warfare
١٩٩٩
Information Security Management - ITP 370 Information Security Management - ITP 370
٢٠١٤
The State of Risk-Based Security Management The State of Risk-Based Security Management
٢٠١٢