Administration: Configuration and Security Administration: Configuration and Security

Administration: Configuration and Security

MicroStrategy Administration: Configuration and Security

От издателя

The MicroStrategy Administration: Configuration and Security course provides an overview of the administrative tasks involved in configuring and securing a MicroStrategy environment and all the administration tasks a MicroStrategy administrator usually performs. The students will learn about topics such as connectivity, security, authentication, in-memory storage, clustering, and MicroStrategy Health Center. Students will also learn about the tuning and the basics of managing Intelligence Server memory usage.

ЖАНР
Компьютеры и Интернет
РЕЛИЗ
2014
28 июля
ЯЗЫК
EN
английский
ОБЪЕМ
291
стр.
ИЗДАТЕЛЬ
MicroStrategy Inc.
ПРОДАВЕЦ
MicroStrategy, Inc.
РАЗМЕР
11,7
МБ
System Administration Guide for MicroStrategy 10 System Administration Guide for MicroStrategy 10
2015
IBM FileNet Content Manager Implementation Best Practices and Recommendations IBM FileNet Content Manager Implementation Best Practices and Recommendations
2013
IBM Systems Director Navigator for i IBM Systems Director Navigator for i
2009
IBM FileNet P8 Platform and Architecture IBM FileNet P8 Platform and Architecture
2011
Microsoft System Center Operations Manager Field Experience Microsoft System Center Operations Manager Field Experience
2015
Building Cloud Apps with Microsoft Azure Building Cloud Apps with Microsoft Azure
2014
Freeform SQL Essentials Freeform SQL Essentials
2013
Advanced Data Warehousing Advanced Data Warehousing
2013
Project Design Essentials for MicroStrategy Architect Project Design Essentials for MicroStrategy Architect
2013
Administration: Configuration and Security Administration: Configuration and Security
2013
Document Essentials for MicroStrategy Report Services Document Essentials for MicroStrategy Report Services
2013
Advanced Project Design for MicroStrategy Architect Advanced Project Design for MicroStrategy Architect
2013
System Administration Guide for MicroStrategy 10 System Administration Guide for MicroStrategy 10
2015
The Myth of the Secure OS The Myth of the Secure OS
2012
How to Recover Files from USB Flash Drive on Mac or Windows How to Recover Files from USB Flash Drive on Mac or Windows
2013
Ultra HTML Reference Ultra HTML Reference
2016
CyberSecurity for the Digitally Challenged CyberSecurity for the Digitally Challenged
2020
The Quick Guide to Cloud Computing and Cyber Security The Quick Guide to Cloud Computing and Cyber Security
2013