Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers (HP Technologies)

T

Technology understanding, 155–57, 378

Threats

denial of service (DoS), 298–99

forgery, 302

information disclosure, 301

mail relay, 302–3

overview, 298

spam, 298, 300–301

spoofing, 302

unauthorized access, 301

viruses, 300–301

See also Security

Torn write, 83

Transacted storage architecture, 156

Transaction logs, 79–81

access order, 80

backing up, 125

defined, 79

design best practice, 62

example contents, 82

files, 79, 80, 81

generation, 80

header format, 81

inside, 81–83

I/O, 79

reserved, 84–85

restoring, 133

truncating, 126

Transactions, 77

Triple-verification strategy, 180

Trustworthy Computing (TWC), 311

Категории