Symantec.com > Enterprise > Yellow Books

Symantec Yellow Books

Symantec Yellow Books provide technical know-how to IT professionals in Symantec's customer and partner communities—and to the technical marketplace in general. Written to show how to solve real-world business and technical problems using Symantec solutions, these books include best-practice recommendations as well as detailed information on installation, configuration, and product integration.
Symantec Yellow Books

Available Yellow Books

book cover
Enterprise Messaging Management for Microsoft Exchange
A comprehensive approach to effectively managing the email environment.
This book is intended for IT personnel responsible for designing or implementing email-oriented solutions, Symantec business partners helping customers deploy these solutions, and Symantec personnel supporting either group. After reading this book the reader should understand the challenges surrounding an Exchange environment and the Symantec capabilities to solve them.
book cover
Secure Business Continuity
Strategies for business continuity management and disaster recovery.
This book provides business and technology leaders viable strategies for recovering data after a disastrous event. The book presents rigorous methodology; one prescribed by business continuity management (BCM) principles, to help with information technology disaster recovery (IT DR). In addition, the book shows IT professionals how to automate recovery procedures while simultaneously securing data and alternate sites from unauthorized use. Also discussed are the techniques that many organizations consider the best automation and testing practices offered by BCM.
book cover
The Role of IT in Achieving Compliance
Strategies for alignment of IT controls with regulatory compliance and business needs.
This book provides CIOs, business stakeholders, IT managers and administrators information about how to meet the business requirements set forth by multiple functions involved in the compliance process. This includes creating a sound control environment, which supports the business and addresses the IT risks in a more efficient manner. Although many of the regulations and examples highlighted in this book focus on the financial industry for the US and Western Europe, the same processes model and methodology, technology solutions, and best practices recommendations can be applied to most regulated industries.
book cover
Using Dynamic Storage Tiering
How Veritas Storage Foundation helps you get the most from multi-tier online storage.
This book describes how Dynamic Storage Tiering works, shows how administrators can use it to automatically optimize online storage utilization, and presents some common use cases. It is a must for architects and administrators concerned with controlling storage cost without sacrificing the quality of service delivered to applications and users.
book cover
Using Local Copy Services
How Veritas Storage Foundation snapshot facilities protect data, reduce costs, and enhance the quality of IT service.
This book describes how Storage Foundation's five snapshot facilities work, how they are commonly used, and how to implement them. The five facilities are: split mirror snapshots, space-optimized instant snapshots, full-sized instant snapshots, snapshot file systems, and storage checkpoints.
book cover
Standardizing Storage Management
Using Veritas Storage Foundation to increase effectiveness of storage management across the enterprise.
This book describes how to standardize storage configuration and administration across all of a data center's platforms to result in better quality of service at lower administrative cost. Storage architects, administrators, integrators, and consultants need to know about the Storage Foundation and how it can reduce their cost to deliver service.

We welcome your feedback so we can continue to improve and deliver the technical content of most value to you.
Data Center Foundation