Symantec Yellow Books provide technical know-how to IT professionals in Symantec's customer and partner communities—and to the technical marketplace in general. Written to show how to solve real-world business and technical problems using Symantec solutions, these books include best-practice recommendations as well as detailed information on installation, configuration, and product integration.
Available Yellow Books
Enterprise Messaging Management for Microsoft Exchange A comprehensive approach to effectively managing the email environment.
This book is intended for IT personnel responsible for designing or implementing email-oriented solutions, Symantec business partners helping customers deploy these solutions, and Symantec personnel supporting either group. After reading this book the reader should understand the challenges surrounding an Exchange environment and the Symantec capabilities to solve them.
Secure Business Continuity Strategies for business continuity management and disaster recovery.
This book provides business and technology leaders viable strategies for recovering data after a disastrous event. The book presents rigorous methodology; one prescribed by business continuity management (BCM) principles, to help with information technology disaster recovery (IT DR). In addition, the book shows IT professionals how to automate recovery procedures while simultaneously securing data and alternate sites from unauthorized use. Also discussed are the techniques that many organizations consider the best automation and testing practices offered by BCM.
The Role of IT in Achieving Compliance Strategies for alignment of IT controls with regulatory compliance and business needs.
This book provides CIOs, business stakeholders, IT managers and administrators information about how to meet the business requirements set forth by multiple functions involved in the compliance process. This includes creating a sound control environment, which supports the business and addresses the IT risks in a more efficient manner. Although many of the regulations and examples highlighted in this book focus on the financial industry for the US and Western Europe, the same processes model and methodology, technology solutions, and best practices recommendations can be applied to most regulated industries.
Using Dynamic Storage Tiering How Veritas Storage Foundation helps you get the most from multi-tier online storage.
This book describes how Dynamic Storage Tiering works, shows how administrators can use it to automatically optimize online storage utilization, and presents some common use cases. It is a must for architects and administrators concerned with controlling storage cost without sacrificing the quality of service delivered to applications and users.
Using Local Copy Services How Veritas Storage Foundation snapshot facilities protect data, reduce costs, and enhance the quality of IT service.
This book describes how Storage Foundation's five snapshot facilities work, how they are commonly used, and how to implement them. The five facilities are: split mirror snapshots, space-optimized instant snapshots, full-sized instant snapshots, snapshot file systems, and storage checkpoints.
Standardizing Storage Management Using Veritas Storage Foundation to increase effectiveness of storage management across the enterprise.
This book describes how to standardize storage configuration and administration across all of a data center's platforms to result in better quality of service at lower administrative cost. Storage architects, administrators, integrators, and consultants need to know about the Storage Foundation and how it can reduce their cost to deliver service.