Book description
An in-depth guide on the leading Unified Communications platform
Microsoft Lync Server 2010 maximizes communication capabilities in the workplace like no other Unified Communications (UC) solution. Written by experts who know Lync Server inside and out, this comprehensive guide shows you step by step how to administer the newest and most robust version of Lync Server. Along with clear and detailed instructions, learning is aided by exercise problems and real-world examples of established Lync Server environments. You'll gain the skills you need to effectively deploy Lync Server 2010 and be on your way to gaining all the benefits UC has to offer.
Gets you up and running with Lync Server—whether you are migrating from Office Communications Server or new to Lync Server.
Walks you through all of the essential stages for deploying Lync Server
Shows integration with Microsoft Exchange Server and Microsoft SharePoint Server
Demonstrates how to monitor, diagnose, and troubleshoot problems more efficiently
Mastering Lync Server 2010 is a must-have resource for anyone looking to manage all the various forms of communication from one user interface.
Table of contents
-
Mastering: Microsoft® Lync™ Server 2010
- Copyright
- Dedication
- Acknowledgments
- About the Authors
- Contents
- Introduction
-
Part 1: Fundamentals
- Chapter 1: What’s in Lync? (1/6)
- Chapter 1: What’s in Lync? (2/6)
- Chapter 1: What’s in Lync? (3/6)
- Chapter 1: What’s in Lync? (4/6)
- Chapter 1: What’s in Lync? (5/6)
- Chapter 1: What’s in Lync? (6/6)
- Chapter 2: Standards and Protocols (1/6)
- Chapter 2: Standards and Protocols (2/6)
- Chapter 2: Standards and Protocols (3/6)
- Chapter 2: Standards and Protocols (4/6)
- Chapter 2: Standards and Protocols (5/6)
- Chapter 2: Standards and Protocols (6/6)
- Chapter 3: Security (1/7)
- Chapter 3: Security (2/7)
- Chapter 3: Security (3/7)
- Chapter 3: Security (4/7)
- Chapter 3: Security (5/7)
- Chapter 3: Security (6/7)
- Chapter 3: Security (7/7)
- Chapter 4: Clients (1/6)
- Chapter 4: Clients (2/6)
- Chapter 4: Clients (3/6)
- Chapter 4: Clients (4/6)
- Chapter 4: Clients (5/6)
- Chapter 4: Clients (6/6)
-
Part 2: Getting Lync Up and Running
- Chapter 5: Planning Your Deployment (1/9)
- Chapter 5: Planning Your Deployment (2/9)
- Chapter 5: Planning Your Deployment (3/9)
- Chapter 5: Planning Your Deployment (4/9)
- Chapter 5: Planning Your Deployment (5/9)
- Chapter 5: Planning Your Deployment (6/9)
- Chapter 5: Planning Your Deployment (7/9)
- Chapter 5: Planning Your Deployment (8/9)
- Chapter 5: Planning Your Deployment (9/9)
- Chapter 6: Installation (1/12)
- Chapter 6: Installation (2/12)
- Chapter 6: Installation (3/12)
- Chapter 6: Installation (4/12)
- Chapter 6: Installation (5/12)
- Chapter 6: Installation (6/12)
- Chapter 6: Installation (7/12)
- Chapter 6: Installation (8/12)
- Chapter 6: Installation (9/12)
- Chapter 6: Installation (10/12)
- Chapter 6: Installation (11/12)
- Chapter 6: Installation (12/12)
- Chapter 7: Migration and Upgrades (1/8)
- Chapter 7: Migration and Upgrades (2/8)
- Chapter 7: Migration and Upgrades (3/8)
- Chapter 7: Migration and Upgrades (4/8)
- Chapter 7: Migration and Upgrades (5/8)
- Chapter 7: Migration and Upgrades (6/8)
- Chapter 7: Migration and Upgrades (7/8)
- Chapter 7: Migration and Upgrades (8/8)
-
Part 3: Administration
- Chapter 8: Introduction to PowerShell and the Lync Management Shell (1/8)
- Chapter 8: Introduction to PowerShell and the Lync Management Shell (2/8)
- Chapter 8: Introduction to PowerShell and the Lync Management Shell (3/8)
- Chapter 8: Introduction to PowerShell and the Lync Management Shell (4/8)
- Chapter 8: Introduction to PowerShell and the Lync Management Shell (5/8)
- Chapter 8: Introduction to PowerShell and the Lync Management Shell (6/8)
- Chapter 8: Introduction to PowerShell and the Lync Management Shell (7/8)
- Chapter 8: Introduction to PowerShell and the Lync Management Shell (8/8)
- Chapter 9: Role-Based Access Control (1/5)
- Chapter 9: Role-Based Access Control (2/5)
- Chapter 9: Role-Based Access Control (3/5)
- Chapter 9: Role-Based Access Control (4/5)
- Chapter 9: Role-Based Access Control (5/5)
- Chapter 10: User Administration (1/7)
- Chapter 10: User Administration (2/7)
- Chapter 10: User Administration (3/7)
- Chapter 10: User Administration (4/7)
- Chapter 10: User Administration (5/7)
- Chapter 10: User Administration (6/7)
- Chapter 10: User Administration (7/7)
- Chapter 11: Archiving and Monitoring (1/7)
- Chapter 11: Archiving and Monitoring (2/7)
- Chapter 11: Archiving and Monitoring (3/7)
- Chapter 11: Archiving and Monitoring (4/7)
- Chapter 11: Archiving and Monitoring (5/7)
- Chapter 11: Archiving and Monitoring (6/7)
- Chapter 11: Archiving and Monitoring (7/7)
- Chapter 12: Troubleshooting (1/6)
- Chapter 12: Troubleshooting (2/6)
- Chapter 12: Troubleshooting (3/6)
- Chapter 12: Troubleshooting (4/6)
- Chapter 12: Troubleshooting (5/6)
- Chapter 12: Troubleshooting (6/6)
-
Part 4: Voice
- Chapter 13: Getting Started with Voice (1/6)
- Chapter 13: Getting Started with Voice (2/6)
- Chapter 13: Getting Started with Voice (3/6)
- Chapter 13: Getting Started with Voice (4/6)
- Chapter 13: Getting Started with Voice (5/6)
- Chapter 13: Getting Started with Voice (6/6)
- Chapter 14: Call Admission Control (1/8)
- Chapter 14: Call Admission Control (2/8)
- Chapter 14: Call Admission Control (3/8)
- Chapter 14: Call Admission Control (4/8)
- Chapter 14: Call Admission Control (5/8)
- Chapter 14: Call Admission Control (6/8)
- Chapter 14: Call Admission Control (7/8)
- Chapter 14: Call Admission Control (8/8)
- Chapter 15: E911 and Location Information Services (LIS) (1/4)
- Chapter 15: E911 and Location Information Services (LIS) (2/4)
- Chapter 15: E911 and Location Information Services (LIS) (3/4)
- Chapter 15: E911 and Location Information Services (LIS) (4/4)
- Chapter 16: Extended Voice Functionality (1/9)
- Chapter 16: Extended Voice Functionality (2/9)
- Chapter 16: Extended Voice Functionality (3/9)
- Chapter 16: Extended Voice Functionality (4/9)
- Chapter 16: Extended Voice Functionality (5/9)
- Chapter 16: Extended Voice Functionality (6/9)
- Chapter 16: Extended Voice Functionality (7/9)
- Chapter 16: Extended Voice Functionality (8/9)
- Chapter 16: Extended Voice Functionality (9/9)
-
Part 5: Integration
- Chapter 17: Exchange, SharePoint, and Group Chat (1/8)
- Chapter 17: Exchange, SharePoint, and Group Chat (2/8)
- Chapter 17: Exchange, SharePoint, and Group Chat (3/8)
- Chapter 17: Exchange, SharePoint, and Group Chat (4/8)
- Chapter 17: Exchange, SharePoint, and Group Chat (5/8)
- Chapter 17: Exchange, SharePoint, and Group Chat (6/8)
- Chapter 17: Exchange, SharePoint, and Group Chat (7/8)
- Chapter 17: Exchange, SharePoint, and Group Chat (8/8)
- Chapter 18: Third-Party Integration (1/9)
- Chapter 18: Third-Party Integration (2/9)
- Chapter 18: Third-Party Integration (3/9)
- Chapter 18: Third-Party Integration (4/9)
- Chapter 18: Third-Party Integration (5/9)
- Chapter 18: Third-Party Integration (6/9)
- Chapter 18: Third-Party Integration (7/9)
- Chapter 18: Third-Party Integration (8/9)
-
Chapter 18: Third-Party Integration (9/9)
- Connecting to Telephony Systems via a Gateway
- Integrating with Your PBX
- Using RCC to Integrate with Your PBX
- Deploying a Survivable Branch Appliance
- Connecting to Other External Systems via an XMPP Gateway
- Integrating with Hardware Video Conferencing Platforms
- Using Third-Party Software Enhancements
- The Bottom Line
- Part 6: Mobile Devices
-
Appendix A: The Bottom Line
- Chapter 1: What’s in Lync?
- Chapter 2: Standards and Protocols
- Chapter 3: Security
- Chapter 4: Clients
- Chapter 5: Planning Your Deployment
- Chapter 6: Installation
- Chapter 7: Migration and Upgrades
- Chapter 8: Introduction to PowerShell and the Lync Management Shell
- Chapter 9: Role-Based Access Control
- Chapter 10: User Administration
- Chapter 11: Archiving and Monitoring
- Chapter 12: Troubleshooting
- Chapter 13: Getting Started with Voice
- Chapter 14: Call Admission Control
- Chapter 15: E911 and Location Information Services (LIS)
- Chapter 16: Extended Voice Functionality
- Chapter 17: Exchange, SharePoint, and Group Chat
- Chapter 18: Third-Party Integration
- Chapter 19: Mobile Devices
- Appendix B: Adoption
- Index (1/6)
- Index (2/6)
- Index (3/6)
- Index (4/6)
- Index (5/6)
- Index (6/6)
Product information
- Title: Mastering: Microsoft® Lync™ Server 2010
- Author(s):
- Release date: February 2012
- Publisher(s): Sybex
- ISBN: 9781118089538
You might also like
book
WordPress® Bible, Second Edition
Get the latest word on the biggest self-hosted blogging tool on the market. Within a week …
book
OpenStack Trove Essentials
Build your own cloud based Database as a Service using OpenStack Trove About This Book Familiarize …
video
What You Need to Know About Modern Hashing
A basic review of hashing.
audiobook
The Renaissance Society: How the Shift from Dream Society to the Age of Individual Control Will Change the Way You Do Business
A BOLD NEW VISION FOR THE FUTURE OF BUSINESS, FROM THE BESTSELLING AUTHOR OF THE DREAM …