Skip to Main Content
Application Administrators Handbook
book

Application Administrators Handbook

by Kelly C Bourne
September 2013
Intermediate to advanced content levelIntermediate to advanced
626 pages
22h 15m
English
Morgan Kaufmann
Content preview from Application Administrators Handbook
Chapter 27

Third-Party Tools

Abstract

There are some third-party tools that are extremely useful but are too complex to build yourself. Some examples of these tools are server monitors, remote access, session sharing, editors, database access tools, browsers, data access, and project management tools.

Key Words

third-party tools; sysinternals utilities; remote session tools; session sharing tools; copy utilities; monitoring tools; WMIC; network monitoring tools; editors; file comparison; compression; encryption; screen capture tools; image editors; browsers; data access; project management

Some tools you can and should build for yourself, but others are significantly more complex and realistically can’t be built by the average Application ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Access Control, Authentication, and Public Key Infrastructure, 2nd Edition

Access Control, Authentication, and Public Key Infrastructure, 2nd Edition

Mike Chapple, Bill Ballad, Tricia Ballad, Erin Banks
The Disaster Recovery Handbook, 3rd Edition

The Disaster Recovery Handbook, 3rd Edition

Michael Wallace, Lawrence Webber

Publisher Resources

ISBN: 9780123985453