LEADER 05215nam 2200673 450 001 9910464141303321 005 20200520144314.0 010 $a1-78217-348-X 035 $a(CKB)2670000000591664 035 $a(EBL)1935703 035 $a(SSID)ssj0001434882 035 $a(PQKBManifestationID)12012491 035 $a(PQKBTitleCode)TC0001434882 035 $a(PQKBWorkID)11427946 035 $a(PQKB)11687417 035 $a(MiAaPQ)EBC1935703 035 $a(CaSebORM)9781782173472 035 $a(PPN)228046874 035 $a(Au-PeEL)EBL1935703 035 $a(CaPaEBR)ebr11014801 035 $a(CaONFJC)MIL718504 035 $a(OCoLC)902836363 035 $a(EXLCZ)992670000000591664 100 $a20150212h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aLync server cookbook $eover 90 recipes to empower you to configure, integrate, and manage your very own Lync Server deployment /$fFabrizio Volpe [and three others] 205 $a1st edition 210 1$aBirmingham, England :$cPackt Publishing Ltd,$d2015. 210 4$d©2015 215 $a1 online resource (392 p.) 300 $aIncludes index. 300 $a"Quick answer to common problems"--Cover. 311 $a1-78217-347-1 311 $a1-322-87222-8 327 $aCover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Lync 2013 Security; Introduction; Controlling administrative rights with RBAC and custom cmdlets; Hardening Lync Servers; Hardening Lync databases; Enhancing conferencing security; Managing certificates for the authentication of desk-phones; Deploying a secure Lync Edge; Applying ethical walls for federation security; Using Application Request Routing to ; configure a reverse proxy for Lync Server 2013; Chapter 2: Lync 2013 Authentication; Introduction 327 $aConfiguring passive authentication for LyncEnabling two-factor authentication; Adding the app password for mobile clients; Authenticating with online services using DirSync; Managing Windows Azure Directory for Lync Online; Configuring server-to-server authentication; Troubleshooting with client authentication logging; Chapter 3: Lync Dial Plans and Voice Routing; Introduction; Introducing dial plans and voice routing; Defining dial plans; Configuring PSTN usage - voice policy; Configuring PSTN usage - Location-Based Routing; Enabling routes; Validating trunks 327 $aConfiguring load balancing, failover, and least cost routingControlling call forwarding; Chapter 4: Lync 2013 Integration with Exchange; Introduction; Configuring the Unified Messaging integration; Configuring OAuth between Lync 2013 and Exchange 2013; Configuring Lync 2013 and Exchange 2013 as partner applications; Configuring Lync 2013 to use Exchange 2013 for archiving; Configuring Lync 2013 to use the Exchange 2013 Unified Contact Store; Integrating Lync 2013 with the Exchange 2013 Outlook Web App; Chapter 5: Scripts and Tools for Lync; Introduction 327 $aInstalling Lync prerequisites and more - Set-Cs2013FeaturesCreating a fully functional voice configuration - Lync Dialing Rule Optimizer; Switching between multiple Lync identities with a click - Profiles for Lync (P4L); Tracing made easier - Lync 2013 Centralized Logging Tool; Identifying recurrent issues - Lync Pilot Deployment Health Analysis; Managing phone numbers - Search-LineURI and Get-UnusedNumbers; Managing Call Pickup Groups - Lync2013CallPickupManager 1.01; Chapter 6: Designing a Lync Solution - The Overlooked Aspects; Introduction; Meeting your users' expectations; User training 327 $aGathering the users' requirementsWeighing up around Lync virtualization; Network readiness - introduction; Defining personas for the network; Defining sites for the network; Network readiness - reviewing and analyzing results; Chapter 7: Lync 2013 in a Resource Forest; Introduction; Planning a resource forest; Using Exchange Online for a Lync resource forest; Configuring FIM in a Lync resource forest; Synchronizing forests with FIM; Deploying Azure Active Directory ; Synchronization services (AAD Sync) in a Lync resource forest; AAD Sync synchronization services and rules 327 $aChapter 8: Managing Lync 2013 Hybrid and Lync Online 330 $aIf you work with Lync on a daily basis or if you have to use a specific feature of Lync for a project, this is the book for you. For solutions architects, technical consultants, and administrators, if you have a Lync deployment and you want to upgrade, integrate, secure, or extend it to the cloud, you can get valuable information from the recipes in this book. 606 $aReal-time data processing$xManagement 606 $aReal-time data processing$vSoftware 608 $aElectronic books. 615 0$aReal-time data processing$xManagement. 615 0$aReal-time data processing 676 $a658.05 702 $aVolpe$b Fabrizio 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910464141303321 996 $aLync server cookbook$92172656 997 $aUNINA LEADER 04423nam 22007335 450 001 9910869172803321 005 20240912152758.0 010 $a9783031631108 010 $a3031631102 024 7 $a10.1007/978-3-031-63110-8 035 $a(MiAaPQ)EBC31505998 035 $a(Au-PeEL)EBL31505998 035 $a(CKB)32575084900041 035 $a(DE-He213)978-3-031-63110-8 035 $a(OCoLC)1443539275 035 $a(EXLCZ)9932575084900041 100 $a20240628d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aResearch in Computer Science $e6th Conference, CRI 2023, Yaounde, Cameroon, December 12?13, 2023, Proceedings /$fedited by Paulin Melatagia Yonta, Kamel Barkaoui, René Ndoundam, Omer-Blaise Yenke 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (202 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2085 311 08$a9783031631092 311 08$a3031631099 327 $a -- Convolutional neural network based detection approach of undesirable SMS (Short Message Service) in the Cameroonian context. -- Time aware implicit social influence estimation to enhance recommender systems performances. -- Analysis of COVID-19 coughs: From the mildest to the most severe form, a realistic classification using deep learning. -- SLCDeepETC : An On-Demand Analysis Ready Data pipeline on Sentinel-1 Single Look Complex for Deep Learning. -- Robusness of image classification on imbalanced datasets using capsules networks. -- Application of the multilingual acoustic representation model XLSR-53 for the transcription of Ewondo. -- Self-supervised and multilingual learning applied to the Wolof, Swahili and Fongbe. -- Explaining Meta-learner?s Predictions: case of corporate CO2 emissions. -- Building and validating an ontology for public procurement : The case of Cameroon. -- A Hybrid Algorithm Based on Tabu Search and K-means for Solving The Traveling Salesman Problem. -- Hybridization Of A Recurrent Neural Network By Quadratic Programming For Combinatory Optimization. -- A New Hybrid Algorithm Based on Ant Colony and Neural Networks with Attention Mechanism for Solving the Traveling Salesman Problem. -- Recurrent Neural Network Parallelization for Hate Messages Detection. -- Two high capacity text steganography schemes based on color coding. -- Integration of the triple block data security model based on distributed crypto-steganography in a distributed system. 330 $aThis book constitutes the refereed proceedings of the 6th Conference on Research in Computer Science, CRI 2023, held in Yaounde, Cameroon, during December 12-13, 2023. The 16 full papers included in this book were carefully reviewed and selected from 72 submissions. The CRI 2023 proceedings focus on artificial intelligence, machine learning, natural language processing, computer vision, cryptography and distributed computing. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2085 606 $aMachine learning 606 $aNatural language processing (Computer science) 606 $aImage processing 606 $aSoftware engineering 606 $aComputer networks$xSecurity measures 606 $aMachine Learning 606 $aNatural Language Processing (NLP) 606 $aImage Processing 606 $aSoftware Engineering 606 $aMobile and Network Security 615 0$aMachine learning. 615 0$aNatural language processing (Computer science) 615 0$aImage processing. 615 0$aSoftware engineering. 615 0$aComputer networks$xSecurity measures. 615 14$aMachine Learning. 615 24$aNatural Language Processing (NLP). 615 24$aImage Processing. 615 24$aSoftware Engineering. 615 24$aMobile and Network Security. 676 $a006.31 700 $aMelatagia Yonta$b Paulin$01743567 701 $aBarkaoui$b Kamel$01743568 701 $aNdoundam$b René$01743569 701 $aYenke$b Omer-Blaise$01743570 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910869172803321 996 $aResearch in Computer Science$94171725 997 $aUNINA