0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (11)
  • R500+ (896)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Cloud Reliability Engineering - Technologies and Tools (Hardcover): Rathnakar Achary, Pethuru Raj Cloud Reliability Engineering - Technologies and Tools (Hardcover)
Rathnakar Achary, Pethuru Raj
R3,265 Discovery Miles 32 650 Ships in 12 - 17 working days

Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation, storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services, their challenges, and the reliability mechanisms used by cloud service providers. These case studies provide readers with techniques to harness cloud reliability and availability requirements in their own endeavors. Both conceptual and applied, the book explains reliability theory and the best practices used by cloud service companies to provide high availability. It also examines load balancing, and cloud security. Written by researchers and practitioners, the book's chapters are a comprehensive study of cloud reliability and availability issues and solutions. Various reliability class distributions and their effects on cloud reliability are discussed. An important aspect of reliability block diagrams is used to categorize poor reliability of cloud infrastructures, where enhancement can be made to lower the failure rate of the system. This technique can be used in design and functional stages to determine poor reliability of a system and provide target improvements. Load balancing for reliability is examined as a migrating process or performed by using virtual machines. The approach employed to identify the lightly loaded destination node to which the processes/virtual machines migrate can be optimized by employing a genetic algorithm. To analyze security risk and reliability, a novel technique for minimizing the number of keys and the security system is presented. The book also provides an overview of testing methods for the cloud, and a case study discusses testing reliability, installability, and security. A comprehensive volume, Cloud Reliability Engineering: Technologies and Tools combines research, theory, and best practices used to engineer reliable cloud availability and performance.

Ecosystems and Technology - Idea Generation and Content Model Processing (Paperback): Cyrus F Nourani Ecosystems and Technology - Idea Generation and Content Model Processing (Paperback)
Cyrus F Nourani
R2,584 Discovery Miles 25 840 Ships in 12 - 17 working days

Ecosystems and Technology: Idea Generation and Content Model Processing, presents important new innovations in the area of management and computing. Innovation is the generation and application of new ideas and skills to produce new products, processes, and services that improve economic and social prosperity. This includes management and design policy decisions and encompasses innovation research, analysis, and best practice in enterprises, public and private sector service organizations, government, regional societies and economies. The book, the first volume in the Innovation Management and Computing book series, looks at technology that improves efficiency and idea generation, including systems for business, medical/health, education, and more. The book provides detailed examples to provide readers with current issues, including Venture planning for innovations New technologies supporting innovations systems Competitive business modeling Context-driven innovation modeling The generation of ideas faster The measurement of relevant data Virtual interfaces Business intelligence and content processing Predictive modeling Haptic expression and emotion recognition innovations, with applications to neurocognitive medical science This book provides a wealth of information that will be useful for IT and business professionals, educators, and students in many fields.

Business Process Reengineering - An ICT Approach (Paperback): Heru Susanto, Fang-Yie Leu, Chin Kang Chen Business Process Reengineering - An ICT Approach (Paperback)
Heru Susanto, Fang-Yie Leu, Chin Kang Chen
R2,579 Discovery Miles 25 790 Ships in 12 - 17 working days

This volume shows how ICT (information and communications technology) can play the role of a driver of business process reengineering (BPR). ICT can aid in enabling improvement in BPR activity cycles as it provides many components that enhance performance that can lead to competitive advantages. IT can interface with BPR to improve business processes in terms of communication, inventory management, data management, management information systems, customer relationship management, computer-aided design, computer-aided manufacturing (CAM), and computer-aided engineering. This volume explores these issues in depth.

Mentors and Mentoring - A Special Issue of the peabody Journal of Education (Paperback): Robert C. Cienkus, Jennifer Grant... Mentors and Mentoring - A Special Issue of the peabody Journal of Education (Paperback)
Robert C. Cienkus, Jennifer Grant Haworth, Jack A. Kavanagh
R1,485 Discovery Miles 14 850 Ships in 12 - 17 working days

The definition and parameters of teacher education have recently been changed by the concept of mentoring. Supporters of the concept maintain that it is an effective technique for inducting and retaining new teachers, but who and what are mentors, and what attributes do they possess? Previous research has identified collaboration, enthusiasm, emotional commitment, and sensitivity as the necessary traits of an effective mentor. It has also been found that mentors are available, give immediate feedback, listen attentively, and collaboratively solve problems with mentees. Epistemological structures that best serve the mentor-novice relationship, gender issues between mentors and proteges, and moral development orientations within the mentor-intern relationship have also been investigated. Thus, mentoring is a complex activity that involves a mentor, an intern or novice, and a process within a predetermined structure. The articles in this special issue validate the fact that the terms "good mentor" and "effective mentoring relationship" often elude easy definition. However, a common theme emerges: The mentor-mentee relationship is a transformative one that can change the course of one's life.

The Complete Guide to Cybersecurity Risks and Controls (Hardcover): Anne Kohnke, Dan Shoemaker, Ken E. Sigler The Complete Guide to Cybersecurity Risks and Controls (Hardcover)
Anne Kohnke, Dan Shoemaker, Ken E. Sigler
R3,563 Discovery Miles 35 630 Ships in 12 - 17 working days

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly, many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning, all the way down to basic technology operation.

Information Systems - Debates, Applications and Impacts (Paperback): Priya Seetharaman, Jocelyn Cranefield Information Systems - Debates, Applications and Impacts (Paperback)
Priya Seetharaman, Jocelyn Cranefield
R1,283 Discovery Miles 12 830 Ships in 12 - 17 working days

This book captures a range of important developments that have occurred in Information Systems over the last forty years, with a particular focus on India and the developing world. Over this time, Information and Communications Technology (ICT) and Information Systems (IS) have come to play a critical role in supporting, complementing and automating managerial decisions, shaping and transforming industries, and contributing to deep societal and economic change. This volume examines a range of topics for those interested in the adoption and use of these technologies across varied situations. It combines empirical studies on the application and impact of IS with commentaries, debates and insights on the transformative role that IT and the IT industry have played, and continue to play, within India as well as globally. The book draws attention to issues and challenges that organizations grapple with in tech-enabled environments, and provides insights on the role of automation and computational techniques. It explores the global impact of the technology revolution on economic growth and development, electronic globalization, and the wider opportunities and challenges of a hi-tech world. The chapters cover various themes such as e-government in India, internet-based distribution systems, internet banking, and use of collaborative IT tools and functions to support virtual teams in the software industry and the business process outsourcing industry. Other chapters focus on methodological advances, such as systems thinking which finds applications in organizational decision-making, and the use of fuzzy logic. This volume will interest professionals and scholars of information technology and information systems, computer studies, IT systems, economics, and business and management studies.

The Insider's Guide to Outsourcing Risks and Rewards (Paperback): Johann Rost The Insider's Guide to Outsourcing Risks and Rewards (Paperback)
Johann Rost
R1,742 Discovery Miles 17 420 Ships in 12 - 17 working days

It is essential for a corporation to not only survive but thrive in today's global outsourcing environment. The Insider's Guide to Outsourcing Risks and Rewards is a comprehensive and accessible resource that assists an organization in deciding whether it will benefit from pursuing-or not pursuing-such an endeavor. The author, an 18-year veteran of the IT industry, is an experienced consultant, software developer, manager, and entrepreneur. Providing an authoritative and unbiased view, he helps the reader navigate through a number of offshore outsourcing issues related to software management and international business. He examines the potential benefits derived from offshore outsourcing, as well as the possible pitfalls and how to avoid them as they apply to an organization's particular situation. Offering a unique combination of technical and political insight, The Insider's Guide to Outsourcing Risks and Rewards is the one resource to have when trying to figure out your organization's next step.

The Project Manager's Emergency Kit (Paperback): PMP, Ralph L. Kliem The Project Manager's Emergency Kit (Paperback)
PMP, Ralph L. Kliem
R1,801 Discovery Miles 18 010 Ships in 12 - 17 working days

Project success requires a solid understanding and proper implementation of the tools, techniques, and principles of project management. A reference for both the novice and expert project manager, The Project Manager's Emergency Kit provides you with everything you will need to get your project off to a solid start and overcome any emergencies that may arise during the project life cycle. It supplies you with over 200 project management tools, techniques, and principles arranged in alphabetical order. The text provides guidance on how to complete projects on time and within budget while meeting the needs of your customers. It presents easy-to-follow project planning steps covering the responsibilities, work breakdown structures, time and cost estimating, scheduling, resource allocation, and budgeting. The Project Manager's Emergency Kit provides you with straightforward guidelines that will help you overcome any challenges that may arise and deliver a product or service that will satisfy everyone who has a stake in the outcome of your project.

Cloud Computing Networking - Theory, Practice, and Development (Hardcover): Lee Chao Cloud Computing Networking - Theory, Practice, and Development (Hardcover)
Lee Chao
R2,840 Discovery Miles 28 400 Ships in 12 - 17 working days

Cloud computing is the most significant technology transformation since the introduction of the Internet in the early 1990s. As more and more companies and educational institutions plan to adopt a cloud-based IT infrastructure, today's job market requires IT professionals who understand cloud computing and have hands-on experience developing cloud-based networks. Cloud Computing Networking: Theory, Practice, and Development covers the key networking and system administration concepts as well as the vital hands-on skills you need to master cloud technology. This book is designed to help you quickly get started in deploying cloud services for a real-world business. It provides detailed step-by-step instructions for creating a fully functioning cloud-based IT infrastructure using the Microsoft Azure cloud platform. In this environment, you can develop cloud services collaboratively or individually. The book enhances your hands-on skills through numerous lab activities. In these lab activities, you will learn to Implement the following services in a cloud environment: Active Directory, DHCP, DNS, and Certificate Services Configure Windows Server so it can route IP traffic Implement IP Security Policy and Windows Firewall with Advanced Security tools Create a point-to-site connection between Microsoft Azure and a local computer Create a site-to-site connection between Microsoft Azure and an on-premises network Develop a hybrid cloud that integrates Microsoft Azure with a private cloud created on a local network Cloud Computing Networking: Theory, Practice, and Development includes numerous examples, figures, and screen shots to help you understand the information. Each chapter concludes with a summary of the major topics and a set of review questions. With this book, you will soon have the critical knowledge and skills to develop and manage cloud-based networks.

Intelligent Cities - Enabling Tools and Technology (Hardcover): Pethuru Raj, Anupama C. Raman Intelligent Cities - Enabling Tools and Technology (Hardcover)
Pethuru Raj, Anupama C. Raman
R3,738 Discovery Miles 37 380 Ships in 12 - 17 working days

The emergence of highly promising and potent technologies has enabled the transition of ordinary objects into smart artifacts-providing wider connectivity of digitized entities that can facilitate the building of connected cities. This book provides readers with a solid foundation on the latest technologies and tools required to develop and enhance smart cities around the world. The book begins by examining the rise of the cloud as the fundamental technology for establishing and sustaining smart cities and enterprises. Explaining the principal technologies and platform solutions for implementing intelligent cities, the book details the role of various technologies, standards, protocols, and tools in establishing flexible homes and the buildings of the future. Examines IT platforms and tools from various product vendors Considers service-oriented architecture and event-driven architecture for smart city applications Explains how to leverage big data analytics for smart city enhancement and improved decision making Includes case studies of intelligent cities, smart homes, buildings, transports, healthcare systems, and airports The authors explore the convergence of cloud computing and enterprise architecture and present valuable information on next-generation cloud computing. They also cover the various architectural types, including enterprise-scale integration, security, management, and governance. The book concludes by explaining the various security requirements of intelligent cities as well as the threats and vulnerabilities of the various components that form the basis of the intelligent city framework, including cloud, big data, Internet of Things, and mobile technologies.

How Things Work - The Computer Science Edition (Paperback): Charles F. Bowman How Things Work - The Computer Science Edition (Paperback)
Charles F. Bowman
R1,564 Discovery Miles 15 640 Ships in 12 - 17 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

Somewhat on the Community System - Representations of Fourierism in the Works of Nathaniel Hawthorne (Paperback): Andrew Loman Somewhat on the Community System - Representations of Fourierism in the Works of Nathaniel Hawthorne (Paperback)
Andrew Loman
R1,493 Discovery Miles 14 930 Ships in 12 - 17 working days

First Published in 2005. Routledge is an imprint of Taylor & Francis, an informa company.

Hacker's Guide to Project Management (Hardcover, 2nd edition): Andrew Johnston Hacker's Guide to Project Management (Hardcover, 2nd edition)
Andrew Johnston
R4,891 Discovery Miles 48 910 Ships in 12 - 17 working days

Managing a software development project is a complex process. There are lots of deliverables to produce, standards and procedures to observe, plans and budgets to meet, and different people to manage. Project management doesn't just start and end with designing and building the system. Once you've specified, designed and built (or bought) the system it still needs to be properly tested, documented and settled into the live environment. This can seem like a maze to the inexperienced project manager, or even to the experienced project manager unused to a particular environment.A Hacker's Guide to Project Management acts as a guide through this maze. It's aimed specifically at those managing a project or leading a team for the first time, but it will also help more experienced managers who are either new to software development, or dealing with a new part of the software life-cycle. This book:describes the process of software development, how projects can fail and how to avoid those failuresoutlines the key skills of a good project manager, and provides practical advice on how to gain and deploy those skillstakes the reader step-by-step through the main stages of the project, explaining what must be done, and what must be avoided at each stagesuggests what to do if things start to go wrong!The book will also be useful to designers and architects, describing important design techniques, and discussing the important discipline of Software Architecture.This new edition:has been fully revised and updated to reflect current best practices in software developmentincludes a range of different life-cycle models and new design techniquesnow uses the Unified Modelling Language throughout

Stakeholder Engagement - The Game Changer for Program Management (Hardcover): Amy Baugh Stakeholder Engagement - The Game Changer for Program Management (Hardcover)
Amy Baugh
R3,386 Discovery Miles 33 860 Ships in 12 - 17 working days

Strong stakeholder engagement is perhaps the most critical factor for achieving successful program execution in our fast-paced world. Many program managers get stuck in the "science" of program management, spending vast amounts of effort on tasks, charts, and metrics. Program managers who emphasize activities around relationship building and stakeholder engagement usually have the best chance for program success. This book focuses on how to engage your stakeholders in the right way, and keep them engaged throughout the course of your program. The first section of the book covers stakeholder engagement in the program definition phase, including how to identify key stakeholders, gain their trust, and build relationships through effective communication. The second section moves to the project execution phase. It explains how to drive stakeholder engagement through the use of performance metrics, effective meeting management, and informal program governance. In the last section, the author explains how to keep stakeholders engaged through the program closure phase. This section covers the operational readiness review, including transition plans, new process documentation and training, new technology rollout, and cultural readiness assessment. It also provides best practices and tips for holding the post-launch review and lessons learned session. The book concludes with a case study of a fictitious company, followed by discussion questions that allow you to apply the knowledge you have gained in this book.

Spatial Decision Support Systems - Principles and Practices (Paperback): Ramanathan Sugumaran, John Degroote Spatial Decision Support Systems - Principles and Practices (Paperback)
Ramanathan Sugumaran, John Degroote
R1,682 Discovery Miles 16 820 Ships in 12 - 17 working days

Although interest in Spatial Decision Support Systems (SDSS) continues to grow rapidly in a wide range of disciplines, students, planners, managers, and the research community have lacked a book that covers the fundamentals of SDSS along with the advanced design concepts required for building SDSS. Filling this need, Spatial Decision Support Systems: Principles and Practices provides a comprehensive examination of the various aspects of SDSS evolution, components, architecture, and implementation. It integrates research from a variety of disciplines, including the geosciences, to supply a complete overview of SDSS technologies and their application from an interdisciplinary perspective. This groundbreaking reference provides thorough coverage of the roots of SDSS. It explains the core principles of SDSS, how to use them in various decision making contexts, and how to design and develop them using readily available enabling technologies and commercial tools. The book consists of four major parts, each addressing different topic areas in SDSS: Presents an introduction to SDSS and the evolution of SDSS Covers the essential and optional components of SDSS Focuses on the design and implementation of SDSS Reviews SDSS applications from various domains and disciplines-investigating current challenges and future directions The text includes numerous detailed case studies, example applications, and methods for tailoring SDSS to your work environment. It also integrates sample code segments throughout. Addressing the technical and organizational challenges that affect the success or failure of SDSS, the book concludes by considering future directions of this rapidly emerging field of study.

Outcome-Driven Business Architecture - Synergizing Strategies and Intelligence with Architecture (Paperback): Amit Tiwary,... Outcome-Driven Business Architecture - Synergizing Strategies and Intelligence with Architecture (Paperback)
Amit Tiwary, Bhuvan Unhelkar
R1,402 Discovery Miles 14 020 Ships in 12 - 17 working days

This book discusses business architecture as a basis for aligning efforts with outcomes. It views BA as complementary to enterprise architecture, where the focus of technological initiatives and inventories is to understand and improve business organization, business direction, and business decision-making. This book provides a practical, long-term view on BA. Based on the authors' consulting experience and industrial research, the material in this book is a valuable addition to the thought processes around BA and EA. The lead author has direct and practical experience with large clients in applying APQC capability framework for undertaking multiple enterprise-wide capability assessments.

Security without Obscurity - A Guide to Cryptographic Architectures (Paperback): Jeff Stapleton Security without Obscurity - A Guide to Cryptographic Architectures (Paperback)
Jeff Stapleton
R1,371 Discovery Miles 13 710 Ships in 12 - 17 working days

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.

Cyberspace and Cybersecurity (Paperback, 2nd edition): George Kostopoulos Cyberspace and Cybersecurity (Paperback, 2nd edition)
George Kostopoulos
R1,393 Discovery Miles 13 930 Ships in 12 - 17 working days

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.

Planning by Design (PxD)-Based Systematic Methodologies (Paperback): Hakan Butuner Planning by Design (PxD)-Based Systematic Methodologies (Paperback)
Hakan Butuner
R1,372 Discovery Miles 13 720 Ships in 12 - 17 working days

The book shows how to use Planning by Design (PxD) for developing working models to any type of subject area. Section 1 describes the nature of planning in general, the formula of planning, the features that make it systematic, the essence of PxD, and developing and using the working model. Section 2 demonstrates personal application of creative planning to real life cases and practical working models on different subject areas. The book provides a general planning "master guide" that shows how to develop a working model of any definable subject matter. This objective will be accomplished by introducing the concepts, the process, and the methodology of PxD.

The Data Protection Officer - Profession, Rules, and Role (Paperback): Paul Lambert The Data Protection Officer - Profession, Rules, and Role (Paperback)
Paul Lambert
R1,391 Discovery Miles 13 910 Ships in 12 - 17 working days

The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and building blocks of the data protection regime are enhanced by the new General Data Protection Regulation and therefore the DPO will be very active in passing the message and requirements of the new data protection regime throughout the organization. This book explains the roles and responsiblies of the DPO, as well as highlights the potential cost of getting data protection wrong.

Enterprise Level Security - Securing Information Systems in an Uncertain World (Paperback): William R. Simpson Enterprise Level Security - Securing Information Systems in an Uncertain World (Paperback)
William R. Simpson
R1,409 Discovery Miles 14 090 Ships in 12 - 17 working days

Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process. Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise. The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project. The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Paperback): Dan... A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Paperback)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R1,489 Discovery Miles 14 890 Ships in 12 - 17 working days

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

Kubernetes Patterns - Reusable Elements for Designing Cloud Native Applications (Paperback): Bilgin Ibryam, Roland Huss Kubernetes Patterns - Reusable Elements for Designing Cloud Native Applications (Paperback)
Bilgin Ibryam, Roland Huss
R1,211 R863 Discovery Miles 8 630 Save R348 (29%) Out of stock

The way developers design, build, and run software has changed significantly with the evolution of microservices and containers. These modern architectures use new principles that require a different set of practices than most developers, tech leads, and architects are accustomed to. With this focused guide, Bilgin Ibryam and Roland Huss from Red Hat provide common reusable elements, patterns, principles, and practices for designing and implementing cloud native applications on Kubernetes. Each recipe includes a description of the problem and a proposed solution with Kubernetes specifics. Many patterns are also backed by concrete code examples. This book is ideal for developers already familiar with basic Kubernetes concepts who want to learn common cloud native patterns. You'll learn about the following pattern categories: Foundational patterns cover the core principles and practices for building container-based cloud native applications Behavioral patterns add finer grained concepts for managing various types of container and platform interactions Structural patterns help you organize containers within a Pod, the atom of the Kubernetes platform Configuration patterns provide insight into how application configuration can be handled in Kubernetes Advanced patterns include a collection of advanced concepts like extending the platform itself

Managing Risk and Security in Outsourcing IT Services - Onshore, Offshore and the Cloud (Hardcover): Frank Siepmann Managing Risk and Security in Outsourcing IT Services - Onshore, Offshore and the Cloud (Hardcover)
Frank Siepmann
R1,903 Discovery Miles 19 030 Ships in 12 - 17 working days

With cloud computing quickly becoming a standard in today s IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments requiring a change in how we evaluate risk and protect information, processes, and people.
Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud explains how to address the security risks that can arise from outsourcing or adopting cloud technology. Providing you with an understanding of the fundamentals, it supplies authoritative guidance and examples on how to tailor the right risk approach for your organization.
Covering onshore, offshore, and cloud services, it provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book will be especially helpful to managers challenged with an outsourcing situation whether preparing for it, living it day to day, or being tasked to safely bring back information systems to the organization.
Many factors can play into the success or failure of an outsourcing initiative. This book not only provides the technical background required, but also the practical information about outsourcing and its mechanics.
By describing and analyzing outsourcing industry processes and technologies, along with their security and privacy impacts, this book provides the fundamental understanding and guidance you need to keep your information, processes, and people secure when IT services are outsourced.

Practical Data Security - Applied Information Technology (Paperback): John Gordon Practical Data Security - Applied Information Technology (Paperback)
John Gordon
R1,044 Discovery Miles 10 440 Ships in 12 - 17 working days

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Rational Decisions in Organisations…
Frederic Adam, Dorota Kuchta, … Paperback R1,388 Discovery Miles 13 880
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
The Practice of Corporate Governance
Bob Tricker Paperback R956 Discovery Miles 9 560
PKI Implementation and Infrastructures
Julian Ashbourn Hardcover R3,016 Discovery Miles 30 160
Mike Meyers' CompTIA A+ Guide to 801…
Mike Meyers Paperback R1,564 Discovery Miles 15 640
What To Do When You Get Hacked - A…
Shimon Brathwaite Paperback R1,202 Discovery Miles 12 020
Software Security - Concepts & Practices
Suhel Ahmad Khan, Rajeev Kumar, … Hardcover R3,640 Discovery Miles 36 400
Intelligent IT Outsourcing
Sara Cullen, Leslie Willcocks Paperback R1,806 Discovery Miles 18 060
Enterprise Digital Transformation…
Peter Augustine, Pethuru Raj, … Paperback R1,445 Discovery Miles 14 450
Acquiring Card Payments
Ilya Dubinsky Paperback R1,359 Discovery Miles 13 590

 

Partners