0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (6)
  • R500+ (824)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Hardening Cisco Routers (Paperback): Thomas Akin Hardening Cisco Routers (Paperback)
Thomas Akin
R559 R514 Discovery Miles 5 140 Save R45 (8%) Ships in 18 - 22 working days

This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. This is a reference for protecting the protectors, and author Thomas Akin supplies all the tools necessary to turn a potential vulnerability into a strength.

Solaris 8 Administrator's Guide (Paperback, 1st ed): Paul Watters Solaris 8 Administrator's Guide (Paperback, 1st ed)
Paul Watters
R892 R771 Discovery Miles 7 710 Save R121 (14%) Ships in 18 - 22 working days

This guide covers all aspects of deploying Solaris as an enterprise-level network operating system, with a focus on e-commerce. Written for experienced network administrators who want an objective guide to networking with Solaris, the book covers installation on the Intel and Sparc platforms, and instructs you how to setup Solaris as a file server, application server, and database server.

Information Systems - What Every Business Student Needs to Know, Second Edition (Paperback, 3rd Edition): Efrem G. Mallach Information Systems - What Every Business Student Needs to Know, Second Edition (Paperback, 3rd Edition)
Efrem G. Mallach
R714 Discovery Miles 7 140 Ships in 4 - 6 working days

Most information systems textbooks overwhelm business students with overly technical information they may not need in their careers. This textbook takes a new approach to the required information systems course for business majors. For each topic covered, the text highlights key "Take-Aways" that alert students to material they will need to remember during their careers. Sections titled "Where You Fit In" and "Why This Chapter Matters" explain how the topics being covered will impact students on the job. Review questions, discussion questions, and summaries are also included. This second edition is updated to include new technology, along with a new running case study.

Key features:

Single-mindedly for business students who are not technical specialists

Doesn’t try to prepare IS professionals; other courses will do that

Stresses the enabling technologies and application areas that matter the most today

Based on the author’s real-world experience

Up to date regarding technology and tomorrow’s business needs

This is the book the author—and, more importantly, his students—wishes he had when he started teaching. Dr. Mallach holds degrees in engineering from Princeton and MIT, and in business from Boston University. He worked in the computer industry for two decades, as Director of Strategic Planning for a major computer firm and as co-founder/CEO of a computer marketing consulting firm. He taught information systems in the University of Massachusetts (Lowell and Dartmouth) business schools for 18 years, then at Rhode Island College following his retirement. He consults in industry and serves as Webmaster for his community, in between hiking and travel with his wife.

Table of Contents

Table of Contents

Why Information Systems Matter in Business

Role of Information Systems in Business

information Systems Hardware

Information Systems Software

Data, Databases, and Database Management

Information Networks

Integrating the Organization

Connecting with Customers and Suppliers

Making Better Decisions

Planning and Selecting Information Systems

Developing Information Systems

Managing Information Systems

Index

CISO COMPASS - Navigating Cybersecurity Leadership Challenges with Insights from Pioneers (Hardcover): Todd Fitzgerald CISO COMPASS - Navigating Cybersecurity Leadership Challenges with Insights from Pioneers (Hardcover)
Todd Fitzgerald
R3,960 Discovery Miles 39 600 Ships in 10 - 15 working days

#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020 and 2021! 2020 Cybersecurity CANON Hall of Fame Winner! Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.

Information Security Governance - Framework and Toolset for CISOs and Decision Makers (Paperback): Andrej Volchkov Information Security Governance - Framework and Toolset for CISOs and Decision Makers (Paperback)
Andrej Volchkov
R1,868 Discovery Miles 18 680 Ships in 10 - 15 working days

This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.

Project Management Lessons Learned - A Continuous Process Improvement Framework (Hardcover): Mel Bost Project Management Lessons Learned - A Continuous Process Improvement Framework (Hardcover)
Mel Bost
R2,156 Discovery Miles 21 560 Ships in 10 - 15 working days

Lessons Learned is an important phase in project management. This is when organizations can pave the way for future project success by documenting mistakes so they are not repeated and recording best practices so they are repeated. This book covers the important role a project management office (PMO) plays in promoting lessons learned. Project managers learn how to improve processes by applying lessons learned. The book emphasizes "actionability," or producing a process improvement that can be acted upon by anyone in the PMO or project team.

Technology in Context - Technology Assessment for Managers (Hardcover): Ernest Braun Technology in Context - Technology Assessment for Managers (Hardcover)
Ernest Braun
R5,607 Discovery Miles 56 070 Ships in 10 - 15 working days

Most managers know very little about the technology they introduce into their firms, often preferring to leave such decisions to a small band of technological 'experts'. As a result large amounts of time and money are often wasted on inappropriate and inefficient systems. The cost of retraining and reorganising can also be prohibitive if the new technology does not deliver the desired results. In a business environment where technology is of increasing importance, the non-technical manager cannot afford to remain in the dark. Technology in Context provides a toolkit of approaches to this difficult subject. Subjects covered include: * the fundamental concepts required for the management of technology * the gathering of information in a firm to support strategic decisions on technology * technology assessment in the public domain * the wider social implications of technology * problems associated with technology, from the danger of environmental degradation to employment and skills.

Evolving Innovation Ecosystems - A Guide to Open Idea Transformation in the Age of Future Tech (Hardcover): Carol L. Stimmel Evolving Innovation Ecosystems - A Guide to Open Idea Transformation in the Age of Future Tech (Hardcover)
Carol L. Stimmel
R2,471 Discovery Miles 24 710 Ships in 10 - 15 working days

While emerging technologies create massive opportunity, especially for investors and companies that seek more adaptable forms of economic growth than currently available, value is held inert by traditional approaches, patents, and other closed systems. Yet, open data, content, and information may be the key to mass innovation for future technologies, although they bring difficult challenges to private-industry models that depend on the established ideas of intellectual property. It is from this foundational observation that OpenXFORM (a blending of the words Open and the engineering abbreviation for Transformation) was developed and is explored and described in this book. The intent of the model design is to synthesize an approach to the process of innovation, inspired by natural systems and human-centric design processes. OpenXFORM describes how an open system of innovation can adapt to the unregulated world of information, data, and content; can decompose its own information to release to the open world; and can discover ways to find the points of synergy among the studied and tested methodologies that put human relationships first. This book presents an explicit innovation process that shows how to move from a breakthrough idea through a process that encourages innovative thinkers to test their assumptions, validate hypotheses, and tune and tweak their ideas, not only to drive solutions for users but also to meet the strategic goals of their companies. The anatomy of innovation through OpenXFORM contains the process for moving ideas from a flight of fancy to an explicit concept that is ready to produce.

Building Organizational Intelligence - A Knowledge Management Primer (Paperback, 3rd Edition): Jay Liebowitz Building Organizational Intelligence - A Knowledge Management Primer (Paperback, 3rd Edition)
Jay Liebowitz
R831 Discovery Miles 8 310 Ships with 15 working days

"Sharing knowledge is power." If ever there were a field to which this applies, it is the knowledge management industry. And in today's highly-competitive, fast-paced business world, corporations, businesses and organizations in both the public and private sectors are constantly searching for new cutting-edge methods and techniques for creating, storing, capturing, managing, organizing, distributing, combining, and retrieving knowledge. But the task of accomplishing such functions is not as simple as it sounds. Jay Liebowitz's Building Organizational Intelligence: A Knowledge Management Primer gives executives, managers, systems analysts, and other knowledge-management professionals the competitive edge they need in achieving that task. In a concise and easy-to-read format, the book describes the concepts, techniques, methodologies, and tools associated with those functions, and includes mini-case studies and vignettes of how industry is developing and applying these functions towards building organizational intelligence.

What's more, the book is packaged with a limited functionality version of "WisdomBuilder," the first in a family of knowledge-management tools that provide a fully integrated solution to the information management and analysis dilemma. Able to run under Windows 95, 98 and NT, "WisdomBuilder" solves the information overload problem by reducing the time and cost of extracting information and other research knowledge from disorganized repositories of heterogeneous data.

Table of Contents

What is Organizational Intelligence? Creating Knowledge. Capturing and Storing Knowledge. Transforming Individual Learning Into Organizational Learning. Combining, Transferring, and Distributing Knowledge. Building A Continuous Learning Culture. Culture: The Key Ingredient. Developing A Knowledge Management Capability

Assessing Knowledge Management Through A Knowledge Audit. Augmenting Organizational Intelligence. Role and Skills for Knowledge Management-Questionnaire. Appendix A: The Intelligent Agent-Based Knowledge Management System for Supporting Multimedia Systems Design on The Web. Appendices

Assessing and Managing Security Risk in IT Systems - A Structured Methodology (Hardcover): John McCumber Assessing and Managing Security Risk in IT Systems - A Structured Methodology (Hardcover)
John McCumber
R2,293 Discovery Miles 22 930 Ships in 10 - 15 working days

Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly improved security environments. Part I delivers an overview of information systems security, providing historical perspectives and explaining how to determine the value of information. This section offers the basic underpinnings of information security and concludes with an overview of the risk management process. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. McCumber details how information extracted from this resource can be applied to his assessment processes.

Operational Assessment of IT (Hardcover): Steve Katzman Operational Assessment of IT (Hardcover)
Steve Katzman
R4,223 Discovery Miles 42 230 Ships in 10 - 15 working days

Operational Assessment of IT presents ideas and concepts of optimization designed to improve an organization's business processes and assist business units in meeting organizational goals more effectively. Rather than focus on specific technologies, computing environments, enterprise risks, resource programs, or infrastructure, the book focuses on organizational processes. Throughout the book, the author presents concerns and environments encountered throughout his career to demonstrate issues and explain how you, too, can successfully implement the tools presented in the book. The assessment process reviews the economics as well as the effectiveness and efficiency of the process. Whether your organization is profit-based, not-for-profit, or even governmental, you cannot provide services or products at a continuous loss. For an operational assessment to be of value, the ultimate goal must be to insure that the business unit process is effective and efficient and employs the financial assets and resources appropriately or helps the business unit make adjustments to improve the operation and use resources more efficiently and economically. After reading this book, you will be able to devise more efficient and economical ways to meet your customers' requirements, no matter who or where your customers are. You will learn that the goal of any process is to service or supply customers with what they want. The book provides tools and techniques that will assist you in gaining a 360-degree view of the process so that you can help the business unit improve the delivery of a quality product or a service to the customer.

Project Management Tools and Techniques for Success (Paperback): Christine B. Tayntor Project Management Tools and Techniques for Success (Paperback)
Christine B. Tayntor
R1,983 Discovery Miles 19 830 Ships in 10 - 15 working days

Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals. Highlighting approaches for avoiding common pitfalls, it begins with an introduction to project management that compares and contrasts the stages of poor management with those of effective management. Because change is inherent in virtually all projects, the text outlines the human effects of change and suggests ways to mitigate these effects. It addresses team dynamics, sourcing alternatives, motivating the team, managing expectations, assessing risk, and defining and prioritizing project requirements. The book translates difficult concepts into practical applications with a case study that examines the merger of two companies, along with the subsequent development of a new corporate headquarters. By adding a layer of statistical methods and tools to the front-end of a project, Design for Six Sigma (DFSS) augments standard Six Sigma processes to help ensure project results meet customers' needs and that delays caused by new requirements or rework after implementation are eliminated or reduced. The book explains how to effectively incorporate DFSS tools to reduce the possibility of failure in your next project. Clearly illustrating effective project management practices, the book includes a listing of commonly used acronyms, suggestions for additional reading, along with instructions on how to create four of the most important tools discussed in the book.

Embedded Systems Design - An Introduction to Processes, Tools and Techniques (Paperback): Arnold S Berger Embedded Systems Design - An Introduction to Processes, Tools and Techniques (Paperback)
Arnold S Berger
R351 Discovery Miles 3 510 Ships in 4 - 6 working days

This is a primer on the development process for embedded systems designed to teach the specialised aspects of writing software in this enviroment that are not covered in standard coursework for software developers and electrical engineers. It traces the software and hardware methodologies and the intergration of the two disciplines in the lifecycle. The guide details the steps necessary for designing and producing embedded systems and discusses the key methods and technologies for each phase of the process: specification, partition, design, integration, validation, release, maintenance and upgrade.

Information Technology - Proceedings of the 2014 International Symposium on Information Technology (ISIT 2014), Dalian, China,... Information Technology - Proceedings of the 2014 International Symposium on Information Technology (ISIT 2014), Dalian, China, 14-16 October 2014 (Hardcover)
Yi Wan, Liangshan Shao, Lipo Wang, Jinguang Sun
R5,801 Discovery Miles 58 010 Ships in 10 - 15 working days

These proceedings of the symposium ISIT 2014 aim to be a platform for international exchange of the state-of-the-art research and practice in information technology. The contributions cover a wide variety of topics, ranging from theoretical and analytical studies to various applications.

The Lean IT Field Guide - A Roadmap for Your Transformation (Paperback): Michael A Orzen, Thomas A. Paider The Lean IT Field Guide - A Roadmap for Your Transformation (Paperback)
Michael A Orzen, Thomas A. Paider
R1,548 Discovery Miles 15 480 Ships in 10 - 15 working days

How many IT books have you read that are long on theory and short on practical application? They are interesting, but not very impactful. They provide a framework from which to think and understand, but lack a process from which to act. Addressing this urgent need for the IT community, The Lean IT Field Guide explains how to initiate, execute, and sustain a lean IT transformation. Illuminating a clear path to lean IT, the authors integrate more than two decades of combined experience to provide you with a proven method for creating and sustaining a true lean IT workplace. This field guide not only highlights the organizational techniques of more agile and lean processes, but also the leadership work required to help management adopt these new approaches. Based on proven methods from different industries, including banking, manufacturing, insurance, food and beverage, and logistics, the book details a clear model that covers all the components you need to achieve and sustain a favorable work environment and culture in support of lean IT. Filled with anecdotes and case studies from actual businesses, the book includes pictures, templates, and examples that illustrate the application of the lean methods discussed.

Simple Statistical Methods for Software Engineering - Data and Patterns (Hardcover): C. Ravindranath Pandian, Murali  Kumar Simple Statistical Methods for Software Engineering - Data and Patterns (Hardcover)
C. Ravindranath Pandian, Murali Kumar
R3,954 Discovery Miles 39 540 Ships in 10 - 15 working days

Although there are countless books on statistics, few are dedicated to the application of statistical methods to software engineering. Simple Statistical Methods for Software Engineering: Data and Patterns fills that void. Instead of delving into overly complex statistics, the book details simpler solutions that are just as effective and connect with the intuition of problem solvers. Sharing valuable insights into software engineering problems and solutions, the book not only explains the required statistical methods, but also provides many examples, review questions, and case studies that provide the understanding required to apply those methods to real-world problems. After reading this book, practitioners will possess the confidence and understanding to solve day-to-day problems in quality, measurement, performance, and benchmarking. By following the examples and case studies, students will be better prepared able to achieve seamless transition from academic study to industry practices. Includes boxed stories, case studies, and illustrations that demonstrate the nuances behind proper application Supplies historical anecdotes and traces statistical methods to inventors and gurus Applies basic statistical laws in their simplest forms to resolve engineering problems Provides simple techniques for addressing the issues software engineers face The book starts off by reviewing the essential facts about data. Next, it supplies a detailed review and summary of metrics, including development, maintenance, test, and agile metrics. The third section covers the fundamental laws of probability and statistics and the final section presents special data patterns in the form of tailed mathematical distributions. In addition to selecting simpler and more flexible tools, the authors have also simplified several standard techniques to provide you with the set of intellectual tools al

C2 Re-envisioned - The Future of the Enterprise (Hardcover): Marius S. Vassiliou, David S Alberts, Jonathan Russell Agre C2 Re-envisioned - The Future of the Enterprise (Hardcover)
Marius S. Vassiliou, David S Alberts, Jonathan Russell Agre
R2,099 Discovery Miles 20 990 Ships in 10 - 15 working days

Command and Control (C2) is the set of organizational and technical attributes and processes by which an enterprise marshals and employs human, physical, and information resources to solve problems and accomplish missions.C2 Re-envisioned: The Future of the Enterprise identifies four interrelated megatrends that are individually and collectively shaping the state of the art and practice of C2 as well as the mission challenges we face. These megatrends the book examines are: Big Problems -manifested in part as increasing complexity of both endeavors and enterprises, as military establishments form coalitions with each other, and partnerships with various civilian agencies and non-governmental organizations Robustly Networked Environments-enabled by the extremely broad availability of advanced information and communications technologies (ICT) that place unprecedented powers of information creation, processing, and distribution in the hands of almost anyone who wants them-friend and foe alike Ubiquitous Data-the unprecedented volumes of raw and processed information with which human actors and C2 systems must contend Organizational alternatives-as decentralized, net-enabled approaches to C2 have been made more feasible by technology. The book analyzes historical examples and experimental evidence to determine the critical factors that make C2 go wrong and how to get it right. Successful enterprises in the future will be those that can reconfigure their approaches in an agile manner. Offering fresh perspectives on this subject of critical importance, this book provides the understanding you will need to choose your organizational approaches to suit the mission and the conditions at hand.

Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Hardcover): Brij B. Gupta Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Hardcover)
Brij B. Gupta
R4,841 Discovery Miles 48 410 Ships in 10 - 15 working days

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

Project Planning and Project Success - The 25% Solution (Hardcover): Pedro Serrador Project Planning and Project Success - The 25% Solution (Hardcover)
Pedro Serrador
R1,984 Discovery Miles 19 840 Ships in 10 - 15 working days

Project planning is generally accepted as an important contributor to project success. However, is there research that affirms the positive impact of project planning and gives guidance on how much effort should be spent on planning? To answer these questions, this book looks at current literature and new research of this under-studied area of project management. The author presents his findings from an extensive review of project planning literature that covers more than 270 sources. He also discusses new research that analyzes data from more than 1,300 global projects. The book confirms that the time spent on planning activities reduces risk and significantly increases the chances of project success. It also concludes that there can be too much planning and shows that the optimum ratio of planning to effort is 25%. The book examines the impact of project planning on different industries. It discusses research in the construction and information technology (IT) industries, and presents a case study of how to plan and track a software development project. The book also looks at the impact of geography on project planning and success. Intended as a basic tool in the library of any project manager or general manager, this book brings to light project planning techniques and information that have never been published previously. It is an important resource on how to plan projects properly and propel your career forward.

Securing Systems - Applied Security Architecture and Threat Models (Hardcover): Brook S. E. Schoenfield Securing Systems - Applied Security Architecture and Threat Models (Hardcover)
Brook S. E. Schoenfield
R3,961 Discovery Miles 39 610 Ships in 10 - 15 working days

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis: When should the security architect begin the analysis? At what points can a security architect add the most value? What are the activities the architect must execute? How are these activities delivered? What is the set of knowledge domains applied to the analysis? What are the outputs? What are the tips and tricks that make security architecture risk assessment easier? To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you've seen a sufficient diversity of architectures, you'll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.

Strategic Information Management - Theory and Practice (Paperback, 5th edition): Robert D. Galliers, Dorothy E. Leidner, Boyka... Strategic Information Management - Theory and Practice (Paperback, 5th edition)
Robert D. Galliers, Dorothy E. Leidner, Boyka Simeonova
R1,703 Discovery Miles 17 030 Ships in 9 - 17 working days

Today, there are few in senior management positions who can afford to ignore modern information technology, and few individuals who would prefer to be without it. Modern IT is key to organizational performance; yet we often assume the benefits will occur without forethought or effort. As managerial tasks become more complex, so the nature of the required information systems changes - from structured, routine support to ad hoc, unstructured, complex enquiries at the highest levels of management. If taken for granted, serious implications can arise for organizations. This fifth edition of Strategic Information Management has been brought fully up to date with recent developments in the management of information systems, including digital transformation strategy, the issues surrounding big data and algorithmic decision-making. The book provides a rich source of material reflecting recent thinking on the key issues facing executives, drawing from a wide range of contemporary articles written by leading experts in North America, Europe, and Australia. Combining theory with practice, each section is fully introduced, includes further reading and questions for further discussion. Designed for MBA, master's level students, and advanced undergraduate students taking courses in information systems management, it also provides a wealth of information and references for researchers.

Backup and Recovery (Paperback): W.Curtis Preston Backup and Recovery (Paperback)
W.Curtis Preston
R1,344 R1,147 Discovery Miles 11 470 Save R197 (15%) Ships in 18 - 22 working days

Packed with practical, freely-available backup and recovery solutions for Unix, Linux, Windows and Mac OS X systems - as well as various databases - this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75 per cent new material. "Backup & Recovery" starts with a complete overview of backup philosophy and design, including the basic backup utilities of tar, dump, cpio, ntbackup, ditto, and rsync. It then explains several open source backup products that automate backups using those utilities, including AMANDA, Bacula, BackupPC, rdiff-backup, and rsnapshot. "Backup & Recovery" then explains how to perform bare metal recovery of AIX, HP-UX, Linux, Mac OS, Solaris, VMWare, & Windows systems using freely-available utilities. The book also provides overviews of the current state of the commercial backup software and hardware market, including overviews of CDP, Data De-duplication, D2D2T, and VTL technology. Finally, it covers how to automate the backups of DB2, Exchange, MySQL, Oracle, PostgreSQL, SQL-Server, and Sybase databases - without purchasing a commercial backup product to do so. For environments of all sizes and budgets, this unique book shows you how to ensure data protection without resorting to expensive commercial solutions. You will soon learn to: automate the backup of popular databases without a commercial utility; perform bare metal recovery of any popular open systems platform, including your PC or laptop; utilize valuable but often unknown open source backup products; understand the state of commercial backup software, including explanations of CDP and data de-duplication software; and access the current state of backup hardware, including Virtual Tape Libraries (VTLs).

Outsourcing - A CIO's Perspective (Paperback): Oakie D. Williams Outsourcing - A CIO's Perspective (Paperback)
Oakie D. Williams
R1,889 Discovery Miles 18 890 Ships in 10 - 15 working days

As global competition grows more fierce, companies continue to look for ways to increase their competitive edge without jeopardizing profit margins. Today's corporations are starting to realize the competitive advantage that Information Technology (IT) can bring to a company. These corporations are also realizing that staying current with technology requires a great deal of effort, risk, and expense. This is one of the primary reasons CEO's are considering outsourcing as an alternative. Written by a CIO who has successfully maneuvered through the outsourcing process, Outsourcing: A CIO's Perspective addresses the realistic expectations and the most commonly asked questions about IT outsourcing, while reviewing it's advantages and disadvantages. This text identifies key elements that can be used to assess the feasibility of securing a profitable and manageable outsourcing agreement. It provides a convincing case that even if the final decision is to not outsource, the result of the process will identify potential business improvement opportunities.

Handbook of e-Business Security (Paperback): Joao Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman,... Handbook of e-Business Security (Paperback)
Joao Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman, Manju Khari
R1,492 Discovery Miles 14 920 Ships in 10 - 15 working days

There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.

Managing NFS & NIS 2e (Paperback, 2nd edition): Hal Stern Managing NFS & NIS 2e (Paperback, 2nd edition)
Hal Stern
R1,254 R1,057 Discovery Miles 10 570 Save R197 (16%) Ships in 18 - 22 working days

This long-awaited new edition of a classic, now updated for NFS Version 3 and based on Solaris 8, shows how to set up and manage a network filesystem installation. Managing NFS and NIS is the only practical book devoted entirely to NFS and the distributed database NIS; it's a "must-have" for anyone interested in Unix networking.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, … Paperback R2,667 Discovery Miles 26 670
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang Paperback R2,606 Discovery Miles 26 060
Flash Memory Integration - Performance…
Jalil Boukhobza, Pierre Olivier Hardcover R1,831 Discovery Miles 18 310
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180
Intelligent Systems for Information…
B. Bouchon-Meunier, L. Foulloy, … Hardcover R3,257 Discovery Miles 32 570
A Study of Black Hole Attack Solutions…
Elahe Fazeldehkordi, I.S. Dr. Amiri, … Paperback R1,277 Discovery Miles 12 770
Technology Integration and Foundations…
Shuyan Wang, Taralynn Hartsell Hardcover R4,500 Discovery Miles 45 000
Systems Thinkers
Magnus Ramage, Karen Shipp Paperback R1,966 R1,858 Discovery Miles 18 580
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, … Paperback R2,763 Discovery Miles 27 630
Interference Mitigation and Energy in 5G…
Chungang Yang, Jiandong Li Hardcover R4,954 Discovery Miles 49 540

 

Partners