![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Systems management
This is the story of an up-and-coming project manager that has been handed a large program to lead. Follow along as Susan Codwell, Program Manager for FitAtWork Inc., struggles, leads, stumbles, and grows into the role of program manager. Throughout this book you will gain a clear understanding of the core program management processes and components involved. An engaging story of what makes program management effective, From Projects to Programs: A Project Manager's Journey introduces key program management concepts in a manner that is easy to understand. It provides a backstage view into the workings of program management, program organization, team dynamics, and the skills required to manage programs. Presents new ideas on program organization and reporting Identifies the critical skills required of program managers Supplies helpful tips for managing project managers Includes reflections at the end of each chapter that reinforce key concepts Narrated through the eyes of a program manager, the book provides you with the opportunity to experience the ins and outs of real-world program management. Every project team member will find themselves somewhere in this story. Whether you are an aspiring program manager, a successful project manager, or a project team member, this book offers a fascinating glimpse into what it takes to run successful programs in today's business environment.
These proceedings of the symposium ISIT 2014 aim to be a platform for international exchange of the state-of-the-art research and practice in information technology. The contributions cover a wide variety of topics, ranging from theoretical and analytical studies to various applications.
Graphite has become one of the most powerful monitoring tools available today, due to its ease of use, rapid graph prototyping abilities, and a friendly rendering API. With this practical guide, system administrators and engineers will learn how to use this open source tool to track operational data you need to monitor your systems, as well as application-level metrics for profiling your services. Author Jason Dixon, member of the Graphite project, provides a thorough introduction of Graphite from the basics to the skills and tools you need for troubleshooting and scaling out its software components. If you want to learn more about monitoring systems, services, or applications, this is the book you need. Get an introduction to monitoring, including important concepts and terminology Examine the features and functionality of key Graphite components, including Carbon and Whisper Learn the typical user workflow necessary to create a basic line chart Build complex charts with chained functions and multiple axes that interact directly with the rendering API Understand how to use the native Graphite dashboard, as well as the more popular third-party dashboards Master the art of scaling and troubleshooting high-performance or highly available Graphite clusters
Networks are everywhere, from the internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network science.
Security-enriched urban computing and smart grids are areas that attracted many a- demic and industry professionals to research and develop. The goal of this conference was to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of urban computing and the smart grid. This conference includes the following special sessions: Signal Processing, Image Processing, Pattern Recognition and Communications (SIPC 2010), Networking, Fault-tolerance and Security For Distributed Computing Systems (NFSDCS 2010), Security Technology Application (STA 2010), Electric Transportation (ElecTrans 2010), Techniques of Bi-directional Power Computing in High Voltage Power Supply (TBPC 2010), Low Power IT and Applications (LPITA 2010), Computational Intel- gence and Soft Computing (CISC 2010), Distributed Computing and Sensor Networks (DCSN 2010), Advanced Fusion IT (AFIT 2010), Social Media and Social Netwo- ing (SMSN 2010), Software Engineering and Medical Information Engineering (SEMIE 2010), Human-Centered Advanced Research/Education (HuCARE 2010), Database Integrity and Security (DIS 2010), Ubiquitous IT Application (UITA 2010) and Smart Grid Applications (SGA 2010). We would like to express our gratitude to all of the authors of the submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future.
"Sharing knowledge is power." If ever there were a field to which this applies, it is the knowledge management industry. And in today's highly-competitive, fast-paced business world, corporations, businesses and organizations in both the public and private sectors are constantly searching for new cutting-edge methods and techniques for creating, storing, capturing, managing, organizing, distributing, combining, and retrieving knowledge. But the task of accomplishing such functions is not as simple as it sounds. Jay Liebowitz's Building Organizational Intelligence: A Knowledge Management Primer gives executives, managers, systems analysts, and other knowledge-management professionals the competitive edge they need in achieving that task. In a concise and easy-to-read format, the book describes the concepts, techniques, methodologies, and tools associated with those functions, and includes mini-case studies and vignettes of how industry is developing and applying these functions towards building organizational intelligence. What's more, the book is packaged with a limited functionality version of "WisdomBuilder," the first in a family of knowledge-management tools that provide a fully integrated solution to the information management and analysis dilemma. Able to run under Windows 95, 98 and NT, "WisdomBuilder" solves the information overload problem by reducing the time and cost of extracting information and other research knowledge from disorganized repositories of heterogeneous data.
This book constitutes revised selected papers from the 9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, held in Singapore, in April 2018.The 14 papers presented in this volume were carefully reviewed and selected from 31 submissions. They were organized in topical sections named: countermeasures against side-channel attacks; tools for side-channel analysis; fault attacks and hardware trojans; and side-channel analysis attacks.
One of the hottest trends in the networking industry is to apply analytics to improve performance, security, and value. Everyone's talking about integrating analytics in networks. But successfully doing so requires a deep understanding of both networking and data, and that's a rare combination. This book's author, John Garrett, is currently Analytics Technical Lead for Cisco Advanced Services, where he draws on his MS in Predictive Analytics to develop analytics use cases for many of Cisco's most sophisticated customers. In Computer Networking Data Analytics, Garrett illuminates the data of networking, revealing the power of the information that's already available in your environment. Next, he introduces powerful techniques for using that information to accelerate innovation, and build a better network. Garrett walks step-by-step through a wide spectrum of common networking analytics techniques and scenarios, illuminating the insights underlying them, and helping you adapt them for your own environment. He concludes with several end-to-end case studies demonstrating how his team has developed high-value use cases for some of Cisco's largest customers. These end-to-end use cases can serve as repeatable templates for developing your own solutions in areas ranging from advanced troubleshooting and self-healing to service assurance. They will help you drive more value from telemetry, event analytics, network infrastructure metadata, and all the information you have.
This open access book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter it discusses realistic ways forward. In discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers. The Snowden files and recent deliberations on the use of Chinese equipment in the critical infrastructures of western countries have changed this. The discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security. This book is of great interest to ICT and security professionals who need a clear understanding of the two questions posed in the subtitle, and to decision-makers in industry, national bodies and nation states.
This book looks at various application and data demand drivers, along with data infrastructure options from legacy on premise, public cloud, hybrid, software-defined data center (SDDC), software data infrastructure (SDI), container as well as serverless along with infrastructure as a Service (IaaS), IT as a Service (ITaaS) along with related technology, trends, tools, techniques and strategies. Filled with example scenarios, tips and strategy considerations, the book covers frequently asked questions and answers to aid strategy as well as decision-making.
Extensive research conducted by the Hasso Plattner Design Thinking Research Program at Stanford University in Palo Alto, California, USA, and the Hasso Plattner Institute in Potsdam, Germany, has yielded valuable insights on why and how design thinking works. Researchers have identified metrics, developed models, and conducted studies, which are featured in this book, and in the previous volumes of this series. Offering readers a closer look at design thinking, and its innovation processes and methods, this volume covers topics ranging from understanding success factors of design thinking to exploring the potential that lies in the use of digital technologies. Furthermore, readers learn how special-purpose design thinking can be used to solve thorny problems in complex fields, such as the health sector or software development. Thinking and devising innovations are inherently human activities - so is design thinking. Accordingly, design thinking is not merely the result of special courses or of being gifted or trained: it is a way of dealing with our environment and improving techniques, technologies and life. As such, the research outcomes compiled in this book should increase knowledge and provide inspiration to all seeking to drive innovation - be they experienced design thinkers or newcomers.
An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.
This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of systematic cyber-resilience within this structure and how to evolve the protection to correctly address the threat environment. This revolves around the steps to perform strategic cyber-resilience planning, implementation and evolution. Readers will know how to perform the necessary activities to identify, prioritize and deploy targeted controls and maintain a persistent and reliable reporting system.
This book constitutes the proceedings of the 12th International Conference on Queueing Theory and Network Applications, QTNA 2017, held in Qinhuangdao, China, in August 2017. The 19 full papers included in this volume were carefully reviewed and selected from 65 initial submissions. They deal with queueing models; queueing applications; and network models.
An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.
How can machine learning help the design of future communication networks - and how can future networks meet the demands of emerging machine learning applications? Discover the interactions between two of the most transformative and impactful technologies of our age in this comprehensive book. First, learn how modern machine learning techniques, such as deep neural networks, can transform how we design and optimize future communication networks. Accessible introductions to concepts and tools are accompanied by numerous real-world examples, showing you how these techniques can be used to tackle longstanding problems. Next, explore the design of wireless networks as platforms for machine learning applications - an overview of modern machine learning techniques and communication protocols will help you to understand the challenges, while new methods and design approaches will be presented to handle wireless channel impairments such as noise and interference, to meet the demands of emerging machine learning applications at the wireless edge.
You did it. You successfully transformed your application into a microservices architecture. But now that you're running services across different environments-public to public, private to public, virtual machine to container-your cloud native software is beginning to encounter reliability issues. How do you stay on top of this ever-increasing complexity? With the Istio service mesh, you'll be able to manage traffic, control access, monitor, report, get telemetry data, manage quota, trace, and more with resilience across your microservice. In this book, Lee Calcote and Zack Butcher explain why your services need a service mesh and demonstrate step-by-step how Istio fits into the life cycle of a distributed application. You'll learn about the tools and APIs for enabling and managing many of the features found in Istio. Explore the observability challenges Istio addresses Use request routing, traffic shifting, fault injection, and other features essential to running a solid service mesh Generate and collect telemetry information Try different deployment patterns, including A/B, blue/green, and canary Get examples of how to develop and deploy real-world applications with Istio support
Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of driving. Big data analytics, as an emerging analytical technology, offers the capability to collect, store, process, and visualize these vast amounts of data. Big Data Analytics in Cybersecurity examines security challenges surrounding big data and provides actionable insights that can be used to improve the current practices of network operators and administrators. Applying big data analytics in cybersecurity is critical. By exploiting data from the networks and computers, analysts can discover useful network information from data. Decision makers can make more informative decisions by using this analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, tools, and other aspects of the network processes. Bringing together experts from academia, government laboratories, and industry, the book provides insight to both new and more experienced security professionals, as well as data analytics professionals who have varying levels of cybersecurity expertise. It covers a wide range of topics in cybersecurity, which include: Network forensics Threat analysis Vulnerability assessment Visualization Cyber training. In addition, emerging security domains such as the IoT, cloud computing, fog computing, mobile computing, and cyber-social networks are examined. The book first focuses on how big data analytics can be used in different aspects of cybersecurity including network forensics, root-cause analysis, and security training. Next it discusses big data challenges and solutions in such emerging cybersecurity domains as fog computing, IoT, and mobile app security. The book concludes by presenting the tools and datasets for future cybersecurity research.
This rigorous introduction to network science presents random graphs as models for real-world networks. Such networks have distinctive empirical properties and a wealth of new models have emerged to capture them. Classroom tested for over ten years, this text places recent advances in a unified framework to enable systematic study. Designed for a master's-level course, where students may only have a basic background in probability, the text covers such important preliminaries as convergence of random variables, probabilistic bounds, coupling, martingales, and branching processes. Building on this base - and motivated by many examples of real-world networks, including the Internet, collaboration networks, and the World Wide Web - it focuses on several important models for complex networks and investigates key properties, such as the connectivity of nodes. Numerous exercises allow students to develop intuition and experience in working with the models.
Executives should not necessarily know the intricacies of project management, but they should know how project management, as a discipline, can benefit the organization in implementing its strategies and realizing its vision. The only way that executives can effectively apply project management to realize these goals is to have sound knowledge of the project management discipline. The purpose of this book is to provide executives with a comprehensive overview of the discipline of project management. It focuses on the benefits of project management to an organization. The goal is to provide executives with a view as to how project management can deliver organizational strategies. The various chapters focus on specific aspects within the project management discipline and how each aspect should be managed from a business perspective. The book covers the entire spectrum of project management from a management and leadership perspective. The focus is not necessarily on what needs to be done from a project management perspective, but on what organizations and senior executives can do to facilitate projects. The book covers: The value of project management Project management as a strategic enabler Project, program, and portfolio management The role of the project management office in the successful delivery of projects, programs, and portfolios The benefits of project deliverables bring Sustainability of the organization Governance and the role of the project sponsor. The book concludes with a comprehensive portfolio, program, and project management framework. This holistic framework enables organizations to achieve value from project management and realize strategic goals.
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.
This book is the comprehensive guide to Samba administration, officially adopted by the Samba Team. Wondering how to integrate Samba's authentication with that of a Windows domain? How to get Samba to serve Microsoft Dfs shares? How to share files on Mac OS X? These and a dozen other issues of interest to system administrators are covered. A whole chapter is dedicated to troubleshooting! The range of this book knows few bounds. Using Samba takes you from basic installation and configuration -- on both the client and server side, for a wide range of systems -- to subtle details of security, cross-platform compatibility, and resource discovery that make the difference between whether users see the folder they expect or a cryptic error message. The current edition covers such advanced 3.x features as: Integration with Active Directory and OpenLDAP Migrating from Windows NT 4.0 domains to Samba Delegating administrative tasks to non-root users Central printer management Advanced file serving features, such as making use of Virtual File System (VFS) plugins. Samba is a cross-platform triumph: robust, flexible and fast, it turns a Unix or Linux system into a file and print server for Microsoft Windows network clients. This book will help you make your file and print sharing as powerful and efficient as possible. The authors delve into the internals of the Windows activities and protocols to an unprecedented degree, explaining the strengths and weaknesses of each feature in Windows domains and in Samba itself. Whether you're playing on your personal computer or an enterprise network, on one note or a full three-octave range, Using Samba will give you an efficient and secure server.
Performability modelling and evaluation brings together two disciplines that have long been treated separately in different communities: computer and communication system performance evaluation and system reliability and availability evaluation.
—Network throughput when network nodes and links fail. —Task completion times on degradable multiprocessor systems. —A variety of modelling and evaluation techniques. Computer scientists and engineers will find this excellent overview compulsive reading as will postgraduates and researchers in computer science and related fields.
This book highlights all aspects of laboratory informatics, with a focus on information management and the corresponding hardware and technical processes involved. In addition to a comprehensive introduction on laboratory informatics, the book emphasizes the importance of information and resource management as opposed to simply covering the role of computers that support the information system. As a Professor of Pathology and the Director of Laboratory Information Services at the University of Texas Medical Branch at Galveston, Dr. Cowan has witnessed the shift in focus in the laboratory from the information generation to information management, and increasing resource limitations demand a higher level of management precision than can be gained from manual methods. The American Board of Pathology now requires an increasing sophistication in information management from candidates for certification. Thus, this book is intended for pathologists and residents in pathology, clinical laboratory scientists, and laboratory and information managers. Following the broad-based introduction on laboratory informatics, the book's topics include: computer basics; development and validation of the laboratory information system; computer networks; security and confidentiality on computer systems and networks; total cost of ownership; essential software; interfaces; process modeling; artificial intelligence and expert systems; bar coding in the laboratory; image analysis and computer-assisted quantitation; and telepathology.
This book contains a collection of 24 state-of-the-art contributions in the area of Information Systems Engineering. It was compiled as a tribute to Professor Janis Bubenko on the occasion of his retirement from the University of Stockholm in February 2000. The contributions are arranged in three sections: - Information Society, with such subjects as B2B E-Commerce, human imperfection, stream data management and enterprise modeling - Approaches to Information Systems Engineering, discussing data warehouse development, web-enabled methods, reuse, and meta-data - Concepts for Information Systems, on more fundamental notions such as time, abstraction, co-operation, intention and information All the contributors are well-known and highly reputed scholars in the area of Information Systems Engineering from all over the world. |
![]() ![]() You may like...
Catalogue of the 1st International…
Royal Society of Marine Artists
Paperback
R597
Discovery Miles 5 970
Helping Children Learn About Domestic…
Catherine Lawler, Abigail Sterne, …
Paperback
R921
Discovery Miles 9 210
Introduction to Adobe Photoshop CS6 with…
AGI Creative Team
Paperback
Complete Lego Minifigure Catalog…
Christopher Bartneck
Hardcover
|