0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (5)
  • R500+ (854)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

How to Build a Cyber-Resilient Organization (Paperback): Dan Shoemaker, Anne Kohnke, Ken Sigler How to Build a Cyber-Resilient Organization (Paperback)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R2,310 Discovery Miles 23 100 Ships in 12 - 19 working days

This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of systematic cyber-resilience within this structure and how to evolve the protection to correctly address the threat environment. This revolves around the steps to perform strategic cyber-resilience planning, implementation and evolution. Readers will know how to perform the necessary activities to identify, prioritize and deploy targeted controls and maintain a persistent and reliable reporting system.

Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Paperback, Expanded... Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Paperback, Expanded edition)
Wouter de Nooy, Andrej Mrvar, Vladimir Batagelj
R1,327 Discovery Miles 13 270 Ships in 12 - 19 working days

An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.

Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Hardcover, Expanded... Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Hardcover, Expanded edition)
Wouter de Nooy, Andrej Mrvar, Vladimir Batagelj
R3,446 Discovery Miles 34 460 Ships in 12 - 19 working days

An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.

Queueing Theory and Network Applications - 12th International Conference, QTNA 2017, Qinhuangdao, China, August 21-23, 2017,... Queueing Theory and Network Applications - 12th International Conference, QTNA 2017, Qinhuangdao, China, August 21-23, 2017, Proceedings (Paperback, 1st ed. 2017)
Wuyi Yue, Quanlin Li, Shunfu Jin, Zhanyou Ma
R2,457 Discovery Miles 24 570 Ships in 10 - 15 working days

This book constitutes the proceedings of the 12th International Conference on Queueing Theory and Network Applications, QTNA 2017, held in Qinhuangdao, China, in August 2017. The 19 full papers included in this volume were carefully reviewed and selected from 65 initial submissions. They deal with queueing models; queueing applications; and network models.

Istio: Up and Running - Using a Service Mesh to Connect, Secure, Control, and Observe (Paperback): Lee Calcote, Zack Butcher Istio: Up and Running - Using a Service Mesh to Connect, Secure, Control, and Observe (Paperback)
Lee Calcote, Zack Butcher
R1,119 R984 Discovery Miles 9 840 Save R135 (12%) Ships in 12 - 19 working days

You did it. You successfully transformed your application into a microservices architecture. But now that you're running services across different environments-public to public, private to public, virtual machine to container-your cloud native software is beginning to encounter reliability issues. How do you stay on top of this ever-increasing complexity? With the Istio service mesh, you'll be able to manage traffic, control access, monitor, report, get telemetry data, manage quota, trace, and more with resilience across your microservice. In this book, Lee Calcote and Zack Butcher explain why your services need a service mesh and demonstrate step-by-step how Istio fits into the life cycle of a distributed application. You'll learn about the tools and APIs for enabling and managing many of the features found in Istio. Explore the observability challenges Istio addresses Use request routing, traffic shifting, fault injection, and other features essential to running a solid service mesh Generate and collect telemetry information Try different deployment patterns, including A/B, blue/green, and canary Get examples of how to develop and deploy real-world applications with Istio support

Big Data Analytics in Cybersecurity (Hardcover): Onur Savas, Julia Deng Big Data Analytics in Cybersecurity (Hardcover)
Onur Savas, Julia Deng
R3,896 Discovery Miles 38 960 Ships in 12 - 19 working days

Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of driving. Big data analytics, as an emerging analytical technology, offers the capability to collect, store, process, and visualize these vast amounts of data. Big Data Analytics in Cybersecurity examines security challenges surrounding big data and provides actionable insights that can be used to improve the current practices of network operators and administrators. Applying big data analytics in cybersecurity is critical. By exploiting data from the networks and computers, analysts can discover useful network information from data. Decision makers can make more informative decisions by using this analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, tools, and other aspects of the network processes. Bringing together experts from academia, government laboratories, and industry, the book provides insight to both new and more experienced security professionals, as well as data analytics professionals who have varying levels of cybersecurity expertise. It covers a wide range of topics in cybersecurity, which include: Network forensics Threat analysis Vulnerability assessment Visualization Cyber training. In addition, emerging security domains such as the IoT, cloud computing, fog computing, mobile computing, and cyber-social networks are examined. The book first focuses on how big data analytics can be used in different aspects of cybersecurity including network forensics, root-cause analysis, and security training. Next it discusses big data challenges and solutions in such emerging cybersecurity domains as fog computing, IoT, and mobile app security. The book concludes by presenting the tools and datasets for future cybersecurity research.

Monitoring with Graphite (Paperback): Jason Dixon Monitoring with Graphite (Paperback)
Jason Dixon
R1,074 R814 Discovery Miles 8 140 Save R260 (24%) Ships in 12 - 19 working days

Graphite has become one of the most powerful monitoring tools available today, due to its ease of use, rapid graph prototyping abilities, and a friendly rendering API. With this practical guide, system administrators and engineers will learn how to use this open source tool to track operational data you need to monitor your systems, as well as application-level metrics for profiling your services. Author Jason Dixon, member of the Graphite project, provides a thorough introduction of Graphite from the basics to the skills and tools you need for troubleshooting and scaling out its software components. If you want to learn more about monitoring systems, services, or applications, this is the book you need. Get an introduction to monitoring, including important concepts and terminology Examine the features and functionality of key Graphite components, including Carbon and Whisper Learn the typical user workflow necessary to create a basic line chart Build complex charts with chained functions and multiple axes that interact directly with the rendering API Understand how to use the native Graphite dashboard, as well as the more popular third-party dashboards Master the art of scaling and troubleshooting high-performance or highly available Graphite clusters

Random Graphs and Complex Networks (Hardcover): Remco van der Hofstad Random Graphs and Complex Networks (Hardcover)
Remco van der Hofstad
R1,636 Discovery Miles 16 360 Ships in 12 - 19 working days

This rigorous introduction to network science presents random graphs as models for real-world networks. Such networks have distinctive empirical properties and a wealth of new models have emerged to capture them. Classroom tested for over ten years, this text places recent advances in a unified framework to enable systematic study. Designed for a master's-level course, where students may only have a basic background in probability, the text covers such important preliminaries as convergence of random variables, probabilistic bounds, coupling, martingales, and branching processes. Building on this base - and motivated by many examples of real-world networks, including the Internet, collaboration networks, and the World Wide Web - it focuses on several important models for complex networks and investigates key properties, such as the connectivity of nodes. Numerous exercises allow students to develop intuition and experience in working with the models.

Implementing Cybersecurity - A Guide to the National Institute of Standards and Technology Risk Management Framework... Implementing Cybersecurity - A Guide to the National Institute of Standards and Technology Risk Management Framework (Hardcover)
Anne Kohnke, Ken Sigler, Dan Shoemaker
R3,732 Discovery Miles 37 320 Ships in 12 - 19 working days

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

Using Samba 3e (Paperback, 3rd Revised edition): Gerald Carter Using Samba 3e (Paperback, 3rd Revised edition)
Gerald Carter; Contributions by Jay Ts, Robert Eckstein
R1,092 R832 Discovery Miles 8 320 Save R260 (24%) Ships in 12 - 19 working days

This book is the comprehensive guide to Samba administration, officially adopted by the Samba Team. Wondering how to integrate Samba's authentication with that of a Windows domain? How to get Samba to serve Microsoft Dfs shares? How to share files on Mac OS X? These and a dozen other issues of interest to system administrators are covered. A whole chapter is dedicated to troubleshooting!

The range of this book knows few bounds. Using Samba takes you from basic installation and configuration -- on both the client and server side, for a wide range of systems -- to subtle details of security, cross-platform compatibility, and resource discovery that make the difference between whether users see the folder they expect or a cryptic error message. The current edition covers such advanced 3.x features as: Integration with Active Directory and OpenLDAP Migrating from Windows NT 4.0 domains to Samba Delegating administrative tasks to non-root users Central printer management Advanced file serving features, such as making use of Virtual File System (VFS) plugins.

Samba is a cross-platform triumph: robust, flexible and fast, it turns a Unix or Linux system into a file and print server for Microsoft Windows network clients. This book will help you make your file and print sharing as powerful and efficient as possible. The authors delve into the internals of the Windows activities and protocols to an unprecedented degree, explaining the strengths and weaknesses of each feature in Windows domains and in Samba itself.

Whether you're playing on your personal computer or an enterprise network, on one note or a full three-octave range, Using Samba will give you an efficient and secure server.

Network Science (Hardcover): Albert-Laszlo Barabasi Network Science (Hardcover)
Albert-Laszlo Barabasi; As told to Marton Posfai
R1,616 Discovery Miles 16 160 Ships in 9 - 17 working days

Networks are everywhere, from the internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network science.

Database Management Systems (Hardcover, 3rd edition): Raghu Ramakrishnan, Johannes Gehrke Database Management Systems (Hardcover, 3rd edition)
Raghu Ramakrishnan, Johannes Gehrke
R10,069 Discovery Miles 100 690 Ships in 12 - 19 working days

Database Management Systems provides comprehensive and up-to-date coverage of the fundamentals of database systems. Coherent explanations and practical examples have made this one of the leading texts in the field. The third edition continues in this tradition, enhancing it with more practical material.

The new edition has been reorganized to allow more flexibility in the way the course is taught. Now, instructors can easily choose whether they would like to teach a course which emphasizes database application development or a course that emphasizes database systems issues. New overview chapters at the beginning of parts make it possible to skip other chapters in the part if you dont want the detail.

More applications and examples have been added throughout the book, including SQL and Oracle examples. The applied flavor is further enhanced by the two new database applications chapters.

Performability Modelling - Techniques & Tools (Hardcover): B.R. Haverkort Performability Modelling - Techniques & Tools (Hardcover)
B.R. Haverkort
R3,450 Discovery Miles 34 500 Ships in 12 - 19 working days

Performability modelling and evaluation brings together two disciplines that have long been treated separately in different communities: computer and communication system performance evaluation and system reliability and availability evaluation.

  • Provides a single-source reference covering of all aspects of performability evaluation.
  • Introduces a new approach to assessing the performance and dependability of systems thus revealing system characteristics that cannot be uncovered separately by performance or reliability evaluation.
  • Explains how systems can operate partially in the presence of failures by discussing:
—Capacity of failure prone clusters of transaction processing systems.
—Network throughput when network nodes and links fail.
—Task completion times on degradable multiprocessor systems.
—A variety of modelling and evaluation techniques.
  • Features software tool descriptions to support performability evaluations as well as an extensive bibliography.

    Computer scientists and engineers will find this excellent overview compulsive reading as will postgraduates and researchers in computer science and related fields.

  • Biology and Ecology of the Brown and Sea Trout - State of the Art and Research Themes (Paperback, 1999 ed.): J.L. Bagliniere,... Biology and Ecology of the Brown and Sea Trout - State of the Art and Research Themes (Paperback, 1999 ed.)
    J.L. Bagliniere, Gerard Maisse
    R1,538 Discovery Miles 15 380 Ships in 10 - 15 working days

    This book contains a collection of 24 state-of-the-art contributions in the area of Information Systems Engineering. It was compiled as a tribute to Professor Janis Bubenko on the occasion of his retirement from the University of Stockholm in February 2000. The contributions are arranged in three sections: - Information Society, with such subjects as B2B E-Commerce, human imperfection, stream data management and enterprise modeling - Approaches to Information Systems Engineering, discussing data warehouse development, web-enabled methods, reuse, and meta-data - Concepts for Information Systems, on more fundamental notions such as time, abstraction, co-operation, intention and information All the contributors are well-known and highly reputed scholars in the area of Information Systems Engineering from all over the world.

    Machine Learning and Wireless Communications (Hardcover): Yonina C. Eldar, Andrea Goldsmith, Deniz Gunduz, H. Vincent Poor Machine Learning and Wireless Communications (Hardcover)
    Yonina C. Eldar, Andrea Goldsmith, Deniz Gunduz, H. Vincent Poor
    R2,559 Discovery Miles 25 590 Ships in 12 - 19 working days

    How can machine learning help the design of future communication networks - and how can future networks meet the demands of emerging machine learning applications? Discover the interactions between two of the most transformative and impactful technologies of our age in this comprehensive book. First, learn how modern machine learning techniques, such as deep neural networks, can transform how we design and optimize future communication networks. Accessible introductions to concepts and tools are accompanied by numerous real-world examples, showing you how these techniques can be used to tackle longstanding problems. Next, explore the design of wireless networks as platforms for machine learning applications - an overview of modern machine learning techniques and communication protocols will help you to understand the challenges, while new methods and design approaches will be presented to handle wireless channel impairments such as noise and interference, to meet the demands of emerging machine learning applications at the wireless edge.

    Hardening Cisco Routers (Paperback): Thomas Akin Hardening Cisco Routers (Paperback)
    Thomas Akin
    R607 R551 Discovery Miles 5 510 Save R56 (9%) Ships in 10 - 15 working days

    This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. This is a reference for protecting the protectors, and author Thomas Akin supplies all the tools necessary to turn a potential vulnerability into a strength.

    T1: A Survival Guide - Provisioning & Managing Leased-Line Circuits (Book, 1st ed): Matthew S. Gast T1: A Survival Guide - Provisioning & Managing Leased-Line Circuits (Book, 1st ed)
    Matthew S. Gast
    R960 R738 Discovery Miles 7 380 Save R222 (23%) Ships in 12 - 19 working days

    This practical, applied reference to T1 for system and network administrators brings together in one place the information you need to set up, test, and troubleshoot T1. You'll learn what components you need to build a T1 line; how the components interact to transmit data; how to adapt the T1 to work with data networks using standardized link layer protocols; troubleshooting strategies; and working with vendors.

    BTEC Level 3 National IT Student Book 1 (Paperback, 3rd edition): Karen Anderson, Alan Jarvis, Allen Kaye, Jenny Phillips,... BTEC Level 3 National IT Student Book 1 (Paperback, 3rd edition)
    Karen Anderson, Alan Jarvis, Allen Kaye, Jenny Phillips, Andrew Smith, … 1
    R1,320 Discovery Miles 13 200 Ships in 12 - 19 working days

    Resources designed to support learners of the 2010 BTEC Level 3 National IT specification*. Extensive unit coverage: Student Book 1 covers 14 units including all the mandatory units, giving learners the breadth to tailor the course to their needs and interests, when combined with Student Book 2. Functional Skills and Personal Learning and Thinking Skills are embedded in activities throughout the book. WorkSpace case studies take learners into the real world of work, showing them how they can apply their knowledge in a real-life context.

    Thinking of...Backing Up Data In Your Business? Ask the Smart Questions (Paperback): Guy Bunker, Gareth Fraser-King Thinking of...Backing Up Data In Your Business? Ask the Smart Questions (Paperback)
    Guy Bunker, Gareth Fraser-King
    R671 Discovery Miles 6 710 Ships in 10 - 15 working days

    Although backup and recovery seems as simple as copying bits from point to point, it is far more challenging to implement properly when considering the details involved. This book captures the decades of backup and storage experience that Gareth Fraser-King and Guy Bunker have in the industry and make them ideally suited to provide the insights and questions you should be asking of your backup vendor or provider.Pat Hanavan, Vice President, Symantec Corporation

    Windows 2000 Administration (Paperback): George Spalding Windows 2000 Administration (Paperback)
    George Spalding
    R1,403 R1,188 Discovery Miles 11 880 Save R215 (15%) Ships in 10 - 15 working days

    Implement and manage Microsoft's revolutionary directory-enabled platform.

    Plan, deploy, and administer Windows 2000 in your enterprise. Windows 2000 Administration offers expert advice on all installation, migration, and management issues and provides in-depth details on Windows 2000 features, including the Active Directory, Microsoft Management Console (MMC), and Intellimirror. You'll also get complete information on the new security, backup, and disaster recovery options. No network administrator should be without this essential guide.

    • Install, configure, and deploy essential Windows 2000 network services, such as Dynamic DNS and Dynamic Host Configuration Protocol (DHCP)
    • Manage a secure, distributed network using the Active Directory
    • Create and organize AD objects - domains, organizational units (OUs), users, groups, computers, printers, and shared folders
    • Implement the Windows 2000 NTFSv5 File System and the Storage Management features
    • Take advantage of centralized deployment and administration features--offline folders, remote OS install, and the Group Policy-based controls of Intellimirror
    • Administer the entire enterprise from within the MMC
    • Enable remote access with Routing and Remote Access Service (RRAS)
    • Secure your network using Kerberos v5, file encryption, Public Key Infrastructure (PKI) support, and Windows File Protection
    • Backup to Zip drives, CDs, other hard drives or volumes, and tapes
    Juniper MX Series 2e (Paperback, 2nd Revised edition): Douglas Hanks, Harry Reynolds Juniper MX Series 2e (Paperback, 2nd Revised edition)
    Douglas Hanks, Harry Reynolds
    R2,033 Discovery Miles 20 330 Ships in 10 - 15 working days

    Discover why routers in the Juniper MX Series-with their advanced feature sets and record-breaking scale-are so popular among enterprises and network service providers. This revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using advanced firewall filters, redundant inline services, powerful CoS tool sets, and many other Juniper MX features. This second edition was written by a Senior NOC Engineer, whose vast experience with the MX Series is well documented. Each chapter covers a specific Juniper MX vertical and includes review questions to help you test what you've learned. This edition includes new chapters on load balancing and vMX-Juniper MX's virtual instance. Discover Junos architecture, MX chassis, and Trio Linecards Work with Juniper MX's bridging, VLAN VXLAN, and virtual switches Create a firewall filter framework and discover the latest flexible filtering options Secure your router and add an extra layer of security with Junos DDOS protection and SCFD feature Discover the advantages of hierarchical scheduling, ingress queuing, and flexible remarking Combine Juniper MX routers, using a virtual chassis or MC-LAG Understand and use classical and advanced Trio Chipset's load balancing features Dive into Trio inline services such as inline NAT, redundant logical tunnel, or filter-based GRE tunnel Discover vMX internal architecture and explore the benefits and typical use case of a virtual router

    Solaris 8 Administrator's Guide (Paperback, 1st ed): Paul Watters Solaris 8 Administrator's Guide (Paperback, 1st ed)
    Paul Watters
    R958 R736 Discovery Miles 7 360 Save R222 (23%) Ships in 12 - 19 working days

    This guide covers all aspects of deploying Solaris as an enterprise-level network operating system, with a focus on e-commerce. Written for experienced network administrators who want an objective guide to networking with Solaris, the book covers installation on the Intel and Sparc platforms, and instructs you how to setup Solaris as a file server, application server, and database server.

    Networking Essentials - A CompTIA Network+ N10-008 Textbook (Paperback, 6th edition): Jeffrey Beasley, Piyasat Nilkaew Networking Essentials - A CompTIA Network+ N10-008 Textbook (Paperback, 6th edition)
    Jeffrey Beasley, Piyasat Nilkaew
    R1,778 Discovery Miles 17 780 Ships in 12 - 19 working days

    Thoroughly updated to reflect the CompTIA (R) Network+ N10-008 exam, Networking Essentials, Sixth Edition is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of a working network administrator, it requires absolutely no experience with either network concepts or day-to-day network management. Networking Essentials, Sixth Edition guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; routing protocols; local, campus, and wide area network configuration; network security; wireless networking; optical networks; Voice over IP; the network server; and Linux networking. This edition reflects the latest exam topics and objectives associated with network security and hardening, cloud networking, virtualization, 5G, and other recent advances in wireless technology, infrastructure management, and current hardware and devices. It also explains many new terms now addressed by CompTIA's N10-008 exam. Clear goals are outlined for each chapter, and every concept is introduced in easy-to-understand language that explains how and why networking technologies are used. Each chapter is packed with real-world examples and practical exercises that reinforce all concepts and guide you through using them to configure, analyze, and fix networks. CHALLENGE SIMULATION SOFTWARE provides hands-on experience with entering router and switch commands, setting up functions, and configuring interfaces and protocols WIRESHARK NETWORK PROTOCOL ANALYZER presents techniques and examples of data traffic analysis throughout PROVEN TOOLS FOR MORE EFFECTIVE LEARNING AND NETWORK+ PREP, including chapter outlines, summaries, and Network+ objectives WORKING EXAMPLES IN EVERY CHAPTER to reinforce key concepts and promote mastery KEY TERM DEFINITIONS, LISTINGS, AND EXTENSIVE GLOSSARY to help you master the language of networking QUESTIONS, PROBLEMS, AND CRITICAL THINKING QUESTIONS to help you deepen your understanding

    IT Service Management - Support for your ITSM Foundation exam (Paperback, 3rd New edition): John Sansbury, Ernest Brewster,... IT Service Management - Support for your ITSM Foundation exam (Paperback, 3rd New edition)
    John Sansbury, Ernest Brewster, Aidan Lawes, Richard Griffiths
    R1,077 Discovery Miles 10 770 Ships in 9 - 17 working days

    Whether you're preparing for your service management foundation exam, or simply want to understand service management better, this new edition of our popular book covers the latest thinking and provides a comprehensive, practical introduction to IT service management. Building on their collective service management experience, the authors walk you through essential concepts including processes, functions and roles and illustrate these with real-life examples.

    Backup and Recovery (Paperback): W.Curtis Preston Backup and Recovery (Paperback)
    W.Curtis Preston
    R1,580 R1,031 Discovery Miles 10 310 Save R549 (35%) Ships in 12 - 19 working days

    Packed with practical, freely-available backup and recovery solutions for Unix, Linux, Windows and Mac OS X systems - as well as various databases - this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75 per cent new material. "Backup & Recovery" starts with a complete overview of backup philosophy and design, including the basic backup utilities of tar, dump, cpio, ntbackup, ditto, and rsync. It then explains several open source backup products that automate backups using those utilities, including AMANDA, Bacula, BackupPC, rdiff-backup, and rsnapshot. "Backup & Recovery" then explains how to perform bare metal recovery of AIX, HP-UX, Linux, Mac OS, Solaris, VMWare, & Windows systems using freely-available utilities. The book also provides overviews of the current state of the commercial backup software and hardware market, including overviews of CDP, Data De-duplication, D2D2T, and VTL technology. Finally, it covers how to automate the backups of DB2, Exchange, MySQL, Oracle, PostgreSQL, SQL-Server, and Sybase databases - without purchasing a commercial backup product to do so. For environments of all sizes and budgets, this unique book shows you how to ensure data protection without resorting to expensive commercial solutions. You will soon learn to: automate the backup of popular databases without a commercial utility; perform bare metal recovery of any popular open systems platform, including your PC or laptop; utilize valuable but often unknown open source backup products; understand the state of commercial backup software, including explanations of CDP and data de-duplication software; and access the current state of backup hardware, including Virtual Tape Libraries (VTLs).

    Free Delivery
    Pinterest Twitter Facebook Google+
    You may like...
    Frontier Computing - Theory…
    Neil Y. Yen, Jason C Hung Hardcover R8,623 Discovery Miles 86 230
    Bionic Functional Structures by…
    Guoqiang Li Hardcover R2,873 Discovery Miles 28 730
    Would You Rather Wacky Christmas Edition…
    Laughing Lion Hardcover R451 R423 Discovery Miles 4 230
    Packet-Based Control for Networked…
    Yun-Bo Zhao, Guoping Liu, … Hardcover R3,499 Discovery Miles 34 990
    Bible Verses for Toddlers from 2-6 years…
    Boyana Atwood Hardcover R583 Discovery Miles 5 830
    Security of Cyber-Physical Systems…
    Chengwei Wu, Weiran Yao, … Hardcover R4,382 Discovery Miles 43 820
    Progress in Ultrafast Intense Laser…
    Kaoru Yamanouchi, Dimitrios Charalambidis Hardcover R3,366 Discovery Miles 33 660
    Animal Law
    David S. Favre, Mildred Loring Hardcover R2,795 Discovery Miles 27 950
    The Biggest Story Bible Storybook
    Kevin Deyoung Hardcover R799 R692 Discovery Miles 6 920
    Adaptive Mechanics
    V. y. Tertychny-Dauri Hardcover R2,999 Discovery Miles 29 990

     

    Partners