0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (6)
  • R500+ (833)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Implementing Cybersecurity - A Guide to the National Institute of Standards and Technology Risk Management Framework... Implementing Cybersecurity - A Guide to the National Institute of Standards and Technology Risk Management Framework (Hardcover)
Anne Kohnke, Ken Sigler, Dan Shoemaker
R3,513 Discovery Miles 35 130 Ships in 10 - 15 working days

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

E-Technologies - 6th International Conference, MCETECH 2015, Montreal, QC, Canada, May 12-15, 2015, Proceedings (Paperback,... E-Technologies - 6th International Conference, MCETECH 2015, Montreal, QC, Canada, May 12-15, 2015, Proceedings (Paperback, 2015 ed.)
Morad Benyoucef, Michael Weiss, Hafedh Mili
R2,143 Discovery Miles 21 430 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on E-Technologies, MCETECH 2015, held in Montreal, Canada, in May 2015. The 18 papers presented in this volume were carefully reviewed and selected from 42 submissions. They have been organized in topical sections on process adaptation; legal issues; social computing; eHealth; and eBusiness, eEducation and eLogistics.

Linux System Administration Recipes - A Problem-Solution Approach (Paperback, 1st ed.): Juliet Kemp Linux System Administration Recipes - A Problem-Solution Approach (Paperback, 1st ed.)
Juliet Kemp
R803 R707 Discovery Miles 7 070 Save R96 (12%) Ships in 18 - 22 working days

The job of Linux systems administrator is interrupt-driven and requires constant learning in byte-wise chunks. This book gives solutions to modern problemseven some you might not have heard ofsuch as scripting LDAP, making Mac clients play nice with Linux servers, and backup, security, and recovery scripts. Author Juliet Kemp takes a broad approach to scripting using Perl and bash, and all scripts work on Debian or Red Hat lineage distributions. Plus, she dispenses wisdom about time management, dealing with desperate colleagues, and how to avoid reinventing the wheel Learn how to love LDAP scripting and NFS tuning Make Perl serve you: don't be enslaved by Perl Learn to change, craft, and feel empowered by recipes that change your life What you'll learn Centralize your network using LDAP and NFS Speak the language of different file systems Know when to use Perl or when to stick to sed and awk Treat security concerns with Perl, bash, and intelligence Learn how to trace errant system calls and misbehaving colleagues Who this book is for

System administrators in need of quick succor and guidance when interruptions prevent the smooth running of a network. Table of Contents Saving Yourself Effort Centralizing Your Network: Kerberos, LDAP, and NFS Monitoring and Updating Taking Backups and Managing Data Working with Filesystems Securing Your Systems Working with Apache Using the Command Line Better Working with Text in Files Things Going In, Things Going Out Tracking Down Bugs Managing Time and People

Automating Linux and Unix System Administration (Paperback, 2nd ed.): Nathan Campi, Kirk Bauer Automating Linux and Unix System Administration (Paperback, 2nd ed.)
Nathan Campi, Kirk Bauer
R1,157 R985 Discovery Miles 9 850 Save R172 (15%) Ships in 18 - 22 working days

Whether you need a network of ten Linux PCs and a server or a data center with a few thousand UNIX nodes, you need to know how to automate much of the installation, configuration, and standard system administration.

Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer. Automating Linux and Unix System Administration, Second Edition is unique in its focus on how to make the system administrator's job easier and more efficient: instead of just managing the system administrator's time, the book explains the technology to automate repetitive tasks and the methodology to automate successfully.Both new and seasoned professionals will profit from industryleading insights into the automation process. System administrators will attain a thorough grasp of cfengine, kickstart, and shell scripting for automation. After reading all chapters and following all exercises in this book, the reader will be able to set up anything from a Linux data center to a small office network. What you'll learn

See how to make changes on many UNIX and Linux hosts at once in a reliable and repeatable manner. Learn how to automate things correctly so you only have to do it once, by leveraging the authors' experience in setting up small, medium, and large networks. Set up a Linux data center or a network correctly. Explore handling realworld environments where not all hosts are configured alike via a case study of a fictional new data center build-out. Examine realworld examples for core infrastructure services (DNS, mail, monitoring, log analysis, security, cfengine, imaging) to build on in your environment. Understand core system administration best practices, which are a key part of how cfengine and automations deployments are outlined in the book. Learn how to make changes reversible, repeatable, and correct the first time through interaction with product/application stakeholders (programmers, product managers, customers, etc.). Who this book is for

This book is for Linux system administrators who want to learn about the software and methodology to automate repetitive tasks--regardless of network or data center size--in one place. System managers will also find it much easier to think about network technology and automation projects if they read this book. This book is also for anyone who is interested in repeatable and secure infrastructure.

Business Process Management (Paperback): Akhil Kumar Business Process Management (Paperback)
Akhil Kumar
R1,898 Discovery Miles 18 980 Ships in 10 - 15 working days

This book introduces students to business process management, an approach that aims to align the organization's business processes with the demands of the marketplace. Processes serve as a coordination mechanism, and the aim of business process management is to improve the organization's effectiveness and efficiency in adapting to change, and maintaining competitive advantage. In Business Process Management, Kumar argues for the value of looking at businesses as a collection of processes that cut across departments, and for breaking down functional silos. The book provides an overview of the basic concepts in this field before moving on to more advanced topics such as process verification, flexible processes, process security and evaluation, resource assignment, and social networks. One chapter of the book is also devoted to process analytics. The book concludes with an examination of the future directions of the discipline. Blending a strong grounding in current research with a focus on concepts and tools, Business Process Management is an accessible textbook full of practical examples and cases that will appeal to upper level students.

Cyberspace and Cybersecurity (Hardcover, 2nd edition): George Kostopoulos Cyberspace and Cybersecurity (Hardcover, 2nd edition)
George Kostopoulos
R2,353 Discovery Miles 23 530 Ships in 10 - 15 working days

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.

The Internet of Things - Enabling Technologies, Platforms, and Use Cases (Hardcover): Pethuru Raj, Anupama C. Raman The Internet of Things - Enabling Technologies, Platforms, and Use Cases (Hardcover)
Pethuru Raj, Anupama C. Raman
R3,811 Discovery Miles 38 110 Ships in 10 - 15 working days

As more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality. The book begins with a discussion of IoT "ecosystems" and the technology that enables them, which includes: Wireless Infrastructure and Service Discovery Protocols Integration Technologies and Tools Application and Analytics Enablement Platforms A chapter on next-generation cloud infrastructure explains hosting IoT platforms and applications. A chapter on data analytics throws light on IoT data collection, storage, translation, real-time processing, mining, and analysis, all of which can yield actionable insights from the data collected by IoT applications. There is also a chapter on edge/fog computing. The second half of the book presents various IoT ecosystem use cases. One chapter discusses smart airports and highlights the role of IoT integration. It explains how mobile devices, mobile technology, wearables, RFID sensors, and beacons work together as the core technologies of a smart airport. Integrating these components into the airport ecosystem is examined in detail, and use cases and real-life examples illustrate this IoT ecosystem in operation. Another in-depth look is on envisioning smart healthcare systems in a connected world. This chapter focuses on the requirements, promising applications, and roles of cloud computing and data analytics. The book also examines smart homes, smart cities, and smart governments. The book concludes with a chapter on IoT security and privacy. This chapter examines the emerging security and privacy requirements of IoT environments. The security issues and an assortment of surmounting techniques and best practices are also discussed in this chapter.

Database Management Systems (Hardcover, 3rd edition): Raghu Ramakrishnan, Johannes Gehrke Database Management Systems (Hardcover, 3rd edition)
Raghu Ramakrishnan, Johannes Gehrke
R9,722 Discovery Miles 97 220 Ships in 10 - 15 working days

Database Management Systems provides comprehensive and up-to-date coverage of the fundamentals of database systems. Coherent explanations and practical examples have made this one of the leading texts in the field. The third edition continues in this tradition, enhancing it with more practical material.

The new edition has been reorganized to allow more flexibility in the way the course is taught. Now, instructors can easily choose whether they would like to teach a course which emphasizes database application development or a course that emphasizes database systems issues. New overview chapters at the beginning of parts make it possible to skip other chapters in the part if you dont want the detail.

More applications and examples have been added throughout the book, including SQL and Oracle examples. The applied flavor is further enhanced by the two new database applications chapters.

Representing Organization - Knowledge, Management, and the Information Age (Paperback, New): Simon Lilley, Geoffrey Lightfoot,... Representing Organization - Knowledge, Management, and the Information Age (Paperback, New)
Simon Lilley, Geoffrey Lightfoot, Paulo Amaral M. N.
R1,474 Discovery Miles 14 740 Ships in 10 - 15 working days

An accessible theoretical analysis of the organizational impact of information technologies. This book examines the many ways in which actors, organizations and technologies are represented through these technologies thus bridging the gap between the abstractions of current theories of organization and the somewhat excessively grounded material on information systems.

Performability Modelling - Techniques & Tools (Hardcover): B.R. Haverkort Performability Modelling - Techniques & Tools (Hardcover)
B.R. Haverkort
R3,248 Discovery Miles 32 480 Ships in 10 - 15 working days

Performability modelling and evaluation brings together two disciplines that have long been treated separately in different communities: computer and communication system performance evaluation and system reliability and availability evaluation.

  • Provides a single-source reference covering of all aspects of performability evaluation.
  • Introduces a new approach to assessing the performance and dependability of systems thus revealing system characteristics that cannot be uncovered separately by performance or reliability evaluation.
  • Explains how systems can operate partially in the presence of failures by discussing:
—Capacity of failure prone clusters of transaction processing systems.
—Network throughput when network nodes and links fail.
—Task completion times on degradable multiprocessor systems.
—A variety of modelling and evaluation techniques.
  • Features software tool descriptions to support performability evaluations as well as an extensive bibliography.

    Computer scientists and engineers will find this excellent overview compulsive reading as will postgraduates and researchers in computer science and related fields.

  • Business Intelligence for Small and Medium-Sized Enterprises - An Agile Roadmap toward Business Sustainability (Hardcover):... Business Intelligence for Small and Medium-Sized Enterprises - An Agile Roadmap toward Business Sustainability (Hardcover)
    Lila Rao-Graham, Maurice L. McNaughton, Gunjan Mansingh
    R2,167 Discovery Miles 21 670 Ships in 10 - 15 working days

    Business intelligence (BI) has evolved over several years as organizations have extended their online transaction processing (OLTP) capabilities and applications to support their routine operations. With online analytical processing (OLAP), organizations have also established the capability to extract internal and external data from a variety of sources to specifically obtain intelligence about non-routine and often less-structured arrangements. BI therefore refers to applications and technologies that are used to gather, provide access to, and analyze data and information about the operations of an organization. It has the capability of providing comprehensive insight into the more volatile factors affecting the business and its operations, thereby facilitating enhanced decision-making quality and contributing to the creation of business value. Larger and more sophisticated organizations have long been exploiting these capabilities. Business Intelligence for Small and Medium-Sized Enterprises (SMEs) guides SMEs in replicating this experience to provide an agile roadmap toward business sustainability. The book points out that successful BI implementations have generated significant increases in revenue and cost savings, however, the failure rates are also very high. More importantly, it emphasizes that a full range of BI capabilities is not the exclusive purview of large organizations. It shows how SMEs make extensive use of BI techniques to develop the kind of agility endowing them with the organizational capability to sense and respond to opportunities and threats in an increasingly dynamic business environment. It points to the way to a market environment in which smaller organizations could have a larger role. In particular, the book explains that by establishing the agility to leverage internal and external data and information assets, SMEs can enhance their competitiveness by having a comprehensive understanding of the key to an agile roadmap for business sustainability.

    T1: A Survival Guide - Provisioning & Managing Leased-Line Circuits (Book, 1st ed): Matthew S. Gast T1: A Survival Guide - Provisioning & Managing Leased-Line Circuits (Book, 1st ed)
    Matthew S. Gast
    R1,028 Discovery Miles 10 280 Ships in 18 - 22 working days

    This practical, applied reference to T1 for system and network administrators brings together in one place the information you need to set up, test, and troubleshoot T1. You'll learn what components you need to build a T1 line; how the components interact to transmit data; how to adapt the T1 to work with data networks using standardized link layer protocols; troubleshooting strategies; and working with vendors.

    From Control To Drift - The Dynamics Of Corporate Information Infrastructures (Paperback, Revised): Claudio U. Ciborra From Control To Drift - The Dynamics Of Corporate Information Infrastructures (Paperback, Revised)
    Claudio U. Ciborra
    R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

    Firms are investing considerable resources to create large information infrastructures able to fulfil their varied information-processing and communication needs.

    The more the drive towards globalization, the more such infrastructures become crucial. The "wiring" of the corporation should be done in a way that is aligned with its corporate strategy - it is global and generates value.

    This book presents six in-depth case studies of large corporations - AstraZeneca, IBM, Norsk Hydro, Roche, SKF, and Statoil - which offer a picture of the main issues involved in information infrastructure implementation and management. Far from being a linear process, the use of the information infrastructure is in fact an open-ended process, in many cases out of control.

    Current management models and consulting advice do not seem to be able to cope with such a business landscape. This book provides the reader with interpretations and theories that can foster a different understanding and approach.

    Biology and Ecology of the Brown and Sea Trout - State of the Art and Research Themes (Paperback, 1999 ed.): J.L. Bagliniere,... Biology and Ecology of the Brown and Sea Trout - State of the Art and Research Themes (Paperback, 1999 ed.)
    J.L. Bagliniere, Gerard Maisse
    R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

    This book contains a collection of 24 state-of-the-art contributions in the area of Information Systems Engineering. It was compiled as a tribute to Professor Janis Bubenko on the occasion of his retirement from the University of Stockholm in February 2000. The contributions are arranged in three sections: - Information Society, with such subjects as B2B E-Commerce, human imperfection, stream data management and enterprise modeling - Approaches to Information Systems Engineering, discussing data warehouse development, web-enabled methods, reuse, and meta-data - Concepts for Information Systems, on more fundamental notions such as time, abstraction, co-operation, intention and information All the contributors are well-known and highly reputed scholars in the area of Information Systems Engineering from all over the world.

    The Data Model Resource Book Volume 2 - A Library of Universal Data Models by Industry Types (Paperback, Rev ed): Len Silverston The Data Model Resource Book Volume 2 - A Library of Universal Data Models by Industry Types (Paperback, Rev ed)
    Len Silverston
    R1,702 Discovery Miles 17 020 Ships in 9 - 17 working days

    A quick and reliable way to build proven databases for core business functions
    Industry experts raved about The Data Model Resource Book when it was first published in March 1997 because it provided a simple, cost-effective way to design databases for core business functions. Len Silverston has now revised and updated the hugely successful First Edition, while adding a companion volume to take care of more specific requirements of different businesses. Each volume is accompanied by a CD-ROM, which is sold separately. Each CD-ROM provides powerful design templates discussed in the books in a ready-to-use electronic format, allowing companies and individuals to develop the databases they need at a fraction of the cost and a third of the time it would take to build them from scratch.
    With each business function boasting its own directory, this CD-ROM provides a variety of data models for specific implementations in such areas as financial services, insurance, retail, healthcare, universities, and telecom.

    Hardening Cisco Routers (Paperback): Thomas Akin Hardening Cisco Routers (Paperback)
    Thomas Akin
    R559 R514 Discovery Miles 5 140 Save R45 (8%) Ships in 18 - 22 working days

    This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. This is a reference for protecting the protectors, and author Thomas Akin supplies all the tools necessary to turn a potential vulnerability into a strength.

    Solaris 8 Administrator's Guide (Paperback, 1st ed): Paul Watters Solaris 8 Administrator's Guide (Paperback, 1st ed)
    Paul Watters
    R892 R771 Discovery Miles 7 710 Save R121 (14%) Ships in 18 - 22 working days

    This guide covers all aspects of deploying Solaris as an enterprise-level network operating system, with a focus on e-commerce. Written for experienced network administrators who want an objective guide to networking with Solaris, the book covers installation on the Intel and Sparc platforms, and instructs you how to setup Solaris as a file server, application server, and database server.

    PgMP Exam Practice Test and Study Guide (Paperback, 4th edition): Ginger Levin, J. LeRoy Ward PgMP Exam Practice Test and Study Guide (Paperback, 4th edition)
    Ginger Levin, J. LeRoy Ward
    R2,092 Discovery Miles 20 920 Ships in 10 - 15 working days

    PgMP (R) Exam Practice Test and Study Guide, Fourth Edition is the book you need to pass the Program Management Professional (PgMP (R)) exam the first time around. It reflects recent revisions based on PMI (R)'s Standard for Program Management - Third Edition (2013).Based on best practices that complement PMI (R)'s standards, this is the most comprehensive and up-to-date resource available to help you prepare for the exam with new and changed terminology. It includes a list of the major topics covered on the exam organized by the five performance domains-strategic program management, program life cycle, benefits management, stakeholder management, and governance-as presented in the Program Management Professional Examination Content Outline. It also includes helpful tips on how to make the most of the time you have available to prepare for the exam. Just like its bestselling predecessors, this indispensable study guide includes 20 multiple-choice practice questions for each domain along with a comprehensive answer key. The program life cycle domain includes 20 questions for each of the five phases. Each question also has a plainly written rationale for each correct answer with bibliographic references for further study. Two challenging, 170-question practice tests that simulate the actual exam are included in the book and online, so you can retake them as many times as necessary. They also include a rationale and reference. Scores for the online tests are presented as if each question is rated similarly, but this edition also includes a new component: the authors' own weighting system for the level of difficulty for each question. This system will show you what they feel meets the exam's criteria for Proficient, Moderately Proficient, and below Proficient. You then will see your scores by domain in both approaches. Supplying an insider's look at the questions, terminology, and sentence construction you will encounter on the day of the exam, this indispensable study tool is designed to help you pass the exam and achieve the highly sought after PgMP (R) certification.

    Juniper MX Series 2e (Paperback, 2nd Revised edition): Douglas Hanks, Harry Reynolds Juniper MX Series 2e (Paperback, 2nd Revised edition)
    Douglas Hanks, Harry Reynolds
    R1,612 R1,208 Discovery Miles 12 080 Save R404 (25%) Ships in 10 - 15 working days

    Discover why routers in the Juniper MX Series-with their advanced feature sets and record-breaking scale-are so popular among enterprises and network service providers. This revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using advanced firewall filters, redundant inline services, powerful CoS tool sets, and many other Juniper MX features. This second edition was written by a Senior NOC Engineer, whose vast experience with the MX Series is well documented. Each chapter covers a specific Juniper MX vertical and includes review questions to help you test what you've learned. This edition includes new chapters on load balancing and vMX-Juniper MX's virtual instance. Discover Junos architecture, MX chassis, and Trio Linecards Work with Juniper MX's bridging, VLAN VXLAN, and virtual switches Create a firewall filter framework and discover the latest flexible filtering options Secure your router and add an extra layer of security with Junos DDOS protection and SCFD feature Discover the advantages of hierarchical scheduling, ingress queuing, and flexible remarking Combine Juniper MX routers, using a virtual chassis or MC-LAG Understand and use classical and advanced Trio Chipset's load balancing features Dive into Trio inline services such as inline NAT, redundant logical tunnel, or filter-based GRE tunnel Discover vMX internal architecture and explore the benefits and typical use case of a virtual router

    Global Software Development Handbook (Hardcover): Raghvinder Sangwan, Matthew Bass, Neel Mullick, Daniel J. Paulish, Juergen... Global Software Development Handbook (Hardcover)
    Raghvinder Sangwan, Matthew Bass, Neel Mullick, Daniel J. Paulish, Juergen Kazmeier
    R2,887 Discovery Miles 28 870 Ships in 10 - 15 working days

    Economics and technology have dramatically re-shaped the landscape of software development. It is no longer uncommon to find a software development team dispersed across countries or continents. Geographically distributed development challenges the ability to clearly communicate, enforce standards, ensure quality levels, and coordinate tasks. Global Software Development Handbook explores techniques that can bridge distances, create cohesion, promote quality, and strengthen lines of communication. The book introduces techniques proven successful at international electronics and software giant Siemens AG. It shows how this multinational uses a high-level process framework that balances agility and discipline for globally distributed software development. The authors delineate an organizational structure that not only fosters team building, but also achieves effective collaboration among the central and satellite teams. The handbook explores the issues surrounding quality and the processes required to realize quality in a distributed environment. Communication is a tremendous challenge, especially for teams separated by several time zones, and the authors elucidate how to uncover patterns of communication among these teams to determine effective strategies for managing communication. The authors analyze successful and failed projects and apply this information to how a project can be successful with distributed teams. They also provide lightweight processes that can be dynamically adapted to the demands of any project.

    Big Data Analytics in Cybersecurity (Hardcover): Onur Savas, Julia Deng Big Data Analytics in Cybersecurity (Hardcover)
    Onur Savas, Julia Deng
    R3,668 Discovery Miles 36 680 Ships in 10 - 15 working days

    Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of driving. Big data analytics, as an emerging analytical technology, offers the capability to collect, store, process, and visualize these vast amounts of data. Big Data Analytics in Cybersecurity examines security challenges surrounding big data and provides actionable insights that can be used to improve the current practices of network operators and administrators. Applying big data analytics in cybersecurity is critical. By exploiting data from the networks and computers, analysts can discover useful network information from data. Decision makers can make more informative decisions by using this analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, tools, and other aspects of the network processes. Bringing together experts from academia, government laboratories, and industry, the book provides insight to both new and more experienced security professionals, as well as data analytics professionals who have varying levels of cybersecurity expertise. It covers a wide range of topics in cybersecurity, which include: Network forensics Threat analysis Vulnerability assessment Visualization Cyber training. In addition, emerging security domains such as the IoT, cloud computing, fog computing, mobile computing, and cyber-social networks are examined. The book first focuses on how big data analytics can be used in different aspects of cybersecurity including network forensics, root-cause analysis, and security training. Next it discusses big data challenges and solutions in such emerging cybersecurity domains as fog computing, IoT, and mobile app security. The book concludes by presenting the tools and datasets for future cybersecurity research.

    Backup and Recovery (Paperback): W.Curtis Preston Backup and Recovery (Paperback)
    W.Curtis Preston
    R1,344 R1,147 Discovery Miles 11 470 Save R197 (15%) Ships in 18 - 22 working days

    Packed with practical, freely-available backup and recovery solutions for Unix, Linux, Windows and Mac OS X systems - as well as various databases - this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75 per cent new material. "Backup & Recovery" starts with a complete overview of backup philosophy and design, including the basic backup utilities of tar, dump, cpio, ntbackup, ditto, and rsync. It then explains several open source backup products that automate backups using those utilities, including AMANDA, Bacula, BackupPC, rdiff-backup, and rsnapshot. "Backup & Recovery" then explains how to perform bare metal recovery of AIX, HP-UX, Linux, Mac OS, Solaris, VMWare, & Windows systems using freely-available utilities. The book also provides overviews of the current state of the commercial backup software and hardware market, including overviews of CDP, Data De-duplication, D2D2T, and VTL technology. Finally, it covers how to automate the backups of DB2, Exchange, MySQL, Oracle, PostgreSQL, SQL-Server, and Sybase databases - without purchasing a commercial backup product to do so. For environments of all sizes and budgets, this unique book shows you how to ensure data protection without resorting to expensive commercial solutions. You will soon learn to: automate the backup of popular databases without a commercial utility; perform bare metal recovery of any popular open systems platform, including your PC or laptop; utilize valuable but often unknown open source backup products; understand the state of commercial backup software, including explanations of CDP and data de-duplication software; and access the current state of backup hardware, including Virtual Tape Libraries (VTLs).

    Security-Enriched Urban Computing and Smart Grid - First International Conference, SUComS 2010, Daejeon, Korea, September... Security-Enriched Urban Computing and Smart Grid - First International Conference, SUComS 2010, Daejeon, Korea, September 15-17, 2010. Proceedings (Paperback, Edition.)
    Tai-Hoon Kim, Adrian Stoica, Ruay-Shiung Chang
    R2,755 Discovery Miles 27 550 Ships in 18 - 22 working days

    Security-enriched urban computing and smart grids are areas that attracted many a- demic and industry professionals to research and develop. The goal of this conference was to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of urban computing and the smart grid. This conference includes the following special sessions: Signal Processing, Image Processing, Pattern Recognition and Communications (SIPC 2010), Networking, Fault-tolerance and Security For Distributed Computing Systems (NFSDCS 2010), Security Technology Application (STA 2010), Electric Transportation (ElecTrans 2010), Techniques of Bi-directional Power Computing in High Voltage Power Supply (TBPC 2010), Low Power IT and Applications (LPITA 2010), Computational Intel- gence and Soft Computing (CISC 2010), Distributed Computing and Sensor Networks (DCSN 2010), Advanced Fusion IT (AFIT 2010), Social Media and Social Netwo- ing (SMSN 2010), Software Engineering and Medical Information Engineering (SEMIE 2010), Human-Centered Advanced Research/Education (HuCARE 2010), Database Integrity and Security (DIS 2010), Ubiquitous IT Application (UITA 2010) and Smart Grid Applications (SGA 2010). We would like to express our gratitude to all of the authors of the submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future.

    Managing NFS & NIS 2e (Paperback, 2nd edition): Hal Stern Managing NFS & NIS 2e (Paperback, 2nd edition)
    Hal Stern
    R1,254 R1,057 Discovery Miles 10 570 Save R197 (16%) Ships in 18 - 22 working days

    This long-awaited new edition of a classic, now updated for NFS Version 3 and based on Solaris 8, shows how to set up and manage a network filesystem installation. Managing NFS and NIS is the only practical book devoted entirely to NFS and the distributed database NIS; it's a "must-have" for anyone interested in Unix networking.

    Lotus Domino Administration in a Nutshell - A Desktop Quick Reference (Paperback, 1st ed): Greg Neilson Lotus Domino Administration in a Nutshell - A Desktop Quick Reference (Paperback, 1st ed)
    Greg Neilson
    R1,026 Discovery Miles 10 260 Ships in 18 - 22 working days

    The release of R5 has made Domino easier for its 55 million users than ever before. For example, it's now possible to centrally modify client configurations or visually monitor the health and status of the network's Domino servers from a single screen. Lotus Domino Administration in a Nutshell is the quick reference for getting the most out of this reliable and scalable integrated server platform.

    Free Delivery
    Pinterest Twitter Facebook Google+
    You may like...
    Annual Report of the Department of Mines…
    West Virginia Dept of Mines Hardcover R923 Discovery Miles 9 230
    Electrical and Magnetic Circuits
    Konstantin K Kim Hardcover R2,510 Discovery Miles 25 100
    Geometric Function Theory in Higher…
    Filippo Bracci Hardcover R2,202 Discovery Miles 22 020
    The Wonder of Their Voices - The 1946…
    Alan Rosen Hardcover R3,101 Discovery Miles 31 010
    Time-Varying Discrete Linear Systems…
    Aristide Halanay, Vlad Ionescu Hardcover R2,680 Discovery Miles 26 800
    Holocaust Impiety in Literature, Popular…
    Matthew Boswell Hardcover R1,410 Discovery Miles 14 100
    Engaging Boys and Men in Sexual Assault…
    Lindsay M. Orchowski, Alan Berkowitz Paperback R2,473 Discovery Miles 24 730
    How to Build and Furnish a Log Cabin…
    W.Ben Hunt Paperback R457 Discovery Miles 4 570
    The Afterlife of Holocaust Memory in…
    R. Crownshaw Hardcover R1,420 Discovery Miles 14 200
    The Art of Doing Science and Engineering…
    Richard Hamming Hardcover R750 Discovery Miles 7 500

     

    Partners