![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Systems management
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.
This book constitutes the refereed proceedings of the 6th International Conference on E-Technologies, MCETECH 2015, held in Montreal, Canada, in May 2015. The 18 papers presented in this volume were carefully reviewed and selected from 42 submissions. They have been organized in topical sections on process adaptation; legal issues; social computing; eHealth; and eBusiness, eEducation and eLogistics.
The job of Linux systems administrator is interrupt-driven and requires constant learning in byte-wise chunks. This book gives solutions to modern problemseven some you might not have heard ofsuch as scripting LDAP, making Mac clients play nice with Linux servers, and backup, security, and recovery scripts. Author Juliet Kemp takes a broad approach to scripting using Perl and bash, and all scripts work on Debian or Red Hat lineage distributions. Plus, she dispenses wisdom about time management, dealing with desperate colleagues, and how to avoid reinventing the wheel Learn how to love LDAP scripting and NFS tuning Make Perl serve you: don't be enslaved by Perl Learn to change, craft, and feel empowered by recipes that change your life What you'll learn Centralize your network using LDAP and NFS Speak the language of different file systems Know when to use Perl or when to stick to sed and awk Treat security concerns with Perl, bash, and intelligence Learn how to trace errant system calls and misbehaving colleagues Who this book is for System administrators in need of quick succor and guidance when interruptions prevent the smooth running of a network. Table of Contents Saving Yourself Effort Centralizing Your Network: Kerberos, LDAP, and NFS Monitoring and Updating Taking Backups and Managing Data Working with Filesystems Securing Your Systems Working with Apache Using the Command Line Better Working with Text in Files Things Going In, Things Going Out Tracking Down Bugs Managing Time and People
Whether you need a network of ten Linux PCs and a server or a data center with a few thousand UNIX nodes, you need to know how to automate much of the installation, configuration, and standard system administration. Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer. Automating Linux and Unix System Administration, Second Edition is unique in its focus on how to make the system administrator's job easier and more efficient: instead of just managing the system administrator's time, the book explains the technology to automate repetitive tasks and the methodology to automate successfully.Both new and seasoned professionals will profit from industryleading insights into the automation process. System administrators will attain a thorough grasp of cfengine, kickstart, and shell scripting for automation. After reading all chapters and following all exercises in this book, the reader will be able to set up anything from a Linux data center to a small office network. What you'll learn See how to make changes on many UNIX and Linux hosts at once in a reliable and repeatable manner. Learn how to automate things correctly so you only have to do it once, by leveraging the authors' experience in setting up small, medium, and large networks. Set up a Linux data center or a network correctly. Explore handling realworld environments where not all hosts are configured alike via a case study of a fictional new data center build-out. Examine realworld examples for core infrastructure services (DNS, mail, monitoring, log analysis, security, cfengine, imaging) to build on in your environment. Understand core system administration best practices, which are a key part of how cfengine and automations deployments are outlined in the book. Learn how to make changes reversible, repeatable, and correct the first time through interaction with product/application stakeholders (programmers, product managers, customers, etc.). Who this book is for This book is for Linux system administrators who want to learn about the software and methodology to automate repetitive tasks--regardless of network or data center size--in one place. System managers will also find it much easier to think about network technology and automation projects if they read this book. This book is also for anyone who is interested in repeatable and secure infrastructure.
This book introduces students to business process management, an approach that aims to align the organization's business processes with the demands of the marketplace. Processes serve as a coordination mechanism, and the aim of business process management is to improve the organization's effectiveness and efficiency in adapting to change, and maintaining competitive advantage. In Business Process Management, Kumar argues for the value of looking at businesses as a collection of processes that cut across departments, and for breaking down functional silos. The book provides an overview of the basic concepts in this field before moving on to more advanced topics such as process verification, flexible processes, process security and evaluation, resource assignment, and social networks. One chapter of the book is also devoted to process analytics. The book concludes with an examination of the future directions of the discipline. Blending a strong grounding in current research with a focus on concepts and tools, Business Process Management is an accessible textbook full of practical examples and cases that will appeal to upper level students.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.
As more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality. The book begins with a discussion of IoT "ecosystems" and the technology that enables them, which includes: Wireless Infrastructure and Service Discovery Protocols Integration Technologies and Tools Application and Analytics Enablement Platforms A chapter on next-generation cloud infrastructure explains hosting IoT platforms and applications. A chapter on data analytics throws light on IoT data collection, storage, translation, real-time processing, mining, and analysis, all of which can yield actionable insights from the data collected by IoT applications. There is also a chapter on edge/fog computing. The second half of the book presents various IoT ecosystem use cases. One chapter discusses smart airports and highlights the role of IoT integration. It explains how mobile devices, mobile technology, wearables, RFID sensors, and beacons work together as the core technologies of a smart airport. Integrating these components into the airport ecosystem is examined in detail, and use cases and real-life examples illustrate this IoT ecosystem in operation. Another in-depth look is on envisioning smart healthcare systems in a connected world. This chapter focuses on the requirements, promising applications, and roles of cloud computing and data analytics. The book also examines smart homes, smart cities, and smart governments. The book concludes with a chapter on IoT security and privacy. This chapter examines the emerging security and privacy requirements of IoT environments. The security issues and an assortment of surmounting techniques and best practices are also discussed in this chapter.
Database Management Systems provides comprehensive and up-to-date coverage of the fundamentals of database systems. Coherent explanations and practical examples have made this one of the leading texts in the field. The third edition continues in this tradition, enhancing it with more practical material. The new edition has been reorganized to allow more flexibility in the way the course is taught. Now, instructors can easily choose whether they would like to teach a course which emphasizes database application development or a course that emphasizes database systems issues. New overview chapters at the beginning of parts make it possible to skip other chapters in the part if you dont want the detail. More applications and examples have been added throughout the book, including SQL and Oracle examples. The applied flavor is further enhanced by the two new database applications chapters.
An accessible theoretical analysis of the organizational impact of information technologies. This book examines the many ways in which actors, organizations and technologies are represented through these technologies thus bridging the gap between the abstractions of current theories of organization and the somewhat excessively grounded material on information systems.
Performability modelling and evaluation brings together two disciplines that have long been treated separately in different communities: computer and communication system performance evaluation and system reliability and availability evaluation.
—Network throughput when network nodes and links fail. —Task completion times on degradable multiprocessor systems. —A variety of modelling and evaluation techniques. Computer scientists and engineers will find this excellent overview compulsive reading as will postgraduates and researchers in computer science and related fields.
Business intelligence (BI) has evolved over several years as organizations have extended their online transaction processing (OLTP) capabilities and applications to support their routine operations. With online analytical processing (OLAP), organizations have also established the capability to extract internal and external data from a variety of sources to specifically obtain intelligence about non-routine and often less-structured arrangements. BI therefore refers to applications and technologies that are used to gather, provide access to, and analyze data and information about the operations of an organization. It has the capability of providing comprehensive insight into the more volatile factors affecting the business and its operations, thereby facilitating enhanced decision-making quality and contributing to the creation of business value. Larger and more sophisticated organizations have long been exploiting these capabilities. Business Intelligence for Small and Medium-Sized Enterprises (SMEs) guides SMEs in replicating this experience to provide an agile roadmap toward business sustainability. The book points out that successful BI implementations have generated significant increases in revenue and cost savings, however, the failure rates are also very high. More importantly, it emphasizes that a full range of BI capabilities is not the exclusive purview of large organizations. It shows how SMEs make extensive use of BI techniques to develop the kind of agility endowing them with the organizational capability to sense and respond to opportunities and threats in an increasingly dynamic business environment. It points to the way to a market environment in which smaller organizations could have a larger role. In particular, the book explains that by establishing the agility to leverage internal and external data and information assets, SMEs can enhance their competitiveness by having a comprehensive understanding of the key to an agile roadmap for business sustainability.
This practical, applied reference to T1 for system and network administrators brings together in one place the information you need to set up, test, and troubleshoot T1. You'll learn what components you need to build a T1 line; how the components interact to transmit data; how to adapt the T1 to work with data networks using standardized link layer protocols; troubleshooting strategies; and working with vendors.
Firms are investing considerable resources to create large information infrastructures able to fulfil their varied information-processing and communication needs. The more the drive towards globalization, the more such infrastructures become crucial. The "wiring" of the corporation should be done in a way that is aligned with its corporate strategy - it is global and generates value. This book presents six in-depth case studies of large corporations - AstraZeneca, IBM, Norsk Hydro, Roche, SKF, and Statoil - which offer a picture of the main issues involved in information infrastructure implementation and management. Far from being a linear process, the use of the information infrastructure is in fact an open-ended process, in many cases out of control. Current management models and consulting advice do not seem to be able to cope with such a business landscape. This book provides the reader with interpretations and theories that can foster a different understanding and approach.
This book contains a collection of 24 state-of-the-art contributions in the area of Information Systems Engineering. It was compiled as a tribute to Professor Janis Bubenko on the occasion of his retirement from the University of Stockholm in February 2000. The contributions are arranged in three sections: - Information Society, with such subjects as B2B E-Commerce, human imperfection, stream data management and enterprise modeling - Approaches to Information Systems Engineering, discussing data warehouse development, web-enabled methods, reuse, and meta-data - Concepts for Information Systems, on more fundamental notions such as time, abstraction, co-operation, intention and information All the contributors are well-known and highly reputed scholars in the area of Information Systems Engineering from all over the world.
A quick and reliable way to build proven databases for core business functions
This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. This is a reference for protecting the protectors, and author Thomas Akin supplies all the tools necessary to turn a potential vulnerability into a strength.
This guide covers all aspects of deploying Solaris as an enterprise-level network operating system, with a focus on e-commerce. Written for experienced network administrators who want an objective guide to networking with Solaris, the book covers installation on the Intel and Sparc platforms, and instructs you how to setup Solaris as a file server, application server, and database server.
PgMP (R) Exam Practice Test and Study Guide, Fourth Edition is the book you need to pass the Program Management Professional (PgMP (R)) exam the first time around. It reflects recent revisions based on PMI (R)'s Standard for Program Management - Third Edition (2013).Based on best practices that complement PMI (R)'s standards, this is the most comprehensive and up-to-date resource available to help you prepare for the exam with new and changed terminology. It includes a list of the major topics covered on the exam organized by the five performance domains-strategic program management, program life cycle, benefits management, stakeholder management, and governance-as presented in the Program Management Professional Examination Content Outline. It also includes helpful tips on how to make the most of the time you have available to prepare for the exam. Just like its bestselling predecessors, this indispensable study guide includes 20 multiple-choice practice questions for each domain along with a comprehensive answer key. The program life cycle domain includes 20 questions for each of the five phases. Each question also has a plainly written rationale for each correct answer with bibliographic references for further study. Two challenging, 170-question practice tests that simulate the actual exam are included in the book and online, so you can retake them as many times as necessary. They also include a rationale and reference. Scores for the online tests are presented as if each question is rated similarly, but this edition also includes a new component: the authors' own weighting system for the level of difficulty for each question. This system will show you what they feel meets the exam's criteria for Proficient, Moderately Proficient, and below Proficient. You then will see your scores by domain in both approaches. Supplying an insider's look at the questions, terminology, and sentence construction you will encounter on the day of the exam, this indispensable study tool is designed to help you pass the exam and achieve the highly sought after PgMP (R) certification.
Discover why routers in the Juniper MX Series-with their advanced feature sets and record-breaking scale-are so popular among enterprises and network service providers. This revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using advanced firewall filters, redundant inline services, powerful CoS tool sets, and many other Juniper MX features. This second edition was written by a Senior NOC Engineer, whose vast experience with the MX Series is well documented. Each chapter covers a specific Juniper MX vertical and includes review questions to help you test what you've learned. This edition includes new chapters on load balancing and vMX-Juniper MX's virtual instance. Discover Junos architecture, MX chassis, and Trio Linecards Work with Juniper MX's bridging, VLAN VXLAN, and virtual switches Create a firewall filter framework and discover the latest flexible filtering options Secure your router and add an extra layer of security with Junos DDOS protection and SCFD feature Discover the advantages of hierarchical scheduling, ingress queuing, and flexible remarking Combine Juniper MX routers, using a virtual chassis or MC-LAG Understand and use classical and advanced Trio Chipset's load balancing features Dive into Trio inline services such as inline NAT, redundant logical tunnel, or filter-based GRE tunnel Discover vMX internal architecture and explore the benefits and typical use case of a virtual router
Economics and technology have dramatically re-shaped the landscape of software development. It is no longer uncommon to find a software development team dispersed across countries or continents. Geographically distributed development challenges the ability to clearly communicate, enforce standards, ensure quality levels, and coordinate tasks. Global Software Development Handbook explores techniques that can bridge distances, create cohesion, promote quality, and strengthen lines of communication. The book introduces techniques proven successful at international electronics and software giant Siemens AG. It shows how this multinational uses a high-level process framework that balances agility and discipline for globally distributed software development. The authors delineate an organizational structure that not only fosters team building, but also achieves effective collaboration among the central and satellite teams. The handbook explores the issues surrounding quality and the processes required to realize quality in a distributed environment. Communication is a tremendous challenge, especially for teams separated by several time zones, and the authors elucidate how to uncover patterns of communication among these teams to determine effective strategies for managing communication. The authors analyze successful and failed projects and apply this information to how a project can be successful with distributed teams. They also provide lightweight processes that can be dynamically adapted to the demands of any project.
Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of driving. Big data analytics, as an emerging analytical technology, offers the capability to collect, store, process, and visualize these vast amounts of data. Big Data Analytics in Cybersecurity examines security challenges surrounding big data and provides actionable insights that can be used to improve the current practices of network operators and administrators. Applying big data analytics in cybersecurity is critical. By exploiting data from the networks and computers, analysts can discover useful network information from data. Decision makers can make more informative decisions by using this analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, tools, and other aspects of the network processes. Bringing together experts from academia, government laboratories, and industry, the book provides insight to both new and more experienced security professionals, as well as data analytics professionals who have varying levels of cybersecurity expertise. It covers a wide range of topics in cybersecurity, which include: Network forensics Threat analysis Vulnerability assessment Visualization Cyber training. In addition, emerging security domains such as the IoT, cloud computing, fog computing, mobile computing, and cyber-social networks are examined. The book first focuses on how big data analytics can be used in different aspects of cybersecurity including network forensics, root-cause analysis, and security training. Next it discusses big data challenges and solutions in such emerging cybersecurity domains as fog computing, IoT, and mobile app security. The book concludes by presenting the tools and datasets for future cybersecurity research.
Packed with practical, freely-available backup and recovery solutions for Unix, Linux, Windows and Mac OS X systems - as well as various databases - this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75 per cent new material. "Backup & Recovery" starts with a complete overview of backup philosophy and design, including the basic backup utilities of tar, dump, cpio, ntbackup, ditto, and rsync. It then explains several open source backup products that automate backups using those utilities, including AMANDA, Bacula, BackupPC, rdiff-backup, and rsnapshot. "Backup & Recovery" then explains how to perform bare metal recovery of AIX, HP-UX, Linux, Mac OS, Solaris, VMWare, & Windows systems using freely-available utilities. The book also provides overviews of the current state of the commercial backup software and hardware market, including overviews of CDP, Data De-duplication, D2D2T, and VTL technology. Finally, it covers how to automate the backups of DB2, Exchange, MySQL, Oracle, PostgreSQL, SQL-Server, and Sybase databases - without purchasing a commercial backup product to do so. For environments of all sizes and budgets, this unique book shows you how to ensure data protection without resorting to expensive commercial solutions. You will soon learn to: automate the backup of popular databases without a commercial utility; perform bare metal recovery of any popular open systems platform, including your PC or laptop; utilize valuable but often unknown open source backup products; understand the state of commercial backup software, including explanations of CDP and data de-duplication software; and access the current state of backup hardware, including Virtual Tape Libraries (VTLs).
Security-enriched urban computing and smart grids are areas that attracted many a- demic and industry professionals to research and develop. The goal of this conference was to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of urban computing and the smart grid. This conference includes the following special sessions: Signal Processing, Image Processing, Pattern Recognition and Communications (SIPC 2010), Networking, Fault-tolerance and Security For Distributed Computing Systems (NFSDCS 2010), Security Technology Application (STA 2010), Electric Transportation (ElecTrans 2010), Techniques of Bi-directional Power Computing in High Voltage Power Supply (TBPC 2010), Low Power IT and Applications (LPITA 2010), Computational Intel- gence and Soft Computing (CISC 2010), Distributed Computing and Sensor Networks (DCSN 2010), Advanced Fusion IT (AFIT 2010), Social Media and Social Netwo- ing (SMSN 2010), Software Engineering and Medical Information Engineering (SEMIE 2010), Human-Centered Advanced Research/Education (HuCARE 2010), Database Integrity and Security (DIS 2010), Ubiquitous IT Application (UITA 2010) and Smart Grid Applications (SGA 2010). We would like to express our gratitude to all of the authors of the submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future.
This long-awaited new edition of a classic, now updated for NFS Version 3 and based on Solaris 8, shows how to set up and manage a network filesystem installation. Managing NFS and NIS is the only practical book devoted entirely to NFS and the distributed database NIS; it's a "must-have" for anyone interested in Unix networking.
The release of R5 has made Domino easier for its 55 million users than ever before. For example, it's now possible to centrally modify client configurations or visually monitor the health and status of the network's Domino servers from a single screen. Lotus Domino Administration in a Nutshell is the quick reference for getting the most out of this reliable and scalable integrated server platform. |
You may like...
Annual Report of the Department of Mines…
West Virginia Dept of Mines
Hardcover
R923
Discovery Miles 9 230
Time-Varying Discrete Linear Systems…
Aristide Halanay, Vlad Ionescu
Hardcover
R2,680
Discovery Miles 26 800
Engaging Boys and Men in Sexual Assault…
Lindsay M. Orchowski, Alan Berkowitz
Paperback
R2,473
Discovery Miles 24 730
|