![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Systems management
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Bestselling CompTIA A+ author Mike Meyers provides hands-on, step-by-step labs-updated for the 2012 release of Exam 220-801-so you can practice the IT skills essential for your successMike Meyers' CompTIA A+ Guide to Managing and Troubleshooting Hardware Lab Manual, Fourth Edition contains more than 75 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to certification exam objectives, ensuring direct correspondence to Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting Hardware, Fourth Edition. Lab solutions are only available to instructors and are not printed inside the book. The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons guide you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the key term quiz helps to build your vocabulary.
This book is a tutorial packed with ready-to-use hacks that give solutions for common problems faced by Vim users in their everyday life. Every chapter covers a set of recipes, each of which follows a systematic approach with a self-contained description of the task it covers, how to use it, and what you gain by using it. The minimum version of Vim required for each hack is clearly indicated. If you are a Vim user who wants to get more out of this legendary text editor, this book is for you. It focuses on making life easier for intermediate to experienced Vim users.
A quick guide to better IT Service Management Many organisations rely on a mishmash of different technologies and ad hoc working practices to deliver products and services. This makes it very difficult to make changes, measure effectiveness and improve service levels. Better for you, better for your customers Employing a structured IT Service Management system will enable your organisation to identify how to improve the service you deliver to your customers. The international standard for IT Service management is ISO/IEC 20000. Achieving compliance with this standard brings real operational benefits and shows new and potential customers that your organisation is efficient, reliable and trustworthy. The ISO/IEC 20000 standard This pocket guide is a handy reference to the key information on ISO/IEC 20000. It features an overview of the purpose of the standard and shows how to use it. It explains qualification programmes, certification schemes and the interrelationship of ISO20000 with other standards, such as ISO27001. The overall emphasis of the guide is on ISO20000's customer-driven approach to ensure your IT service management processes align with the needs of your business.
Although backup and recovery seems as simple as copying bits from point to point, it is far more challenging to implement properly when considering the details involved. This book captures the decades of backup and storage experience that Gareth Fraser-King and Guy Bunker have in the industry and make them ideally suited to provide the insights and questions you should be asking of your backup vendor or provider.Pat Hanavan, Vice President, Symantec Corporation
An area of vehicle repairs that is something of a mystery to many mechanics, repairing alternators and starter motors is shown in step by step detail in this unique manual. Not only is this ideal for the garage professional, it also offers an opportunity for starting a new and highly profitable business, supplying reconditioned units to the public and garage trade as well as a full repair service if you wish. Truly a valuable publication that will pay for itself in the first repaired or reconditioned unit that you supply.
Network data are produced automatically by everyday interactions - social networks, power grids, and links between data sets are a few examples. Such data capture social and economic behavior in a form that can be analyzed using powerful computational tools. This book is a guide to both basic and advanced techniques and algorithms for extracting useful information from network data. The content is organized around 'tasks', grouping the algorithms needed to gather specific types of information and thus answer specific types of questions. Examples include similarity between nodes in a network, prestige or centrality of individual nodes, and dense regions or communities in a network. Algorithms are derived in detail and summarized in pseudo-code. The book is intended primarily for computer scientists, engineers, statisticians and physicists, but it is also accessible to network scientists based in the social sciences. MATLAB (R)/Octave code illustrating some of the algorithms will be available at: http://www.cambridge.org/9781107125773.
Systems Engineering--an interdisciplinary, multi-stage-driven
approach to the design and implementation of any large-scale or
complex engineered product or service--has found its way from
aerospace into general manufacturing as well as the services
industry. It has been found to be particularly useful in such
applications as software engineering, the bio- and medical
industries, and large, multi-component projects like those found in
energy-generation. Following on the author's previous book System
Requirements Analysis, this new book will lay out the steps and
procedures needed to implement a quality check of the system being
proposed or designed...the "Verification" stage of a full systems
engineering program.
Fundamentals Made Easy--Covers Struts 1.2 Create powerful Web applications with Struts, the dynamic application framework built for online Java programming. Through hands-on examples you'll quickly learn Struts basics--working in the MVC architecture, handling user input, and using Struts actions and tag libraries. Then, you'll find coverage of the Struts Validator framework, Tiles, and Eclipse--the most popular Java Integrated Development Environment (IDE). Start taking advantage of the all the powerful development features available in Struts right away. Designed for Easy Learning: Modules--Each concept is divided into logically organized modules (chapters), ideal for self-paced learning Critical Skills--Each module opens with the specific skills covered in the module Mastery Checks--End-of-module reviews test knowledge using short-answer, multiple-choice, and fill-in-the-blank questions Ask the Experts--Q&A sections throughout are filled with bonus information and helpful tips Progress Checks--Quick self-assessment sections check your progress Annotated Syntax--Example code annotated with commentary that describes the programming techniques being illustrated Steven Holzner is an award-winning author of more than 80 computing books, and a former contributing editor for PC Magazine. He is an expert in Struts, Java, and online programming.
First Practical Guide to Integrating Risk Management, Business Continuity Management and Corporate Governance From Two World-Renowned BCM Pioneers Who Have Served on the British Standards Institution (BSI) Team Creating a British and International Standard for Risk Management. The U.S. Department of Homeland Security (DHS) is currently developing disaster preparedness standards for businesses. DHS is incorporating language from the British Standards Institution (BSI) because it "provides a management systems approach to business continuity and integrates risk management disciplines and processes." The two authors of this now classic text in the field have been directly involved in developing those BSI standards. Here they bring you a distillation of their worldwide experience in pioneering the integration of the disciplines of risk management and business continuity. This practical guide is endorsed by: * * * The Business Continuity Institute * * * The Institute for Risk Management * * * Disaster Recovery Institute International It includes numerous helpful features: * * * Chapter objectives, summaries and bibliographies; charts, sample forms, checklists throughout * * * Plentiful case studies, in boxed text, drawn from enterprises around the globe, including the UK, US, Europe, Australia, Asia, etc. * * * Boxed inserts summarizing key concepts * * * Glossy of 150 risk management and business continuity terms * * * Timely topics, including stakeholder management, supplier management, outsourcing, the people factor, technology recovery, and communication, both internally and externally. * * * Wide range of challenges, including supply chain disruptions, media and brand attack, product contamination and product recall, bomb threats, chemical and biological threats, etc. * * * Instructions for designing/executing team exercises with role playing to rehearse scenarios * * * Guidance on how to develop a business continuity plan, including a Business Impact Analysis * * * Ideal for senior undergraduate, MBA, certificate, corporate training programs; in use at 50+ campuses worldwide * * * Instructor Materials on CD, including PowerPoint slides and syllabus for 12-week course with lecture outlines/notes, quizzes, reading assignments, discussion topics, projects * * * Authors with extensive international experience in all aspects of risk management and business continuity, having worked with organizations in a combined total of 50 countries The authors' message is that risk management has become a strategic tool in managing all risk across an organization, and that BCM forms one more important tool in a much wider and coordinated risk management program. They are now complementary disciplines that must be understood and supported by your organization as a whole, including CEO's, directors, non- executive directors, risk managers, continuity managers, internal and external auditors, investment managers, compliance managers, finance directors, human resource managers, project managers, regulators, corporate trainers and other stakeholders. After discussing the relationship between risk management and BCM, the authors take the reader through the business continuity management cycle: how to understand the organization and its culture; continuity strategies; how to develop and implement a business continuity response, including developing a Business Impact Analysis; building and embedding a business continuity culture; testing/exercising a plan, along with benchmarking, maintenance and audit. "This book is a must read for those senior managers, risk managers and continuity managers who have the vision to see both the new opportunities and the new responsibilities of business continuity management." - George J. Mitchell, Chairman, DLA Piper Rudnick Gray Cary; Former Senate Majority Leader and U.S. Senator for Maine.
The Ultimate Learning Guide for SAP BW Consultants With Certification Review Questions, Answers, and Explanations! It's clear that SAP BW is one of the most challenging areas in SAP. And learning can be difficult. SAP BW Ultimate Interview Questions, Answers, and Explanations guides you through your learning process. From helping you to assess your BW skills to evaluating candidates for a job, SAP BW Interview Questions will put you on the path to understanding what you really need to know. The book is organized around five areas of SAP BW: Extraction, Modeling and Configuration, Transformation and Administration, Presentation and Analysis, and finally, Performance Tuning. More than just a rehash of SAP documentation and sales presentations, each question is based on project knowledge and experience gained on successful high-profile SAP implementations.;Key interview topics include: - The most important BW settings to know - BW tables and transaction code quick references - Certification Examination Questions - Extraction, Modeling and Configuration - Transformations and Administration - Performance Tuning, Tips & Tricks, and FAQ - Everything a BW resource needs to know before an interview
This book is perfect for any network administrator looking to push their servers to improved performance or to perform uncustomary tasks. Provides undocumented techniques for installation, networking, multimedia tools, disk checking, migration (single and multiCPUs), backup, IIS tuning, Active Directory, memory, upgrades, and much more.
This book is a guide to implementation of World-Class Business Continuity Management within an enterprise. It may be used as a step-by-step guide by those new to Business Continuity Management or dipped into by the more seasoned professional for ideas and updates on specific topics. There is no absolute "right way" to perform business continuity management - although there are plenty of wrong ways. Business Continuity is not rocket science: it is applied common sense. Yes, experience helps, but it is no mystic art. This book makes the processes transparent and provide the reader with everything necessary to do the job. Many examples are provided throughout this guide: these all have their roots in real cases and real organizations, and come heavily laden with pragmatism. Over fifteen years of business continuity experience in environments large and small, public and private, has gone into developing the methods described. Your own "right way" for business continuity management means picking, matching and tailoring from the cases and examples provided and combining these with existing best practice within your organization. EXCERPT FROM THE PREFACE Melvyn Musson, FBCI, CBCP, CISSP I was very pleased to be asked to write a preface to this much-needed book. There are many books that have been written covering various aspects of hazard control, emergency response, disaster recovery and business continuity, but not one that pulls all areas together under the auspices of the individual sections of the BCI and DRII Professional Practices. Why my interest? To quote from a letter I wrote to the National Fire Protection Association (NFPA) in 1991 when they were considering the establishment of a Technical Committee to develop a Standard on Disaster Management: "Disaster Management, or Business Continuation Planning as we prefer to call it, is a natural progression from Hazard/Loss Control through Emergency Response to the recovery process. "The best hazard/loss control programs cannot prevent emergency or catastrophic situations occurring. The emergency response procedures that most companies have developed or which may be required by law, deal with such aspects as initial fire fighting, evacuation, life safety, etc. - what one might term the stabilization of the situation. They cover the first hours of the emergency. They do not deal with the long-term recovery, which could take several months. "Disaster Management, or some other similarly named program, is needed to enable the company to institute procedures to return to normal operations as soon as possible. That standard is now available as NFPA 1600: Standard on Disaster/Emergency Management and Business Continuity Programs. Within that standard are details of the BCI/DRII Professional Practices, albeit as part of the various sections of the standard and not as an individual, specific section. In addition to NFPA 1600, other standards and guides such as BS7779 in Great Britain and the recent Australian Risk Management Standard are incorporating the Professional Practices either by specific reference or wording relating to the practices. The advent of the Turnbull Report introduces a new consideration and need, which the Professional Practices can support. This makes it all the more important to have a reference material that can clearly detail what should be considered in each of the ten subject areas, together with appropriate examples and details of not only the benefits but also the problems that can be expected with each of those subject areas. Andrew Hiles has been able to do so in the development of this book. In addition, since Andrew intends to issue periodic updates, this book becomes a living document, which will address both changes in the Professional Practices and developments within the industry.
Essential Skills Made Easy! Learn the fundamentals of UNIX administration--from both a network and single system perspective--using this easy-to-follow introductory guide. You'll find clear instructions for setting up such important system services sas DNS, FTP, file systems, basic security tools, and much more. Designed for easy learning, this book walks you through each step of key processes--from installation to using TCP/IP tools and network and system management. Also, the book reviews SNMP and related tools. Organized by topic and filled with step-by-step exercises, tips, and quizzes, this book is an ideal starting point on the path to becoming a successful system administrator. This Beginner's Guide is Designed for Easy Learning: Modules--Each concept is divided into logically organized modules (chapters), ideal for self-paced learning Critical Skills--Each module opens with the specific skills covered in the module Ask the Experts--Q&A sections throughout are filled with bonus information and helpful tips 1-Minute Drills--Quick self-assessment sections check your progress Mastery Checks--End-of-module reviews test knowledge using short-answer, multiple-choice, and fill-in-the-blank questions Projects--Practical exercises show how to apply the critical skills learned in each module Blueprints--Key networking configurations are illustrated in detail
The lambda-calculus lies at the very foundations of computer science. Besides its historical role in computability theory it has had significant influence on programming language design and implementation, denotational semantics, and domain theory. The book emphasises the proof theory for the type-free lambda-calculus. The first six chapters concern this calculus and cover the basic theory, reduction, models, computability, and the relationship between the lambda-calculus and combinatory logic. Chapter 7 presents a variety of typed calculi; first the simply typed lambda-calculus, then Milner-style polymorphism and, finally, the polymorphic lambda-calculus. Chapter 8 concerns two variants of the type-free lambda-calculus that have appeared in the research literature: the lazy lambda-calculus, and the lambda sigma-calculus. The final chapter contains references and a guide to further reading. There are exercises throughout. In contrast to earlier books on these topics, which were written by logicians, this book is written from a computer science perspective and emphasises the practical relevance of many of the key theoretical ideas. The book is intended as a course text for final year undergraduates or first year graduate students in computer science. Research students should find it a useful introduction to more specialist literature.
Essential Skills--Made Easy! Learn to set up, run, and support Solaris 9 across your network using this hands-on introductory guide. Beginning with an overview of this powerful operating system, this practical resource will show you how to install the SPARC version of Solaris 9 and manage Internet and intranet services, and will help you become familiar with the new features of Solaris 9--including role-based access control, Kerberos 5, and the LDAP directory service. You'll also learn how to integrate Windows NT/2000 or Linux with the Solaris platform. Filled with step-by-step exercises, self-assessment sections, and tips from a leading Solaris expert--this is a premier learning tool for every administrator new to Solaris.Modules--Each concept is divided into logically organized modules (chapters), ideal for self-paced learning Critical Skills--Each module opens with the specific skills covered in the module Ask-the-Experts--Q&A sections throughout are filled with bonus information and helpful tips 1-Minute Drills--Quick self-assessment sections check your progress Mastery Checks--End-of-module reviews test knowledge using short-answer, multiple-choice, and fill-in-the-blank questions Projects--Practical exercises show how to apply the critical skills learned in each module Blueprints--Key networking configurations are illustrated in detail
Systems Engineering for Business Process Change: New Directions is
a collection of papers resulting from an EPSRC managed research
programme set up to investigate the relationships between Legacy IT
Systems and Business Processes. The papers contained in this volume
report the results from the projects funded by the programme, which
ran between 1997 and 2001. An earlier volume, published in 2000,
reported interim results.
XML in Data Management is for IT managers and technical staff
involved in the creation, administration, or maintenance of a data
management infrastructure that includes XML. For most IT staff, XML
is either just a buzzword that is ignored or a silver bullet to be
used in every nook and cranny of their organization. The truth is
in between the two. This book provides the guidance necessary for
data managers to make measured decisions about XML within their
organizations. Readers will understand the uses of XML, its
component architecture, its strategic implications, and how these
apply to data management.
Find hundreds of readily accessible tips for upgrading and tuning your PC inside this organized resource. Written by best-selling computer book author Kris Jamsa, you’ll get inside information and best practices on everything from system settings to adding and upgrading peripherals, and much more.
This book constitutes the refereed proceedings of the 5th International Workshop on Hybrid Systems: Computation and Control, HSCC 2002, held in Stanford, California, USA, in March 2002.The 33 revised full papers presented were carefully reviewed and selected from 73 submissions. All current issues in hybrid systems are addressed including formal models and methods and computational representations, algorithms and heuristics, computational tools, and innovative applications.
COMPREHENSIVE EMERGENCY MANAGEMENT FOR LOCAL GOVERNMENTS: DEMYSTIFYING EMERGENCY PLANNING is a "how-to" guide for staff in small to mid-sized local governments. It is incumbent upon such local authorities to be as prepared as possible for the natural and human-caused emergencies that seem to be occurring with greater frequency throughout North America, whether large or small, urban or rural. Preparing for such an eventuality is not ad hoc or sporadic: it follows a logical process considering a wide range of important aspects well beyond what is traditionally considered emergency preparedness. Comprehensive Emergency Management (CEM) is a framework intended to guide novice emergency planners through the complete process of mitigation, preparedness, response and recovery. This work also includes an introductory chapter on the nature of local government emergency planning and a final chapter of tips on "putting it all together." Between these are detailed chapters on each of the four phases of comprehensive emergency management. The Mitigation chapter provides a thorough review of the concept of risk, risk assessment, management and communication. The Preparedness chapter constructs the preparedness plan which is an assembly of a general emergency management plan, four common priority plans covering public information, emergency social services, evacuation and telecommunications, and finally, hazard-specific preparedness plans for each hazard facing a community. The Response chapter covers the unique nature of response where the preparedness plan is put into use. Specifically, it addresses the scale of response by discussing mutual aid and supplementary resources. The Recovery chapter touches on the three cornerstones of recovery: staff, facilities and services. It also includes comments on the unique end to emergencies in addressing "Returning to Normal." Together they lead the emergency planner through the detailed process of compiling a comprehensive emergency management plan for their community. Beyond simply having the plan prepared, this book conveys the dynamic life of such a plan by stressing "the other 80%," which is training and exercising. Creating a training matrix for staff and developing a timetable of graduated exercises are those important steps beyond writing the plan that instill its principles and procedures. The book offers helpful advice on how a local government undertakes comprehensive emergency planning, who is assigned what tasks, and the ongoing obligations of those with such responsibilities. It is a treatment of the entire process of which writing a plan is only one part. There are many aspects to managing a successful, but more importantly effective, local government emergency program that are often overlooked by the novice or part-time emergency planner. This book provides a truly comprehensive view that any local government will benefit from.
Novell ZENworks for Servers (ZENworks stands for Zero Effort Networking) is the cross-platform solution for server content and configuration management. It provides server consistency across Windows, Linux, Solaris and NetWare platforms, enables intelligent network automation, and increases management efficiency so everything works together as on Net. As a result, organizations get a stable server environment and significantly reduce networking costs. Novell?s ZENworks for Server 3 Administrator?s Handbook guides the reader through the potential rough spots. It explains how ZENworks for Server 3 functions and affects NetWare, Windows, Linux and/or Solaris networks.
Endorsed by The Business Continuity Institute.- Contains a comprehensive, detailed business continuity audit plan- Includes sample audit report and work papers- An ideal resource for consultants or auditors, as well as internal business continuity planners - International in scope - includes country-specific guidelines.This book presents a general methodology and a framework for auditing Business Continuity Management (BCM). The main purpose is to provide a single work of reference for auditors, managers working in business continuity and consultants.BCM is a complex field. It covers business issues and technology with a perspective on the entire enterprise. The business continuity manager, and the auditor, require a diversified set of skills and extensive knowledge to assess business continuity as a question of business survival. There has been a lot of confusion about the terms "business continuity," "disaster recovery," "IT security" and many other words attempting to describe the continuation of critical business processes under adverse circumstances. However, for the auditor these terms refer to one and the same notion: businesses should take adequate precautions to ensure that no going concern issues arise from crises or disasters.Some companies decide to take a cautious stance with regard to continuing their operations come what may: they prefer to "err on the safe side" and rely on preventative measures. Other firms, perhaps in an industry where "speed to market" and competitive pressure require a faster pace, may prefer to reduce investments on prevention, while putting in place a robust crisis and disaster management mechanism. Both types of corporations nevertheless pursue the overall goal of business continuity, by either avoiding risks or disasters (if they can), or by making sure they can deal with these events.In a sense, BCM means "reading the future" or trying to safeguard an organization against unforeseen events. Management is still forced to address precisely this issue, by carefully evaluating their options and then making an entrepreneurial decision about the acceptable level of remaining risk. To the auditor, it is important to understand how this decision has been reached and whether it can be justified from a financial, operational and managerial point of view. Neither the overly cautious nor the reckless manager will succeed in today's market - the BCM auditor should provide a sounding board and an objective business partnership to the management of the company being reviewed. BCM audit is therefore an important element of ensuring corporate survival. The audit result incorporates issues of compliance, highlights weaknesses and provides reasonable recommendations to management, whose experience may be enhanced and improved by the auditor's objective input from other corporations or industries. It is not to be confused with the much narrower field of IT audit. This book has been deliberately restricted to business continuity rather than IT continuity to highlight the all-important differences between the two. The contents have been arranged around the Business Continuity Institute (BCI) / Disaster Recovery Institute International (DRII) Professional Practices for business continuity as well as other standards such as CobIT or ISO / IEC 17799. Some elements may look familiar to the experienced auditor who may still benefit from using this book as a reference manual or as an instructive tool for groups of auditors. This is intentional, as BCM and related audit questions should "fit in" with tools and models that are recognized and proven in the field.
This book presents a new approach to on-line observation and concurrent checking of processors by refining and improving known techniques and introducing new ideas.The proposed on-line error detection and fast recover techniques support and complement other established methods. In combination with other on-line observation priniciples and with a combined hardware-software test, these techniques are used to fulfill a complete self-check scheme for an embedded processor.
Install, configure, and manage Microsoft's Exchange 2000 Server Build, maintain, and troubleshoot a scaleable, reliable messaging infrastructure using Exchange 2000 Server. Logically organized into task-based sections, Administering Exchange 2000 Server explains how to manage sites, clients, address lists, and Internet protocols. The book also covers the new features of Exchange, such as Active Directory integration, the Windows 2000 security model, instant messaging, and video conferencing services. The step-by-step walk-throughs, task-at-a-glance sections, and detailed screen shots make this the perfect day-to-day reference for administrators working with or migrating to Exchange 2000 Server.
|
![]() ![]() You may like...
Catalogue of the 1st International…
Royal Society of Marine Artists
Paperback
R597
Discovery Miles 5 970
Painting for My Life: The Holocaust…
Joanna Meacock, Peter Tuka, …
Paperback
R518
Discovery Miles 5 180
|