![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Systems management
-- The hands-on daily bible for administrators working with SMS on
large-scale Microsoft networks. Task-by-task instruction rather
than overviews of the software and tools. Other essential tasks are
covered in detail to get the network administrator quickly up to
speed and on to the next job in their inbox.
This is a lucid book on the ins and outs of the much-in-vogue call centres, it caters to the need of a global audience with panache. The focus is on honing personal relation skills and educating the reader on what it takes ti thrive in the highly competitive, vibrant and evolving world of call centres.
Practice the Skills You'll Need on the Job! Perfect for both classroom and self-paced learningLabs that challenge you to solve problems based on realistic case studies Step-by-step scenarios that require you to think critically Post-lab observation questions that measure your understanding of lab results and key term quizzes that help build your vocabulary End-of-chapter solutions that explain not only what happened, but why In this lab manual, you'll practice: Identifying, Adding, and Removing System Components Diagnosing and Troubleshooting Common Computer Problems Protecting Your Computer's Power and Utilizing Important Safety Procedures Identifying Your PC's Motherboard, Processors, and Memory Installing and Maintaining Peripheral Devices Including Printers Performing Basic Networking Skills Installing and Upgrading Operating Systems Diagnosing and Troubleshooting Operating System Problems Configuring and Troubleshooting Network Utilities
Computer Networks and Open Systems: An Application Development Perspective covers principles, theory, and techniques of networks and open systems from a practical perspective, using real system and network applications as its basis. The selection of topics forms a core of material in computer networking, emphasizing methods and the environment for application development. The text aims to make readers immediately comfortable in today's networking environment while equipping them to keep pace in one of the fastest moving and most exciting areas of computer system development. Students will enter the study of networking through their own experience as a network users, and they will have the opportunity to practice the kind of networking tasks they will perform in the workplace. The authors take an application development perspective. This point of view reverses that traditional order of networking topics- instead of proceeding from the Physical Layer upward, the authors move from the Application Layer downward.
A comprehensive introduction to reliability and availability modeling, analysis, and design at the system, hardware, and software levels Reliability of Computer Systems and Networks presents the fundamentals of reliability and availability analysis for various computer hardware, software, and networked systems. Reliability and availability as major objectives in system design are the focus. Various redundancy and fault-tolerant techniques, as well as error-correcting coding techniques are treated. The author proposes a high-level design approach based on apportioning the reliability and availability goals to subsystems and provides various techniques for achieving these subsystem goals. The next step is an efficient, exact optimization approach based on upper and lower bounds to minimize the number of feasible candidates. The most readily applied methods for analysis are utilized and design techniques are derived from basic principles. Analytical simplifications and approximations are developed to validate the results of computer models used for large-scale complex problems. Coverage includes:
Reliability of Computer Systems and Networks offers in-depth and up-to-date coverage of reliability and availability for students with a focus on important applications areas, computer systems, and networks. Professionals in systems and reliability design, as well as computer architecture, will find it a highly useful reference.
Supply Chain Design and Management introduces the concept of a
sharing mechanism that will ensure the sustainability of a supply
chain by fair distribution of costs and benefits. This book
provides a holistic view of the supply chain from product
development, purchasing, manufacturing, distribution and storage,
to retailing. The presentation of the enabling technologies in
supply chain management will help companies better understand their
options.
Microsoft's flagship ISA Server delivers the Internet to your
customers
Configure, manage, and optimize Active Directory on your Windows
2000 network Deploy and administer a distributed, interoperable, and secure Windows 2000 directory system using Active Directory and this hands-on resource. Administering Active Directory explains how to configure and implement Active Directory as your enterprise directory service and improve network performance. You'll learn to use the core AD components and services, including DNS, replication, and group policy, and take advantage of the centralized management capabilities. With step-by-step walk-throughs, task-at-a-glance sections, and detailed screen shots, this is the ideal desktop reference to Active Directory-the fully integrated directory service feature at the heart of Windows 2000.
The survival guide for system administrators!
*Fully revised updated edition. first edition was strong seller - over 30,000 sold.
Call on Admin911 to learn what’s going on with your network, to understand your options, and pick the right solutions. -David Chernicoff, Windows 2000 Magazine
The book summarizes the results of the projects of the High Performance Computing Center Stuttgart (HLRS) for the year 2000. The most significant contributions have been selected in a scientific review process. Together they provide an overview of recent developments in high performance computing and simulation. Reflecting the close cooperation of the HLRS with industry, special emphasis has been put on the industrial relevance of the presented results and methods. The book therefore becomes a collection of showcases for an innovative combination of the state-of-the-art modeling, novel numerical algorithms and the use of leading edge high performance computing systems.
Technology and organizations co-evolve, as is illustrated by the growth of information and communication technology (ICT) and global software engineering (GSE). Technology has enabled the development of innovations in GSE. The literature on GSE has emphasized the role of the organization at the expense of technology. This book explores the role of technology in the evolution of globally distributed software engineering. To date, the role of the organization has been examined in coordinating GSE activities because of the prevalence of the logic of rationality (i.e., the efficiency ethos, mechanical methods, and mathematical analysis) and indeterminacy (i.e., the effectiveness ethos, natural methods, and functional analysis). This logic neglects the coordination role of ICT. However, GSE itself is an organizational mode that is technology-begotten, technology-dominated, and technology-driven, as is its coordination. GSE is a direct reflection of ICT innovation, change, and use, yet research into the role technology of GSE has been neglected. Global Software Engineering: Virtualization and Coordination considers existing fragmented explanations and perspectives in GSE research, poses new questions about GSE, and proposes a framework based on the logic of virtuality (i.e., creativity ethos, electrical methods, and technological analysis) rather than of rationality and indeterminacy. Virtuality is the primary perspective in this book's comprehensive study of GSE. The book concludes with an integrated explanation of GSE coordination made possible through ICT connectivity and capitalization.
-- Step by step approach shows how to analyze networks carrying
mission critical data such as voice over IP applications, streaming
video and e-commerce.
ONE-STOP GUIDE TO CONFIGURING CISCO ACCESS LISTS.
Self-stabilization, an important concept to theoreticians and practitioners in distributed computing and communication networks, refers to a system's ability to recover automatically from unexpected faults. In this book Shlomi Dolev presents the fundamentals of self-stabilization and demonstrates the process of designing self-stabilizing distributed systems. He details the algorithms that can be started in an arbitrary state, allowing the system to recover from the faults that brought it to that state. The book proceeds from the basic concept of self-stabilizing algorithms to advanced applications.
Implement and manage Microsoft's revolutionary directory-enabled
platform. Plan, deploy, and administer Windows 2000 in your enterprise. Windows 2000 Administration offers expert advice on all installation, migration, and management issues and provides in-depth details on Windows 2000 features, including the Active Directory, Microsoft Management Console (MMC), and Intellimirror. You'll also get complete information on the new security, backup, and disaster recovery options. No network administrator should be without this essential guide.
This guide provides a complete overview of all facets of Unix backup and recovery and offers practical, affordable backup and recovery solutions for environments of all sizes and budgets. It explains everything from freely available backup systems to large-scale commercial utilities.
The increased computational power and software tools available to
engineers have increased the use and dependence on modeling and
computer simulation throughout the design process. These tools have
given engineers the capability of designing highly complex systems
and computer architectures that were previously unthinkable. Every
complex design project, from integrated circuits, to aerospace
vehicles, to industrial manufacturing processes requires these new
methods. This book fulfills the essential need of system and
control engineers at all levels in understanding modeling and
simulation. This book, written as a true text/reference has become
a standard sr./graduate level course in all EE departments
worldwide and all professionals in this area are required to update
their skills. * Presents a working foundation necessary for compliance with
High Level Architecture (HLA) standards
This is a book about IT in organizations how it works, how it changes organization and the problems and challenges it creates. Based on detailed research in several sectors (financial services, hospitals etc.) the authors present an up to date analysis of current issues. The book is divided into three main sections: Strategies and Markets; Integrating Technology and Organization; and Networks.
What is a systems librarian? Both history and practice indicate a wide variation in the field, strong commitments to local arrangements and a lack of functional standards. Library administrators and managers struggle with the broad requirements of the position, weighing the skill sets of degree holding professionals and the non-MLS technologists. Systems librarians are often designers, planners, implementors, consultants, technology representatives or facilitators. This text provides an assessment of what system librarianship is and what it can be, outlining the type of training needed for people to fill these positions, and illustrates challenges for libraries - and systems librarians - in computing and networking.
Although the potential of information technology (IT) is beyond dispute, it proves to be very difficult to evaluate its true business value. In the present competitive business arena, modern IT provides the enabling infrastructure for efficient and effective business operations, leveraging business improvements and securing a competitive edge. Capturing the value of this IT-based infrastructure is often considered as the most critical and yet the most complex part of managerial decision-making. Many managers do not try to justify their expenditure or measure whether their money was well spent. This situation has become unacceptable in the light of the rising costs and uncertain benefits of this increasingly important type of business investment. The call for more financial returns and more ‘value for money’ can no longer be ignored. Making the right investment evaluations will make the vital difference between business success and failure. This book provides a unique perspective on assessing and creating business value from investments in IT-based infrastructure and, more importantly, it shows how the role of IT-based infrastructure is critical to obtain the full benefits of IT.
Until now, business systems have focused on selected data within a certain context to produce information. A better approach, says Thierauf, is to take information accompanied by experience over time to generate knowledge. He demonstrates that knowledge management systems can be used as a source of power to outmaneuver business competitors. Knowledge discovery tools enable decision makers to extract the patterns, trends, and correlations that underlie the inner (and inter-) workings of a company. His book is the first comprehensive text to define this important new direction in computer technology and will be essential reading for MIS practitioners, systems analysts, and academics researching and teaching the theory and applications of knowledge management systems. Thierauf centers on leveraging a company's knowledge capital. Indeed, knowledge is power--the power to improve customer satisfaction, marketing and production methods, financial operations, and other functions. Thierauf shows how knowledge, when developed and renewed, can be applied to a company's functional areas and provide an important competitive advantage. By utilizing some form of internal and external computer networks and providing some type of knowledge discovery software that encapsulates usable knowledge, Thierauf shows how to create an infrastructure to capture knowledge, store it, improve it, clarify it, and disseminate it throughout the organization, then how to use it regularly. His book demonstrates clearly how knowledge management systems focus on making knowledge available to company employees in the right format, at the right time, and in the right place. The result is inevitably a higher order of intelligence in decision making, more so now than could ever have been possible in even the most recent past.
The book presents a user-oriented methodology for formative (technology) assessment at the development of medical IT-based solutions throughout a system's life-cycle, i.e. from the conception of an idea to disposal of the materialized solution. The methodology developed was tested in a full scale prospective application. Three basic cognitions underpin the entire work: 1) the users of the medical application domain are responsible (and liable) for the level of quality of their service provision within the Healthcare scenario; 2) users are experts at their work (the Healthcare service), and the IT-professionals are not; and 3) introduction of a non-trivial IT-based solution implies re-engineering of the business of the organization into which it is introduced.
Computer Hardware Maintenance presents the full scope and understanding of how the PC hardware maintenance function should operate and be managed in an organization, including steps involved in containing costs, keeping records, and planning the integration of the help desk function. In today's IS department too often the PC hardware maintenance function is treated as a 'necessary evil', with the understanding that eventually all equipment will have some degree of mechanical or electrical failure. This book discusses scenarios where keeping the maintenance function internal is most viable and where having it external, from a depot service, pickup and delivery, or on-site service, is most viable. Computer Hardware Maintenance concludes with brief descriptions of available third-party systems and how emerging trends in PC hardware configuration as proposed by the Desktop Management Task Force (DMTF) will have a major impact on the PC hardware maintenance function in the future. |
![]() ![]() You may like...
Miniature Books - The Stephen and Sandra…
Rupert Neelands, Stephen Joffe
Hardcover
R1,155
Discovery Miles 11 550
Complete Lego Minifigure Catalog…
Christopher Bartneck
Hardcover
|