0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (7)
  • R500+ (825)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Windows 2000 Administration (Paperback): George Spalding Windows 2000 Administration (Paperback)
George Spalding
R1,292 R1,101 Discovery Miles 11 010 Save R191 (15%) Ships in 18 - 22 working days

Implement and manage Microsoft's revolutionary directory-enabled platform.

Plan, deploy, and administer Windows 2000 in your enterprise. Windows 2000 Administration offers expert advice on all installation, migration, and management issues and provides in-depth details on Windows 2000 features, including the Active Directory, Microsoft Management Console (MMC), and Intellimirror. You'll also get complete information on the new security, backup, and disaster recovery options. No network administrator should be without this essential guide.

  • Install, configure, and deploy essential Windows 2000 network services, such as Dynamic DNS and Dynamic Host Configuration Protocol (DHCP)
  • Manage a secure, distributed network using the Active Directory
  • Create and organize AD objects - domains, organizational units (OUs), users, groups, computers, printers, and shared folders
  • Implement the Windows 2000 NTFSv5 File System and the Storage Management features
  • Take advantage of centralized deployment and administration features--offline folders, remote OS install, and the Group Policy-based controls of Intellimirror
  • Administer the entire enterprise from within the MMC
  • Enable remote access with Routing and Remote Access Service (RRAS)
  • Secure your network using Kerberos v5, file encryption, Public Key Infrastructure (PKI) support, and Windows File Protection
  • Backup to Zip drives, CDs, other hard drives or volumes, and tapes
UNIX Backup and Recovery (Paperback): W.Curtis Preston UNIX Backup and Recovery (Paperback)
W.Curtis Preston
R1,289 Discovery Miles 12 890 Ships in 10 - 15 working days

This guide provides a complete overview of all facets of Unix backup and recovery and offers practical, affordable backup and recovery solutions for environments of all sizes and budgets. It explains everything from freely available backup systems to large-scale commercial utilities.

The Systems Librarian - Designing Roles, Defining Skills (Paperback): The Systems Librarian - Designing Roles, Defining Skills (Paperback)
R1,089 Discovery Miles 10 890 Ships in 18 - 22 working days

What is a systems librarian? Both history and practice indicate a wide variation in the field, strong commitments to local arrangements and a lack of functional standards. Library administrators and managers struggle with the broad requirements of the position, weighing the skill sets of degree holding professionals and the non-MLS technologists. Systems librarians are often designers, planners, implementors, consultants, technology representatives or facilitators. This text provides an assessment of what system librarianship is and what it can be, outlining the type of training needed for people to fill these positions, and illustrates challenges for libraries - and systems librarians - in computing and networking.

Black Box Testing - Techniques for Functional Testing of Software & Systems (Paperback): B Beizer Black Box Testing - Techniques for Functional Testing of Software & Systems (Paperback)
B Beizer
R1,119 R947 Discovery Miles 9 470 Save R172 (15%) Ships in 18 - 22 working days

From a leading expositor of testing methods, a practical, comprehensive, hands-on guide to the state-of-the-art black-box testing techniques

This book fills a long-standing need in the software and general systems development communities to make the essential aspects of black-box testing available in one comprehensive work. Written by one of the world's most respected figures in the field of testing, it is both a valuable working resource for independent testers and programmers and an excellent practical introduction for students. Dr. Boris Beizer clearly explains the principles behind behavioral testing in general and behind the most important black-box testing techniques in use today, which involve testing a system based on its desired behavior or function and for conformance to its specifications. Then, with fully worked examples, he leads you step-by-step from specifications to finished test cases.

Complete coverage of all important test techniquesæincluding those that apply to object-oriented software

  • Up-to-dateæincluding the most recent breakthroughs in domain testing that now make this technique available to the working tester with no tools needed beyond a calculator or spreadsheet
  • Examples based on the popular off-the-shelf tax preparation packages let you try the techniques on your favorite tax software
  • Includes all necessary IRS tax forms
  • Self-evaluation quizzes help you evaluate your understanding of the material
Ecosystems and Technology - Idea Generation and Content Model Processing (Hardcover): Cyrus F Nourani Ecosystems and Technology - Idea Generation and Content Model Processing (Hardcover)
Cyrus F Nourani
R2,697 Discovery Miles 26 970 Ships in 10 - 15 working days

Ecosystems and Technology: Idea Generation and Content Model Processing, presents important new innovations in the area of management and computing. Innovation is the generation and application of new ideas and skills to produce new products, processes, and services that improve economic and social prosperity. This includes management and design policy decisions and encompasses innovation research, analysis, and best practice in enterprises, public and private sector service organizations, government, regional societies and economies. The book, the first volume in the Innovation Management and Computing book series, looks at technology that improves efficiency and idea generation, including systems for business, medical/health, education, and more. The book provides detailed examples to provide readers with current issues, including Venture planning for innovations New technologies supporting innovations systems Competitive business modeling Context-driven innovation modeling The generation of ideas faster The measurement of relevant data Virtual interfaces Business intelligence and content processing Predictive modeling Haptic expression and emotion recognition innovations, with applications to neurocognitive medical science This book provides a wealth of information that will be useful for IT and business professionals, educators, and students in many fields.

Information Security Management Systems - A Novel Framework and Software as a Tool for Compliance with Information Security... Information Security Management Systems - A Novel Framework and Software as a Tool for Compliance with Information Security Standard (Hardcover)
Heru Susanto, Mohammad Nabil Almunawar
R2,808 Discovery Miles 28 080 Ships in 10 - 15 working days

This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances. It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001. The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.

Effective Coding with VHDL - Principles and Best Practice (Hardcover): Ricardo Jasinski Effective Coding with VHDL - Principles and Best Practice (Hardcover)
Ricardo Jasinski
R1,489 R1,387 Discovery Miles 13 870 Save R102 (7%) Ships in 9 - 17 working days

A guide to applying software design principles and coding practices to VHDL to improve the readability, maintainability, and quality of VHDL code. This book addresses an often-neglected aspect of the creation of VHDL designs. A VHDL description is also source code, and VHDL designers can use the best practices of software development to write high-quality code and to organize it in a design. This book presents this unique set of skills, teaching VHDL designers of all experience levels how to apply the best design principles and coding practices from the software world to the world of hardware. The concepts introduced here will help readers write code that is easier to understand and more likely to be correct, with improved readability, maintainability, and overall quality. After a brief review of VHDL, the book presents fundamental design principles for writing code, discussing such topics as design, quality, architecture, modularity, abstraction, and hierarchy. Building on these concepts, the book then introduces and provides recommendations for each basic element of VHDL code, including statements, design units, types, data objects, and subprograms. The book covers naming data objects and functions, commenting the source code, and visually presenting the code on the screen. All recommendations are supported by detailed rationales. Finally, the book explores two uses of VHDL: synthesis and testbenches. It examines the key characteristics of code intended for synthesis (distinguishing it from code meant for simulation) and then demonstrates the design and implementation of testbenches with a series of examples that verify different kinds of models, including combinational, sequential, and FSM code. Examples from the book are also available on a companion website, enabling the reader to experiment with the complete source code.

Introduction to Healthcare Information - Enabling Technologies (Paperback): Raymond Gensinger Introduction to Healthcare Information - Enabling Technologies (Paperback)
Raymond Gensinger
R2,026 Discovery Miles 20 260 Ships in 10 - 15 working days

Based on HIMSS' highly successful Annual Conference workshop, "Introduction to Healthcare and IT Enabling Technologies: All You Wanted to Know and Were Afraid to Ask," this book is a valuable resource for individuals new to healthcare, healthcare professionals transitioning into the field of information technology, students or anyone wanting a better understanding of the role IT plays within today's healthcare system. The book introduces many enabling technologies currently used within healthcare, including electronic health records, personal health records, medication dispensing devices, bioelectronic equipment and patient identification technologies. In addition, the books contributors--nationally recognized leaders of their organizations' successful IT implementations--explore how external influences, such as the evolving legislative activities in Washington DC, are responsible for the rapid changes facing health IT today. With chapters focused on IT use from bedside to board room, Introduction to Healthcare Information Enabling Technologies examines today's health IT environment from various stakeholder perspectives, including nurses, physicians and the C-Suite--CEO, CFO and CIO. (2010.)

Data Analytics in Marketing, Entrepreneurship, and Innovation (Hardcover): Mounir Kehal, Shahira El Alfy Data Analytics in Marketing, Entrepreneurship, and Innovation (Hardcover)
Mounir Kehal, Shahira El Alfy
R2,468 R894 Discovery Miles 8 940 Save R1,574 (64%) Ships in 9 - 17 working days

Innovation based in data analytics is a contemporary approach to developing empirically supported advances that encourage entrepreneurial activity inspired by novel marketing inferences. Data Analytics in Marketing, Entrepreneurship, and Innovation covers techniques, processes, models, tools, and practices for creating business opportunities through data analytics. It features case studies that provide realistic examples of applications. This multifaceted examination of data analytics looks at: Business analytics Applying predictive analytics Using discrete choice analysis for decision-making Marketing and customer analytics Developing new products Technopreneurship Disruptive versus incremental innovation The book gives researchers and practitioners insight into how data analytics is used in the areas of innovation, entrepreneurship, and marketing. Innovation analytics helps identify opportunities to develop new products and services, and improve existing methods of product manufacturing and service delivery. Entrepreneurial analytics facilitates the transformation of innovative ideas into strategy and helps entrepreneurs make critical decisions based on data-driven techniques. Marketing analytics is used in collecting, managing, assessing, and analyzing marketing data to predict trends, investigate customer preferences, and launch campaigns.

Network Programmability with YANG - The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI (Hardcover):... Network Programmability with YANG - The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI (Hardcover)
Benoit Claise, Joe Clarke, Jan Lindblad
R1,474 Discovery Miles 14 740 Ships in 18 - 22 working days

Today, networks must evolve and scale faster than ever. You can't manage everything by hand anymore: You need to automate relentlessly. YANG, along with the NETCONF, RESTCONF, or gRPC/gNMI protocols, is the most practical solution, but most implementers have had to learn by trial and error. Now, Network Programmability with YANG gives you complete and reliable guidance for unlocking the full power of network automation using model-driven APIs and protocols. Authored by three YANG pioneers, this plain-spoken book guides you through successfully applying software practices based on YANG data models. The authors focus on the network operations layer, emphasizing model-driven APIs, and underlying transports. Whether you're a network operator, DevOps engineer, software developer, orchestration engineer, NMS/OSS architect, service engineer, or manager, this guide can help you dramatically improve value, agility, and manageability throughout your network. Discover the value of implementing YANG and Data Model-Driven Management in your network Explore the layers and components of a complete working solution Build a business case where value increases as your solution grows Drill down into transport protocols: NETCONF, RESTCONF, and gNMI/gRPC See how telemetry can establish a valuable automated feedback loop Find data models you can build on, and evaluate models with similar functionality Understand models, metadata, and tools from several viewpoints: architect, operator, module author, and application developer Walk through a complete automation journey: business case, service model, service implementation, device integration, and operation Leverage the authors' experience to design successful YANG models and avoid pitfalls

Effective Processes for Quality Assurance (Paperback): Boyd L. Summers Effective Processes for Quality Assurance (Paperback)
Boyd L. Summers
R1,371 R1,258 Discovery Miles 12 580 Save R113 (8%) Ships in 10 - 15 working days

Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. It shows how Quality Assurance provides a common operating framework in which best practices, improvements, and cost avoidance activities can be shared. Effective Processes for Quality Assurance emphasizes improving process execution and reducing operational costs. It also focuses on how Quality Assurance personnel must support companies, institutions, military programs, and successful businesses by encouraging a cooperative, proactive approach and ensure compliance through management and team member participation. Lean and Agile can provide a competitive advantage, and this practical reference explains how to implement these two principles to deliver products that have fewer defects. It also explains: Quality Assurance methods Measuring benefits of Quality Assurance process improvement Quality Assurance performance and improvement Risk management Quality Assurance improvement with metrics Effective processes for Quality Assurance Quantitative process performance and commitments Quality Assurance plans Quality Assurance for customers and suppliers Supporting software configuration Effective Processes for Quality Assurance covers the critical issues for implementing Quality Assurance processes that can deliver high-quality products successfully.

Security without Obscurity - A Guide to Confidentiality, Authentication, and Integrity (Hardcover): J. J. Stapleton Security without Obscurity - A Guide to Confidentiality, Authentication, and Integrity (Hardcover)
J. J. Stapleton
R3,308 Discovery Miles 33 080 Ships in 9 - 17 working days

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about information security based on his experience developing dozens of ISO Technical Committee 68 and ANSI accredited X9 standards. Starting with the fundamentals, it provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication. The text delves beyond the typical cryptographic abstracts of encryption and digital signatures as the fundamental security controls to explain how to implement them into applications, policies, and procedures to meet business and compliance requirements. Providing you with a foundation in cryptography, it keeps things simple regarding symmetric versus asymmetric cryptography, and only refers to algorithms in general, without going too deeply into complex mathematics. Presenting comprehensive and in-depth coverage of confidentiality, integrity, authentication, non-repudiation, privacy, and key management, this book supplies authoritative insight into the commonalities and differences of various users, providers, and regulators in the U.S. and abroad.

Principles of Network and System Administration 2e (Paperback, 2nd Edition): M Burgess Principles of Network and System Administration 2e (Paperback, 2nd Edition)
M Burgess
R2,164 Discovery Miles 21 640 Ships in 18 - 22 working days

This is a single, comprehensive resource that responds to the high demand for specialists who can provide advice to users and handle day to day administration, maintenance, and support of computer systems and networks. The author approaches both network and system administration from the perspective of the principles that do not change on a day to day basis. He shows how to discover customer needs and then use that information to identify, interpret, and evaluate system and network requirements. The new coverage includes Java services and Ipv6.

UML in Practice - The Art of Modeling Software Systems Demonstrated Through Worked Examples and Solutions (Paperback): P Roques UML in Practice - The Art of Modeling Software Systems Demonstrated Through Worked Examples and Solutions (Paperback)
P Roques
R1,271 R1,059 Discovery Miles 10 590 Save R212 (17%) Ships in 18 - 22 working days

* Offers comprehensive coverage of all major modeling viewpoints
* Provides details of collaboration and class diagrams for filling in the design-level models

Kya Hai Network Marketing Jaaniyen (Hindi, Paperback): Surya Sinha Kya Hai Network Marketing Jaaniyen (Hindi, Paperback)
Surya Sinha
R576 Discovery Miles 5 760 Ships in 18 - 22 working days
Network Marketing Sawal Aapke Jawab Surya Sinha Ke (Hindi, Paperback): Surya Sinha Network Marketing Sawal Aapke Jawab Surya Sinha Ke (Hindi, Paperback)
Surya Sinha
R464 Discovery Miles 4 640 Ships in 18 - 22 working days
Network Security with NetFlow  and IPFIX - Big Data Analytics for Information Security (Paperback): Omar Santos Network Security with NetFlow and IPFIX - Big Data Analytics for Information Security (Paperback)
Omar Santos
R1,283 Discovery Miles 12 830 Ships in 18 - 22 working days

A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security Today's world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches. Visibility into the network is an indispensable tool for network and security professionals and Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing. Network Security with NetFlow and IPFIX is a key resource for introducing yourself to and understanding the power behind the Cisco NetFlow solution. Omar Santos, a Cisco Product Security Incident Response Team (PSIRT) technical leader and author of numerous books including the CCNA Security 210-260 Official Cert Guide, details the importance of NetFlow and demonstrates how it can be used by large enterprises and small-to-medium-sized businesses to meet critical network challenges. This book also examines NetFlow's potential as a powerful network security tool. Network Security with NetFlow and IPFIX explores everything you need to know to fully understand and implement the Cisco Cyber Threat Defense Solution. It also provides detailed configuration and troubleshooting guidance, sample configurations with depth analysis of design scenarios in every chapter, and detailed case studies with real-life scenarios. You can follow Omar on Twitter: @santosomar NetFlow and IPFIX basics Cisco NetFlow versions and features Cisco Flexible NetFlow NetFlow Commercial and Open Source Software Packages Big Data Analytics tools and technologies such as Hadoop, Flume, Kafka, Storm, Hive, HBase, Elasticsearch, Logstash, Kibana (ELK) Additional Telemetry Sources for Big Data Analytics for Cyber Security Understanding big data scalability Big data analytics in the Internet of everything Cisco Cyber Threat Defense and NetFlow Troubleshooting NetFlow Real-world case studies

Network Coding & Data Compression - Theory, Applications & Challenges (Hardcover): Maryann Simmons Network Coding & Data Compression - Theory, Applications & Challenges (Hardcover)
Maryann Simmons
R3,656 Discovery Miles 36 560 Ships in 10 - 15 working days

In this book, new developments in network coding and data compression are examined. The first chapter proposes a new multipath transmission scheme that employs network coding at the source for rate-delay adaptation. The second chapter presents the theory, applications and challenges of a physical-layer network coding technique that promises significant improvement to the spectral efficiency and interference mitigation challenges in future heterogenous cellular and wireless networks. In this third chapter, network and distributed turbo coding based HARQ protocol are examined for wireless broadcasting systems. The last three chapters included in this book present three models that are based on Data Envelopment Analysis (DEA) methodology to appropriately evaluate the efficiency of multicast energy and further minimizes energy transmission in wireless networks without affecting the overall network performance; the development of methods of experimental statistical modeling of physical laws and the cascade scheme of data compression in multimode fibre systems.

Business Continuity Planning - A Step-by-Step Guide With Planning Forms on CD-ROM, 3rd Edition (Paperback, 3rd Enlarged ed.):... Business Continuity Planning - A Step-by-Step Guide With Planning Forms on CD-ROM, 3rd Edition (Paperback, 3rd Enlarged ed.)
Kenneth L Fulmer; Edited by Philip Jan Rothstein
R1,168 Discovery Miles 11 680 Ships in 18 - 22 working days

Your businessa survival depends on a solid business continuity and disaster recover plan. If you are overwhelmed by the very thought of creating a continuity plan for your business, this is the book for you.

It acknowledges the day-to-day realities of running an enterprise or any size by taking you step-by-step through the generally accepted abest practices, a enabling you to construct an appropriately sized recovery plan. It will neither overwhelm you nor break the bank and it will get your business continuity program running surprisingly fast and with a lot less effort than you expect. The author uses straightforward, jargon-free writing and supplements it with checklists, tables and worksheets to illustrate the easiest path to your destination.

Once you have the basic structure in place, you can refer back to this guide time and time again to build on your business continuity plan as your business evolves. The simplicity of this reference and the accompanying materials on CD-ROM will allay your concerns and allow you to confidently devote more time and resources to this critical process. As you move through the steps, you will see the practical and measurable results of a business that is becoming more resilient, more agile, and better prepared to take advantage of the next business change.

SAP MM: Interview Questions, Answers, and Explanations (Paperback): Jordan Schliem SAP MM: Interview Questions, Answers, and Explanations (Paperback)
Jordan Schliem
R792 Discovery Miles 7 920 Ships in 18 - 22 working days

The Comprehensive Guide for SAP MM Consultants and Managers SAP MM Certification Questions, Answers, and Explanations! It's clear that MM is one of the core modules in SAP, but finding relevant resources can be difficult. SAP MM Interview Questions, Answers, and Explanations will guide you through your learning process. From helping to assess the skills you will need for your team to how to choose a project resource, SAP MM Interview Questions will put you on the path to understanding what resources really know. The book is organized around three areas of the MM module: configuration, troubleshooting, and production support. Each question includes everything you need to know to master the interview or properly evaluate a candidate. More than just a rehash of SAP documentation and sales presentations, each question is based on project knowledge and experience gained on successful high-profile SAP MM implementation projects.;Key interview topics include: - The most important MM Configuration to know - Common MM Implementation Scenarios - MM Certification Exam Questions - Consumption Based Planning - Warehouse Management - Material Master Creation and Planning - Purchasing Document Inforecords

Computer Organisation and Architecture - An Introduction (Paperback, 2nd ed. 2003): B.S. Chalk, Antony Carter, Robert Hind Computer Organisation and Architecture - An Introduction (Paperback, 2nd ed. 2003)
B.S. Chalk, Antony Carter, Robert Hind
R2,701 Discovery Miles 27 010 Ships in 18 - 22 working days

This book describes how a computer works and explains how the various hardware components are organized and interconnected to provide a platform upon which programs can be executed. It takes a simple, step-by-step approach suitable for first year undergraduates coming to the subject for the first time. The second edition of this book has been thoroughly updated to cover new developments in the field and includes new diagrams and end-of-chapter exercises. It will also be accompanied by a lecturer and student web site which will contain solutions to exercises, further exercises, PowerPoint slides and all the source code used in the book.

The CISO Journey - Life Lessons and Concepts to Accelerate Your Professional Development (Hardcover): Eugene Fredriksen The CISO Journey - Life Lessons and Concepts to Accelerate Your Professional Development (Hardcover)
Eugene Fredriksen
R3,793 Discovery Miles 37 930 Ships in 10 - 15 working days

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each relating to a "Rule of Information Security" developed through a career of real life experiences. The elements are selected to accelerate the development of CISO skills critical to success. Each segments clearly calls out lessons learned and skills to be developed. The last segment of the book addresses presenting security to senior execs and board members, and provides sample content and materials.

PMP Exam Challenge! (Paperback, 6th edition): J. LeRoy Ward, Ginger Levin PMP Exam Challenge! (Paperback, 6th edition)
J. LeRoy Ward, Ginger Levin
R1,487 Discovery Miles 14 870 Ships in 10 - 15 working days

Preparing for and passing the PMP (R) exam is no small feat. Although the number of certified PMP (R)s continues at a phenomenal rate, the exam failure rate remains uncommonly high. PMP (R) Exam Challenge! is designed to help readers pass the exam by giving them an easy-to-use, highly portable publication, containing key relevant topics they are certain to encounter on the exam. Featuring 660 practice questions, this sixth edition completely reflects the PMBOK (R) Guide, Fifth Edition and covers the guide's ten knowledge areas.

Software-Defined Data Infrastructure Essentials - Cloud, Converged, and Virtual Fundamental Server Storage I/O Tradecraft... Software-Defined Data Infrastructure Essentials - Cloud, Converged, and Virtual Fundamental Server Storage I/O Tradecraft (Hardcover)
Greg Schulz
R3,995 Discovery Miles 39 950 Ships in 10 - 15 working days

Software-Defined Data Infrastructures Essentials provides fundamental coverage of physical, cloud, converged, and virtual server storage I/O networking technologies, trends, tools, techniques, and tradecraft skills. From webscale, software-defined, containers, database, key-value store, cloud, and enterprise to small or medium-size business, the book is filled with techniques, and tips to help develop or refine your server storage I/O hardware, software, and services skills. Whether you are new to data infrastructures or a seasoned pro, you will find this comprehensive reference indispensable for gaining as well as expanding experience with technologies, tools, techniques, and trends. We had a front row seat watching Greg present live in our education workshop seminar sessions for ITC professionals in the Netherlands material that is in this book. We recommend this amazing book to expand your converged and data infrastructure knowledge from beginners to industry veterans. -Gert and Frank Brouwer, Brouwer Storage Consultancy Software-Defined Data Infrastructures Essentials provides the foundational building blocks to improve your craft in serval areas including applications, clouds, legacy, and more. IT professionals, as well as sales professionals and support personnel, stand to gain a great deal by reading this book.-Mark McSherry, Oracle Regional Sales Manager Looking to expand your data infrastructure IQ? From CIOS to operations, sales to engineering, this book is a comprehensive reference, a must read for IT infrastructure professionals, beginners to seasoned experts.-Tom Becchetti, Advisory Systems Engineer Greg Schulz has provided a complete 'toolkit' for storage management along with the background and framework for the storage or data infrastructure professional or those aspiring to become one.-Greg Brunton, Experienced Storage and Data Management Professional

Security and Auditing of Smart Devices - Managing Proliferation of Confidential Data on Corporate and BYOD Devices (Hardcover):... Security and Auditing of Smart Devices - Managing Proliferation of Confidential Data on Corporate and BYOD Devices (Hardcover)
Sajay Rai, Philip Chukwuma, Richard Cozart
R2,092 Discovery Miles 20 920 Ships in 10 - 15 working days

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the IT organization but for the IT auditors as well. This book will serve as a guide to IT and Audit professionals on how to manage, secure and audit smart device. It provides guidance on the handling of corporate devices and the Bring Your Own Devices (BYOD) smart devices.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Microbiorobotics - Biologically Inspired…
Minjun Kim, Agung Julius, … Hardcover R3,214 Discovery Miles 32 140
The Pocket Gospels and Psalms
Our Sunday Visitor Paperback R217 R200 Discovery Miles 2 000
Proceedings of 14th International…
Andrey Ronzhin, Vladislav Shishlakov Hardcover R5,310 Discovery Miles 53 100
No Greater Love - Experiencing the Heart…
A.W. Tozer, James L. Snyder Paperback R369 R299 Discovery Miles 2 990
The Narcissist Needs You - The Main…
Lily Leroy Hardcover R793 Discovery Miles 7 930
Informatics in Control, Automation and…
Jean-Louis Ferrier, Oleg Gusikhin, … Hardcover R6,455 Discovery Miles 64 550
I Love Jesus, But I Want To Die - Moving…
Sarah J Robinson Paperback R380 R354 Discovery Miles 3 540
Intelligent Autonomy for Unmanned Marine…
Carlos C Insaurralde Hardcover R3,619 R3,359 Discovery Miles 33 590
ERV Holy Bible Gospel of Matthew…
Paperback R58 Discovery Miles 580
The Second Epistle of JOHN
King James, John Hardcover R416 Discovery Miles 4 160

 

Partners