|
Showing 1 - 3 of
3 matches in All Departments
System administration is about the design, running and maintenance
of human-computer systems. Examples of human-computer systems
include business enterprises, service institutions and any
extensive machinery that is operated by, or interacts with human
beings. System administration is often thought of as the
technological side of a system: the architecture, construction and
optimization of the collaborating parts, but it also occasionally
touches on softer factors such as user assistance (help desks),
ethical considerations in deploying a system, and the larger
implications of its design for others who come into contact with
it.
This book summarizes the state of research and practice in this
emerging field of network and system administration, in an
anthology of chapters written by the top academics in the field.
The authors include members of the IST-EMANICS Network of
Excellence in Network Management.
This book will be a valuable reference work for researchers and
senior system managers wanting to understand the essentials of
system administration, whether in practical application of a data
center or in the design of new systems and data centers.
- Covers data center planning and design
- Discusses configuration management
- Illustrates business modeling and system administration
- Provides the latest theoretical developments
Information Security is usually achieved through a mix of
technical, organizational and legal measures. These may include the
application of cryptography, the hierarchical modeling of
organizations in order to assure confidentiality, or the
distribution of accountability and responsibility by law, among
interested parties.
The history of Information Security reaches back to ancient times
and starts with the emergence of bureaucracy in administration and
warfare. Some aspects, such as the interception of encrypted
messages during World War II, have attracted huge attention,
whereas other aspects have remained largely uncovered.
There has never been any effort to write a comprehensive history.
This is most unfortunate, because Information Security should be
perceived as a set of communicating vessels, where technical
innovations can make existing legal or organisational frame-works
obsolete and a breakdown of political authority may cause an
exclusive reliance on technical means.
This book is intended as a first field-survey. It consists of
twenty-eight contributions, written by experts in such diverse
fields as computer science, law, or history and political science,
dealing with episodes, organisations and technical developments
that may considered to be exemplary or have played a key role in
the development of this field.
These include: the emergence of cryptology as a discipline during
the Renaissance, the Black Chambers in 18th century Europe, the
breaking of German military codes during World War II, the
histories of the NSA and its Soviet counterparts and contemporary
cryptology. Other subjects are: computer security standards,
viruses and worms on the Internet, computer transparency and free
software, computer crime, export regulations for encryption
software and the privacy debate.
- Interdisciplinary coverage of the history Information
Security
- Written by top experts in law, history, computer and information
science
- First comprehensive work in Information Security
|
|