- Table View
- List View
Managing RAID on Linux: Fast, Scalable, Reliable Data Storage
by Derek VadalaRedundant Array of Independent Disks (RAID) technology is becoming a standard feature of computer systems that support mission-critical services like file sharing, mail exchange, or Web servers. RAID offers two benefits to these essential systems: improved I/O performance and fail-safe data storage.Although bandwidth problems on networks are well documented, the internal data transfer bottleneck that exists at the hardware level in each system can also leave you with perplexing performance issues. RAID is a cost-effective and easy-to-manage way to alleviate this bandwidth problem by distributing the I/O load seamlessly across multiple disks and controllers.RAID also provides uninterrupted data access through disk mirroring and parity algorithms. That means systems can remain online even during a disk or controller failure. RAID is scalable, making it robust enough for large, high-traffic sites and small, critical systems. By using RAID, system administrators can combine single disks into terabytes worth of data storage.Managing RAID on Linux covers everything system administrators need to know to put together a system that can support RAID. You will learn about the different types of RAID, along with associated technologies and issues, and how to choose the best RAID system for your needs. With a step-by-step, hands-on approach, the author guides you through the installation of either Linux software RAID or a hardware RAID card. The book shows how to build an array and optionally install a high-performance file system. Contents include:An introduction to RAID and LinuxPlanning and architecture of your RAID systemBuilding a software RAIDSoftware RAID tools and referencesBuilding a hardware RAIDPerformance and tuning of your RAID systemRAID has become the low-cost solution of choice to deal with the ever-increasing demand for data storage space. Written for system administrators, power users, tech managers, and anyone who wants to learn about RAID technology, Managing RAID on Linux sidesteps the often-confusing vendor-specific approach you'll find elsewhere to give you the straight story on RAID. Even non-Linux users will find this book full of valuable material.
Managing RPM-Based Systems with Kickstart and Yum
by Q. Ethan McCallumManaging multiple Red Hat-based systems can be easy--with the right tools. The yum package manager and the Kickstart installation utility are full of power and potential for automatic installation, customization, and updates. Here's what you need to know to take control of your systems.
Managing Requirements Knowledge
by Anil Kumar Thurimella Walid MaalejRequirements engineering is one of the most complex and at the same time most crucial aspects of software engineering. It typically involves different stakeholders with different backgrounds. Constant changes in both the problem and the solution domain make the work of the stakeholders extremely dynamic. New problems are discovered, additional information is needed, alternative solutions are proposed, several options are evaluated, and new hands-on experience is gained on a daily basis. The knowledge needed to define and implement requirements is immense, often interdisciplinary and constantly expanding. It typically includes engineering, management and collaboration information, as well as psychological aspects and best practices. This book discusses systematic means for managing requirements knowledge and its owners as valuable assets. It focuses on potentials and benefits of "lightweight," modern knowledge technologies such as semantic Wikis, machine learning, and recommender systems applied to requirements engineering. The 17 chapters are authored by some of the most renowned researchers in the field, distilling the discussions held over the last five years at the MARK workshop series. They present novel ideas, emerging methodologies, frameworks, tools and key industrial experience in capturing, representing, sharing, and reusing knowledge in requirements engineering. While the book primarily addresses researchers and graduate students, practitioners will also benefit from the reports and approaches presented in this comprehensive work.
Managing Risk and Information Security: Protect to Enable
by Malcolm HarkinsManaging Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. The book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologiessuch as social media and the huge proliferation of Internet-enabled deviceswhile minimizing risk. With ApressOpen content will be freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context. Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies. The book contains eye-opening security insights that are easily understood, even by the curious layman. Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities. Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven't picked up on the change, impeding their companies' agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come. Dr. Jeremy Bergsman, Practice Manager, CEB The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think. Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods from dealing with the misperception of risk to how to become a Z-shaped CISO. Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession and should be on the desk of every CISO in the worl
Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud
by Frank SiepmannWith cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information, processes, and people.Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and
Managing Risk in Information Systems
by Darril Gibson Andy IgonorRevised and updated with the latest data in the field, the Second Edition of Managing Risk in Information Systems provides a comprehensive overview of the SSCP® Risk, Response, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastructu
Managing Risks in Digital Transformation: Navigate the modern landscape of digital threats with the help of real-world examples and use cases
by Ashish Kumar Shashank Kumar Abbas Kudrati Sarah Armstrong- SmithSecure your business in a post-pandemic world: Master digital risk identification and defensePurchase of the print or Kindle book includes a free PDF eBookKey FeaturesBecome well-versed with sophisticated system-level security risks and the zero-trust frameworkLearn about remote working risks, modern collaboration, and securing the digital data estateKeep up with rapidly evolving compliances and regulations and their impact on cyber risksBook DescriptionWith the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet.This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof.In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.What you will learnBecome aware of and adopt the right approach to modern digital transformationExplore digital risks across companies of all sizesStudy real-world cases that focus on post-pandemic digital transformationUnderstand insider threats and how to mitigate vulnerability exploitationGet to know how cyberwarfare targets infrastructure and disrupts critical systemsDiscover how implementing a regulatory framework can safeguard you in the current and future data landscapesWho this book is forThis book is for three categories of readers—those who own a business and are planning to scale it; those who are leading business and technology charters in large companies or institutions; and those who are academically or disciplinarily targeting cybersecurity and risk management as a practice-area.Essentially, this book is for board members, and professionals working in IT, GRC, and legal domains. It will also help technology leaders, including chief digital officers, chief privacy officers, chief risk officers, CISOs, CIOs, as well as students and cybersecurity enthusiasts with basic awareness of risks to navigate the digital threat landscape.
Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control
by Dr N. Jeyanthi Dr Kun Ma Dr Thinagaran Perumal Dr R. ThandeeswaranA heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control.The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.
Managing Security with Snort & IDS Tools: Intrusion Detection with Open Source Tools
by Kerry J. Cox Christopher GergIntrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools. This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs.Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts.Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
Managing Security with Snort and IDS Tools
by Kerry J. Cox Christopher GergThis practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, Managing Security with Snort and IDS Tools provides step-by-step instructions on getting up and running with Snort 2.1, and how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.
Managing Smart Cities: Sustainability and Resilience Through Effective Management
by Anna Visvizi Orlando TroisiThis book adopts the managerial perspective to the study of smart cities. As such, this book is a necessary addition to the existing body of literature on smart cities. The chapters included in this book prove the case that transformation of cities to smart cities is a function of effective and efficient management practices implemented at diverse levels of smart cities. While advances in information and communication technology (ICT) are crucial, it is the ability to apply ICT consciously and efficiently that drives the transformation of cities to smart cities in a manner conducive to cities’ sustainability and resilience.The book covers three sets of interconnected topics:Management and decision-making for urban design and infrastructure developmentManagement and decision-making in context of smart cities developmentWays of promoting and ensuring participation, representation and co-creation in smart cities These three groups of topics offer a great opportunity to acquire a clear, direct, and practice-driven knowledge and understanding of how effective management allows ICT-enhanced tools and applications to change smart cities, possibly making them smarter.
Managing Social Media and Consumerism
by RajagopalCategorically reviews the theories of communication, best practices in social media and previous research, and analyzes the corporate involvement towards strategic and tactical stewardship in serving customer-centric business requirements.
Managing Software Crisis: A Smart Way to Enterprise Agility (Smart Innovation, Systems And Technologies #92)
by Sergey V. ZykovThis book discusses smart, agile software development methods and their applications for enterprise crisis management, presenting a systematic approach that promotes agility and crisis management in software engineering. The key finding is that these crises are caused by both technology-based and human-related factors. Being mission-critical, human-related issues are often neglected. To manage the crises, the book suggests an efficient agile methodology including a set of models, methods, patterns, practices and tools. Together, these make a survival toolkit for large-scale software development in crises. Further, the book analyses lifecycles and methodologies focusing on their impact on the project timeline and budget, and incorporates a set of industry-based patterns, practices and case studies, combining academic concepts and practices of software engineering.
Managing Software Development with Trac and Subversion
by David J MurphyThis book combines theory with practical knowledge of how Trac and Subversion can help us to achieve the process of managing the software development. This book is aimed at developers of all calibres, but particularly those that lead teams or projects, especially if they have recently moved into the role or are simply looking for a better way.
Managing Software Requirements the Agile Way: Bridge the gap between software requirements and executable specifications to deliver successful projects
by Fred HeathLearn how to deliver software that meets your clients' needs with the help of a structured, end-to-end methodology for managing software requirements and building suitable systems Key Features Learn how to communicate with a project's stakeholders to elicit software requirements Deal every phase of the requirement life cycle with pragmatic methods and techniques Manage the software development process and deliver verified requirements using Scrum and Kanban Book Description Difficulty in accurately capturing and managing requirements is the most common cause of software project failure. Learning how to analyze and model requirements and produce specifications that are connected to working code is the single most fundamental step that you can take toward project success. This book focuses on a delineated and structured methodology that will help you analyze requirements and write comprehensive, verifiable specifications. You'll start by learning about the different entities in the requirements domain and how to discover them based on customer input. You'll then explore tried-and-tested methods such as impact mapping and behavior-driven development (BDD), along with new techniques such as D3 and feature-first development. This book takes you through the process of modeling customer requirements as impact maps and writing them as executable specifications. You'll also understand how to organize and prioritize project tasks using Agile frameworks, such as Kanban and Scrum, and verify specifications against the delivered code. Finally, you'll see how to start implementing the requirements management methodology in a real-life scenario. By the end of this book, you'll be able to model and manage requirements to create executable specifications that will help you deliver successful software projects. What you will learn Kick-start the requirements-gathering and analysis process in your first meeting with the client Accurately define system behavior as features Model and describe requirement entities using Impact Mapping and BDD Create a feature-based product backlog and use it to drive software development Write verification code to turn features into executable specifications Deliver the right software and respond to change using either Scrum or Kanban Choose appropriate software tools to provide transparency and traceability to your clients Who this book is for This book is for software engineers, business analysts, product managers, project managers, and software project stakeholders looking to learn a variety of techniques and methodologies for collating accurate software requirements. A fundamental understanding of the software development life cycle (SDLC) is needed to get started with this book. Although not necessary, basic knowledge of the Agile philosophy and practices, such as Scrum, along with some programming experience will help you to get the most out of this book.
Managing Software Supply Chains: Theory and Practice
by Ying Wang Zhiliang Zhu Shing-Chi Cheung Hai YuOpen-source software supply chains wield significant influence in the software industry, drawing substantial interest from enterprises, researchers, and policymakers. Leveraging third-party libraries to build software applications is a common practice aimed at cost savings and software quality enhancement. However, heavy reliance on external libraries often leads to a state of “dependency hell”, marked by issues like incompatibilities, conflicting versions, bloated dependencies, and the inclusion of vulnerable library versions. Despite extensive research on software dependency management and the evolution of software supply chains, questions linger regarding the variances in dependency challenges across programming language ecosystems and how best to address the dependency hell phenomenon from an ecosystem-wide perspective. The aim of this book is to offer: (1) a comprehensive literature review on software supply chains, (2) discussions on modeling software supply chains and analyzing their evolutionary behaviors, (3) ecosystem-level strategies for diagnosing various dependency issues and automating problem resolution with cost-benefit analysis, and (4) provision of a toolkit and datasets to support future research and assist practitioners in addressing the challenges of dependency management. The methodologies outlined in this book have been previously presented in top-tier conferences and journals, with some techniques officially integrated into products by Microsoft Corporation and Huawei Technologies Co Ltd. This book is designed to provide readers with a solid understanding of software supply chain fundamentals and practical guidance on implementing theory and techniques in real-world industrial settings. The book is chiefly intended for software engineering researchers and students with an academic background who are interested in learning about dependency management for third-party libraries, quality assurance for software supply chains, and the evolution of open-source software ecosystems. It will also be of interest to practitioners, including software engineers, quality assurance professionals, and software managers, as well as general readers. All will benefit from our systematic studies on the dependency hell phenomenon in various programming language communities and valuable associated artifacts.
Managing Spontaneous Community Volunteers in Disasters: A Field Manual
by Lisa OrloffWhile history has identified a need for improved coordination during emergencies, it has also demonstrated that community volunteers positively impact their neighborhoods during times of crisis. Laying out the rationale and process by which emergency managers, community leaders, and non-governmental aid organizations can effectively collaborate and
Managing Stakeholders in Software Development Projects (Computer Weekly Professional Ser.)
by John McManusAs stakeholder relationships and business in general have become increasingly central to the unfolding of stakeholder thinking, important new topics have begun to take centre stage in both the worlds of practitioners and academics. The role of project management becomes immeasurably more challenging, when stakeholders are no longer seen as simple objects of managerial action but rather as subjects with their own objectives and purposes. This book will aim to explain some of the complexities of project management and managerial relationships with stakeholders by discussing the practice of stakeholder engagement, dialog, measurement and management and the consequences of this practice for reporting and productivity, and performance within project management.
Managing State in Flutter Pragmatically: Discover how to adopt the best state management approach for scaling your Flutter app
by Waleed ArshadExplore popular state management techniques in Flutter and implement them in real-world applicationsKey FeaturesGet to grips with popular approaches for managing your Flutter application stateThink declaratively in order to decide on the most fitting approach for different applicationsLearn to implement state management solutions by building a popular use case in the form of a shopping cart appBook DescriptionFlutter is a cross-platform user interface (UI) toolkit that enables developers to create beautiful native applications for mobile, desktop, and the web with a single codebase. State management in Flutter is one of the most crucial and complex topics within Flutter, with a wide array of approaches available that can make it easy to get lost due to information overload.Managing State in Flutter Pragmatically is a definitive guide to starting out with Flutter and learning about state management, helping developers with some experience of state management to choose the most appropriate solutions and techniques to use. The book takes a hands-on approach and begins by covering the basics of Flutter state management before exploring how to build and manipulate a shopping cart app using popular approaches such as BLoC/Cubit, Provider, MobX, and Riverpod. Throughout the book, you'll also learn how to adopt approaches from React such as Redux and all its types.By the end of this Flutter book, you'll have gained a holistic view of all the state management approaches in Flutter, and learned which approach is the best solution for managing state in your app development journey.What you will learnUnderstand the core concepts of different state management techniques used in FlutterBuild optimal and performant applications in FlutterDevelop an understanding of which technique to apply in what sort of appsBuild the habit of writing clean state management codeProduce code with techniques from beginner to advanced level for different state management solutionsUse state management techniques to create robust and scalable apps in FlutterWho this book is forThis book is for developers who have already started with their Flutter journey and are now looking to learn optimal state management approaches for app development. The book will also help less experienced Flutter engineers to find the best state management solution to fit their app, along with Flutter engineers who want to learn which state management approach should be taken under what circumstances.
Managing Technology in Higher Education
by A. W. Bates Albert SangraUniversities continue to struggle in their efforts to fully integrate information and communications technology within their activities. Based on examination of current practices in technology integration at 25 universities worldwide, this book argues for a radical approach to the management of technology in higher education. It offers recommendations for improving governance, strategic planning, integration of administrative and teaching services, management of digital resources, and training of technology managers and administrators. The book is written for anyone wanting to ensure technology is integrated as effectively and efficiently as possible.
Managing Trust in Cyberspace
by Pradeep K. Atrey Sabu M. Thampi Bharat BhargavaIn distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooper
Managing Virtual Infrastructure with Veeam® ONE™
by Kevin L. SappThis book is aimed at virtualization professionals who want to improve their skills in infrastructure monitoring and management. You need a good understanding of server virtualization and management of virtual environments.
Managing Web Projects (ESI International Project Management Series)
by Edward B. FarkasGetting Web projects done right and delivered on time is all about efficiency. Putting the information you need and tools you can rely on at your ready disposal-Managing Web Projects-is a complete guide for project managers in the Internetworking industry. Whether you are a Web developer or an Internet Service Provider, whether your project is a qu
Managing Windows Servers with Chef
by John EwartThis is a guide to automating Windows infrastructures using Chef, from the big picture through to hands-on examples. This book is designed for systems administrators who have had some exposure to Chef and are interested using it to manage their Windows-based systems. Some exposure to programming or scripting languages is expected for portions of this book.
Managing Writers
by Richard HamiltonManaging Writers is a practical guide to managing documentation projects in the real world. It is informal, but concise, using examples from the author's experience working with and managing technical writers. It looks beyond big project, big team methodologies to the issues faced by smaller, less well-funded projects. Managing Writers is for technical writers, both freelancers and employees, documentation managers, and managers in other disciplines who are responsible for documentation; anyone who may need to manage, full or part-time, a documentation project. Inside the Book Leading People Leading Projects Leading Technology Glossary, Bibliography, and Index