Kirjojen hintavertailu. Mukana 12 016 292 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

3 kirjaa tekijältä Marvin Waschke

Cloud Standards

Cloud Standards

Marvin Waschke

APress
2012
nidottu
Cloud computing is often described as providing computing resources the way electric utilities provide energy. In theory, anyone with an adequate connection to the Internet should be able to tap into a cloud provider and get exactly the computing resources they want when they want it, just like plugging into the electricity grid and getting exactly the energy you want when you want it. But to get that electricity, there are many standards: voltage, frequency, phase, motors constructed in standard ways—there is a long list; there is an equally long list for cloud computing. Many of the standards are already in place. Others are being developed; some in contention. Cloud Standards is a broad discussion of important existing and future standards. For existing standards, the discussion focuses on how they are used, providing practical advice to engineers constructing clouds and services to be deployed on clouds. For future standards, the discussion is on why a standard is needed, what the benefits will be, and what is being done now to fill the gap. No current book provides this information in the depth and detail necessary for an engineer in his work, an architect in designing cloud systems, a product manager collecting and evaluating products, or an executive evaluating the feasibility of a project. A second benefit from this book is that it provides insight into cloud implementations. Cloud implementations can be seen as the culmination of many trends in software and hardware engineering. Much of the foundation for these developments have been crystallized in the form of standards like TCP/IP (Transmission Control Protocol/Internet Protocol) and HTTP (Hypertext Transmission Protocol). The book leads readers to understand how these contribute to and affect cloud implementations. Unfortunately, emerging standards are often messy. Cloud implementers may need to choose between competing proposed standards. Sometimes it is better toreject the standard entirely and "roll your own." This book provides background for intelligent decisions. Keeping a cloud, or an application implemented on a cloud, running well requires careful tuning of the implementation. Tuning often involves adjusting controls that are in the standard or applying the standard in less well-known ways. This book is an aid in tuning cloud systems for maximum benefits.
How Clouds Hold IT Together

How Clouds Hold IT Together

Marvin Waschke

APress
2015
nidottu
Gain the practical knowledge you need to plan, design, deploy, and manage mixed cloud and on-premises IT management systems. Drawing on his experience as senior principal software architect at CA Technologies, Marvin Waschke lays out the nuts and bolts of the IT Infrastructure Library (ITIL)—the 5-volume bible of standard IT service management practices that is the single most important tool for aligning IT services with business needs.Many enterprise IT management applications, and the ways they are integrated, come directly from ITIL service management requirements. Types of integration include integrated reporting and dashboards, event-driven integration, device integration, and application data integration. Enterprise integration depends critically on high performance, scalability, and flexibility. Failure to integrate applications to service management requirements results in such wryly anticipated spectacles as the annual crash of the websites of Super Bowl advertiserssuch as Coca-Cola and Acura.Waschke weighs in on the debate between those who advocate integrating "best-of-breed" applications and those who favor a pre-integrated set of applications from a single vendor. He also rates the strengths and weaknesses of the major architectural patterns—central relational databases, service-oriented architecture (SOA), and enterprise data buses—for IT integration of service management applications. He examines the modifications to traditional service management that are required by virtualized systems of datacenter management and application design.Clouds present special problems for integration. How Clouds Hold IT Together details solutions for integration problems in private, community, and public clouds—especially problems with multi-tenant SaaS applications. Most enterprises are migrating to the cloud gradually rather than at one go. The transitional phase of mixed cloud and on-premises applications presents thorny problems for IT management. Waschke shows the reader how to normalize the performance and capacity measurements of concurrent traditional and cloud resources.
Personal Cybersecurity

Personal Cybersecurity

Marvin Waschke

APress
2017
nidottu
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems. Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage.Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips you with the battlefield intelligence, strategic understanding, survival training, and proven tools you need to intelligently assess the security threats in your environment and most effectively secure yourself from attacks. Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed.What You'll LearnDiscover how computer security works and what it can protect us fromSee how a typical hacker attack worksEvaluate computer security threats to the individual user and corporate systemsIdentify the critical vulnerabilities of a computer connected to the InternetManage your computer to reduce vulnerabilities to yourself and your employerDiscover how the adoption of newer forms of biometric authentication affects youStop your router and other online devices from being co-opted into disruptive denial of service attacksWho This Book Is ForProficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack anddefense but do not want to go so far as to become security experts. Some of this audience will be purely home users, but many will be executives, technical managers, developers, and members of IT departments who need to adopt personal practices for their own safety and the protection of corporate systems. Many will want to impart good cybersecurity practices to their colleagues. IT departments tasked with indoctrinating their users with good safety practices may use the book as training material.