A study guide for Oracle database administrators who want OCP certification. Certification ensures a high level of competence in the DBA job role. An accompanying CD-ROM includes self-testing software and pre-assessment exams.
Every day, companies struggle to scale critical applications. As traffic volume and data demands increase, these applications become more complicated and brittle, exposing risks and compromising availability. This practical guide shows IT, devops, and system reliability managers how to prevent an application from becoming slow, inconsistent, or downright unavailable as it grows. Scaling isn't just about handling more users; it's also about managing risk and ensuring availability. Author Lee Atch...
Cisa Certified Information Systems Auditor All-In-One Exam Guide, Fourth Edition
by Peter H Gregory
Good backup and recovery strategies are key to the health of any organization. Medium- to very-large-scale systems administrators have to protect large amounts of critical data as well as design backup solutions that are scalable and optimized to meet changing conditions. Pro Data Backup and Recovery will cover some of the more common backup applications, such as Symantec NetBackup/BackupExec, EMC NetWorker, and CommVault, but the main discussion will focus on the implementation of 21st century...
Everything You Want to Know about Organisational Change (Everything You Want to Know About, #1)
by Brian Johnson and Darren Arcangel
A must-have book for every organisation that faces change! Your organisation can benefit from change. This book will show you how. Why do organisations change? What are the risks involved? Can we resist change? What is the best way to manage it? What are the key factors that drive change, and how? Why are some changes easier to survive than others? These are just some of the questions that Darren Arcangel and Brian Johnson address in Everything you want to know about Organisational Change. This...
Build a resilient cloud architecture to tackle data disasters with ease Key Features Gain a firm grasp of Cloud data security and governance, irrespective of your Cloud platform Practical examples to ensure you secure your Cloud environment efficiently A step-by-step guide that will teach you the unique techniques and methodologies of Cloud data governance Book Description Modern day businesses and enterprises are moving to the Cloud, to improve efficiency and speed, achieve flexibility and c...
Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers and consumers. The book discusses different infrastructures in a smart grid, such as the automatic metering infrastruc...
What would you do if the hard drive containing a year's worth of financial data and your wedding photos suddenly stops working? What would you do if Internet hackers run off with your credit card numbers and rack up several thousand dollars in 1-900 calls? Most people never even remotely consider the possibility of a computer disaster, but instead take it for granted that their computer will always work. Inevitably, disaster strikes in various forms, from hardware failures to hackers, fires, flo...
In recent years, a considerable amount of effort has been devoted, both in industry and academia, to the development, validation and verification of critical systems, i.e. those systems whose malfunctions or failures reach a critical level both in terms of risks to human life as well as having a large economic impact. Certifications of Critical Systems - The CECRIS Experience documents the main insights on Cost Effective Verification and Validation processes that were gained during work in the...
Don't wait for an attacker to find and exploit your security vulnerabilities-take the lead by assessing the state of your network's security. This book delivers advanced network testing strategies, including vulnerability scanning and penetration testing, from members of the Microsoft security teams. These real-world practitioners provide hands-on guidance on how to perform security assessments, uncover security vulnerabilities, and apply appropriate countermeasures. The companion CD features ti...
Discover the unified, distributed storage system and improve the performance of applications Key FeaturesExplore the latest features of Ceph's Mimic releaseGet to grips with advanced disaster and recovery practices for your storageHarness the power of Reliable Autonomic Distributed Object Store (RADOS) to help you optimize storage systemsBook DescriptionCeph is an open source distributed storage system that is scalable to Exabyte deployments. This second edition of Mastering Ceph takes you a ste...
Companies and institutions depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based. Business Continuity is the ability to do business under any circumstances and is an essential requirement faced by modern companies. Both concepts - High Availability and Disaster Recovery - are realized by redundant systems. This book presents requirements, concepts, and realizations of redundant systems on all abstraction levels, and a...
Have you ever wondered whether your business continuity plan is any good, or whether you've even got a business continuity plan? Anyone can write a simple document, call it a business continuity plan and hope for the best. But, unless you know that it will do what it is supposed to, it may be a wasted investment. This practical guide to the ISO22301 business continuity management system standard shows you how to develop and implement a business continuity management (BCM) and disaster recovery p...
Microsoft Sharepoint 2013 Disaster Recovery Guide
by Professor & Chairman Department of Pathology Peter Ward, Peter Abreu, Pavlo Andrushkiw, Pat Esposito, Jeff Gellman, and Joel Plaut
The style and approach of the book is an easytoread SharePoint admin guide. This is not a stepbystep instruction book, but rather a guide on how to implement and execute a disaster recovery plan to your SharePoint environment.This book is great for both SharePoint and SQL administrators new to the SharePoint 2013 architecture, and who are looking to get a good grounding in how to use implement a solid disaster recoveryrecovery plan. It's assumed that you have some experience in SharePoint and Wi...
Microsoft System Center 2012 R2 Compliance Management Cookbook
by Andreas Baumgarten, Ronnie Isherwood, and Susan Roesner
Whether you are an IT manager, an administrator, or security professional who wants to learn how Microsoft Security Compliance Manager and Microsoft System Center can help fulfil compliance and security requirements, this is the book for you. Prior knowledge of Microsoft System Center is required.
How would your organisation keep going in the event of a crisis? If you got hit by a disaster and lost the use of your IT systems, would you be able to continue operating? To minimise the impact of a disaster on your business, and to continue to provide essential services to your customers, you need to put in place a Business Continuity Management System (BCMS).
What would you do if your systems were hacked or compromised by a virus? How would your IT systems cope in the event of flooding or an explosion? What if your IT systems simply stopped working? IT has brought many benefits to business. However, IT failures can seriously damage your ability to deliver products and services, harm your company's reputation, and jeopardise your relationship with your customers. In short, poorly managed IT problems could threaten the survival of your business. Create...
Become an expert at managing enterprise identity infrastructure with Active Directory Domain Services 2022. Purchase of the print or Kindle book includes a free eBook in the PDF format.Key FeaturesDesign and update your identity infrastructure by utilizing the latest Active Directory features and core capabilitiesOvercome migration challenges as you update to Active Directory Domain Services 2022Establish a strong identity foundation in the cloud by consolidating secure accessBook DescriptionMa...