Chaos Engineering with Go
by Kapil Kumar Khandelwal and Mohit Garg
Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
by Abhilash GB
This is a step by step guide that will help you understand disaster recovery using VMware vSphere Replication 5.5 and VMware vCenter Site Recovery Manager (SRM) 5.5. The topics and configuration procedures are accompanied with relevant screenshots, flowcharts, and logical diagrams that makes grasping the concepts easier. This book is a guide for anyone who is keen on using vSphere Replication or vCenter Site Recovery Manager as a disaster recovery solution. This is an excellent handbook for solu...
Every day, companies struggle to scale critical applications. As traffic volume and data demands increase, these applications become more complicated and brittle, exposing risks and compromising availability. This practical guide shows IT, devops, and system reliability managers how to prevent an application from becoming slow, inconsistent, or downright unavailable as it grows. Scaling isn't just about handling more users; it's also about managing risk and ensuring availability. Author Lee Atch...
Developing and Evaluating Security-Aware Software Systems
As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field. Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practi...
Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers and consumers. The book discusses different infrastructures in a smart grid, such as the automatic metering infrastruc...
What would you do if the hard drive containing a year's worth of financial data and your wedding photos suddenly stops working? What would you do if Internet hackers run off with your credit card numbers and rack up several thousand dollars in 1-900 calls? Most people never even remotely consider the possibility of a computer disaster, but instead take it for granted that their computer will always work. Inevitably, disaster strikes in various forms, from hardware failures to hackers, fires, flo...
In recent years, a considerable amount of effort has been devoted, both in industry and academia, to the development, validation and verification of critical systems, i.e. those systems whose malfunctions or failures reach a critical level both in terms of risks to human life as well as having a large economic impact. Certifications of Critical Systems - The CECRIS Experience documents the main insights on Cost Effective Verification and Validation processes that were gained during work in the...
Don't wait for an attacker to find and exploit your security vulnerabilities-take the lead by assessing the state of your network's security. This book delivers advanced network testing strategies, including vulnerability scanning and penetration testing, from members of the Microsoft security teams. These real-world practitioners provide hands-on guidance on how to perform security assessments, uncover security vulnerabilities, and apply appropriate countermeasures. The companion CD features ti...
Discover the unified, distributed storage system and improve the performance of applications Key FeaturesExplore the latest features of Ceph's Mimic releaseGet to grips with advanced disaster and recovery practices for your storageHarness the power of Reliable Autonomic Distributed Object Store (RADOS) to help you optimize storage systemsBook DescriptionCeph is an open source distributed storage system that is scalable to Exabyte deployments. This second edition of Mastering Ceph takes you a ste...
Companies and institutions depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based. Business Continuity is the ability to do business under any circumstances and is an essential requirement faced by modern companies. Both concepts - High Availability and Disaster Recovery - are realized by redundant systems. This book presents requirements, concepts, and realizations of redundant systems on all abstraction levels, and a...
Microsoft Sharepoint 2013 Disaster Recovery Guide
by Professor & Chairman Department of Pathology Peter Ward, Peter Abreu, Pavlo Andrushkiw, Pat Esposito, Jeff Gellman, and Joel Plaut
The style and approach of the book is an easytoread SharePoint admin guide. This is not a stepbystep instruction book, but rather a guide on how to implement and execute a disaster recovery plan to your SharePoint environment.This book is great for both SharePoint and SQL administrators new to the SharePoint 2013 architecture, and who are looking to get a good grounding in how to use implement a solid disaster recoveryrecovery plan. It's assumed that you have some experience in SharePoint and Wi...
Microsoft System Center 2012 R2 Compliance Management Cookbook
by Andreas Baumgarten, Ronnie Isherwood, and Susan Roesner
Whether you are an IT manager, an administrator, or security professional who wants to learn how Microsoft Security Compliance Manager and Microsoft System Center can help fulfil compliance and security requirements, this is the book for you. Prior knowledge of Microsoft System Center is required.
As PCs continue to get more complicated, disasters continue to become more commonplace. This book focuses on helping users overcome the disasters that happen on their PCs as a result of viruses, system crashes, hard disk failures and the like. Unlike other books that focus on a single aspect of the problem, this book covers all the important issues including prevention, diagnosis, and troubleshooting. While other books contain theory and background that may be of interest to a network administra...