Home | Amazing | Today | Tags | Publishers | Years | Search 
Reinventing ITIL® in the Age of DevOps: Innovative Techniques to Make Processes Agile and Relevant
Reinventing ITIL® in the Age of DevOps: Innovative Techniques to Make Processes Agile and Relevant
Delve into the principles of ITIL® and DevOps and examine the similarities and differences. This book re-engineers the ITIL framework to work in DevOps projects without changing its meaning and its original objectives, making it fit for purpose for use in DevOps...
The Business of IT: How to Improve Service and Lower Costs
The Business of IT: How to Improve Service and Lower Costs

Drive More Business Value from IT…

and Bridge the Gap Between IT and Business Leadership

  • Apply business practices throughout IT to optimize budgets and improve ROI
  • ...
Service Level Management Best Practice Handbook: Building, Running and Managing Effective Service Level Management SLAs - Ready to Use Supporting Documents Bringing ITIL Theory into Practice
Service Level Management Best Practice Handbook: Building, Running and Managing Effective Service Level Management SLAs - Ready to Use Supporting Documents Bringing ITIL Theory into Practice
Many organizations are looking to implement Service Level Management as a way to improve the structure and quality of the business.

This document describes the contents of the Service Level Management Guide. The information found within the book is based on the ITIL Version 2 framework, specifically the Service
...
How Clouds Hold IT Together: Integrating Architecture with Cloud Deployment
How Clouds Hold IT Together: Integrating Architecture with Cloud Deployment

Gain the practical knowledge you need to plan, design, deploy, and manage mixed cloud and on-premises IT management systems. Drawing on his experience as senior principal software architect at CA Technologies, Marvin Waschke lays out the nuts and bolts of the IT Infrastructure Library (ITIL)―the 5-volume bible of standard IT service...

The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))
The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley,...

Visio 2007 Bible
Visio 2007 Bible
Visio® 2007 Bible is as comprehensive a guide to the popular Microsoft diagramming software as a book of less than 1000 pages can be. Covering both Visio Standard and Visio Professional, this book explains Visio fundamentals as well as more advanced techniques that help you master any type of diagram. It also describes in detail how to use each...
IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
Sarbanes-Oxley Internal Controls: Effective Auditing with AS5, CobiT, and ITIL
Sarbanes-Oxley Internal Controls: Effective Auditing with AS5, CobiT, and ITIL
The passage of the Sarbanes-Oxley Act (SOx) in 2002 almost seems like distant history today. That legislation became effective after a series of accounting scandals led to the failure of several then major corporations, such as Enron and WorldCom, the conviction and imprisonment of multiple key executives, and the failure of the major public...
Information Security Fundamentals, Second Edition
Information Security Fundamentals, Second Edition

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides...

Result Page: 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy