Enterprise Systems Integration 2nd Edition
The convergence of knowledge, technology, and human performance which comprises today’s enterprise allows creative business process design. Thus, an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy that integrates the enterprise. Enterprise Systems Integration, Second Edition continues to provide you with the business insight and the technical know-how that ensures successful systems integration.The book combines the perspectives, knowledge, and experience of more than 70 experts in the various areas that involve enterprise integration. Their expertise ranges from hands-on experience with technology and project management to the higher-level issues of business and management strategy. Each chapter examines an issue or technology relevant to today’s enterprise. Collectively, these chapters span the range of enterprise computing and systems integration. Once armed with the strategy and technologies, you must successfully deploy ERP systems within budget and on time. In addition, you must be able to integrate them into the rest of the enterprise. Still, ERP software does not make up the full picture of today’s enterprise. Legacy systems, e-commerce and other Web-based systems, client/server applications, networks and communications systems, data warehousing, and integrated databases enter into the mix. Enterprise Systems Integration, Second Edition paints a comprehensive picture of the technologies that comprise today’s enterprise and shows you how to make them work together.
Out of stock
Updated with the latest advances from the field, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Fifth Edition combines all-encompassing topic coverage, authoritative information from seasoned experts, and real-world applications to deliver the most comprehensive forensics resource available. This proven author team’s wide ranging areas of expertise mirror the breadth of coverage provided in the book, which focuses on techniques and practices for gathering and analyzing evidence used to solve crimes involving computers. While other books offer more of an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, introducing readers to every step of the computer forensics investigation-from lab set-up to testifying in court. It also details step-by-step guidance on how to use current forensics software and provides free demo downloads. Appropriate for learners new to the field, it is also an excellent refresher and technology update for professionals in law enforcement, investigations, or computer security.
About the Author
Amelia Phillips is a graduate of the Massachusetts Institute of Technology and has worked for more than 30 years in government, private industry, and academics. She has designed distance education classes and e-commerce, computer forensics, and network security programs at several community colleges. Amelia is Chair of the Pure and Applied Science Division at Highline Community College, a Fulbright Scholar, and a recent PhD in computer security. Bill Nelson has been a computer forensics examiner for a Fortune 50 company for the past 12 years and has developed high-tech investigation programs for professional organizations and colleges. His previous experience includes AFIS software engineering and reserve police work. Christopher Steuart is one of the founders and the staff attorney for IT Forensics.com. Previously, he was an information systems security specialist for a Fortune 50 company and the United States government. Chris resides in Seattle, Washington.
Understand and implement VMware Virtual SAN: the heart of tomorrow’s Software-Defined Datacenter (SDDC) VMware’s breakthrough Software-Defined Datacenter (SDDC) initiative can help you virtualize your entire datacenter: compute, storage, networks, and associated services. Central to SDDC is VMware Virtual SAN (VSAN): a fully distributed storage architecture seamlessly integrated into the hypervisor and capable of scaling to meet any enterprise storage requirement. Now, the leaders of VMware’s wildly popular Virtual SAN previews have written the first authoritative guide to this pivotal technology. You’ll learn what Virtual SAN is, exactly what it offers, how to implement it, and how to maximize its value. Writing for administrators, consultants, and architects, Cormac Hogan and Duncan Epping show how Virtual SAN implements both object-based storage and a policy platform that simplifies VM storage placement. You’ll learn how Virtual SAN and vSphere work together to dramatically improve resiliency, scale-out storage functionality, and control over QoS. Both an up-to-the-minute reference and hands-on tutorial, Essential Virtual SAN uses realistic examples to demonstrate Virtual SAN’s most powerful capabilities. You’ll learn how to plan, architect, and deploy Virtual SAN successfully, avoid gotchas, and troubleshoot problems once you’re up and running. Coverage includes * Understanding the key goals and concepts of Software-Defined Storage and Virtual SAN technology * Meeting physical and virtual requirements for safe Virtual SAN implementation * Installing and configuring Virtual SAN for your unique environment * Using Storage Policy Based Management to control availability, performance, and reliability * Simplifying deployment with VM Storage Policies * Discovering key Virtual SAN architectural details: caching I/O, VASA, witnesses, pass-through RAID, and more * Ensuring efficient day-to-day Virtual SAN management and maintenance * Interoperating with other VMware features and products * Designing and sizing Virtual SAN clusters * Troubleshooting, monitoring, and performance optimization.
About the Author
Cormac Hogan is a storage architect in the Integration Engineering team at VMware. Cormac was one of the first VMware employees at the EMEA headquarters in Cork, Ireland, back in 2005, and has previously held roles in VMware’s Technical Marketing and Support organizations. Cormac has written a number of storage-related white papers and has given numerous presentations on storage best practices and new features. Cormac is the owner of CormacHogan.com, a blog site dedicated to storage and virtualization. He can be followed on twitter @CormacJHogan. Duncan Epping is a principal architect working for VMware R&D. Duncan is responsible for exploring new possibilities with existing products and features, researching new business opportunities for VMware. Duncan specializes in software-defined storage, hyperconverged platforms, and availability solutions. Duncan was among the first VMware Certified Design Experts (VCDX 007). Duncan is the owner of Yellow-Bricks.com and author of various books, including the VMware vSphere Clustering Technical Deepdive series. He can be followed on twitter @DuncanYB.
Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security.
In recent years, the need for education in computer security and related topics has grown dramatically – and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective.
Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval 2nd Edition
Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data-if that is indeed possible. This book is for all of you, whatever your need or interest. Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition explains the reasons you need to know about electronic data. It also gets into great detail about the how, what, when, and where of what is known in legal circles as electronically stored information (ESI). With easy-to-understand explanations and guidelines, this book provides the practical understanding you need to effectively manage the complex world of ESI. Whether you are an attorney, judge, paralegal, business manager or owner, or just one of the ever-growing population of computer users, you will benefit from the information presented in this book.
About the Author
David Matthews has worked in the information technology (IT) field since 1992. He began working for the City of Seattle as the technology manager for the Legislative Department (City Council) in 1998. In early 2005, he was selected to be the first Deputy CISO for the city. In his work for the city, he developed and created an incident response plan that is compliant with the National Incident Management System (NIMS)/Incident Command System (ICS); updated and extensively rewrote the city’s information security policy; and created and taught training courses on information security and forensics. He created an IT primer for the city’s law department as part of his collaboration with them on e-discovery issues. In 2012, he was recruited by Expedia, Inc. to develop and lead their global cyber incident response team. He created and exercised a plan that integrated with their network response and disaster recovery plans and led a team located both in the United States and India. He retired in 2014 and is now doing consultant work mostly with local governments and critical infrastructure to enhance their cyber response and resiliency capabilities.