2 results (0,14378 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Data Center Storage Cost-Effective Strategies Implementation and Management

Data Center Storage Cost-Effective Strategies Implementation and Management

We overspend on data center storage … yet we fall short of business requirements. It's not about the technologies. It's about the proper application of technologies to deliver storage services efficiently and affordably. It’s about meeting business requirements dependent on data center storage. Spend less deliver more. Data Center Storage: Cost-Effective Strategies Implementation and Management provides an industry insider’s insight on how to properly scope plan evaluate and implement storage technologies to maximize performance capacity reliability and power savings. It provides business and use-case focused coverage of storage technology including storage area networks (SAN) capacity-optimized drives and solid-state drives. It offers key insights on financially responsible spending for data center storage. Delivered in accessible language the book starts with a discussion of the business merits of replacing direct attached compartmentalized storage with consolidated SAN-attached storage. The author advises on the use of service level applications (SLAs) as a tool to drive business unit collaboration with IT and prioritize those actions that impact productivity and profit from those that are less critical. This business guide to applied technologies disassembles big problems into digestible segments to help you understand quantify and fix any problems that arise as you work towards meeting your growing storage needs. The book builds on the consolidation and SLA driven approach to take advantage of the compelling benefits and potential savings of managed hosting and cloud storage. | Data Center Storage Cost-Effective Strategies Implementation and Management

GBP 56.99
1

Core Software Security Security at the Source

Core Software Security Security at the Source

. an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. . Readers are armed with firm solutions for the fight against cyber threats. —Dr. Dena Haritos Tsamitis. Carnegie Mellon University. a must read for security specialists software developers and software engineers. . should be part of every security professional’s library. —Dr. Larry Ponemon Ponemon Institute. the definitive how-to guide for software security professionals. Dr. Ransome Anmol Misra and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process. . A must-have for anyone on the front lines of the Cyber War . —Cedric Leighton Colonel USAF (Ret. ) Cedric Leighton AssociatesDr. Ransome Anmol Misra and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source! —Eric S. Yuan Zoom Video CommunicationsThere is much publicity regarding network security but the real cyber Achilles’ heel is insecure software. Millions of software vulnerabilities create a cyber house of cards in which we conduct our digital lives. In response security people build ever more elaborate cyber fortresses to protect this vulnerable software. Despite their efforts cyber fortifications consistently fail to protect our digital treasures. Why? The security industry has failed to engage fully with the creative innovative people who write software. Core Software Security expounds developer-centric software security a holistic process to engage creativity for security. As long as software is developed by humans it requires the human element to fix it. Developer-centric security is not only feasible but also cost effective and operationally relevant. The methodology builds security into software development which lies at the heart of our cyber infrastructure. Whatever development method is employed software must be secured at the source. Book Highlights: Supplies a practitioner's view of the SDL Considers Agile as a security enabler Covers the privacy elements in an SDL Outlines a holistic business-savvy SDL framework that includes people process and technology Highlights the key success factors deliverables and metrics for each phase of the SDL Examines cost efficiencies optimized performance and organizational structure of a developer-centric software security program and PSIRT Includes a chapter by noted security architect Brook Schoenfield who shares his insights and experiences in applying the book’s SDL framework View the authors' website at http://www. androidinsecurity. com/ | Core Software Security Security at the Source

GBP 44.99
1