No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.
New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…Find out more
See below for a selection of the latest books from Network management category. Presented with a red border are the Network management books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Network management books and those from many more genres to read that will keep you inspired and entertained. And it's all free!
Updated for agile project management and the latest standards on project management, this bestseller explores the discipline of project management from the perspective of the healthcare environment. The book dissects the project process and provides the tools and techniques required to successfully plan, execute, and control any healthcare-based project. From identifying stakeholders to constructing a project plan, it covers the spectrum of project planning activities. Complete with chapter summaries, exercises, hints, review questions, and case studies, it illustrates applications across a range of healthcare settings.
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of the testing life cycle. He describes how to set test expectations and how to identify a good test from a bad one. He introduces the business characteristics of testing, the imposed and inherent limitations, and describes how to deal with those limitations. The book outlines a framework for protecting confidential information and security professionals during testing. It covers social engineering and explains how to tune the plethora of options to best use this investigative tool within your own environment. Ideal for senior security management and anyone else responsible for ensuring a sound security posture, this reference depicts a wide range of possible attack scenarios. It illustrates the complete cycle of attack from the hacker's perspective and presents a comprehensive framework to help you meet the objectives of penetration testing-including deliverables and the final report.
You did it. You successfully transformed your application into a microservices architecture. But now that you're running microservices across different environments-public to public, private to public, virtual machine to container-your cloud native software is beginning to encounter reliability issues. How do you stay on top of this ever-increasing complexity? Simple: you run the Istio service mesh. With Istio, you'll be able to manage traffic, control access, monitor, report, get telemetry data, manage quota, trace, and more with resilience across your microservice. In this book, Matthew Baldwin and Lee Calcote explain why your services need a service mesh, and demonstrate how Istio fits into the lifecycle of a distributed application. You'll learn about tools and APIs for enabling and managing many of the features found in Istio. Explore the observability challenges Istio addresses Learn about request routing, traffic shifting, fault injection, and other features essential to running a solid service mesh Generate and collect telemetry information Go through different deployment patterns including A/B, Blue/Green, and Canary Learn examples of how to develop and deploy real-world applications with Istio support
This book provides ergonomic principles of times, machines, production space, materials and organization, within contemporary demands of the international fashion industry. It presents the analysis of planning, layout and logistics in the production of clothing as key parameters of strategic and operating management. The book also discusses tools for control as well as methods for determining the time of technological operations are described, which can be useful not only to beginners, but also to professionals experienced in this field.
Usability is the key to successful use of EHRs resulting in safe, easy to use and useful applications. Good usability saves money by reducing the time and resources needed for training and post-implementation support, lessens the negative impact on productivity and diminishes technology-induced errors. It also promotes user satisfaction and adoption. There have been numerous outcries from improved EHR usability. These arise at granular level by physicians, nurses and other clinicians in hospitals, clinics and other healthcare settings. They also are more formally voiced by organizations such as the American Medical Association (AMA), American College of Physician (ACP) and the American Medical Informatics Association (AMIA). Even the Office of the National Coordinator has openly cited EHR usability as a priority. This book is all about usability in EHRs. The content covers everything from measurement to improvement. It is not just for vendors and software programmers but for organizations that purchase EHRs and customize them thereby impacting the usability of the application. The book is for everyone who wants to participate in the improvement of EHRs.
Terraform has become a key player in the DevOps world for defining, launching, and managing infrastructure as code (IaC) across a variety of cloud and virtualization platforms, including AWS, Google Cloud, Azure, and more. This hands-on second edition, expanded and thoroughly updated for Terraform version 0.12 and beyond, shows you the fastest way to get up and running. Gruntwork cofounder Yevgeniy (Jim) Brikman walks you through code examples that demonstrate Terraform's simple, declarative programming language for deploying and managing infrastructure with a few commands. Veteran sysadmins, DevOps engineers, and novice developers will quickly go from Terraform basics to running a full stack that can support a massive amount of traffic and a large team of developers. Explore changes from Terraform 0.9 through 0.12, including backends, workspaces, and first-class expressions Learn how to write production-grade Terraform modules Dive into manual and automated testing for Terraform code Compare Terraform to Chef, Puppet, Ansible, CloudFormation, and Salt Stack Deploy server clusters, load balancers, and databases Use Terraform to manage the state of your infrastructure Create reusable infrastructure with Terraform modules Use advanced Terraform syntax to achieve zero-downtime deployment
Traditional methods for handling spatial data are encumbered by the assumption of separate origins for horizontal and vertical measurements. Modern measurement systems operate in a 3-D spatial environment. The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure offers a new model for handling digital spatial data, the global spatial data model or GSDM. The GSDM preserves the integrity of three-dimensional spatial data while also providing additional benefits such as simpler equations, worldwide standardization, and the ability to track spatial data accuracy with greater specificity and convenience. This groundbreaking spatial model incorporates both a functional model and a stochastic model to connect the physical world to the ECEF rectangular system. Combining horizontal and vertical data into a single, three-dimensional database, this authoritative monograph provides a logical development of theoretical concepts and practical tools that can be used to handle spatial data more efficiently. The book clearly describes procedures that can be used to handle both ECEF and flat-Earth rectangular components in the context of a rigorous global environment.
Knowledge management (KM) is the identification and analysis of available and required knowledge, and the subsequent planning and control of actions, to develop knowledge assets that enable businesses to generate profits and improve their competitive positions. This volume provides the framework for the strategic use of the information intelligence processes - business intelligence, content management, and knowledge management. In nine detailed chapters, the author explains every facet of these three subjects, enabling you to understand these sophisticated business concepts within the framework of information technology. Knowledge Management, Business Intelligence, and Content Management: The IT Practitioner's Guide discusses creation, protection, development, sharing, and management of information and intellectual assets through the use of business intelligence and other knowledge sharing and analytical techniques. About the Author Jessica Keyes is president of New Art Technologies, Inc., a high-technology and management consultancy, and is also founding partner of Manhattan Technology Group. Often a keynote speaker on the topics of competitive strategy, productivity, and quality, she is a founding board of directors member of the New York Software Industry Association, and has recently completed a 2-year term on the Mayor of New York City's Small Business Advisory Council. A noted columnist and correspondent, Keyes is the author of 19 books, including Auerbach Publications' Software Engineering Handbook, Software Configuration Management, and Implementing the IT Balanced Scorecard.
When you invest in expensive technology and systems, you want to get the most out of them. Process improvement has been used for years as an effective strategy to reduce costs, shorten cycle times, improve quality, and increase user satisfaction in other areas of business such as Quality, Manufacturing, and Engineering. While there are many books available on process improvement and process re-engineering, few of them address the unique processes within information systems as clearly and succinctly as A Practical Guide to Information Systems Improvement. Process Improvement for IS Tailored specifically for IS processes, A Practical Guide to Information Systems Process Improvement provides a step-by-step method for creating a world class Information System organization. The authors introduce process management and highlight its application to information systems. The book outlines a practical, complete, and easy-to-understand method for improving or re-engineering the processes within the Information Systems organization - simplifying process improvement so that you can begin to use it immediately. Avoid common pitfalls and mistakes The evolving business environment puts new demands on your Information Systems. E-commerce, changing technology, ERP, and globalization are just a few of the areas that will benefit from process improvement. This easy-to-follow guide includes a corresponding process model for each step that serves as a starting point for process improvement effort. It provides a checklist to ensure your new process meets all the requirements for its particular purpose and identifies pitfalls and mistakes to avoid.
While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner. Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book- Focuses on setting the right road map so that you can be most effective in your information security implementations Discusses cost-effective staffing, the single biggest expense to the security organization Presents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectively Identifies high-risk areas, focusing limited resources on the most imminent and severe threats Describes how to manage the key access controls when faced with manual user management, how to automate user management tasks in a cost effective manner, and how to deal with security breaches Demonstrating strategies to maximize a limited security budget without compromising the quality of risk management initiatives, Information Security Cost Management helps you save your organization time and money. It provides the tools required to implement policies, processes, and training that are crucial to the success of a company's security.
Most companies work hard to avoid costly failures, but in complex systems a better approach is to embrace and learn from them. Through chaos engineering, you can proactively hunt for evidence of system weaknesses before they trigger a crisis. This practical book shows software developers and system administrators how to plan and run successful chaos engineering experiments. System weaknesses go beyond your infrastructure, platforms, and applications to include policies, practices, playbooks, and people. Author Russ Miles explains why, when, and how to test systems, processes, and team responses using simulated failures on Game Days. You'll also learn how to work toward continuous chaos through automation with features you can share across your team and organization. Learn to think like a chaos engineer Build a hypothesis backlog to determine what could go wrong in your system Develop your hypotheses into chaos engineering experiment Game Days Write, run, and learn from automated chaos experiments using the open source Chaos Toolkit Turn chaos experiments into tests to confirm that you've overcome the weaknesses you discovered Observe and control your automated chaos experiments while they are running
A valuable, practical guide for navigating through ICT turbulence and dynamics. A lighthouse for the human side of ICT. Erik van de Loo, Director Executive Masters in Change, INSEAD Professor of Organisational Behaviour, INSEAD Business School The ICT Malaise is a different and thorough point of view on the dysfunctional approach the world has taken to information and technology. In an era of exponential changes where humans are rendered obsolete at the same pace of technology, it is fundamental to go back to basics on why we lead and innovate in the first place. Silvio Rugolo, VP, Global Sales, BMC Software, Digital Service Operations We hurtle ahead with technology, apps, and the newest innovation in a world that already demands a constant online presence and availability. You are included if you quickly adapt the newest technology and excluded if you wait too long. Information and communication technology (ICT) service providers, suppliers, and customers all try to make sense and make the most money out of technology developments and constant innovation with the help of frameworks, methodologies, best-practice approaches, and models. They continuously improve, align, integrate, and optimize, but unfortunately do not apply the same drive to safeguarding quality. This book leads the reader along a path of critical thinking, reflecting, and contemplating while offering alternative ways for service providers, customers, and suppliers to interact with each other. In addition, it encourages them to conduct their business in such a way that customers, service providers, and suppliers achieve satisfaction. The author implies a different mindset, a new way of interacting and a surprising approach to the many frameworks, models, and methodologies being introduced ceaselessly. While reading this book, IT professionals receive practical guidelines for using these newfound methodologies and models to help build and maintain healthy business relations while ensuring quality delivery of products and services. Readers will be surprised by how much more satisfying and less stressful their work environment becomes!