62,95 €
62,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
31 °P sammeln
62,95 €
62,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
31 °P sammeln
Als Download kaufen
62,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
31 °P sammeln
Jetzt verschenken
62,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
31 °P sammeln
  • Format: ePub

Providing guidance that can be applied to an enterprise of any scale, this book supplies IT practitioners with the tools needed to develop an architecture designed for long-term growth and maximum organizational value. Rather than focusing on a single governance framework, the text explains how to develop successful and sustainable enterprise deployments in any setting. Coverage includes general security practices, common threats, storage mechanisms, and the impact of virtualization. The author presents functional considerations for developing and maintaining extended enterprise networks using practices tested in large scale enterprise settings.…mehr

  • Geräte: eReader
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 16.55MB
Produktbeschreibung
Providing guidance that can be applied to an enterprise of any scale, this book supplies IT practitioners with the tools needed to develop an architecture designed for long-term growth and maximum organizational value. Rather than focusing on a single governance framework, the text explains how to develop successful and sustainable enterprise deployments in any setting. Coverage includes general security practices, common threats, storage mechanisms, and the impact of virtualization. The author presents functional considerations for developing and maintaining extended enterprise networks using practices tested in large scale enterprise settings.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Kirk Hausman is employed as an Assistant Commandant at Texas A&M University and specializes in project management, enterprise architecture, IT governance, security and business continuity, information assurance, and regulatory compliance. He has a background that includes digital forensics, WMD/wide-area disaster response planning, pandemic response planning, and technology audit practices in higher education, corporate, and health care venues. His experience includes application design, data resource management, network architecture, server and storage virtualization, strategic technology modernization, network and backup centralization, research computing, and large-network business continuity/disaster recovery planning.

With a Master's degree in Information Technology, Mr. Hausman has served as a senior research scientist in the fields of cyber terrorism, cybercrime, and cyber security. He lectures regularly on the uses of technology in education, solutions for persons with disabling conditions, and strategic architectural planning to improve enterprise efficiencies. Mr. Hausman has served as a subject-matter expert before both Houses of the Texas State Legislature and has more than 20 books currently in print, together with numerous articles and white papers addressing enterprise architecture, cyber terrorism, and IT governance. His professional certifications include the CISSP, CGEIT, CRISC, CISA, CISM, and CCP, together with a wide assortment of technology- and regulatory-specific designations.