17,95 €
17,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
9 °P sammeln
17,95 €
17,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
9 °P sammeln
Als Download kaufen
17,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
9 °P sammeln
Jetzt verschenken
17,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
9 °P sammeln
  • Format: ePub

Understand the crux of legacy systems-their architecture, analysis, and security constraintsKey FeaturesUnderstand what legacy systems are and strategies for their maintenanceExplore basic and advanced architectures of legacy systemsDiscover how to analyze and secure legacy systemsBook DescriptionThe IT industry is constantly evolving with the introduction of new technologies. While it is important to keep up with advancements, maintaining legacy systems is equally necessary to ensure that the infrastructure of your organization functions to the best of its ability. Sound knowledge of…mehr

  • Geräte: eReader
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 5.21MB
Produktbeschreibung
Understand the crux of legacy systems-their architecture, analysis, and security constraintsKey FeaturesUnderstand what legacy systems are and strategies for their maintenanceExplore basic and advanced architectures of legacy systemsDiscover how to analyze and secure legacy systemsBook DescriptionThe IT industry is constantly evolving with the introduction of new technologies. While it is important to keep up with advancements, maintaining legacy systems is equally necessary to ensure that the infrastructure of your organization functions to the best of its ability. Sound knowledge of techniques that can be used for maintaining legacy systems can help you avoid common pitfalls.The book begins with a quick overview of what a real legacy system looks like, how it works, and common issues that may be faced when trying to maintaining it. You'll then explore the architecture of a legacy system in detail and understand each of its components. As you progress, you'll discover a variety of techniques for analyzing a legacy system and how to apply them. Once you get to grips with the security constraints associated with legacy systems, you'll explore ways to secure them. Finally, you'll be able to easily make changes in legacy systems to enhance their performance.By the end of this book, you'll have developed the skills and confidence to work with legacy systems and efficiently maintain them.What you will learnPerform static and dynamic analyses of legacy systemsImplement best practices to secure your legacy systemsUse techniques such as data cleansing and process cleansing to stabilize your systemApply structural changes in your legacy system to make it highly availableIdentify and resolve common issues with legacy systemsUnderstand a variety of tests that can help you secure and maintain legacy systemsWho this book is forIf you're new to working with legacy systems and want to understand how they work and how to maintain them, this book is for you.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.