|
|
|
|
LEADER |
03140nam a2200433Ia 4500 |
001 |
99751629804151 |
005 |
20241030105246.0 |
008 |
190910s2019 miua 001 0 eng d |
020 |
|
|
|a 9781945254208
|q (paperback)
|
020 |
|
|
|a 1945254203
|q (paperback)
|
020 |
|
|
|a 9781945254215
|q (hardcover)
|
020 |
|
|
|a 1945254211
|q (hardcover)
|
035 |
|
|
|a (OCoLC)1117772928
|
035 |
|
|
|a (OCoLC)on1117772928
|
040 |
|
|
|a U@S
|b spa
|c U@S
|
049 |
|
|
|a U@SA
|
050 |
|
4 |
|a HD30.37
|b .S85 2019
|
100 |
1 |
|
|a Stiennon, Richard,
|d 1959-
|
245 |
1 |
0 |
|a Secure cloud transformation :
|b the CIO's journey /
|c Richard Stiennon ; [contributions by Philip Armstrong ... et al.].
|
260 |
|
|
|a Birmingham, Michigan :
|b IT-Harvest Press,
|c c2019.
|
300 |
|
|
|a 289 p. :
|b il. ;
|c 23 cm.
|
500 |
|
|
|a "Strategies and best practices for building the future." --Cubierta.
|
500 |
|
|
|a CIOs entrevistados: Philip Armstrong, Ken Athanasiou, Larry Biagini, Hervé Coureil, Joe Drouin, Tony Fergusson, Jim Fowler, Scott Guthrie, Frederik Janssen, Erik Klein, Bruce Lee, Stephen Orban, Alex Philips, Jim Reavis, Tariq Shaukat, Darryl Staskowski.
|
500 |
|
|
|a Incluye índice.
|
520 |
|
|
|a "The cloud has transformed how we work: We connect to resources from any device, from anywhere, via access that is fast, direct, and so reliable we take it for granted. But that attractive productivity ideal challenges IT leaders, who must enhance business agility, adopt cloud applications and infrastructure, and accommodate greater traffic volumes, all without compromising security. Through interviews with 16 progressive IT leaders from industry, "Secure cloud transformation" reveals their transformation experience and journeys. They are CIOs, CTOs, CISOs, and architects from organizations that are blazing new trails as they transition their IT operations to the cloud. In this first-hand anthology, they provide actionable guidance on what pitfalls to avoid and what steps to take for a smooth transition to the modern era of cloud computing." --Descripción del editor.
|
650 |
|
0 |
|a Information technology
|x Management
|v Case studies.
|
650 |
|
0 |
|a Information technology
|x Security measures
|v Case studies.
|
650 |
|
0 |
|a Business enterprises
|x Information technology
|x Management
|v Case studies.
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures
|v Case studies.
|
650 |
|
0 |
|a Cloud computing
|v Case studies.
|
650 |
|
0 |
|a Cloud computing
|x Security measures
|v Case studies.
|
650 |
|
0 |
|a Chief information officers
|v Interviews.
|
650 |
|
7 |
|a Tecnología de la información
|x Administración
|v Casos de estudio.
|2 UDESA
|
650 |
|
7 |
|a Tecnología de la información
|x Medidas de seguridad
|v Casos de estudio.
|2 UDESA
|
650 |
|
7 |
|a Empresas comerciales
|x Tecnología de la información
|x Administración
|v Casos de estudio.
|2 UDESA
|
650 |
|
7 |
|a Empresas comerciales
|x Redes de computadoras
|x Medidas de seguridad
|v Casos de estudio.
|2 UDESA
|
650 |
|
7 |
|a Computación en nube
|v Casos de estudio.
|2 UDESA
|
650 |
|
7 |
|a Computación en nube
|x Medidas de seguridad
|v Casos de estudio.
|2 UDESA
|
650 |
|
7 |
|a Directores de información
|v Entrevistas.
|2 UDESA
|