IT Infrastructure & Management

Detalles Bibliográficos
Autores principales: Keshari, Surendra, Kumar, Narendra
Formato: Libro
Lenguaje:Inglés
Publicado: Nueva Delhi : Dreamtech Press, 2020
Edición:1a ed.
Materias:
Aporte de:Registro referencial: Solicitar el recurso aquí
LEADER 02802nam a22002537a 4500
003 AR-BaUNH
005 20230513063108.0
008 230310s2020 ii ad |r|||| 001 0deng d
020 |a 9788194668657 
040 |a AR-BaUNH  |b spa  |c AR-BaUNH  |d AR-BaUNH  |e aacr 
041 0 |a eng 
082 1 |a 005.740 68 
100 1 |9 6679  |a Keshari, Surendra 
100 1 |9 6680  |a Kumar, Narendra 
245 |a IT Infrastructure & Management 
250 |a 1a ed. 
260 |a Nueva Delhi :  |b Dreamtech Press,  |c 2020 
300 |a xx, 265 p. :  |b il., gra. ;  |c 23 cm. 
505 |a Preface. -- Acknowledgments. -- INTRODUCTION. -- Information Technology. -- Computer Hardware. -- Computer Software. -- Computer Network. -- Network Topology. -- The Internet. -- Computing Resources. -- Exercise. -- IT INFRASTRUCTURE. -- Information Technology System Management. -- Service Management Process. -- Information System. -- Information Technology Infrastructure Library. -- ITIL FUndamentals. -- Exercise. -- SERVICE DELIVERY PROCESS. -- Service Level Management. -- Financial Management. -- IT Service Continuity Management. -- IT Service Continuity Management Process Map. -- Capacity Management. -- Availability Management. -- Exercise. -- SERVICE SUPPORT PROCESS. -- Service Support Process. -- Incident Management. -- Change Management. -- Release Management. -- Problem Management. -- Configuration Management. -- Exercise. -- STORAGE MANAGEMENT. -- Storage Media. -- Storage Management. -- Backup. -- Archive & Retrieve. -- Business Continuity Planning. -- Disaster Recovery. -- Space Management. -- Database & Application protection. -- Data Protection Law in India. -- BAre Machine Recovery (BMR). -- Data retention. -- Exercise. -- SECURITY MANAGEMENT. -- Computer Security. -- Application Security. -- Data Security. -- Information Security. -- Network Security. -- The Internet Security. -- Physical Security. -- Identity Management. -- Access Management. -- Intrusion Detection. -- Network Intrusion Detection System. -- Intrusion Prevention System. -- Security Information Management. -- Security Information Management Systems (SIMS). -- Exercise. -- IT ETHICS. -- Introduction to Cyber Ethics. -- Teaching your Children Acceptable Behaviour on the Internet. -- Intellectual Property. -- The Role of WIPO. -- What is privacy?. -- Computer Forensics. -- Ethics and the Internet. -- Cyber Crime. -- EMERGING TRENDS IN IT. -- Electronic Commerce. -- Electronic Data Interchange. -- Mobile Communication Systems. -- Evolution of the Mobile Technology. -- Evolution of Mobile Cellular Networks. -- Smart Card. -- Applications. -- Expert System. -- Exercise. -- Glossary. -- Model Test Papers. -- Index. 
650 0 |9 1376  |a INFORMÁTICA 
650 0 |a CETI  |9 6648 
900 |a Bruno  |b Bruno 
942 |2 ddc  |c LIBROS 
999 |c 4698  |d 4700