Books Guide: IT Operations

Submit A Book

Books Guide

Please enter a book title, author, or keyword

IT Operations

DevOps: High-impact Strategies: What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
By:
Kevin Roebuck
Published:
2011

DevOps is an emerging set of principles, methods and practices for communication, collaboration and integration between software development (application/software engineering) and IT operations (systems administration/infrastructure) professionals. It has developed in response to the emerging understanding of the interdependence and importance of both the development and operations disciplines in meeting an organization's goal of rapidly producing software products and services.

IT Release Management: A Hands-on Guide
By:
Dave Howard
Published:
2011

Filled with practical insights, IT Release Management: A Hands-on Guide clearly illustrates the effective implementation of a release process in the real world. It examines the similarities and differences of release management and project management to clear up any confusion there might be about the two complementary processes. 

Model-Based Software Performance Analysis
By:
Vittorio Cortellessa, et al.
Published:
2011

Model-based Software Performance Analysis introduces performance concerns in the scope of software modeling, thus allowing the developer to carry on performance analysis throughout the software lifecycle.

Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation
By:
Jez Humble and David Farley
Published:
2010

Continuous Delivery shows how to create fully automated, repeatable, and reliable processes for rapidly moving changes through build, deploy, test, and release. Using these techniques, software organizations are getting critical fixes and other new releases into production in hours—sometimes even minutes—even in large projects with complex code bases.

Driving Technical Change
By:
Terrence Ryan
Published:
2010

Finding cool languages, tools, or development techniques is easy-new ones are popping up every day. Convincing co-workers to adopt them is the hard part. The problem is political, and in political fights, logic doesn't win for logic's sake. Hard evidence of a superior solution is not enough. But that reality can be tough for programmers to overcome.

Implementing and Developing Cloud Computing Applications
By:
David E. Y. Sarna
Published:
2010

Filled with comparative charts and decision trees, Implementing and Developing Cloud Computing Applications explains exactly what it takes to build robust and highly scalable cloud computing applications in any organization.

Lean IT: Enabling and Sustaining Your Lean Transformation
By:
Steven C. Bell, Michael A. Orzen
Published:
2010

This book shares practical tips, examples, and case studies to help you establish a culture of continuous improvement to deliver IT operational excellence and business value to your organization.

Cloud Application Architectures: Building Applications and Infrastructure in the Cloud
By:
George Reese
Published:
2009

Much is said about the advantages and risks of cloud computing, but how do you actually create a web application for this environment or migrate existing applications to it? With this book, you'll learn the programming and system administration skills necessary to build and support applications in the cloud, using transactional apps for customer orders and payments as a practical example.

Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide
By:
David S. Linthicum
Published:
2009

Cloud Computing and SOA Convergence in Your Enterprise offers a clear-eyed assessment of the challenges associated with this new world—and offers a step-by-step program for getting there with maximum return on investment and minimum risk. Using multiple examples, Linthicum:

CMMI for Services: Guidelines for Superior Service
By:
Eileen C. Forrester, et al.
Published:
2009

CMMI® for Services (CMMI-SVC) is a comprehensive set of guidelines to help organizations establish and improve processes for delivering services. By adapting and extending proven standards and best practices to reflect the unique challenges faced in service industries, CMMI-SVC offers providers a practical and focused framework for achieving higher levels of service quality, controlling costs, improving schedules, and ensuring user satisfaction.

CMMI-ACQ: Guidelines for Improving the Acquisition of Products and Services
By:
Brian P. Gallagher, et al.
Published:
2009

CMMI-ACQ® (Capability Maturity Model® Integration for Acquisition) describes best practices for the successful acquisition of products and services. Providing a practical framework for improving acquisition processes, "CMMI-ACQ" addresses the growing trend in business and government for organizations to purchase or outsource required products and services as an alternative to in-house development or resource allocation.

Handbook of Enterprise Integration
By:
Mostafa Hashem Sherif
Published:
2009

Maintaining compatibility among all affected network and application interfaces of modern enterprise systems can quickly become costly and overwhelming. This handbook presents the knowledge and practical experience of a global group of experts from varying disciplines to help you plan and implement enterprise integration projects that respond to business needs quickly and are seamless to business users.

Eating the IT Elephant: Moving from Greenfield Development to Brownfield
By:
Richard Hopkins and Kevin Jenkins
Published:
2008

Richard Hopkins and Kevin Jenkins explain why accumulated business and IT complexity is the root cause of large-scale project failure and show how to overcome that complexity "one bite of the elephant at a time." You'll learn how to manage every phase of the Brownfield project, leveraging breakthrough collaboration, communication, and visualization tools--including Web 2.0, semantic software engineering, model-driven development and architecture, and even virtual worlds.

Enterprise Master Data Management: An SOA Approach to Managing Core Information
By:
Allen Dreibelbis, et. al
Published:
2008

Companies moving toward flexible SOA architectures often face difficult information management and integration challenges. The master data they rely on is often stored and managed in ways that are redundant, inconsistent, inaccessible, non-standardized, and poorly governed. Using Master Data Management (MDM), organizations can regain control of their master data, improve corresponding business processes, and maximize its value in SOA environments.

Implementing ITIL Change and Release Management
By:
Larry Klosterboer
Published:
2008

Leading IBM® ITIL expert and author Larry Klosterboer shares solid expertise gained from real implementations across multiple industries. He helps you decide where to invest, avoid ITIL pitfalls, and build successful, long-term processes that deliver real return on investment. You'll find detailed guidance on each process, integrated into a comprehensive roadmap for planning, implementation, and operation—a roadmap available nowhere else.

Implementing ITIL Configuration Management
By:
Larry Klosterboer
Published:
2008

Now, there's a practical, start-to-finish guide to ITIL configuration management for every IT leader, manager, and practitioner. ITIL-certified architect and solutions provider Larry Klosterboer helps you establish a clear roadmap for success, customize standard processes to your unique needs, and avoid the pitfalls that stand in your way.

Patterns for Performance and Operability: Building and Testing Enterprise Software
By:
Chris Ford, et al.
Published:
2007

Patterns for Performance and Operability is filled with practical, hands-on software development and testing techniques to ensure customers enjoy properly running software rather than complain about bugs and system crashes.

Architecture and Patterns for IT Service Management, Resource Planning, and Governance
By:
Charles Betz
Published:
2006

How would you feel if you visited your financial planners office and saw past-due credit card notices on their desk? Would you trust an auto mechanic whose car backfires and produces black smoke? A dentist with bad teeth? A banker in shabby clothes? An interior designer whose offices are a shambles?

Hacking Web Services
By:
Shreeraj Shah
Published:
2006

Web Services are an integral part of next generation Web applications. The development and use of these services is growing at an incredible rate, and so too are the security issues surrounding them. Hacking Web Services is a practical guide for understanding Web services security and assessment methodologies. Written for intermediate-to-advanced security professionals and developers, the book provides an in-depth look at new concepts and tools used for Web services security.

Introduction to Network Security
By:
Neal Krawetz
Published:
2006

The book teaches the skills and knowledge you need to design, develop, implement, analyze, and maintain networks and network protocols.

Coder to Developer: Tools and Strategies for Delivering Your Software
By:
Mike Gunderloy
Published:
2005

No one can disparage the ability to write good code. At its highest levels, it is an art. But no one can confuse writing good code with developing good software. The difference--in terms of challenges, skills, and compensation--is immense. Coder to Developer helps you excel at the many non-coding tasks entailed, from start to finish, in just about any successful development project.

Honeypots For Windows
By:
Roger A. Grimes
Published:
2005

Honeypots for Windows will cover installing, configuring, and maintaining security Honeypots on Windows platforms, specifically the popular open source Honeypot product called honeyd, and summarize other commercial Honeypot solutions. There are no computer security books covering Honeypots (or IDSs) as they run on Windows platforms.

IT Production Services
By:
Harris Kern, Mayra Muiz
Published:
2005

This book introducies the Production Services function, which addresses the needs of multiple departments within IT, including Applications Development and Computer Operations.

Open Source for Windows Administrators
By:
Christian Gross
Published:
2005

This book introduces Microsoft® Windows® administrators to the world of Open Source applications in order to save time and money.

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
By:
Gregor Hohpe, Bobby Woolf
Published:
2004

Enterprise Integration Patterns provides an invaluable catalog of sixty-five patterns, with real-world solutions that demonstrate the formidable of messaging and help you to design effective messaging solutions for your enterprise.

Network Performance Toolkit: Using Open Source Testing Tools
By:
Richard Blum
Published:
2004

Troubleshooting expert Richard Blum takes you through some of the basic elements that affect network performance and then supplies you with information about the Open Source tools used for monitoring the network to uncover any of these problems.

 

Performance by Design: Computer Capacity Planning by Example
By:
Virgilio A. F. Almeida, Lawrence Dowdy, Daniel A. Menasce
Published:
2004

Information technology professionals must ensure that the systems under their management provide an acceptable quality of service to their users. Managers must avoid the pitfalls of inadequate capacity and meet users' performance expectations in a cost-effective manner. Performance engineers, system administrators, software engineers, network administrators, capacity planners and analysts, managers, consultants, and other IT professionals will benefit from reading parts or the entire book.

Database Performance Tuning and Optimization
By:
Sitansu S. Mittra
Published:
2002

(from Book Info) Provides comprehensive coverage of database performance tuning using Oracle 8i and select 9i examples as the RDBMS. Combines theory with practical tools to address the tuning and optimization issues of DBAs and developers, irrespective of whether they use Oracle.

Hack Attacks Testing: How to Conduct Your Own Security Audit
By:
John Chirillo
Published:
2002

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Also, learn how to conduct thorough security examinations via illustrations and virtual simulations.

IT Measurement: Practical Advice from the Experts
By:
International Function Point Users Group, Edward Yourdon
Published:
2002

The book's collected articles offer important perspectives on the role of metrics in the development process, and show how metrics directly enhance software quality and output efficiency. The book explores several vital areas, including Function Point Analysis, project estimation and management, outsourcing, statistical process control, and more. These articles range from basic theory to the sophisticated application of metrics.

Disaster Recovery Planning: Strategies for Protecting Critical Information
By:
Jon William Toigo
Published:
2000

The most complete guide to data protection, disaster recovery avoidance, and disaster recovery tools, techniques, and technologies! Disaster Recovery Planning, Second Edition shows exactly how to implement world-class disaster recovery for today's distributed environments--without paying for expensive consultants or proprietary methodologies! Veteran planner and analyst Jon William Toigo delivers strategies and insight that any company can use, large or small.

Foundations of Service Level Management
By:
Mary Jander, Wayne Morris, Rick Sturm
Published:
2000

Foundations of Service Level Management provides detailed recommendations for creating a service level management strategy and establishing service level agreements.

Hack Proofing Your Network: Internet Tradecraft
By:
Stace Cunningham, Ryan Russell
Published:
2000

The first step in securing a system from infiltration, theft, and sabotage is knowing where the weak points are. This nuts-and-bolts guide helps computer professionals make a meaningful security assessment of their systems by understanding hackers' methods. The book offers expert advice on staying on top of the latest viruses and stopping password cracking, sniffing attacks, spoofing, and session hijacking before they happen.

Hacking Exposed: Network Security Secrets & Solutions
By:
George Kurtz, Stuart McClure, Joel Scambray
Published:
2000

In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business.

Blueprints for High Availability: Designing Resilient Distributed Systems
By:
Evan Marcus, Hal Stern
Published:
1999

Bestselling authors deliver an authoritative, hands-on book of tools for maintaining constant system availability. Reliability is not a quality that can simply be purchased; instead, it needs to be engineered into a system or product. Here is the only top-to-bottom guide available for the assessment, design, implementation, and testing of a system for 100% reliability.

Internet Performance Survival Guide
By:
Geoff Huston
Published:
1999

The bestselling author of the ISP Survival Guide returns with an unprecedented look at network performance solutions delivered from an Internet perspective

Capacity Planning for Web Performance: Metrics, Models, and Methods
By:
Virgilio A. F. Almeida, Daniel A. Menasce
Published:
1998

KEY BENEFIT: Virtually overnight, capacity planning has become the most critical issue for Web and intranet developers. This is the first comprehensive guide to every aspect of making sure your Web and intranet servers will deliver the performance your users and executives expect.

Upcoming Events

Nov 09
Nov 09
Apr 13
May 03