Sinopsis:
This module explains the management and support aspects of distributed systems with special attention to e-business and security. This is one module of an extensive handbook that systematically discusses how to translate e-business strategies to working solutions by using the latest distributed computing technologies. Chapters of this module discuss the following topics a) planning, organizing, staffing, and monitoring/control activities in e-business environments; b) the emerging role of "management platforms" such as Tivoli and Openview that can be used to manage networks, databases, applications, and computer systems; c) the importance of security in modern digital enterprises with risk anaysis and a methodology; d) security management approaches and the basic cryptography techniques such as public/private key encryption, PKI, digital certificates, digital signatures, and digital envelopes; e) how to use the security technologies and approaches to develop solutions that secure corporate networks, computing platforms, middleware services, databases, and applications; and e) state of the practice (case studies), market (commercial products), and art (research and development trends).of e-business applications. Chapters of the module also include several real life examples and case studies to highlight practical applications. Additional information and instructor material available from author website (www.amjadumar.com).
Reseña del editor:
This module explains the management and support aspects of distributed systems with special attention to e-business and security. This is one module of an extensive handbook that systematically discusses how to translate e-business strategies to working solutions by using the latest distributed computing technologies. Chapters of this module discuss the following topics a) planning, organizing, staffing, and monitoring/control activities in e-business environments; b) the emerging role of "management platforms" such as Tivoli and Openview that can be used to manage networks, databases, applications, and computer systems; c) the importance of security in modern digital enterprises with risk anaysis and a methodology; d) security management approaches and the basic cryptography techniques such as public/private key encryption, PKI, digital certificates, digital signatures, and digital envelopes; e) how to use the security technologies and approaches to develop solutions that secure corporate networks, computing platforms, middleware services, databases, and applications; and e) state of the practice (case studies), market (commercial products), and art (research and development trends).of e-business applications. Chapters of the module also include several real life examples and case studies to highlight practical applications. Additional information and instructor material available from author website (www.amjadumar.com).
"Sobre este título" puede pertenecer a otra edición de este libro.