IT Architecture For Dummies und über 1,5 Millionen weitere Bücher verfügbar für Amazon Kindle. Erfahren Sie mehr


oder
Loggen Sie sich ein, um 1-Click® einzuschalten.
oder
Mit kostenloser Probeteilnahme bei Amazon Prime. Melden Sie sich während des Bestellvorgangs an.
Jetzt eintauschen
und EUR 3,39 Gutschein erhalten
Eintausch
Alle Angebote
Möchten Sie verkaufen? Hier verkaufen
Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Farbe:
Keine Abbildung vorhanden

 
Beginnen Sie mit dem Lesen von IT Architecture For Dummies auf Ihrem Kindle in weniger als einer Minute.

Sie haben keinen Kindle? Hier kaufen oder eine gratis Kindle Lese-App herunterladen.

IT Architecture For Dummies [Englisch] [Taschenbuch]

Kalani Kirk Hausman
5.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)
Preis: EUR 26,10 kostenlose Lieferung. Siehe Details.
  Alle Preisangaben inkl. MwSt.
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Nur noch 6 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
Lieferung bis Donnerstag, 18. September: Wählen Sie an der Kasse Morning-Express. Siehe Details.

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 18,99  
Taschenbuch EUR 26,10  

Kurzbeschreibung

5. November 2010 For Dummies
A solid introduction to the practices, plans, and skills required for developing a smart system architecture
 
Information architecture combines IT skills with business skills in order to align the IT structure of an organization with the mission, goals, and objectives of its business. This friendly introduction to IT architecture walks you through the myriad issues and complex decisions that many organizations face when setting up IT systems to work in sync with business procedures.
 
Veteran IT professional and author Kirk Hausman explains the business value behind IT architecture and provides you with an action plan for implementing IT architecture procedures in an organization. You'll explore the many challenges that organizations face as they attempt to use technology to enhance their business's productivity so that you can gain a solid understanding of the elements that are required to plan and create an architecture that meets specific business goals.
* Defines IT architecture as a blend of IT skills and business skills that focuses on business optimization, business architecture, performance management, and organizational structure
* Uncovers and examines every topic within IT architecture including network, system, data, services, application, and more
* Addresses the challenges that organizations face when attempting to use information technology to enable profitability and business continuity
 
While companies look to technology more than ever to enhance productivity, you should look to IT Architecture For Dummies for guidance in this field.

Wird oft zusammen gekauft

IT Architecture For Dummies + IT-Architektur: Grundlagen, Konzepte und Umsetzung
Preis für beide: EUR 55,20

Die ausgewählten Artikel zusammen kaufen

Kunden, die diesen Artikel gekauft haben, kauften auch


Produktinformation

  • Taschenbuch: 364 Seiten
  • Verlag: John Wiley & Sons; Auflage: 1. Auflage (5. November 2010)
  • Sprache: Englisch
  • ISBN-10: 0470554231
  • ISBN-13: 978-0470554234
  • Größe und/oder Gewicht: 23 x 19 x 2 cm
  • Durchschnittliche Kundenbewertung: 5.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)
  • Amazon Bestseller-Rang: Nr. 51.191 in Fremdsprachige Bücher (Siehe Top 100 in Fremdsprachige Bücher)
  • Komplettes Inhaltsverzeichnis ansehen

Mehr über die Autoren

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Produktbeschreibungen

Buchrückseite

Get a handle on enterprise architecture and develop a strategy for success
 
An enterprise network is a complex creature. This book breaks it down into simpler bites. You'll understand the parts, what they mean to your company, how to make technology match your business goals, and how to create an enterprise culture. Then you'll get help with long-term planning, managing security, and getting the most from your technology.
* Know the game and the players -- understand enterprise components, the management roles involved, and the impact of platform selection
* What IT can do -- learn to align technology with organizational goals and explore regulatory compliance and risk management practices
* Who you are -- examine the fundamental aspects of identity management and how to develop an enterprise culture
* Nuts and bolts -- look at the elements of a distributed network, its resources, and how to establish long-term operational strategies
* Increase technology's value -- through virtualization, high-performance computing, Green IT strategies, and other practices
* Keep your guard up -- create effective disaster recovery solutions and develop a sound game plan against the ever-changing threats to interconnected systems
 
Open the book and find:
* Tasks, roles, and tools of IT architecture
* Risk and compliance issues for management
* Tips for reducing complexity
* Identity and access management strategies
* Effective communication methods
* How to plan for the mobile enterprise
* When green is profitable
* What to consider when planning technology updates
 
Learn to:
* Create an Enterprise IT strategy that meets business objectives
* Work with each layer of the technology stack
* Support organizational structure and processes
* Develop an action plan for implementation

Über den Autor und weitere Mitwirkende

Kalani Kirk Hausman is a specialist in enterprise architecture, security, information assurance, business continuity, and regulatory compliance.
 
Susan L. Cook is a Senior IT Policy and Security Programs Administrator and a former compliance auditor. Both are employed by Texas A&M University.

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?


In diesem Buch (Mehr dazu)
Ausgewählte Seiten ansehen
Buchdeckel | Copyright | Inhaltsverzeichnis | Auszug | Stichwortverzeichnis | Rückseite
Hier reinlesen und suchen:

Kundenrezensionen

4 Sterne
0
3 Sterne
0
2 Sterne
0
1 Sterne
0
5.0 von 5 Sternen
5.0 von 5 Sternen
Die hilfreichsten Kundenrezensionen
5.0 von 5 Sternen The ideal entry point ...... 14. Oktober 2013
Format:Kindle Edition|Verifizierter Kauf
.. for a growing architect like me ...... before reading the deep-diving books.

Really recommended for someone, who starts to enter Architecture area ....
War diese Rezension für Sie hilfreich?
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
Amazon.com: 2.8 von 5 Sternen  4 Rezensionen
22 von 28 Kunden fanden die folgende Rezension hilfreich
1.0 von 5 Sternen What Architecture ? 30. Dezember 2011
Von Koala - Veröffentlicht auf Amazon.com
Format:Taschenbuch
I dreaded writing this review because I could only manage to read the first 7 chapters, and skimmed the rest. There was minimal "architecture" discussion. The best I can describe it is an assortment of miscellaneous trendy IT topics - Identity management, Virtualisation, Green IT, Cloud, Mobile computing. In the true Dummies style, each topic was treated with a basic definition and some high level fluff. Nothing you can't Google for and get a more in-depth reading. There was no attempt to tie any of these technologies into anything. Where is the architecting ?

The following stopped me from reading the book after seven chapters:

1) Making the Hard Software Choice: Open Source or Closed Source (Page 33)
2) Basically, an enterprise security strategy must include a layered framework to protect the data. [followed by an illustration: A diagram with concentric rings with Data as the center and an arrow point inward with the phrase "Defense In Depth", and called this a layered framework.] (Page 68, 69)
3) Risk assessments are critical tools for showing management the value of the procedures outlined in the security policy. (Page 74)
4) The emergence of cloud computing has introduced difficulties for organizations using strict ITIL service management practices due to the block-box nature of the cloud service host details. (Page 77)
5) Reducing the probability of a threat event involves employing countermeasures appropriate to the vulnerabilities associated with the threat. (Page 90)

- Several pages were devoted on the Pros and Cons of Open Source vs Closed Source softwares. The suggested judging criteria was - if you don't need to see the code, pick commercial software. The world has moved on from the Either/Or argument 15 years ago. 99% of the companies have both, and decisions are made based on fit-for-purpose and functionality.
- Figure 5-1 on Page 69 is not a framework, it's a diagram with concentric circles and some words throw at it. A framework needs to provide a structured approach to build a foundation. Where is the structure ? What elements constitute as the building blocks ? What is the relationship between the different elements within the structure ?
- Risk assessments to show the "value of the procedures..." I am not sure what this mean. However, you should try to avoid including procedures in policy documents. Risk assessments are done to understand the company/system security posture and evaluate the effectiveness of security controls and risk mitigation strategies.
- Seriously..... with all the publicity of Cloud immaturity: extended outage; lack of proper backup; data leaks...etc. all areas of many active research, and you worry about ITIL compliance ? Really ?
- Threats are generally external entities that we can't do much about, except to understand, manage and try to mitigate the associated risks. How do you change the probability of a threat ? By putting in place effective security controls, the likelihood (probability) of risks being realised can be reduced. You can also reduce vulnerabilities. Not running certain applications or turning off services for example, can reduce the overall % of risks by virtue of the fact that there are less exploitable vulnerabilities. But I still can't do much about the number of hackers out there or how often they like to hack. Readers are encouraged to do their own research on these security fundamentals.

Perhaps the book was simply mis-titled. But what is the architecture ? where is the discussion on business alignment with technologies ? what was the repeatable methodology used to translate business objectives into IT strategies ?

But if you read the book and thought - "huh, that's not so bad. I too can call myself an architect." I urge you to Google "TOGAF 9" and download the framework. You will learn more about enterprise architect after reading just the first two chapters.
4 von 10 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Excellent Book 5. April 2011
Von Amazon Customer - Veröffentlicht auf Amazon.com
Format:Kindle Edition|Verifizierter Kauf
Really enjoyed this book and found it highly informative and easy to read. Covered many topics with great detail and highly relevant, i.e current.
Definitely recommend it.
4 von 10 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen helpful 12. Juni 2011
Von Amazon Customer - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
a consistent level of infocmation for 'dummies' series of books. gives you the key information but not too much detail.
0 von 4 Kunden fanden die folgende Rezension hilfreich
2.0 von 5 Sternen Heavy on information, light on insight 28. Juli 2013
Von Mr Ben HA Ramsden - Veröffentlicht auf Amazon.com
Format:Kindle Edition|Verifizierter Kauf
Sorry.

Apparently I need to write nineteen more words to make this review valid so I will keep on until...
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.
Kundenrezensionen suchen
Nur in den Rezensionen zu diesem Produkt suchen

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Thema:
Erster Beitrag:
Eingabe des Log-ins
 

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen
   


Ähnliche Artikel finden


Ihr Kommentar