IT Architecture For Dummies und über 1,5 Millionen weitere Bücher verfügbar für Amazon Kindle. Erfahren Sie mehr
  • Alle Preisangaben inkl. MwSt.
Nur noch 4 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon.
Geschenkverpackung verfügbar.
IT Architecture For Dummi... ist in Ihrem Einkaufwagen hinzugefügt worden
+ EUR 3,00 Versandkosten
Gebraucht: Gut | Details
Verkauft von Deal DE
Zustand: Gebraucht: Gut
Kommentar: Dieses Buch ist in gutem, sauberen Zustand. Seiten und Einband sind intakt.
Ihren Artikel jetzt
eintauschen und
EUR 2,50 Gutschein erhalten.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Anhören Wird wiedergegeben... Angehalten   Sie hören eine Probe der Audible-Audioausgabe.
Weitere Informationen
Alle 2 Bilder anzeigen

IT Architecture For Dummies (Englisch) Taschenbuch – 5. November 2010

1 Kundenrezension

Alle 2 Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Amazon-Preis Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
"Bitte wiederholen"
EUR 37,45
EUR 15,55 EUR 15,43
14 neu ab EUR 15,55 6 gebraucht ab EUR 15,43

Wird oft zusammen gekauft

IT Architecture For Dummies + ITIL For Dummies
Preis für beide: EUR 70,77

Die ausgewählten Artikel zusammen kaufen
Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


  • Taschenbuch: 364 Seiten
  • Verlag: John Wiley & Sons; Auflage: 1. Auflage (5. November 2010)
  • Sprache: Englisch
  • ISBN-10: 0470554231
  • ISBN-13: 978-0470554234
  • Größe und/oder Gewicht: 18,7 x 1,8 x 23,5 cm
  • Durchschnittliche Kundenbewertung: 5.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)
  • Amazon Bestseller-Rang: Nr. 96.676 in Fremdsprachige Bücher (Siehe Top 100 in Fremdsprachige Bücher)
  • Komplettes Inhaltsverzeichnis ansehen

Mehr über die Autoren

Entdecken Sie Bücher, lesen Sie über Autoren und mehr



Get a handle on enterprise architecture and develop a strategy for success
An enterprise network is a complex creature. This book breaks it down into simpler bites. You'll understand the parts, what they mean to your company, how to make technology match your business goals, and how to create an enterprise culture. Then you'll get help with long-term planning, managing security, and getting the most from your technology.
* Know the game and the players -- understand enterprise components, the management roles involved, and the impact of platform selection
* What IT can do -- learn to align technology with organizational goals and explore regulatory compliance and risk management practices
* Who you are -- examine the fundamental aspects of identity management and how to develop an enterprise culture
* Nuts and bolts -- look at the elements of a distributed network, its resources, and how to establish long-term operational strategies
* Increase technology's value -- through virtualization, high-performance computing, Green IT strategies, and other practices
* Keep your guard up -- create effective disaster recovery solutions and develop a sound game plan against the ever-changing threats to interconnected systems
Open the book and find:
* Tasks, roles, and tools of IT architecture
* Risk and compliance issues for management
* Tips for reducing complexity
* Identity and access management strategies
* Effective communication methods
* How to plan for the mobile enterprise
* When green is profitable
* What to consider when planning technology updates
Learn to:
* Create an Enterprise IT strategy that meets business objectives
* Work with each layer of the technology stack
* Support organizational structure and processes
* Develop an action plan for implementation

Über den Autor und weitere Mitwirkende

Kalani Kirk Hausman is a specialist in enterprise architecture, security, information assurance, business continuity, and regulatory compliance.
Susan L. Cook is a Senior IT Policy and Security Programs Administrator and a former compliance auditor. Both are employed by Texas A&M University.

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?

In diesem Buch (Mehr dazu)
Ausgewählte Seiten ansehen
Buchdeckel | Copyright | Inhaltsverzeichnis | Auszug | Stichwortverzeichnis | Rückseite
Hier reinlesen und suchen:


5.0 von 5 Sternen
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne
Siehe die Kundenrezension
Sagen Sie Ihre Meinung zu diesem Artikel

Die hilfreichsten Kundenrezensionen

Format: Kindle Edition Verifizierter Kauf
.. for a growing architect like me ...... before reading the deep-diving books.

Really recommended for someone, who starts to enter Architecture area ....
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback. Wenn diese Rezension unangemessen ist, informieren Sie uns bitte darüber.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen

Die hilfreichsten Kundenrezensionen auf (beta) 6 Rezensionen
24 von 30 Kunden fanden die folgende Rezension hilfreich
What Architecture ? 30. Dezember 2011
Von Koala - Veröffentlicht auf
Format: Taschenbuch
I dreaded writing this review because I could only manage to read the first 7 chapters, and skimmed the rest. There was minimal "architecture" discussion. The best I can describe it is an assortment of miscellaneous trendy IT topics - Identity management, Virtualisation, Green IT, Cloud, Mobile computing. In the true Dummies style, each topic was treated with a basic definition and some high level fluff. Nothing you can't Google for and get a more in-depth reading. There was no attempt to tie any of these technologies into anything. Where is the architecting ?

The following stopped me from reading the book after seven chapters:

1) Making the Hard Software Choice: Open Source or Closed Source (Page 33)
2) Basically, an enterprise security strategy must include a layered framework to protect the data. [followed by an illustration: A diagram with concentric rings with Data as the center and an arrow point inward with the phrase "Defense In Depth", and called this a layered framework.] (Page 68, 69)
3) Risk assessments are critical tools for showing management the value of the procedures outlined in the security policy. (Page 74)
4) The emergence of cloud computing has introduced difficulties for organizations using strict ITIL service management practices due to the block-box nature of the cloud service host details. (Page 77)
5) Reducing the probability of a threat event involves employing countermeasures appropriate to the vulnerabilities associated with the threat. (Page 90)

- Several pages were devoted on the Pros and Cons of Open Source vs Closed Source softwares. The suggested judging criteria was - if you don't need to see the code, pick commercial software. The world has moved on from the Either/Or argument 15 years ago. 99% of the companies have both, and decisions are made based on fit-for-purpose and functionality.
- Figure 5-1 on Page 69 is not a framework, it's a diagram with concentric circles and some words throw at it. A framework needs to provide a structured approach to build a foundation. Where is the structure ? What elements constitute as the building blocks ? What is the relationship between the different elements within the structure ?
- Risk assessments to show the "value of the procedures..." I am not sure what this mean. However, you should try to avoid including procedures in policy documents. Risk assessments are done to understand the company/system security posture and evaluate the effectiveness of security controls and risk mitigation strategies.
- Seriously..... with all the publicity of Cloud immaturity: extended outage; lack of proper backup; data leaks...etc. all areas of many active research, and you worry about ITIL compliance ? Really ?
- Threats are generally external entities that we can't do much about, except to understand, manage and try to mitigate the associated risks. How do you change the probability of a threat ? By putting in place effective security controls, the likelihood (probability) of risks being realised can be reduced. You can also reduce vulnerabilities. Not running certain applications or turning off services for example, can reduce the overall % of risks by virtue of the fact that there are less exploitable vulnerabilities. But I still can't do much about the number of hackers out there or how often they like to hack. Readers are encouraged to do their own research on these security fundamentals.

Perhaps the book was simply mis-titled. But what is the architecture ? where is the discussion on business alignment with technologies ? what was the repeatable methodology used to translate business objectives into IT strategies ?

But if you read the book and thought - "huh, that's not so bad. I too can call myself an architect." I urge you to Google "TOGAF 9" and download the framework. You will learn more about enterprise architect after reading just the first two chapters.
Two Stars 13. Juni 2015
Von Adam M Carbonneau - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
Not what I was looking for. Wanted highlevel insight to the IT industry
0 von 1 Kunden fanden die folgende Rezension hilfreich
got book as described and on time---fine experience with seller ... 3. November 2014
Von marc cash - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
got book as described and on time---fine experience with seller....However, I did not care for the content of the book. It is not for beginners.
4 von 10 Kunden fanden die folgende Rezension hilfreich
helpful 12. Juni 2011
Von Amazon Customer - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
a consistent level of infocmation for 'dummies' series of books. gives you the key information but not too much detail.
4 von 11 Kunden fanden die folgende Rezension hilfreich
Excellent Book 5. April 2011
Von Cristian - Veröffentlicht auf
Format: Kindle Edition Verifizierter Kauf
Really enjoyed this book and found it highly informative and easy to read. Covered many topics with great detail and highly relevant, i.e current.
Definitely recommend it.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.