The Phoenix Project

Autor: Gene Kim
Publisher: IT Revolution
ISBN: 0988262584
File Size: 71,20 MB
Format: PDF, ePub
Read: 8057
Download or Read Book
Bill is an IT manager at Parts Unlimited. It's Tuesday morning and on his drive into the office, Bill gets a call from the CEO. The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of The Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined. With the clock ticking, Bill must organize work flow, streamline interdepartmental communications, and effectively serve the other business functions at Parts Unlimited. In a fast-paced and entertaining style, three luminaries of the DevOps movement deliver a story that anyone who works in IT will recognize. Readers will not only learn how to improve their own IT organizations, they'll never view IT the same way again.

Special Ops Host And Network Security For Microsoft Unix And Oracle

Autor: Syngress
Publisher: Elsevier
ISBN: 9780080481050
File Size: 30,12 MB
Format: PDF
Read: 2320
Download or Read Book
Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the "bad guys," but what has been done on the inside? This book attacks the problem of the soft, chewy center in internal networks. We use a two-pronged approach-Tactical and Strategic-to give readers a complete guide to internal penetration testing. Content includes the newest vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies to bring it all together. We have scoured the Internet and assembled some of the best to function as Technical Specialists and Strategic Specialists. This creates a diversified project removing restrictive corporate boundaries. The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will be written using the same concepts behind software development. Chapters will be treated like functions within programming code, allowing the authors to call on each other's data. These functions will supplement the methodology when specific technologies are examined thus reducing the common redundancies found in other security books. This book is designed to be the "one-stop shop" for security engineers who want all their information in one place. The technical nature of this may be too much for middle management; however technical managers can use the book to help them understand the challenges faced by the engineers who support their businesses. Ø Unprecedented Team of Security Luminaries. Led by Foundstone Principal Consultant, Erik Pace Birkholz, each of the contributing authors on this book is a recognized superstar in their respective fields. All are highly visible speakers and consultants and their frequent presentations at major industry events such as the Black Hat Briefings and the 29th Annual Computer Security Institute Show in November, 2002 will provide this book with a high-profile launch. Ø The only all-encompassing book on internal network security. Windows 2000, Windows XP, Solaris, Linux and Cisco IOS and their applications are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Special Ops. This book's unique style will give the reader the value of 10 books in 1.

Cyber Security Engineering

Autor: Nancy R. Mead
Publisher: Addison-Wesley Professional
ISBN: 0134189876
File Size: 77,22 MB
Format: PDF, Docs
Read: 5601
Download or Read Book
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring together comprehensive best practices for building software systems that exhibit superior operational security, and for considering security throughout your full system development and acquisition lifecycles. Drawing on their pioneering work at the Software Engineering Institute (SEI) and Carnegie Mellon University, Mead and Woody introduce seven core principles of software assurance, and show how to apply them coherently and systematically. Using these principles, they help you prioritize the wide range of possible security actions available to you, and justify the required investments. Cyber Security Engineering guides you through risk analysis, planning to manage secure software development, building organizational models, identifying required and missing competencies, and defining and structuring metrics. Mead and Woody address important topics, including the use of standards, engineering security requirements for acquiring COTS software, applying DevOps, analyzing malware to anticipate future vulnerabilities, and planning ongoing improvements. This book will be valuable to wide audiences of practitioners and managers with responsibility for systems, software, or quality engineering, reliability, security, acquisition, or operations. Whatever your role, it can help you reduce operational problems, eliminate excessive patching, and deliver software that is more resilient and secure.

Enterprise Information Security And Privacy

Autor: C. Warren Axelrod
Publisher: Artech House
ISBN: 1596931914
File Size: 56,79 MB
Format: PDF, Mobi
Read: 3491
Download or Read Book
Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment.

Introduction To Devops With Chocolate Lego And Scrum Game

Autor: Dana Pylayeva
Publisher: Apress
ISBN: 1484225651
File Size: 41,39 MB
Format: PDF, Kindle
Read: 6944
Download or Read Book
Discover a role-based simulation game designed to introduce DevOps in a very unusual way. Working with LEGO and chocolate, using avatars, personas, and role cards, you will gain an understanding of the Dev and Ops roles as well as their interdependencies. Throughout the game, players go through a range of emotions and learn to expand the boundaries of individual roles, acquire T-shaped skills, and grow the Scrum-team circle to include Operations. The game combines ideas from "The Phoenix Project" with the experience gained from real-life challenges, encountered by development and operations teams in many organizations. Security vulnerabilities, environments patching, deployment code freeze, development and operations silos - the game helps simulate an end-to-end product delivery process and visualize the bottlenecks in the value delivery flow. Introduction to DevOps with Chocolate, LEGO and Scrum Game engages all five senses to maximize learning effectiveness and in three sprints takes players through a gamified DevOps transformation journey. What You Will Learn Play the Chocolate, LEGO and Scrum role-simulation game Gain knowledge of DevOps and how to apply the game to it See how this game illustrates the DevOps cycle as a case study Who This Book Is For Programmers or system admins/project managers who are new to DevOps. DevOps trainers and Agile Coaches who are interested in offering a collaborative and engaging learning experience to their teams.