Литмир - Электронная Библиотека
Литмир - Электронная Библиотека > Johnson Michael (EN) > Configuration Auditing: What you Need to Know For IT Operations Management
Configuration Auditing: What you Need to Know For IT Operations Management
Добавить похожую книгу
Jouissance as Ananda
Похожа
Непохожа
Trouble with Physics
Автор: Smolin Lee (EN)
Похожа
Непохожа
Configuration Auditing: What you Need to Know For IT Operations Management
Author:Johnson Michael (EN)
A introductory fragment is available
Language of a book: Английский
Publisher: Gardners Books

    Configuration audits are broken into functional and physical configuration audits.They occur either at delivery or at the moment of effecting a change.A functional configuration audit ensures that functional and performance attributes of a configuration item are achieved, while a physical configuration audit ensures that a configuration item is installed in accordance with the requirements of its detailed design documentation. This book is your ultimate resource for Configuration Auditing. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Configuration Auditing right away, covering: Physical configuration audit, Comparison of open source configuration management software, Configuration management, Accelops, Augeas (software), Baseline (configuration management), Bcfg2, Belarc, CA Software Change Manager, Cfengine, Chef (software), Component repository management, Configuration item, Engineering support, Granular Configuration Automation, ISconf, LCFG, M23 software distribution system, Merge (revision control), MSConfig, Opsi, Professional Systems Associates, Puppet (software), Quattor, RANCID (software), Security Technical Implementation Guide, SmartFrog, Software configuration management, Sysedit, Telelogic Synergy, ISO 10007, Process area (CMMI), Nessus (software), Database activity monitoring, Aba CM Enablement, Tenable Network Security This book explains in-depth the real drivers and workings of Configuration Auditing. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Configuration Auditing with the objectivity of experienced IT professionals.

    Поделиться:
    ]]>Facebook :0]]>  ]]>Twitter :0]]>  ]]>В контакте :0]]>  ]]>Livejournal :0]]>  ]]>Мой мир :0]]>  ]]>Gmail :0]]>  Email :0  ]]>Скачать :0]]>  
    Мой статус книги:
    Чтобы оставить свою оценку и комментарий вам нужно зайти на сайт или зарегистрироваться

    {"b":"489149","o":30}