Site Reliability Engineering: How Google Runs Production Systems, Beyer Betsy, Jones Chris, Petoff Jennifer
Автор: Bertolotti Название: Real-Time Embedded Systems ISBN: 1439841543 ISBN-13(EAN): 9781439841549 Издательство: Taylor&Francis Рейтинг: Цена: 33686.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: From the Foreword: "…the presentation of real-time scheduling is probably the best in terms of clarity I have ever read in the professional literature. Easy to understand, which is important for busy professionals keen to acquire (or refresh) new knowledge without being bogged down in a convoluted narrative and an excessive detail overload. The authors managed to largely avoid theoretical-only presentation of the subject, which frequently affects books on operating systems. … an indispensable [resource] to gain a thorough understanding of the real-time systems from the operating systems perspective, and to stay up to date with the recent trends and actual developments of the open-source real-time operating systems." —Richard Zurawski, ISA Group, San Francisco, California, USA Real-time embedded systems are integral to the global technological and social space, but references still rarely offer professionals the sufficient mix of theory and practical examples required to meet intensive economic, safety, and other demands on system development. Similarly, instructors have lacked a resource to help students fully understand the field. The information was out there, though often at the abstract level, fragmented and scattered throughout literature from different engineering disciplines and computing sciences. Accounting for readers’ varying practical needs and experience levels, Real Time Embedded Systems: Open-Source Operating Systems Perspective offers a holistic overview from the operating-systems perspective. It provides a long-awaited reference on real-time operating systems and their almost boundless application potential in the embedded system domain. Balancing the already abundant coverage of operating systems with the largely ignored real-time aspects, or "physicality," the authors analyze several realistic case studies to introduce vital theoretical material. They also discuss popular open-source operating systems—Linux and FreRTOS, in particular—to help embedded-system designers identify the benefits and weaknesses in deciding whether or not to adopt more traditional, less powerful, techniques for a project.
Описание: In this practical book, author Susan Fowler presents a set of microservice standards in depth, drawing from her experience standardizing over a thousand microservices at Uber. You`ll learn how to design microservices that are stable, reliable, scalable, fault tolerant, performant, monitored, documented, and prepared for any catastrophe.
Автор: Hoang Pham Название: Handbook of Reliability Engineering ISBN: 1447139399 ISBN-13(EAN): 9781447139393 Издательство: Springer Рейтинг: Цена: 30039.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: It will also aid professional engineers to find creative reliability solutions and management to evaluate systems reliability and to improve processes.
Автор: Schoenfield Название: Insider`s Guide to Cyber Security Architecture ISBN: 1498741991 ISBN-13(EAN): 9781498741996 Издательство: Taylor&Francis Рейтинг: Цена: 9492.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"?
Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him.
Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers:
What security architecture is and the areas of expertise a security architect needs in practice
The relationship between attack methods and the art of building cyber defenses
Why to use attacks and how to derive a set of mitigations and defenses
Approaches, tricks, and manipulations proven successful for practicing security architecture
Starting, maturing, and running effective security architecture programs
Secrets of the trade for the practicing security architecture
Tricks to surmount typical problems
Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.
Автор: Vaishnavi Название: Design Science Research Methods and Patterns ISBN: 1498715257 ISBN-13(EAN): 9781498715256 Издательство: Taylor&Francis Рейтинг: Цена: 16843.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Presenting innovative research methods, this second edition of a bestseller describes a simple and practical methodology for conducting cutting-edge design science research (DSR). It provides comprehensive guidance on how to conduct such research and supplies in-depth treatment of design science theory and the different types of theory that can be generated in design science research.
Making novel use of the concept of patterns, it presents 84 research patterns for conducting effective DSR. It emphasizes design science theory throughout and is filled with practical examples of using patterns to conduct information and communication technology research (ICT). With a focus on reusing research activities to increase the effectiveness and efficiency of conducting design science research, the book relies on familiar patterns to provide the fundamentals of various research philosophies and techniques required to innovate ICT. It describes design science research in relation to other information systems research paradigms such as positivist and interpretivist research. New to this edition are relevant design science research patterns adapted from TRIZ, the widely regarded European engineering design and creativity method. This edition also provides greatly expanded treatment of theory building in design science research (DSR), a topic of rapidly growing interest in addition to a new chapter presenting a framework for theory development in DSR. The book provides an expanded examination of patterns in DSR presented using a new pattern classification mechanism to group patterns with like functionality. This book will be of value to those interested in learning to conduct design science research, particularly in the ICT disciplines the book focuses on.
A novel, model-driven approach to security requirements engineering that focuses on socio-technical systems rather than merely technical systems.
Security requirements engineering is especially challenging because designers must consider not just the software under design but also interactions among people, organizations, hardware, and software. Taking this broader perspective means designing a secure socio-technical system rather than a merely technical system. This book presents a novel, model-driven approach to designing secure socio-technical systems. It introduces the Socio-Technical Modeling Language (STS-ML) and presents a freely available software tool, STS-Tool, that supports this design approach through graphical modeling, automated reasoning capabilities to verify the models constructed, and the automatic derivation of security requirements documents.
After an introduction to security requirements engineering and an overview of computer and information security, the book presents the STS-ML modeling language, introducing the modeling concepts used, explaining how to use STS-ML within the STS method for security requirements, and providing guidelines for the creation of models. The book then puts the STS approach into practice, introducing the STS-Tool and presenting two case studies from industry: an online collaborative platform and an e-Government system. Finally, the book considers other methods that can be used in conjunction with the STS method or that constitute an alternative to it. The book is suitable for course use or as a reference for practitioners. Exercises, review questions, and problems appear at the end of each chapter.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru