Book description
Enterprise Applications Administration prepares you for the full breadth of work associated with administering large enterprise applications. This book provides essential information on tasks such as operating systems administration, network design, system architecture, project planning, working within a team, protecting the network, and how to keep applications up and running. The book effectively bridges the gap between what is taught in the technology-specific literature and the real world of enterprise application administrators.- Provides a general understanding of all key knowledge areas needed by enterprise application administrators
- Bridges the gap between technology-specific literature and the actual work being performed by enterprise application administrators
- Shows how to define and standardize processes and documentation to make enterprise application administration easier and more consistent
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Acknowledgments
- Preface
- Chapter 1. Introduction to Enterprise Applications Administration
- Chapter 2. Networks
- Chapter 3. Servers
- Chapter 4. Databases
- Chapter 5. Information Security
- Chapter 6. Architecture
- Chapter 7. Enterprise Applications Administration Teams
- Chapter 8. Automation and Monitoring
- Chapter 9. Documentation
- Index
Product information
- Title: Enterprise Applications Administration
- Author(s):
- Release date: November 2013
- Publisher(s): Morgan Kaufmann
- ISBN: 9780124078871
You might also like
book
Enterprise Cloud Security and Governance
Build a resilient cloud architecture to tackle data disasters with ease About This Book Get a …
book
Cybersecurity and Third-Party Risk
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of …
book
Managing Risk and Security in Outsourcing IT Services
With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising …
book
Network Vulnerability Assessment
Build a network security threat model with this comprehensive learning guide Key Features Develop a network …