توضیحاتی در مورد کتاب Sustainable enterprise architecture
نام کتاب : Sustainable enterprise architecture
عنوان ترجمه شده به فارسی : معماری سازمانی پایدار
سری :
نویسندگان : Kalani Kirk Hausman
ناشر :
سال نشر : 2011
تعداد صفحات : 291
ISBN (شابک) : 9781439821541 , 1439821542
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 4 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Content: The Impact of Enterprise Architecture Simple Choice, Complex Impact A Strong Hand Opportunity Costs Ripples in the Pond Where the Only Constant Is Change Lilliput and Blefuscu Open Source and Open Standards The Best Solution Enterprise Planning Beyond Platform Selection Where Lies Success? The Architect The Chief Architect The Lead Architect The Business Architect The Technology Architect Outsourced Architecture Multiple Architects Creating a Symphony Governance Architectural Models Project and Program Management Beyond Basics Language Standard Operational Environment Virtualization Mobile Technologies Service-Oriented Architecture (SOA) Whatever's Next Resources Enterprise Architecture Challenges Complexity Sources of Complexity Opposition to Standardization Enterprise Information Management Sell the Value of Information Avoid Drawing Fire Look Beyond the Project Align Technology and Business Data Center Management Consolidation Automation Virtualization Plan for the Worst and Hope to Be Wrong Finding Value Impact and Return on Effort Applying the 80/20 Rule Expectations from Architectural Change An Objective View The Federated Enterprise Legal Mandates Alphabet Soup Discovery and Retention Extended Legal Involvement Managing Risk Beyond the End Planned Obsolescence Hidden Obsolescence Good Enough Architecture Managing Identity The Many-Walled Garden Identification What You Know What You Have What You Are Multifactor Identification Authentication The Authentication Directory External Authentication Authentication Standards Single Sign-On Authorization Access Controls Identity Management Regulatory Mandates Business Drivers Identity Management Elements Identity Management Providers Identity Management Strategies Implement Strong Identification Combine Authentication and Authorization Assign Rights to Groups Employ Identity Management Solutions Simplify the Garden Sharing Information The Value of Communication Communication Systems Network of Trust Collective Intelligence Communication Technologies Asynchronous Communications Synchronous Communications Telepresence Combined Collaboration Groupware Portals Beyond the Boundary Storing Information Everything in Its Place File Storage Logging E-mail Repositories Virtual Computers Storage Policies Scouting the Land Areas of Interest Data Protection Backups Media Retirement Making Connections What Came Before The World Wide Web Web 1.0 Web 2.0 Web 3.0 Culture The Needle in the Haystack Ranking Caching Bogus Information Name Squatting Typos and One-Offs Name Service Poisoning Inter, Intra, and Extra Internet Intranet Extranet Anytime/Anywhere Computing Mobile Technologies New Technologies Network Connectivity Extending the Enterprise Accessibility Mobile and Remote Access Mobile Limitations Remote Desktops Transport Security Kill Pills Device Interaction Signal Boosters Policy Requirements Virtualization Virtualized Services Virtualized Applications Virtualized Desktops Remote Desktop Clients Virtual Appliances Virtualized Servers Virtualized Networks Cloud Computing Comparing Cloud and Traditional Application Life Cycles Types of Clouds Cloud Flexibility Best Practices Enterprise Sustenance Project Management Hardware Firmware Drivers Components Tech Refresh Software Testing Deployment Update Directory Entries Passwords Enterprise Security The Process of Security Security Is like an Onion Program Rather than Project Explain Why Standardize and Simplify Common Enterprise Threats Load Only in the Nursery Secure the Network Secure the Data Secure the Applications Defend the Enterprise Malware Defense Network Protection Defense Against the Unexpected Emergency Response Planning Don't Forget the Little Things Recovering from Disaster Continuity of Operations Versus Disaster Recovery Continuity of Operations (COO) Disaster Recovery (DR) Planning for Recovery Business Impact Analysis (BIA) Risk Assessment (RA) Construct a Plan Technology in Recovery Planning Alternate Data Center Alternate Equipment Alternate Communications Future Computing Bigger Is Better Supercomputing Distributed Computing Grid and Cluster Computing Volunteer Computing Grid Computing Cluster Computing Distributed Computing and the Cloud The Sustainable Enterprise Equipment Replacement and Disposal Energy Options Reducing Consumption The Right Location Index Each chapter concludes with a Summary