Informatyka

2049
Завантаження...
EЛЕКТРОННА КНИГА

IoT and Edge Computing for Architects. Implementing edge and IoT systems from sensors to clouds with communication systems, analytics, and security - Second Edition

Perry Lea

Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is needed if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of IoT devices.IoT and Edge Computing for Architects, 2E encompasses the entire spectrum of IoT solutions, from IoT sensors to the cloud. It examines modern sensor systems, focusing on their power and functionality. It also looks at communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, the book explores IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, Sigfox, and LoRaWAN. It also explains edge computing, routing and gateways, and their role in fog computing, as well as the messaging protocols of MQTT 5.0 and CoAP.With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. The book wraps up the analytics portion with the application of statistical analysis, complex event processing, and deep learning models. The book then concludes by providing a holistic view of IoT security, cryptography, and shell security in addition to software-defined perimeters and blockchains.

2050
Завантаження...
EЛЕКТРОННА КНИГА

IoT and OT Security Handbook. Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT

Smita Jain, Vasantha Lakshmi

The Fourth Industrial Revolution, or Industry 4.0, is all about digital transformation, manufacturing, and production. The connected world we live in today, including industries, comes with several cybersecurity challenges that need immediate attention. This book takes you through the basics of IoT and OT architecture and helps you understand and mitigate these security challenges.The book begins with an overview of the challenges faced in managing and securing IoT and OT devices in Industry 4.0. You’ll then get to grips with the Purdue model of reference architecture, which will help you explore common cyber attacks in IoT and OT environments. As you progress, you’ll be introduced to Microsoft Defender for IoT and understand its capabilities in securing IoT and OT environments. Finally, you will discover best practices for achieving continuous monitoring and vulnerability management, as well as threat monitoring and hunting, and find out how to align your business model toward zero trust.By the end of this security book, you’ll be equipped with the knowledge and skills to efficiently secure IoT and OT environments using Microsoft Defender for IoT.

2051
Завантаження...
EЛЕКТРОННА КНИГА

IoT Edge Computing with MicroK8s. A hands-on approach to building, deploying, and distributing production-ready Kubernetes on IoT and Edge platforms

Karthikeyan Shanmugam

Are you facing challenges with developing, deploying, monitoring, clustering, storing, securing, and managing Kubernetes in production environments as you're not familiar with infrastructure technologies? MicroK8s - a zero-ops, lightweight, and CNCF-compliant Kubernetes with a small footprint is the apt solution for you.This book gets you up and running with production-grade, highly available (HA) Kubernetes clusters on MicroK8s using best practices and examples based on IoT and edge computing.Beginning with an introduction to Kubernetes, MicroK8s, and IoT and edge computing architectures, this book shows you how to install, deploy sample apps, and enable add-ons (like DNS and dashboard) on the MicroK8s platform. You’ll work with multi-node Kubernetes clusters on Raspberry Pi and networking plugins (such as Calico and Cilium) and implement service mesh, load balancing with MetalLB and Ingress, and AI/ML workloads on MicroK8s. You’ll also understand how to secure containers, monitor infrastructure and apps with Prometheus, Grafana, and the ELK stack, manage storage replication with OpenEBS, resist component failure using a HA cluster, and more, as well as take a sneak peek into future trends.By the end of this book, you’ll be able to use MicroK8 to build and implement scenarios for IoT and edge computing workloads in a production environment.

2052
Завантаження...
EЛЕКТРОННА КНИГА

IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices

Aaron Guzman, Aditya Gupta

IoT is an upcoming trend in the IT industry today; there are a lot of IoT devices on the market, but there is a minimal understanding of how to safeguard them. If you are a security enthusiast or pentester, this book will help you understand how to exploit and secure IoT devices.This book follows a recipe-based approach, giving you practical experience in securing upcoming smart devices. It starts with practical recipes on how to analyze IoT device architectures and identify vulnerabilities. Then, it focuses on enhancing your pentesting skill set, teaching you how to exploit a vulnerable IoT device, along with identifying vulnerabilities in IoT device firmware. Next, this book teaches you how to secure embedded devices and exploit smart devices with hardware techniques. Moving forward, this book reveals advanced hardware pentesting techniques, along with software-defined, radio-based IoT pentesting with Zigbee and Z-Wave. Finally, this book also covers how to use new and unique pentesting techniques for different IoT devices, along with smart devices connected to the cloud.By the end of this book, you will have a fair understanding of how to use different pentesting techniques to exploit and secure various IoT devices.

2053
Завантаження...
EЛЕКТРОННА КНИГА

IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices

Aaron Guzman, Aditya Gupta

IoT is an upcoming trend in the IT industry today; there are a lot of IoT devices on the market, but there is a minimal understanding of how to safeguard them. If you are a security enthusiast or pentester, this book will help you understand how to exploit and secure IoT devices.This book follows a recipe-based approach, giving you practical experience in securing upcoming smart devices. It starts with practical recipes on how to analyze IoT device architectures and identify vulnerabilities. Then, it focuses on enhancing your pentesting skill set, teaching you how to exploit a vulnerable IoT device, along with identifying vulnerabilities in IoT device firmware. Next, this book teaches you how to secure embedded devices and exploit smart devices with hardware techniques. Moving forward, this book reveals advanced hardware pentesting techniques, along with software-defined, radio-based IoT pentesting with Zigbee and Z-Wave. Finally, this book also covers how to use new and unique pentesting techniques for different IoT devices, along with smart devices connected to the cloud.By the end of this book, you will have a fair understanding of how to use different pentesting techniques to exploit and secure various IoT devices.

2054
Завантаження...
EЛЕКТРОННА КНИГА

IoT Projects with Bluetooth Low Energy. Harness the power of connected things

Madhur Bhargava

Bluetooth Low Energy, or Bluetooth Smart, is Wireless Personal Area networking aimed at smart devices and IoT applications. BLE has been increasingly adopted by application developers and IoT enthusiasts to establish connections between smart devices.This book initially covers all the required aspects of BLE, before you start working on IoT projects. In the initial stages of the book, you will learn about the basic aspects of Bluetooth Low Energy—such as discovering devices, services, and characteristics—that will be helpful for advanced-level projects. This book will guide you through building hands-on projects using BLE and IoT. These projects include tracking health data, using a mobile App, and making this data available for health practitioners; Indoor navigation; creating beacons using the Raspberry Pi; and warehouse weather Monitoring. This book also covers aspects of Bluetooth 5 (the latest release) and its effect on each of these projects.By the end of this book, you will have hands-on experience of using Bluetooth Low Energy to integrate with smart devices and IoT projects.

2055
Завантаження...
EЛЕКТРОННА КНИГА

IoT Projects with Bluetooth Low Energy. Harness the power of connected things

Madhur Bhargava

Bluetooth Low Energy, or Bluetooth Smart, is Wireless Personal Area networking aimed at smart devices and IoT applications. BLE has been increasingly adopted by application developers and IoT enthusiasts to establish connections between smart devices.This book initially covers all the required aspects of BLE, before you start working on IoT projects. In the initial stages of the book, you will learn about the basic aspects of Bluetooth Low Energy—such as discovering devices, services, and characteristics—that will be helpful for advanced-level projects. This book will guide you through building hands-on projects using BLE and IoT. These projects include tracking health data, using a mobile App, and making this data available for health practitioners; Indoor navigation; creating beacons using the Raspberry Pi; and warehouse weather Monitoring. This book also covers aspects of Bluetooth 5 (the latest release) and its effect on each of these projects.By the end of this book, you will have hands-on experience of using Bluetooth Low Energy to integrate with smart devices and IoT projects.

2056
Завантаження...
EЛЕКТРОННА КНИГА

iPhone 3GS. Nieoficjalny podręcznik. Wydanie III

David Pogue

Odkryj wszystkie możliwości Twojego iPhone’a Jak optymalnie wykorzystać wszystkie funkcje iPhone’a? Jak szybko rozpracować oprogramowanie? Jak bezprzewodowo zsynchronizować iPhone’a z sieciami korporacyjnymi? Jeśli trzymasz w rękach tę książkę, z pewnością jesteś już posiadaczem iPhone’a albo przymierzasz się do jego kupna. A skoro tak, wiesz już, czym jest ten olśniewający przedmiot: kalendarzem, książką adresową, kalkulatorem, budzikiem, stoperem, urządzeniem do śledzenia notowań giełdowych, podglądem ruchu ulicznego, czytnikiem źródeł RSS oraz podręcznym synoptykiem. iPhone umożliwia oglądanie programów telewizyjnych i filmów, przyjemne zwiedzanie Internetu i korzystanie z poczty elektronicznej, odtwarzanie muzyki czy pokazu slajdów oraz — oczywiście — wykonywanie połączeń telefonicznych. Jeśli chcesz w pełni wykorzystać potencjał tego urządzenia, przeczytaj podręcznik Davida Pogue’a. Książka "iPhone 3GS. Nieoficjalny podręcznik. Wydanie III" to szczegółowy przewodnik po świecie tego przełomowego urządzenia. Znajdziesz tu dokładne omówienie zagadnień dotyczących rozmów telefonicznych, takich jak sterowanie głosem, połączenia konferencyjne, wiadomości tekstowe, wiadomości MMS oraz program Kontakty. Dowiesz się, jak wykorzystywać funkcje multimedialne iPhone’a i poznasz obsługę słynnego serwisu internetowego App Store. Nauczysz się synchronizować kalendarz, książkę adresową i pocztę Twojego iPhone’a z sieciami korporacyjnymi za pomocą usługi Microsoft Exchange ActiveSync. Ikony i przełączniki Pisanie, edycja i wyszukiwanie Rozmowy telefoniczne Klawiatura ekranowa Dodatkowe funkcje telefoniczne Muzyka i wideo Zdjęcia i slajdy Aplikacje Łączenie z siecią Korporacyjny iPhone Czy wiesz, co kryje Twój niezwykły iPhone? David Pogue jest felietonistą w dziale technicznym dziennika "New York Times", autorem bestsellerów oraz twórcą serii Nieoficjalny podręcznik.

2057
Завантаження...
EЛЕКТРОННА КНИГА

iPhone User Interface Cookbook. A concise dissection of Apple's iOS user interface design principles

Cameron Banga

The incredible growth rates for the iPhone, iPod touch, and iPad have pushed consumers to a new “App” economy, with developers racing to the platform. Mobile touch-centric interfaces vary greatly from traditional computing platforms, and programmers as well as designers must learn to adapt to the new form-factor.The iPhone User Interface Cookbook offers a complete breakdown of standard interface design on the iPhone, iPod touch, and iPad. You will learn the tools behind the trade, how to properly utilize standard interface elements, and custom UI tricks that will help your work stand out on the App Store.The book is designed to be a complete overview of interface design on all iOS platforms, offering insight and an inside look into app design. A variety of topics are covered, starting with an overview of tools for the app interface designer, touching upon popular interface components such as the Tab Bar, and offering suggestions for complex game interfaces. Whether you’re new to the platform or a seasoned developer with numerous applications in the App Store, this book strives to teach everyone simple and easy to implement tips for iOS interface design. Regardless of skill level, the iPhone User Interface Cookbook offers a detailed breakdown of all things interface design.

2058
Завантаження...
EЛЕКТРОННА КНИГА

iPhone with Microsoft Exchange Server 2010: Business Integration and Deployment. A solution for integrating iPhone and iPad is built into Microsoft's Exchange Server, and this guide will walk you through successfully deploying it to allow Apple's devices to be used securely and effectively in your organization

Steve Goodman

With the recent boom in the smartphone market, users are demanding access to the latest consumer technology in the business, and that means you need to be able to integrate Apple's iPhone and iPad into your business in a way you can manage. Microsoft's Exchange Server provides a solution for integrating iPhone into your business and this book will show you exactly how to implement this solution.iPhone with Microsoft Exchange Server 2010: Business Integration and Deployment takes you through the basics of Apple mobile devices, and teaches you how to plan a basic, highly available Exchange environment. You will then be taught how to secure your environment, provision and manage iDevices.Have you been tasked with getting iPhones into the hands of your business executives, and need to ensure they can reliably and securely access corporate email? This book will teach you what you need to know about getting Exchange 2010 set up and then help you deploy iPhones in a secure, manageable way.Starting with the basics, you'll learn about what Apple mobile devices have to offer and how they have evolved into devices suitable for business use. If you're new to Exchange Server 2010, you'll learn the basics of Microsoft's world leading messaging suite, before learning how to plan, install and configure a highly available Exchange environment. You will also understand how to configure Office 365 and learn how both can be configured to apply policies to iPhone, iPad and the iPod Touch. You'll also learn how to configure advanced features, like certificate authentication, how to create and deploy configuration profiles for devices and how to manage your devices once they are in the hands of your users.After reading this book, you will be confident about introducing Apple mobile devices into your organization.

2059
Завантаження...
EЛЕКТРОННА КНИГА

IPython Interactive Computing and Visualization Cookbook. Over 100 hands-on recipes to sharpen your skills in high-performance numerical computing and data science in the Jupyter Notebook - Second Edition

Cyrille Rossant

Python is one of the leading open source platforms for data science and numerical computing. IPython and the associated Jupyter Notebook offer efficient interfaces to Python for data analysis and interactive visualization, and they constitute an ideal gateway to the platform.IPython Interactive Computing and Visualization Cookbook, Second Edition contains many ready-to-use, focused recipes for high-performance scientific computing and data analysis, from the latest IPython/Jupyter features to the most advanced tricks, to help you write better and faster code. You will apply these state-of-the-art methods to various real-world examples, illustrating topics in applied mathematics, scientific modeling, and machine learning.The first part of the book covers programming techniques: code quality and reproducibility, code optimization, high-performance computing through just-in-time compilation, parallel computing, and graphics card programming. The second part tackles data science, statistics, machine learning, signal and image processing, dynamical systems, and pure and applied mathematics.

2060
Завантаження...
EЛЕКТРОННА КНИГА

ISO 27001 Controls. Mastering ISO 27001: A Step-by-Step Guide to Effective Implementation and Auditing

IT Governance Publishing, Bridget Kenyon

This guide offers a comprehensive approach to implementing and auditing ISO 27001 controls, providing clear steps for establishing a robust Information Security Management System (ISMS). It is designed to help organizations navigate the complexities of meeting international security standards while ensuring the protection of sensitive information. The book covers every aspect of ISO/IEC 27001, from the foundational principles to practical applications of organizational, physical, and technological controls.Each chapter is carefully structured to explain the implementation of specific controls, focusing on real-world scenarios and offering actionable advice for security professionals. With detailed instructions and clear examples, readers will gain a deep understanding of the ISO 27001 framework and how to align their organizations with best practices. In addition to control implementation, the book emphasizes ongoing compliance and risk management strategies. It highlights critical areas such as incident management, supplier relationships, and data protection, ensuring readers can address security challenges at all levels. Whether new to ISO 27001 or looking to refine an existing ISMS, this book provides the tools necessary for successful information security management and compliance auditing.

2061
Завантаження...
EЛЕКТРОННА КНИГА

ISO 27001/ISO 27002. A guide to information security management systems

IT Governance Publishing, Alan Calder

This comprehensive guide demystifies the ISO 27001 and ISO 27002 standards, offering a clear roadmap to understanding, implementing, and managing an Information Security Management System (ISMS). It begins with foundational concepts, a history of ISO 27001, and introduces the ISO 27000 family. The book proceeds to cover the PDCA cycle, Annex SL structure, and the significance of shall vs. should in compliance language.Core chapters walk through ISO 27001’s clauses and requirements, from organizational context and leadership to performance evaluation and continual improvement. Annex A's security controls are explored in detail, linking theory with practical application. ISO 27002 is also thoroughly reviewed to offer guidance on selecting and implementing appropriate controls.By the end of the book, readers gain a strong understanding of ISMS design, certification processes, and control mapping. This resource supports IT managers, compliance officers, and auditors seeking to align with international security standards.

2062
Завантаження...
EЛЕКТРОННА КНИГА

IT for Business (IT4B). From Genesis to Revolution, a Business and IT approach to Digital Transformation

IT Governance Publishing, Brian Johnson, Walter Zondervan

This book delves into the evolving role of IT in business transformation, covering key strategies for aligning business objectives with digital tools and technologies. It focuses on the importance of governance, efficiency, and risk management in driving IT success. Readers will discover how to build effective IT strategies, manage service delivery, and improve stakeholder engagement in a rapidly changing digital landscape. With practical frameworks and real-world case studies, it provides a roadmap for managing the complexities of digital service design, contract management, and performance. As the book progresses, it highlights the challenges and opportunities IT presents, from governance issues to innovation drivers. It concludes with actionable insights into digital readiness and transformation, equipping readers with the tools to navigate and lead in the digital age.

2063
Завантаження...
EЛЕКТРОННА КНИГА

IT Governance. An international guide to data security and ISO 27001/ISO 27002

IT Governance Publishing, Alan Calder, Steve G...

In the modern digital landscape, information security has never been more critical. This book introduces readers to the essential components of IT governance, focusing on frameworks like ISO 27001 and strategies for managing risks in today's complex information economy. The content explores key topics like cybersecurity, risk management, information security policies, and compliance with international standards. As you progress, you’ll learn to navigate the challenges of organizing and maintaining a secure IT environment, with insights into compliance regulations, security frameworks, and governance codes. The book provides hands-on guidance on applying security controls, setting up robust information security policies, and evaluating risks. Real-world scenarios and practical applications ensure the knowledge gained is immediately applicable to professional environments.The journey culminates in an understanding of how to integrate IT governance within an organization. You’ll learn to assess vulnerabilities, implement risk management strategies, and ensure that security measures align with both business goals and regulatory requirements. The book equips readers with the tools needed to strengthen IT systems against evolving threats and to stay ahead in the information security landscape.

2064
Завантаження...
EЛЕКТРОННА КНИГА

IT Inventory and Resource Management with OCS Inventory NG 1.02. Eliminate inventorying dilemmas by implementing a free and feasible IT Inventory solution

Barzan Antal Tony (Euro)

OCS Inventory NG is a cross-platform, open-source inventory and asset management solution. It brings more than plentiful features to the table to satisfy the business needs of small-to-large organizations with up to tens of thousands of computers. However, to put this inventory solution to optimum use requires a lot of skill.This book will lead you through the steps of implementing OCS-NG until you master working with it. This book aims at reducing efforts involved in resource management. The solution gives a robust foundation on top of which we can implement other third party applications, plugins, and much more.This book begins with the basics—it explains what IT inventorying needs are to be met in the real-world. Then, it covers a step-by-step approach to everything you need to know to set up and implement OCS-NG as a centralized inventory solution to meet all these requirements. It delves deeper into carrying out inventory tasks with every chapter.You will learn how to choose the best agent type and deployment method. We discuss the process of gathering inventory data and cover techniques for creating and deploying packages. You will also learn how to acquire added benefits with the use of plugins. We discuss best practices on inventorying and troubleshooting agent-related problems. The book presents real-world inventorying scenarios along with their solutions. You will basically learn how to use OCS-NG to get the most out of it.As a conclusion, if you want to learn about a free solution that fulfils inventorying necessities of the real-world, this is the book for you.

2065
Завантаження...
EЛЕКТРОННА КНИГА

IT Product Manager. Pierwsze kroki

Dawid Pacholczyk

Zacznij zarządzać produktem jak prawdziwy profesjonalista! Jak wejść w rolę kierownika produktu i na czym ona polega? Co należy wiedzieć o procesie budowania produktu? Jak poradzić sobie z wprowadzaniem go na rynek? Po czym poznać, czy produkt odniósł sukces? Rola lidera produktu jest wyjątkowa. Trzeba się wykazać szeroką gamą talentów i umiejętności. Obowiązkiem lidera jest kreowanie wizji i strategii produktu, tworzenie zespołu produktowego oraz kierowanie nim, wreszcie - eksperymentowanie, sprawdzanie, ryzykowanie! Sukces lub porażka leżą w rękach lidera. Zarządzanie produktem to trudna sztuka, której opanowanie może jednak dać wiele satysfakcji i... przynieść całkiem niezłe pieniądze. Jeśli zastanawiasz się nad wyborem nowej, interesującej ścieżki kariery, stoisz przed wyzwaniami przekraczającymi zwykłe kompetencje kierownika projektu czy lidera zespołu albo zostałeś właśnie osobą odpowiedzialną za opracowanie nowego produktu lub rozwój już istniejącego, nie mogłeś trafić lepiej! Ta książka - jak żadna inna - sprawnie przeprowadzi Cię przez meandry zarządzania produktem. Pokaże, na co trzeba zwracać szczególną uwagę, kiedy zaczyna się przygodę z tą dziedziną, a także ostrzeże przed sytuacjami, których należy za wszelką cenę unikać. W przystępny sposób podpowie, co robić, aby odnieść sukces i ustrzec się typowych błędów popełnianych przez początkujących. Pomoże Ci zdobyć niezbędne doświadczenie i stać się prawdziwym kierownikiem produktu. W książce znajdziesz: Znaczenie i zakres odpowiedzialności kierownika produktu Rozpoczęcie kariery product managera Środowisko pracy i przydatne narzędzia Cykl życia produktu i fazy jego tworzenia Projektowanie, planowanie i budowanie produktu Analiza rynku i tworzenie prototypów Wdrażanie użytkowników i strategia komunikacji Zbieranie i analizowanie informacji zwrotnych Poznaj tajniki product managementu!

2066
Завантаження...
EЛЕКТРОННА КНИГА

IT Product Manager. Pierwsze kroki

Dawid Pacholczyk

Zacznij zarządzać produktem jak prawdziwy profesjonalista! Jak wejść w rolę kierownika produktu i na czym ona polega? Co należy wiedzieć o procesie budowania produktu? Jak poradzić sobie z wprowadzaniem go na rynek? Po czym poznać, czy produkt odniósł sukces? Rola lidera produktu jest wyjątkowa. Trzeba się wykazać szeroką gamą talentów i umiejętności. Obowiązkiem lidera jest kreowanie wizji i strategii produktu, tworzenie zespołu produktowego oraz kierowanie nim, wreszcie - eksperymentowanie, sprawdzanie, ryzykowanie! Sukces lub porażka leżą w rękach lidera. Zarządzanie produktem to trudna sztuka, której opanowanie może jednak dać wiele satysfakcji i... przynieść całkiem niezłe pieniądze. Jeśli zastanawiasz się nad wyborem nowej, interesującej ścieżki kariery, stoisz przed wyzwaniami przekraczającymi zwykłe kompetencje kierownika projektu czy lidera zespołu albo zostałeś właśnie osobą odpowiedzialną za opracowanie nowego produktu lub rozwój już istniejącego, nie mogłeś trafić lepiej! Ta książka - jak żadna inna - sprawnie przeprowadzi Cię przez meandry zarządzania produktem. Pokaże, na co trzeba zwracać szczególną uwagę, kiedy zaczyna się przygodę z tą dziedziną, a także ostrzeże przed sytuacjami, których należy za wszelką cenę unikać. W przystępny sposób podpowie, co robić, aby odnieść sukces i ustrzec się typowych błędów popełnianych przez początkujących. Pomoże Ci zdobyć niezbędne doświadczenie i stać się prawdziwym kierownikiem produktu. W książce znajdziesz: Znaczenie i zakres odpowiedzialności kierownika produktu Rozpoczęcie kariery product managera Środowisko pracy i przydatne narzędzia Cykl życia produktu i fazy jego tworzenia Projektowanie, planowanie i budowanie produktu Analiza rynku i tworzenie prototypów Wdrażanie użytkowników i strategia komunikacji Zbieranie i analizowanie informacji zwrotnych Poznaj tajniki product managementu!

2067
Завантаження...
EЛЕКТРОННА КНИГА

ITIL(R) 4 Create, Deliver and Support (CDS). Your companion to the ITIL® 4 Managing Professional CDS certification

IT Governance Publishing, Claire Agutter

This book offers a thorough guide to ITIL® 4’s Create, Deliver, and Support (CDS) module, covering key concepts and practices for IT service management. It begins with foundational aspects of the service value system (SVS), highlighting organizational structures, roles, and collaborative cultures essential for successful service delivery. The early chapters focus on adopting a shift-left approach to resource management, helping teams prioritize efficiency and proactive problem-solving.As the book progresses, it explores the strategic planning and management of resources within the SVS, stressing the importance of continual improvement and leveraging technology to optimize service management. It also provides insight into managing value streams for new services, guiding readers on how to create, manage, and measure service value chains for improved service delivery and innovation.The later chapters address specific ITIL® practices, such as service design, incident management, problem management, and knowledge management. The book concludes with exam preparation for ITIL® 4 CDS, offering practical case studies and real-world scenarios.By the end, readers will be equipped to enhance service management processes and ensure the delivery of high-quality IT services aligned with business objectives.

2068
Завантаження...
EЛЕКТРОННА КНИГА

ITIL(R) 4 Create, Deliver and Support (CDS). Your companion to the ITIL® 4 Managing Professional CDS certification

IT Governance Publishing, Claire Agutter

This book offers a thorough guide to ITIL® 4’s Create, Deliver, and Support (CDS) module, covering key concepts and practices for IT service management. It begins with foundational aspects of the service value system (SVS), highlighting organizational structures, roles, and collaborative cultures essential for successful service delivery. The early chapters focus on adopting a shift-left approach to resource management, helping teams prioritize efficiency and proactive problem-solving.As the book progresses, it explores the strategic planning and management of resources within the SVS, stressing the importance of continual improvement and leveraging technology to optimize service management. It also provides insight into managing value streams for new services, guiding readers on how to create, manage, and measure service value chains for improved service delivery and innovation.The later chapters address specific ITIL® practices, such as service design, incident management, problem management, and knowledge management. The book concludes with exam preparation for ITIL® 4 CDS, offering practical case studies and real-world scenarios.By the end, readers will be equipped to enhance service management processes and ensure the delivery of high-quality IT services aligned with business objectives.