(Formerly) Analytical Network and System Administration: Managing Human-Computer Systems (Mark Burgess)

 
0.0 (0)
(Formerly) Analytical Network and System Administration: Managing Human-Computer Systems (Mark Burgess)

Network and system administration typically refers to the ability to maintain the smooth operation of computers and networks. But in actuality, complexity management is a necessary skill.

Independent of the actual operating systems these sophisticated systems use, this book explains the science that underlies them.

It provides a theoretical approach to systems administration that:

  • saves time in performing common system administration tasks.
  • allows safe utilization of untrained and trained help in maintaining mission-critical systems.
  • allows efficient and safe centralized network administration.

This book:

  • Will show how to make informed analyses and decisions about systems, how to diagnose faults and weaknesses
  • Gives advice/guidance as to how to determine optimal policies for system management
  • Includes exercises that illustrate the key points of the book

The book provides a unique approach to an old problem and will become a classic for researchers and graduate students in Networking and Computer Science, as well as practicing system managers and system administrators.

Ebook Details

Author(s)
About the Authors
Writer Mark Burgess has a wide range of passions. His writings range from hard science to fantasy, and he frequently blogs philosophically about all facets of contemporary digital culture. He actively promotes science to a broad audience by giving public speeches at conferences across the world.
Published
Published Date / Year
(April 23, 2004)
Hardcover
384 pages
eBook Format
PDF
Language
English
ISBN-10
0470861002
ISBN-13
978-0470861004

Similar Programming & Computer Books

Optical Communication (Narottam Das)
In data processing, networking, and telecommunications systems, optical communication is incredibly helpful. It is made up of a transmitter that converts a message into an optical signal, a channel...
Advances in Optical Communication (Narottam Das)
The research, development, and design engineers from the teams in the manufacturing industry, academia, and communications industries are the target audience for this book. ...
Java 2 Network Security (Marco Pistoia, et al.)
With thorough coverage of the new Java 2 security models, this book offers the entire insiders' guide to protecting Java 2 enterprise applications. Developed to assist you in incorporating...
Cellular: An Economic and Business History of the International Mobile-Phone Industry (Daniel D. Garcia-Swartz, et al)
From the late 1970s to the present, charts the development of the global cellular industry. It took exceptional collaboration between businesses, governments, and industrial sectors for the mobile phone...
Learn Ethical Hacking from Scratch (Zaid Sabih)
The fundamentals of ethical hacking, how to hack safely and legally, how to install Kali Linux and use the Linux terminal are covered at the beginning of this book....
Watermarking - Volume 2 (Mithun Das Gupta)
The books in this collection contain some of the most recent advancements in the watermarking industry. To make this work a significant contribution to science, authors with various backgrounds...
Watermarking - Volume 1 (Mithun Das Gupta)
Some of the most recent advancements in the watermarking discipline are presented in this collection of books. To make this book a significant contribution to scientific study, authors from...
Hacking Exposed Computer Forensics (Aaron Philipp, et al)
With the aid of this fully updated, practical guide, you can identify and look into computer thieves of all shades.
Multimedia Forensics (Husrev Taha Sencar, et al)
The field of media forensics has never been more important to modern society. Media content not only makes up an ever-growing portion of the data that is transmitted over...
Handbook of Forensic Science (FBI)
The modern crime laboratory works daily to develop new methods for utilizing cutting-edge scientific and technology advancements to help the on-the-scene investigator solve crimes.

Others Programming Books by Mark Burgess

The GNU C Programming Tutorial (Mark Burgess)
This free programming book serves as a tutorial for the GNU C Library and the programming language C. Additionally, you need have access to a machine running a GNU...
A Treatise on Systems (Mark Burgess)
Typically, the terms "network and system administration" simply relates to the conventional techniques and procedures for maintaining the optimal operation of computers and networks.
C Programming Tutorial, 4th Edition (K&R Version), by Mark Burgess
This book serves as a manual. Its goal is to introduce a beginner to C while including just enough technical information to avoid becoming outdated over time. ...
The Unix Programming Environment (Mark Burgess)
This book thoroughly explains the UNIX® programming environment and philosophy, catering to both novice and seasoned users. The reader will learn how to operate the system, its parts, and...

Others Programming Books by Wiley Publishers

Securing Java: Getting Down to Business with Mobile Code (Gary McGraw, et al)
Security becomes more important as Java develops and enters the industry. But as Java develops, so do its security concerns and designs. ...
The Complexity of Boolean Functions (Ingo Wegener)
One of the most fascinating and crucial areas of theoretical computer science presently includes research on the difficulty of Boolean functions in non-uniform processing models. It directly relates to...
Data Structures and Algorithms with Object-Oriented Design Patterns in C++ (Bruno R. Preiss)
This free programming book gives readers a contemporary, object-oriented perspective for examining data structures and algorithms. It demonstrates how to use polymorphism and inheritance clearly and includes pieces of...
Computer Security Handbook (Seymour Bosworth, et al.)
Every aspect of our daily lives—from our computers and other linked gadgets to the wireless signals all around us—is impacted by computer security. Breach ramifications for safety, privacy, and...
Reversing: Secrets of Reverse Engineering (Eldad Eilam)
This book gives readers practical, in-depth methods for reverse engineering software, starting with a fundamental primer on the subject that covers computer internals, operating systems, and assembly language. It...
Naked Objects (Richard Pawson, et al)
A full-stack open-source application development framework called Naked Objects for Java was created to enable you to create business apps that are driven by specific domains quickly. ...
Security Engineering: A Guide to Building Dependable Distributed Systems (Gordon Fyodor Lyon)
Massively thorough and meticulously studied, Security Engineering demonstrates how challenging it is to safeguard information systems from tampering, eavesdropping, illegal usage, and general malice.
Simply Logical: Intelligent Reasoning by Example (Peter Flach)
An introduction to Prolog programming for AI that covers both fundamental and advanced AI concepts.
Digital Design with RTL Design, VHDL, and Verilog, 2nd Edition (Frank Vahid)
This book is a highly anticipated, current resource for the fundamentals of digital design.
Evil by Design: Design Patterns that Lead Us into Temptation (Chris Nodder)
The book Evil by Design offers a lighthearted look at how online and application design can be used to manipulate our behavior by exploiting psychological principles. ...
An Introduction to ATM Networks (Harry G. Perros)
Telecommunications have been transformed by Asynchronous Transfer Mode (ATM), which is now a crucial component of networking architecture.
Financial Applications using Excel Add-in Development in C/C++ (Steve Dalton)
Any serious Excel developer should purchase this book. Excel is the de facto industry standard for financial modeling and offers a variety of techniques for users to expand the...
Mastering Enterprise JavaBeans 3.0 (Rima Patel Sriganesh, et al)
An invaluable tutorial on the dramatic changes to Enterprise JavaBeans (EJB) 3.0 EJB 3.0 boasts drastically different programming and deployment strategy from its prior iterations, with almost...
SOAAdoptionForDummies-1-58-1655572680
SOA is the most important initiative facing IT today and is difficult to grasp; this book demystifies the complex topic of SOA and makes it accessible to all those...

User reviews

There are no user reviews for this listing.
Ratings
Rate this Book
Comments