Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mission-Critical Network Planning

I wrote this book in the aftermath of the terrorist attacks that took place on September
11, 2001. Until then, I was planning to write this book at a much later time. But
the events of that day compelled me to immediately begin this work. As we have
seen, those events have had far-reaching repercussions in the information technology
(IT) industry. Now more than ever, private and public organizations are assessing
their vulnerability to unexpected adverse events. I felt that this was the right time
to develop a work that would serve as a reference for them to utilize in their efforts.

This book represents wisdom distilled from over 25 years of industry experience,
the bulk of which was realized during my years at AT&T. I also researched
many books and countless articles that were directly or peripherally related to this
subject. I conducted conversations with colleagues and experts on the many topics
within to obtain their viewpoints. I discovered that there wasn’t any one book that
embodied the many facets of IT continuity. I thus saw the need for a work that
assembled and consolidated much of this conventional wisdom into an organized
knowledge base for continuity practitioners.

This book is intended for IT managers, service providers, business continuity
planners, educators, and consultants representing corporations, public agencies, or
nonprofit organizations. It is assumed that the reader has some basic familiarity
with data or voice networking. Even those seasoned continuity professionals, I
hope, will find this book a valuable resource with a different perspective. All along, I
stress the understanding of basic concepts and principles to maximize retention. The
book is quite comprehensive. Many topics are covered at a level that will most likely
require follow up by the reader—this is intentional. Under each topic, I have tried to
flag those issues of importance and relevance to continuity.
(HTML tags aren't allowed.)

WordPress 3 Complete
WordPress 3 Complete

WordPress 3 Complete begins from scratch, starting with how to install WordPress, all the way to the most advanced topics such as creating your own themes, writing plugins, and including custom post types in your website. Starting with downloading and installing the core WordPress software, you will take a detailed look at WordPress settings...

Getting Started with BizTalk Services
Getting Started with BizTalk Services

It all started about a year ago and BizTalk Services was soon to go for preview in a few months. We were all excited to break new ground in the era of cloud middleware. We must tell you one of the benefits of being in the product group (or being an MVP) is that you get early access to bits long before they hit the market. Working on those...

Ultimate Journey
Ultimate Journey

In 1958, a successful businessman named Robert Mornroe began to have experiences that drastically altered his life.  Unpredictably, and without his willing it, Monroe found himself leaving his physical body to travel via a "second body" to locales far removed from the physical and spiritual realities of his life. He was...

Designing Large Scale LANs
Designing Large Scale LANs
Large networks are complex systems, with many interdependent devices held together only by the strength of the network designer's specifications. It takes a lot of knowledge--and a lot of time--to make sure that the capacity of links and nodes is neither wasted nor overloaded. Designing Large-Scale LANs explains how the pieces of a large...
Game Development Tool Essentials
Game Development Tool Essentials

Game Development Tool Essentials provides must-have tips and tricks from industry professionals for strengthening and streamlining your game tools pipeline. Everyone knows the game tools pipeline is important, but in the current environment of shrinking budgets and increased time pressure, developers often have to settle for...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy