|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn990802555 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
170623s2017 ca o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d EBLCP
|d N$T
|d YDX
|d UMI
|d OCLCF
|d MERER
|d TOH
|d OCLCQ
|d COO
|d OCLCA
|d UOK
|d CEF
|d KSU
|d VT2
|d OCLCQ
|d WYU
|d C6I
|d UAB
|d UKAHL
|d CNCEN
|d OCLCQ
|d PBF
|d OCLCQ
|d HS0
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 992147529
|a 1227645656
|
020 |
|
|
|a 9781491917800
|q (electronic bk.)
|
020 |
|
|
|a 1491917806
|q (electronic bk.)
|
020 |
|
|
|z 9781491917626
|
029 |
1 |
|
|a GBVCP
|b 1004860293
|
029 |
1 |
|
|a AU@
|b 000067099351
|
035 |
|
|
|a (OCoLC)990802555
|z (OCoLC)992147529
|z (OCoLC)1227645656
|
037 |
|
|
|a CL0500000870
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.F34
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.068
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Schnepp, Rob,
|e author.
|
245 |
1 |
0 |
|a Incident management for operations /
|c Rob Schnepp, Ron Vidal, and Chris Hawley.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c 2017.
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Vendor-supplied metadata.
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Copyright; Table of Contents; Foreword; Preface; Conventions Used in This Book; O'Reilly Safari; How to Contact Us; Acknowledgments; Chapter 1. Evaluating the Incident Response PROCESS; Summary; Chapter 2. The Incident Management System (IMS); Overview of Incident Command; The Culture of Incident Response; Common Terminology for Job Functions; Summary; Chapter 3. The Incident Commander (IC); Resolving the Incident; Communication Methods; Developing the Incident Action Plan; Size Up the Incident; Triage; Act; Review; It's All About TIME; Tone; Interaction; Management; Engagement; Summary.
|
505 |
8 |
|
|a Chapter 4. Scaling the Incident ResponseIncident Response and Escalation; Span of Control; Transfer of Command; Summary; Chapter 5. Unified Command (UC); UC in Action; The UC Planning Wheel; Planning Wheel in Action; UC Org Chart; UC Case Study; Launching UC: The Programmatic Backend; Key UC Positions and Checklists; Summary; Chapter 6. After Action Review (AAR); The Name Is Important; AAR as an Integrated Effort; AAR Documentation and Data Collection; Documenting an Incident: A Case Study; Timeline; Case Study AAR; Training; Accountability; Leadership; Empowerment; Notification; Trust.
|
505 |
8 |
|
|a AAR Case Study: The New SMEIssue Identified During the AAR; Change Recommendations from the AAR; Summary; Index; About the Authors.
|
520 |
|
|
|a Are you satisfied with the way your company responds to IT incidents? How prepared is your response team to handle critical, time-sensitive events such as service disruptions and security breaches? IT professionals looking for effective response models have successfully adopted the Incident Management System (IMS) used by firefighters throughout the US. This practical book shows you how to apply the same response methodology to your own IT operation. You'll learn how IMS best practices for leading people and managing time apply directly to IT incidents where the stakes are high and outcomes are uncertain. This book provides use cases of some of the largest (and smallest) IT operations teams in the world. There is a better way to respond. You just found it. Assess your IT incident response with the PROCESS programmatic evaluation tool Get an overview of the IMS all-hazard, all-risk framework Understand the responsibilities of the Incident Commander Form a unified command structure for events that affect multiple business units Systematically evaluate what broke and how the incident team responded.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer system failures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Pannes système (Informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computer system failures
|2 fast
|
700 |
1 |
|
|a Vidal, Ron,
|e author.
|
700 |
1 |
|
|a Hawley, Chris,
|e author.
|
776 |
|
|
|z 1-4919-1762-8
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781491917619/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32922292
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32906483
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4882037
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1539016
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14649581
|
994 |
|
|
|a 92
|b IZTAP
|