Cargando…

Incident management for operations /

Are you satisfied with the way your company responds to IT incidents? How prepared is your response team to handle critical, time-sensitive events such as service disruptions and security breaches? IT professionals looking for effective response models have successfully adopted the Incident Manageme...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Schnepp, Rob (Autor), Vidal, Ron (Autor), Hawley, Chris (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, 2017.
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn990802555
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 170623s2017 ca o 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d EBLCP  |d N$T  |d YDX  |d UMI  |d OCLCF  |d MERER  |d TOH  |d OCLCQ  |d COO  |d OCLCA  |d UOK  |d CEF  |d KSU  |d VT2  |d OCLCQ  |d WYU  |d C6I  |d UAB  |d UKAHL  |d CNCEN  |d OCLCQ  |d PBF  |d OCLCQ  |d HS0  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 992147529  |a 1227645656 
020 |a 9781491917800  |q (electronic bk.) 
020 |a 1491917806  |q (electronic bk.) 
020 |z 9781491917626 
029 1 |a GBVCP  |b 1004860293 
029 1 |a AU@  |b 000067099351 
035 |a (OCoLC)990802555  |z (OCoLC)992147529  |z (OCoLC)1227645656 
037 |a CL0500000870  |b Safari Books Online 
050 4 |a QA76.9.F34 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.068  |2 23 
049 |a UAMI 
100 1 |a Schnepp, Rob,  |e author. 
245 1 0 |a Incident management for operations /  |c Rob Schnepp, Ron Vidal, and Chris Hawley. 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c 2017. 
264 4 |c ©2017 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Vendor-supplied metadata. 
500 |a Includes index. 
505 0 |a Copyright; Table of Contents; Foreword; Preface; Conventions Used in This Book; O'Reilly Safari; How to Contact Us; Acknowledgments; Chapter 1. Evaluating the Incident Response PROCESS; Summary; Chapter 2. The Incident Management System (IMS); Overview of Incident Command; The Culture of Incident Response; Common Terminology for Job Functions; Summary; Chapter 3. The Incident Commander (IC); Resolving the Incident; Communication Methods; Developing the Incident Action Plan; Size Up the Incident; Triage; Act; Review; It's All About TIME; Tone; Interaction; Management; Engagement; Summary. 
505 8 |a Chapter 4. Scaling the Incident ResponseIncident Response and Escalation; Span of Control; Transfer of Command; Summary; Chapter 5. Unified Command (UC); UC in Action; The UC Planning Wheel; Planning Wheel in Action; UC Org Chart; UC Case Study; Launching UC: The Programmatic Backend; Key UC Positions and Checklists; Summary; Chapter 6. After Action Review (AAR); The Name Is Important; AAR as an Integrated Effort; AAR Documentation and Data Collection; Documenting an Incident: A Case Study; Timeline; Case Study AAR; Training; Accountability; Leadership; Empowerment; Notification; Trust. 
505 8 |a AAR Case Study: The New SMEIssue Identified During the AAR; Change Recommendations from the AAR; Summary; Index; About the Authors. 
520 |a Are you satisfied with the way your company responds to IT incidents? How prepared is your response team to handle critical, time-sensitive events such as service disruptions and security breaches? IT professionals looking for effective response models have successfully adopted the Incident Management System (IMS) used by firefighters throughout the US. This practical book shows you how to apply the same response methodology to your own IT operation. You'll learn how IMS best practices for leading people and managing time apply directly to IT incidents where the stakes are high and outcomes are uncertain. This book provides use cases of some of the largest (and smallest) IT operations teams in the world. There is a better way to respond. You just found it. Assess your IT incident response with the PROCESS programmatic evaluation tool Get an overview of the IMS all-hazard, all-risk framework Understand the responsibilities of the Incident Commander Form a unified command structure for events that affect multiple business units Systematically evaluate what broke and how the incident team responded. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer system failures. 
650 0 |a Computer security. 
650 6 |a Pannes système (Informatique) 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Computer system failures  |2 fast 
700 1 |a Vidal, Ron,  |e author. 
700 1 |a Hawley, Chris,  |e author. 
776 |z 1-4919-1762-8 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781491917619/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32922292 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32906483 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4882037 
938 |a EBSCOhost  |b EBSC  |n 1539016 
938 |a YBP Library Services  |b YANK  |n 14649581 
994 |a 92  |b IZTAP