|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1082522893 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
190117s2017 caua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d G3B
|d STF
|d MERER
|d OCLCF
|d OCLCQ
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|z 9781491986950
|
029 |
1 |
|
|a AU@
|b 000068970513
|
035 |
|
|
|a (OCoLC)1082522893
|
037 |
|
|
|a CL0501000018
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hand, Jason,
|e author.
|
245 |
1 |
0 |
|a Post-incident reviews :
|b learning from failure for improved incident response /
|c Jason Hand.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed January 14, 2019).
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a Anyone who works with technology knows that eventually something will go wrong--even in today's complex, distributed, and highly available IT systems. In the battle to maintain uninterrupted service, your DevOps teams require updated methods for detecting and solving problems fast. In this report, author Jason Hand explains that effective post-incident reviews today encourage team members to play a key role in continuously improving the system. Traditional techniques for conducting post-incident analyses don't work well in modern IT organizations, mainly because the command-and-control approach offers team members no incentive to explore the system and detect flaws when they occur. This report presents an up-to-date approach to post-incident reviews that embraces the human element and adds more eyes for discovering system flaws and potential improvements. Understand why sustained success depends on a core value of continuous improvement Examine why traditional post-incident approaches, such as Root Cause Analysis, do little to provide greater availability and reliability of IT services Understand the role that team members can play in discovering system flaws Learn why it's often difficult to determine the cause and effect of outages in complex systems Get a case study that examines the unique phases of an outage incident Explore post-incident analysis in depth by moving away from causes and going deeper into the phases of the incident lifecycle.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781491986998/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|