Additional Information

Additional Information
  • Home

Account Navigation

Account Navigation

Currency - All prices are in AUD

Currency - All prices are in AUD
 Loading... Please wait...
  • Call us on (US) 1.877.772.2536 or (AU) 07 32052596
  • My Account
  • Gift Certificates
The Art of Service

Configuration Management: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

$39.95

Configuration Management: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

$39.95

Product Description

Configuration management (CM) is a field of management that focuses on establishing and maintaining consistency of a system or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life.

For information assurance, CM can be defined as the management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures, and test documentation throughout the life cycle of an information system. CM for information assurance, sometimes referred to as Secure Configuration Management, relies upon performance, functional, and physical attributes of IT platforms and products and their environments to determine the appropriate security features and assurances that are used to measure a system configuration state.

For example, configuration requirements may be different for a network firewall that functions as part of an organization's Internet boundary versus one that functions as an internal local network firewall.

This book is your ultimate resource for Configuration Management. Here you will find the most up-to-date information, analysis, background and everything you need to know.

Configuration management (CM) is a field of management that focuses on establishing and maintaining consistency of a system or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life.

For information assurance, CM can be defined as the management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures, and test documentation throughout the life cycle of an information system. CM for information assurance, sometimes referred to as Secure Configuration Management, relies upon performance, functional, and physical attributes of IT platforms and products and their environments to determine the appropriate security features and assurances that are used to measure a system configuration state.

For example, configuration requirements may be different for a network firewall that functions as part of an organization's Internet boundary versus one that functions as an internal local network firewall.

This book is your ultimate resource for Configuration Management. Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Configuration Management right away, covering: Configuration management, Comparison of open source configuration management software, Accelops, AccuRev SCM, Augeas (software), Baseline (configuration management), Bcfg2, Belarc, CA Software Change Manager, CFEngine, Chef (software), Component repository management, Configuration item, Engineering support, Granular Configuration Automation, ISconf, LCFG, M23 software distribution system, Merge (revision control), MSConfig, Opsi, Physical configuration audit, Professional Systems Associates, Puppet (software), Quattor, RANCID (software), Rational Synergy, Security Technical Implementation Guide, SmartFrog, Software configuration management, Sysedit, Method engineering, Axios Systems, Competitive Engineering, Fagan inspection, IBM Tivoli Unified Process (ITUP), Information Services Procurement Library, Information Technology Infrastructure Library, ITIL Planning to implement service management, Market analysis for product software, Marketing decision support systems, Method Framework for Engineering System Architectures, Technical architecture.  

This book explains in-depth the real drivers and workings of Configuration Management. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Configuration Management with the objectivity of experienced professionals.

Product Reviews

Find Similar Products by Category