0 Items (Empty)
Bent Sombrero Rub - 14.6 oz
We combined traditional south of the border seasonings and out popped a rub with flavor nobody expec...
Your shopping cart is currently empty. If you would like to make a purchase today, add items to your shopping cart.
Store Home > EST Publications
Search Term
Advanced Search
This aisle is for publications written by EST
Default | Name Up | Name Down | Price Up | Price Down
Secured By Design
This book is a composition of Best Practices and lessons learned over 40 years in the technology business. Almost every day we hear about another hack and theft of a companies data including private information for these systems store. Topics covered include encryption both at rest and over the wire, preventive maintenance, monitoring, and reporting for each item in the stack. To be clear, compromising systems is an ongoing challenge for any company and topics covered in this book are a great place to start. Also covered are methods for collecting and processing data necessary for reporting, Governance, and providing proactive knowledge when someone is after your data. Hacks are described and chilling examples are available detailing how IT happened. Many examples sound like common sense or "I knew that", but some of the most destructive intrusions happened because of poor maintenance of IT systems for whatever reason. ISBN - 978-1-7349512-0-2 Pages: 1140
Secured By Design (e-Book)
This book is a composition of Best Practices and lessons learned over 40 years in the technology business. Almost every day we hear about another hack and theft of a companies data including private information for these systems store. Topics covered include encryption both at rest and over the wire, preventive maintenance, monitoring, and reporting for each item in the stack. To be clear, compromising systems is an ongoing challenge for any company and topics covered in this book are a great place to start. Also covered are methods for collecting and processing data necessary for reporting, Governance, and providing proactive knowledge when someone is after your data. Hacks are described and chilling examples are available detailing how IT happened. Many examples sound like common sense or "I knew that", but some of the most destructive intrusions happened because of poor maintenance of IT systems for whatever reason. ISBN - 978-1-7349512-1-9 Pages: 1140
Oracle Enterprise Manager Cloud Control
Oracle Enterprise Manager, Cloud Control is the quintessential tool for monitoring IT systems. From the bottom to the top, this product can monitor servers, applications, databases (not just Oracle), and manage jobs possible managed today by job scheduler packages. What you will find in this book are steps for performing tasks Enterprise Manager was built to perform resulting in streamlining business operations. Those operations include automated patching, job submission, notification methods, low level database monitoring, performance management, and many many other tasks teams of administration perform today. Having worked with many company technology teams, there are as many areas with the same processes and conversely, many companies where their processing needs couldn't be more different. The good news is this book will show you how they can be combined resulting is better integration even between well functioning teams. Pages: 540 ISBN: 978-1-7349512-2-6
Oracle Enterprise Manager Cloud Control (e-Book)
Oracle Enterprise Manager, Cloud Control is the quintessential tool for monitoring IT systems. From the bottom to the top, this product can monitor servers, applications, databases (not just Oracle), and manage jobs possible managed today by job scheduler packages. What you will find in this book are steps for performing tasks Enterprise Manager was built to perform resulting in streamlining business operations. Those operations include automated patching, job submission, notification methods, low level database monitoring, performance management, and many many other tasks teams of administration perform today. Having worked with many company technology teams, there are as many areas with the same processes and conversely, many companies where their processing needs couldn't be more different. The good news is this book will show you how they can be combined resulting is better integration even between well functioning teams. Pages: 549 ISBN: 978-1-7349512-3-3