Software deployment, updating, and patching:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY [u.a.]
Auerbach
2008
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XX, 397 S. Ill., graph. Darst. 24cm |
ISBN: | 0849358000 9780849358005 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV023275562 | ||
003 | DE-604 | ||
005 | 20080425 | ||
007 | t | ||
008 | 080424s2008 ad|| j||| 00||| eng d | ||
020 | |a 0849358000 |c (hbk.) |9 0-8493-5800-0 | ||
020 | |a 9780849358005 |c (hbk.) |9 978-0-8493-5800-5 | ||
035 | |a (OCoLC)70173628 | ||
035 | |a (DE-599)GBV513934766 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1051 | ||
050 | 0 | |a QA76.76.C69 | |
082 | 0 | |a 005.1/6 |2 22 | |
084 | |a SR 860 |0 (DE-625)143367: |2 rvk | ||
100 | 1 | |a Stackpole, Bill |e Verfasser |4 aut | |
245 | 1 | 0 | |a Software deployment, updating, and patching |c Bill Stackpole ; Patrick Hanrion |
264 | 1 | |a New York, NY [u.a.] |b Auerbach |c 2008 | |
300 | |a XX, 397 S. |b Ill., graph. Darst. |c 24cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Configuration management | |
650 | 4 | |a Software maintenance | |
650 | 0 | 7 | |a Update |0 (DE-588)4255930-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwarewartung |0 (DE-588)4197459-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4173536-5 |a Patentschrift |2 gnd-content | |
689 | 0 | 0 | |a Softwarewartung |0 (DE-588)4197459-1 |D s |
689 | 0 | 1 | |a Update |0 (DE-588)4255930-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Hanrion, Patrick |e Sonstige |4 oth | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016460468&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016460468 |
Datensatz im Suchindex
_version_ | 1804137591622074368 |
---|---|
adam_text | SOFTWARE DEPLOYMENT, UPDATING, AND PATCHING BILL STACKPOLE PATRICK
HANRION A AUERBACH PUBLICATIONS TAYLOR & FRANCIS GROUP NEW YORK LONDON
CRC PRESS IS AN IMPRINT OF THE TAYLOR & FRANCIS CROUP, AN INFORMA
BUSINESS CONTENTS ABOUT THE AUTBORS XIX 1 INTRODUCTION 1 LANDSCAPE AND
LAND MINES 3 BEST OF BREED VERSUS RISK NEED 4 UPDATES AND MORE UPDATES 5
MORE WORK, SAME STAFF. 6 CONFIGURATION MANAGEMENT SOLUTION 7 UPDATE
MANAGEMENT SOLUTION 8 GOAL AND SCOPE OF THIS BOOK 9 PEOPLE ASPECTS OF
CONFIGURATION AND UPDATE MANAGEMENT 10 PROCESS ASPECTS OF CONFIGURATION
AND UPDATE MANAGEMENT 10 TECHNOLOGY ASPECTS OF CONFIGURATION AND UPDATE
MANAGEMENT 10 MEASUREMENT ASPECTS OF CONFIGURATION AND UPDATE MANAGEMENT
11 DEFINITIONS AND TERMS USED IN THIS BOOK 12 2 SYSTEM LIFECYCLE
OVERVIEW 15 CONFIGURATION MANAGEMENT THROUGHOUT THE LIFECYCLE PROCESS 17
ENVISION PHASE 18 STRATEGY 19 ORGANIZATION 22 ORGANIZATIONAL REVIEWS 22
BUDGET 22 PLANNING AND DESIGN PHASE 22 DETERMINING CONFIGURATION
REQUIREMENTS 23 DETERMINING TEST REQUIREMENTS 23 DETERMINING DEPLOYMENT
REQUIREMENTS 23 DETERMINING OPERATION AND MAINTENANCE REQUIREMENTS 24
MANAGED AND UNMANAGED SYSTEMS 25 DETERMINING TRAINING AND SKILL
REQUIREMENTS 26 DETERMINING PERFORMANCE AND COMPLIANCE BASELINES 26
DETERMINING ORGANIZATIONAL REQUIREMENTS 27 VII VIII * CONTENTS
DETERMINING SYSTEM RETIREMENT 27 DOCUMENTING SYSTEM PLANS AND DESIGNS 28
TEST AND STABILIZE PHASE 29 VERIFYING SYSTEM CONFIGURATIONS 29 VERIFYING
SYSTEM INTERFACES 29 VERIFYING SYSTEM PERFORMANCE 29 VERIFYING SECURITY
REQUIREMENTS 29 VERIFYING SYSTEM INTEROPERABILITY 30 SYSTEM AND SUPPORT
DOCUMENTATION UPDATES 30 DEPLOY PHASE 31 SYSTEM BUILD 32 HARDENING 32
INSTALLATION 32 SYSTEM COMPATIBILITY TESTING 33 CHANGE CONTROL 33
OPERATIONS VERIFICATION 33 SECURITY VERIFICATION 33 SYSTEM SUPPORT
DOCUMENTATION 34 OPERATE AND MAINTAIN PHASE 35 ADDING NEW SOFTWARE,
HARDWARE, OR FIRMWARE 35 CHANGING SOFTWARE, HARDWARE, OR FIRMWARE 35
DELETING SOFTWARE, HARDWARE, OR FIRMWARE 36 ROUTINE SYSTEM SERVICE 36
RETIRE PHASE 38 RETIREMENT NOTIFICATION 38 VERIFICATION OF NONUSE 39
POWER DOWN 39 REMOVE FROM CMDB AND INFRASTRUCTURE SERVICES (DNS,
DIRECTORY, ETC.) 39 CONCLUSION 39 3 CONFIGURATION MANAGEMENT PROGRAM
OVERVIEW 41 CONFIGURATION MANAGEMENT ROLES AND RESPONSIBILITIES 43
MANAGEMENT 43 TESTING 43 LIBRARIAN 44 ADMINISTRATORS 44 SUPPORT 44
STRATEGY 44 PLANNING 45 PROCESSES 45 GOALS 48 STRATEGY 51 POLICIES 53
CONTENTS * IX IDENTIFICATION 55 INFRASTRUCTURE AND FACILITIES 55 NETWORK
SCANNING 57 PROCEDURES 57 CONTROL 58 POLICIES 58 CHANGE CONTROL 59
SYSTEM CONTROL TOOLS 59 STATUS ACCOUNTING 60 CONFIGURATION MANAGEMENT
LIFECYCLE 60 CONFIGURATION MANAGEMENT CHANGE STATUS MODES 60
VERIFICATION 61 COMPLIANCE CHECKING 61 COMPLIANCE REMEDIATION 61
CONFIGURATION MANAGEMENT AND ITS RELATIONSHIP TO OTHER PROGRAMS 62 RISK
MANAGEMENT 62 INCIDENT MANAGEMENT 62 CHANGE CONTROL 62 INFORMATION
TECHNOLOGY STRATEGY 63 UPDATE MANAGEMENT 63 COMPLIANCE AND AUDIT 63
OPERATIONS 63 INFORMATION TECHNOLOGY SECURITY 63 CONCLUSION 63 4
CONFIGURATION MANAGEMENT PLANNING 65 PLANNING 65 PROCESSES 66 GOALS 69
STRATEGY 75 POLICIES 79 CONCLUSION 81 5 CONFIGURATION MANAGEMENT
IDENTIFICATION 83 INFRASTRUCTURE 84 HARDWARE AND SOFTWARE OWNERS 84
NAMING STANDARDS 85 BASE ARCHITECTURE 86 PLATFORM STANDARDS 87 SOFTWARE
STANDARDS 88 INTELLIGENCE 88 CONFIGURATION MANAGEMENT DATABASE 89
CLASSIFICATION FILTERING 90 COMPILATION AND STORAGE OF INFORMATION 91 X
* CONTENTS GENERALIZED RISK 91 THREAT ANALYSIS 92 NETWORK SCANNING 92
VULNERABILITY SCANNING 92 TYPES OF SYSTEMS AND SCANNED VULNERABILITIES
93 FREQUENCY OF SCANS 93 FREQUENCY OF UPDATES 93 ACTIONS TO TAKE BASED
ON THE INFORMATION OBTAINED 94 REPORTING AND ALERTING REQUIREMENTS 94
ESCALATION AND REMEDIATION REQUIREMENTS 95 IDENTIFYING ROGUE SYSTEMS 95
TESTING FACILITIES 95 RECEIVING UPDATES 95 TESTING UPDATES 95 PACKAGING
UPDATES 96 PROCEDURES 96 INSTALLATION AND CONFIGURATION GUIDANCE 96
CONFIGURATION CHANGE PROCEDURES 96 NEW PRODUCT INTRODUCTION PROCEDURE 96
RISK ASSESSMENT 98 COMPLIANCE MONITORING 100 CONCLUSION 101 6
CONFIGURATION MANAGEMENT CONTROL 103 POLICIES 104 CHANGE POLICY 104
IDENTIFICATION POLICY 110 SYSTEM SOFTWARE 112 SYSTEM LIFECYCLE 112
SYSTEM USAGE 112 SYSTEM SECURITY 112 CHANGE CONTROL 114 HOW A CHANGE
REQUEST IS SUBMITTED FOR EACH UPDATE 115 EXCEPTION PROCESS FOR EMERGENCY
UPDATES 115 APPROPRIATE CHANGE WINDOW FOR DEPLOYING UPDATES 116
APPROPRIATE BACKUP AND ROLLBACK REQUIREMENTS 116 CHANGE APPROVAL
REQUIREMENTS 116 PRE- AND POSTCHANGE NOTIFICATION AND REPORTING
REQUIREMENTS 116 SYSTEM CONTROL TOOLS 116 ASSET INVENTORY SYSTEM 116
OTHER INFORMATION REQUIRED TO DETERMINE UPDATING REQUIREMENTS AND
CRITICALITY 117 DEPLOYMENT INFRASTRUCTURE 117 CONTENTS * XI PRIMARY
AUTOMATION METHODS 118 SECONDARY AUTOMATION METHODS 118 MANUAL METHODS
118 COMMUNICATIONS PORTAL 118 SECURITY BULLETINS AND UPDATE RELEASE
NOTIFICATION 118 UPDATE BINARIES 119 DISCUSSION AND FEEDBACK LISTS 119
COMPLIANCE REPORTS 119 OTHER COMMUNICATIONS 119 INCIDENT RESPONSE AND
FORENSICS 119 FORENSICS 121 CONCLUSION 121 7 CONFIGURATION MANAGEMENT
STATUS AND VERIFICATION 123 STATUS 123 CONFIGURATION MANAGEMENT
LIFECYCLE 124 CONFIGURATION MANAGEMENT CHANGEOF CONFIGURATION ITEM
STATUS MODES 125 MEASUREMENTS 126 VERIFICATION 129 COMPLIANCE CHECKS 129
COMPLIANCE REMEDIATION 132 CONCLUSION 133 8 DEPLOYMENT PROCESSES 135
SELECTION PROCESS 135 NEEDS ASSESSMENT 135 VENDOR ASSESSMENT 138 BUILD
VERSUS BUY 139 STAFFING REQUIREMENTS 139 HARDWARE REQUIREMENTS 140
SOFTWARE REQUIREMENTS 140 BUDGETING 141 SKILLS ASSESSMENT 141 TRAINING,
CONSULTING, OR BOTH 141 SOLUTION ARCHITECTURE BUILD PROCESS 141
APPLICATION BUILD PROCESS 142 SOLUTION ARCHITECTURE 143 CONFIGURATION
MANAGEMENT 143 CONNECTING IT TOGETHER 143 TRIAL 143 HARDENING PROCESS
144 THREAT MODELING 144 XII * CONTENTS VULNERABILITY ASSESSMENT 147
MITIGATING VULNERABILITIES 148 TESTING 148 TEST LAB 148 DUPLICATE
ENVIRONMENT 149 CHANGE PROCESS 150 DOCUMENTATION 150 SOFTWARE AND
HARDWARE DOCUMENTATION 150 ORGANIZATION-SPECIFIC DOCUMENTATION 150
INSTALLATION 151 INSTALLATION TYPE 152 INSTALLATION METHOD 153
INSTALLATION PLANNING 153 FINALIZATION 153 INSTALLATION AND OPERATIONAL
VERIFICATION PROCESS 153 SECURITY VERIFICATION PROCESS: VULNERABILITY
ASSESSMENT 155 INITIAL SYSTEM AND SUPPORT DOCUMENTATION 156 CONCLUSION
157 9 OPERATE AND MAINTAIN PROCESSES 159 ROUTINE SERVICE TASKS 160
ACCOUNT PROVISIONING AND MAINTENANCE 160 SECURITY MANAGEMENT 162 STORAGE
MANAGEMENT 164 PERFORMANCE MANAGEMENT 165 UPDATE TASKS 166 OPERATING
SYSTEM AND APPLICATION UPDATES 166 PATCH/UPDATE CHALLENGES 166 OVERVIEW
OF ITIL: PATCH MANAGEMENT QUADRANTS AND TASKS -.. 167 BASELINE SYSTEM
MEASUREMENT 171 REMEDIATION TASKS 172 SYSTEM AND SUPPORT DOCUMENTATION
173 SYSTEM SUPPORT 173 INCIDENT MANAGEMENT 173 PROBLEM MANAGEMENT 175
CHANGE MANAGEMENT 175 RELEASE MANAGEMENT 176 HELPDESK 176 CONCLUSION 176
10 PATCH/UPDATE MANAGEMENT: ASSESS TASKS 179 SETUP AND PERIODIC
ASSESSMENT TASKS 179 SYSTEM BASELINING 180 REQUIREMENTS BASELINING 186
CONTENTS * XIII SUBSCRIPTION BASELINING 186 ARCHITECTURE REVIEW 188
FUNCTIONAL BUILDING BLOCKS -. 191 INFRASTRUCTURE REVIEW 194 TEST
INFRASTRUCTURE 194 DEPLOYMENT INFRASTRUCTURE 194 MONITORING/DISCOVERY
INFRASTRUCTURE 195 COMMUNICATIONS INFRASTRUCTURE 196 PROGRAM
OPTIMIZATION REVIEW 196 ONGOING TASKS 197 INFORMATION TECHNOLOGY ASSET
DISCOVERY 197 UNKNOWN SYSTEM REMEDIATION 207 REMEDIATION PROCEDURES 209
CONCLUSION 211 11 PATCH/UPDATE MANAGEMENT: IDENTIFY TASKS 213 IDENTIFY
NEW UPDATES 214 RELEVANCE 219 SEVERITY 220 RELEASE NOTES 222 DOWNLOAD
AND VERIFY 222 QUARANTINE 223 ACCEPTANCE TESTING 224 HANDOVER TO THE
EVALUATE AND PLAN PHASE 225 CONCLUSION 226 12 PATCH/UPDATE MANAGEMENT:
EVALUATE AND PLAN TASKS 227 CHANGE MANAGEMENT 228 REQUEST FOR CHANGE 228
RELEASE MANAGEMENT 230 EVALUATING DEPLOYMENT RISKS 231 PLANNING FOR THE
VARIOUS DEPLOYMENT SCENARIOS 232 DETERMINING DEPLOYMENT SCHEDULING 238
DEVELOPING DEPLOYMENT PROCEDURES AND PACKAGES 240 HANDOVER TO THE
DEPLOYMENT PHASE 249 CONCLUSION 250 13 CHANGE MANAGEMENT 251 CHANGE
MANAGEMENT PROGRAM REQUIREMENTS 252 CHANGE MANAGEMENT POLICY: SCOPE 252
CHANGE MANAGEMENT POLICY: PROCESS 254 CHANGE MANAGEMENT POLICY: ROLES
AND RESPONSIBILITIES 255 CHANGE MANAGEMENT POLICY: AUTHORITY 256 CHANGE
MANAGEMENT POLICY: COMPLIANCE AND REPORTING 257 CHANGE MANAGEMENT
POLICY: COMMUNICATIONS PLAN 258 XIV * CONTENTS ROLES AND
RESPONSIBILITIES 259 MANAGING CHANGE 261 CHANGE REQUEST 261 CHANGE
TRACKING SYSTEM 263 CHANGE CLASSIFICATION 264 CHANGE AUTHORIZATION 265
CHANGE ADVISORY BOARD 265 CHANGE ADVISORY BOARD MEETINGS 266 CHANGE
EVALUATION 267 APPROVING, REJECTING, OR RESCHEDULING CHANGES 269 CHANGE
DEVELOPMENT 270 CHANGE REVIEW AND REPORTING 271 CONCLUSION 272 14 UPDATE
TESTING 273 TEST STRATEGY 273 TEST PLANNING 275 TEST SCOPE: WHAT IS
GOING TO BE TESTED? 276 TEST ASSIGNMENT: WHO WILL DO THE TESTING? 276
WHAT TYPES OF TESTS WILL BE CONDUCTED? 277 DEPLOYMENT AND ROLLBACK 279
TEST FACILITIES 279 SOFTWARE 281 REFERENCE MATERIALS 282 STAFFING 283
OPERATOR/TESTER 284 TEST DEVELOPMENT 285 TEST PROCEDURE: TURNING GOALS
INTO TARGETS 285 TEST SUITE 285 TEST CASE 285 TEST AUTOMATION 288 TEST
TIPS AND TRICKS 290 ONLY TEST WHAT NEEDS TO BE TESTED 290 PRIORITIZE
YOUR TESTS 290 MAXIMIZE COVERAGE 291 USE THE BEST TOOLS 292 MINIMIZE
TARGET INTERACTIONS 292 LEVERAGE SYSTEM AUTOMATION 292 LEVERAGE SYSTEM
LOGGING 294 ONE PIECE AT A TIME 295 WATCH YOUR P S AND F S 295
CONCLUSION 295 CONTENTS * XV 15 PATCH/UPDATE MANAGEMENT: DEPLOY TASKS
297 DEPLOYMENT PREPARATION 298 PRODUCTION STAGING 298 SELECT TARGET
GROUPS 302 TRAINING 302 BACKUP 303 COMMUNICATE ROLLOUT SCHEDULE 304
DISTRIBUTE AND INSTALL 304 DISTRIBUTE 304 SUMMARY 307 INSTALL 309
PRIVILEGE/PERMISSIONS 310 AVAILABLE DISK SPACE 311 FILE USAGE 312 MANUAL
INSTALLATION 312 INSTALLATION TRIGGERS 313 PRIMARY AND SECONDARY
DEPLOYMENT 313 PILOT DEPLOYMENTS 315 DEPLOYING TO BUILD ENVIRONMENTS 316
MONITORING AND REPORTING 317 VERIFYING SUCCESSFUL INSTALLATION 317
REPORTING DEPLOYMENT PROGRESSION 318 HANDLING ISSUES AND EXCEPTIONS 318
VERIFYING ISSUES 319 DETERMINING IMPACT 319 ROLLING BACK DEPLOYMENTS 319
GRANTING EXCEPTIONS 320 REVIEW DEPLOYMENT 320 CONCLUSION 321 16 BASELINE
COMPLIANCE MANAGEMENT PROCESSES 323 ROLE OF BASELINE COMPLIANCE
MANAGEMENT 324 PROGRAM REQUIREMENTS 324 BASELINE COMPLIANCE PROCESS 327
TASK 1: IDENTIFY AND CLASSIFY ASSETS 328 TASK 2: ESTABLISH OWNERSHIP 330
TASK 3: DEFINE BASELINES 331 TASK 4: SCAN AND MEASURE COMPLIANCE 333
TASK 5: ENFORCE COMPLIANCE 335 TASK 6: CONTINUOUSLY IMPROVE 338 DEALING
WITH UNMANAGED SYSTEMS 339 CONCLUSION 343 XVI * CONTENTS 17 TECHNOLOGIES
AND RESOURCES 345 TIPS AND BEST PRACTICES 345 TOOL TYPES 346
CONFIGURATION MANAGEMENT TOOLS 346 INVENTORY TOOLS 346 BUILD AND
HARDENING TOOLS 348 CMDB TOOLS 352 UPDATE AND COMPLIANCE MANAGEMENT
TOOLS 352 UPDATE MANAGEMENT 352 COMPLIANCE MANAGEMENT 354 NETWORK
DISCOVERY TOOLS 355 MICROSOFT NBTSTAT 355 FOUNDSTONE/SYMANTEC SUPERSCAN
355 SOLARWINDS SNMP SWEEP 356 NETWORK MAPPER 356 SERVICES 357 MICROSOFT
NETWORK ACCESS PROTECTION 357 CISCO NETWORK ADMISSION CONTROL 358
NOTIFICATION SERVICES AND RESOURCES 358 FRENCH SECURITY INCIDENT
RESPONSE TEAM 359 SECURITYTRACKER 359 CHANGE MANAGEMENT RESOURCES 360
COMPUTER ASSOCIATES ENTERPRISE CHANGE MANAGEMENT 360 TIDEWAY CHANGE
MANAGEMENT SYSTEM 360 TESTING TOOLS 361 IBM RATIONAL SOFTWARE 361
SCRIPTING LANGUAGES 361 SIMULATORS 361 MAPPING TOOLS 362 PACKAGING AND
ROLLBACK TOOLS 363 MICROSOFT SYSDIFF 363 MACROVISION INSTALLSHIELD 363
ONDEMAND SOFTWARE WINLNSTALL DESKTOP MANAGEMENT SUITE...364 REPORTING
TOOLS 364 CRYSTAL REPORTS 364 MS SQL REPORTING SERVICE 364
MONITORING/AUDIT TOOLS 364 MICROSOFT OPERATIONS MANAGER 364 OPEN SOURCE
AND FREEWARE TOOLS 365 SHAVLIK HFNETCHKPRO 365 CONTENTS * XVII STANDARDS
AND FRAMEWORKS 365 INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY 365
COBIT 366 INTERNATIONAL ORGANIZATION FOR STANDARDIZATION 366 NATIONAL
INSTITUTE OF STANDARDS AND TECHNOLOGY 366 CONCLUSION 367 GLOSSARY. 369
APPENDIX A REQUEST FOR CHANGE (RFC) TEMPLATE 373 APPENDIX B SYSTEM OWNER
ROLES AND RESPONSIBILITIES 375 APPENDIX C UPDATE MANAGEMENT PROCESS
DIAGRAMS 377 INDEX 381
|
adam_txt |
SOFTWARE DEPLOYMENT, UPDATING, AND PATCHING BILL STACKPOLE PATRICK
HANRION A AUERBACH PUBLICATIONS TAYLOR & FRANCIS GROUP NEW YORK LONDON
CRC PRESS IS AN IMPRINT OF THE TAYLOR & FRANCIS CROUP, AN INFORMA
BUSINESS CONTENTS ABOUT THE AUTBORS XIX 1 INTRODUCTION 1 LANDSCAPE AND
LAND MINES 3 BEST OF BREED VERSUS RISK NEED 4 UPDATES AND MORE UPDATES 5
MORE WORK, SAME STAFF. 6 CONFIGURATION MANAGEMENT SOLUTION 7 UPDATE
MANAGEMENT SOLUTION 8 GOAL AND SCOPE OF THIS BOOK 9 PEOPLE ASPECTS OF
CONFIGURATION AND UPDATE MANAGEMENT 10 PROCESS ASPECTS OF CONFIGURATION
AND UPDATE MANAGEMENT 10 TECHNOLOGY ASPECTS OF CONFIGURATION AND UPDATE
MANAGEMENT 10 MEASUREMENT ASPECTS OF CONFIGURATION AND UPDATE MANAGEMENT
11 DEFINITIONS AND TERMS USED IN THIS BOOK 12 2 SYSTEM LIFECYCLE
OVERVIEW 15 CONFIGURATION MANAGEMENT THROUGHOUT THE LIFECYCLE PROCESS 17
ENVISION PHASE 18 STRATEGY 19 ORGANIZATION 22 ORGANIZATIONAL REVIEWS 22
BUDGET 22 PLANNING AND DESIGN PHASE 22 DETERMINING CONFIGURATION
REQUIREMENTS 23 DETERMINING TEST REQUIREMENTS 23 DETERMINING DEPLOYMENT
REQUIREMENTS 23 DETERMINING OPERATION AND MAINTENANCE REQUIREMENTS 24
MANAGED AND UNMANAGED SYSTEMS 25 DETERMINING TRAINING AND SKILL
REQUIREMENTS 26 DETERMINING PERFORMANCE AND COMPLIANCE BASELINES 26
DETERMINING ORGANIZATIONAL REQUIREMENTS 27 VII VIII * CONTENTS
DETERMINING SYSTEM RETIREMENT 27 DOCUMENTING SYSTEM PLANS AND DESIGNS 28
TEST AND STABILIZE PHASE 29 VERIFYING SYSTEM CONFIGURATIONS 29 VERIFYING
SYSTEM INTERFACES 29 VERIFYING SYSTEM PERFORMANCE 29 VERIFYING SECURITY
REQUIREMENTS 29 VERIFYING SYSTEM INTEROPERABILITY 30 SYSTEM AND SUPPORT
DOCUMENTATION UPDATES 30 DEPLOY PHASE 31 SYSTEM BUILD 32 HARDENING 32
INSTALLATION 32 SYSTEM COMPATIBILITY TESTING 33 CHANGE CONTROL 33
OPERATIONS VERIFICATION 33 SECURITY VERIFICATION 33 SYSTEM SUPPORT
DOCUMENTATION 34 OPERATE AND MAINTAIN PHASE 35 ADDING NEW SOFTWARE,
HARDWARE, OR FIRMWARE 35 CHANGING SOFTWARE, HARDWARE, OR FIRMWARE 35
DELETING SOFTWARE, HARDWARE, OR FIRMWARE 36 ROUTINE SYSTEM SERVICE 36
RETIRE PHASE 38 RETIREMENT NOTIFICATION 38 VERIFICATION OF NONUSE 39
POWER DOWN 39 REMOVE FROM CMDB AND INFRASTRUCTURE SERVICES (DNS,
DIRECTORY, ETC.) 39 CONCLUSION 39 3 CONFIGURATION MANAGEMENT PROGRAM
OVERVIEW 41 CONFIGURATION MANAGEMENT ROLES AND RESPONSIBILITIES 43
MANAGEMENT 43 TESTING 43 LIBRARIAN 44 ADMINISTRATORS 44 SUPPORT 44
STRATEGY 44 PLANNING 45 PROCESSES 45 GOALS 48 STRATEGY 51 POLICIES 53
CONTENTS * IX IDENTIFICATION 55 INFRASTRUCTURE AND FACILITIES 55 NETWORK
SCANNING 57 PROCEDURES 57 CONTROL 58 POLICIES 58 CHANGE CONTROL 59
SYSTEM CONTROL TOOLS 59 STATUS ACCOUNTING 60 CONFIGURATION MANAGEMENT
LIFECYCLE 60 CONFIGURATION MANAGEMENT CHANGE STATUS MODES 60
VERIFICATION 61 COMPLIANCE CHECKING 61 COMPLIANCE REMEDIATION 61
CONFIGURATION MANAGEMENT AND ITS RELATIONSHIP TO OTHER PROGRAMS 62 RISK
MANAGEMENT 62 INCIDENT MANAGEMENT 62 CHANGE CONTROL 62 INFORMATION
TECHNOLOGY STRATEGY 63 UPDATE MANAGEMENT 63 COMPLIANCE AND AUDIT 63
OPERATIONS 63 INFORMATION TECHNOLOGY SECURITY 63 CONCLUSION 63 4
CONFIGURATION MANAGEMENT PLANNING 65 PLANNING 65 PROCESSES 66 GOALS 69
STRATEGY 75 POLICIES 79 CONCLUSION 81 5 CONFIGURATION MANAGEMENT
IDENTIFICATION 83 INFRASTRUCTURE 84 HARDWARE AND SOFTWARE OWNERS 84
NAMING STANDARDS 85 BASE ARCHITECTURE 86 PLATFORM STANDARDS 87 SOFTWARE
STANDARDS 88 INTELLIGENCE 88 CONFIGURATION MANAGEMENT DATABASE 89
CLASSIFICATION FILTERING 90 COMPILATION AND STORAGE OF INFORMATION 91 X
* CONTENTS GENERALIZED RISK 91 THREAT ANALYSIS 92 NETWORK SCANNING 92
VULNERABILITY SCANNING 92 TYPES OF SYSTEMS AND SCANNED VULNERABILITIES
93 FREQUENCY OF SCANS 93 FREQUENCY OF UPDATES 93 ACTIONS TO TAKE BASED
ON THE INFORMATION OBTAINED 94 REPORTING AND ALERTING REQUIREMENTS 94
ESCALATION AND REMEDIATION REQUIREMENTS 95 IDENTIFYING ROGUE SYSTEMS 95
TESTING FACILITIES 95 RECEIVING UPDATES 95 TESTING UPDATES 95 PACKAGING
UPDATES 96 PROCEDURES 96 INSTALLATION AND CONFIGURATION GUIDANCE 96
CONFIGURATION CHANGE PROCEDURES 96 NEW PRODUCT INTRODUCTION PROCEDURE 96
RISK ASSESSMENT 98 COMPLIANCE MONITORING 100 CONCLUSION 101 6
CONFIGURATION MANAGEMENT CONTROL 103 POLICIES 104 CHANGE POLICY 104
IDENTIFICATION POLICY 110 SYSTEM SOFTWARE 112 SYSTEM LIFECYCLE 112
SYSTEM USAGE 112 SYSTEM SECURITY 112 CHANGE CONTROL 114 HOW A CHANGE
REQUEST IS SUBMITTED FOR EACH UPDATE 115 EXCEPTION PROCESS FOR EMERGENCY
UPDATES 115 APPROPRIATE CHANGE WINDOW FOR DEPLOYING UPDATES 116
APPROPRIATE BACKUP AND ROLLBACK REQUIREMENTS 116 CHANGE APPROVAL
REQUIREMENTS 116 PRE- AND POSTCHANGE NOTIFICATION AND REPORTING
REQUIREMENTS 116 SYSTEM CONTROL TOOLS 116 ASSET INVENTORY SYSTEM 116
OTHER INFORMATION REQUIRED TO DETERMINE UPDATING REQUIREMENTS AND
CRITICALITY 117 DEPLOYMENT INFRASTRUCTURE 117 CONTENTS * XI PRIMARY
AUTOMATION METHODS 118 SECONDARY AUTOMATION METHODS 118 MANUAL METHODS
118 COMMUNICATIONS PORTAL 118 SECURITY BULLETINS AND UPDATE RELEASE
NOTIFICATION 118 UPDATE BINARIES 119 DISCUSSION AND FEEDBACK LISTS 119
COMPLIANCE REPORTS 119 OTHER COMMUNICATIONS 119 INCIDENT RESPONSE AND
FORENSICS 119 FORENSICS 121 CONCLUSION 121 7 CONFIGURATION MANAGEMENT
STATUS AND VERIFICATION 123 STATUS 123 CONFIGURATION MANAGEMENT
LIFECYCLE 124 CONFIGURATION MANAGEMENT CHANGEOF CONFIGURATION ITEM
STATUS MODES 125 MEASUREMENTS 126 VERIFICATION 129 COMPLIANCE CHECKS 129
COMPLIANCE REMEDIATION 132 CONCLUSION 133 8 DEPLOYMENT PROCESSES 135
SELECTION PROCESS 135 NEEDS ASSESSMENT 135 VENDOR ASSESSMENT 138 BUILD
VERSUS BUY 139 STAFFING REQUIREMENTS 139 HARDWARE REQUIREMENTS 140
SOFTWARE REQUIREMENTS 140 BUDGETING 141 SKILLS ASSESSMENT 141 TRAINING,
CONSULTING, OR BOTH 141 SOLUTION ARCHITECTURE BUILD PROCESS 141
APPLICATION BUILD PROCESS 142 SOLUTION ARCHITECTURE 143 CONFIGURATION
MANAGEMENT 143 CONNECTING IT TOGETHER 143 TRIAL 143 HARDENING PROCESS
144 THREAT MODELING 144 XII * CONTENTS VULNERABILITY ASSESSMENT 147
MITIGATING VULNERABILITIES 148 TESTING 148 TEST LAB 148 DUPLICATE
ENVIRONMENT 149 CHANGE PROCESS 150 DOCUMENTATION 150 SOFTWARE AND
HARDWARE DOCUMENTATION 150 ORGANIZATION-SPECIFIC DOCUMENTATION 150
INSTALLATION 151 INSTALLATION TYPE 152 INSTALLATION METHOD 153
INSTALLATION PLANNING 153 FINALIZATION 153 INSTALLATION AND OPERATIONAL
VERIFICATION PROCESS 153 SECURITY VERIFICATION PROCESS: VULNERABILITY
ASSESSMENT 155 INITIAL SYSTEM AND SUPPORT DOCUMENTATION 156 CONCLUSION
157 9 OPERATE AND MAINTAIN PROCESSES 159 ROUTINE SERVICE TASKS 160
ACCOUNT PROVISIONING AND MAINTENANCE 160 SECURITY MANAGEMENT 162 STORAGE
MANAGEMENT 164 PERFORMANCE MANAGEMENT 165 UPDATE TASKS 166 OPERATING
SYSTEM AND APPLICATION UPDATES 166 PATCH/UPDATE CHALLENGES 166 OVERVIEW
OF ITIL: PATCH MANAGEMENT QUADRANTS AND TASKS -. 167 BASELINE SYSTEM
MEASUREMENT 171 REMEDIATION TASKS 172 SYSTEM AND SUPPORT DOCUMENTATION
173 SYSTEM SUPPORT 173 INCIDENT MANAGEMENT 173 PROBLEM MANAGEMENT 175
CHANGE MANAGEMENT 175 RELEASE MANAGEMENT 176 HELPDESK 176 CONCLUSION 176
10 PATCH/UPDATE MANAGEMENT: ASSESS TASKS 179 SETUP AND PERIODIC
ASSESSMENT TASKS 179 SYSTEM BASELINING 180 REQUIREMENTS BASELINING 186
CONTENTS * XIII SUBSCRIPTION BASELINING 186 ARCHITECTURE REVIEW 188
FUNCTIONAL BUILDING BLOCKS -. 191 INFRASTRUCTURE REVIEW 194 TEST
INFRASTRUCTURE 194 DEPLOYMENT INFRASTRUCTURE 194 MONITORING/DISCOVERY
INFRASTRUCTURE 195 COMMUNICATIONS INFRASTRUCTURE 196 PROGRAM
OPTIMIZATION REVIEW 196 ONGOING TASKS 197 INFORMATION TECHNOLOGY ASSET
DISCOVERY 197 UNKNOWN SYSTEM REMEDIATION 207 REMEDIATION PROCEDURES 209
CONCLUSION 211 11 PATCH/UPDATE MANAGEMENT: IDENTIFY TASKS 213 IDENTIFY
NEW UPDATES 214 RELEVANCE 219 SEVERITY 220 RELEASE NOTES 222 DOWNLOAD
AND VERIFY 222 QUARANTINE 223 ACCEPTANCE TESTING 224 HANDOVER TO THE
EVALUATE AND PLAN PHASE 225 CONCLUSION 226 12 PATCH/UPDATE MANAGEMENT:
EVALUATE AND PLAN TASKS 227 CHANGE MANAGEMENT 228 REQUEST FOR CHANGE 228
RELEASE MANAGEMENT 230 EVALUATING DEPLOYMENT RISKS 231 PLANNING FOR THE
VARIOUS DEPLOYMENT SCENARIOS 232 DETERMINING DEPLOYMENT SCHEDULING 238
DEVELOPING DEPLOYMENT PROCEDURES AND PACKAGES 240 HANDOVER TO THE
DEPLOYMENT PHASE 249 CONCLUSION 250 13 CHANGE MANAGEMENT 251 CHANGE
MANAGEMENT PROGRAM REQUIREMENTS 252 CHANGE MANAGEMENT POLICY: SCOPE 252
CHANGE MANAGEMENT POLICY: PROCESS 254 CHANGE MANAGEMENT POLICY: ROLES
AND RESPONSIBILITIES 255 CHANGE MANAGEMENT POLICY: AUTHORITY 256 CHANGE
MANAGEMENT POLICY: COMPLIANCE AND REPORTING 257 CHANGE MANAGEMENT
POLICY: COMMUNICATIONS PLAN 258 XIV * CONTENTS ROLES AND
RESPONSIBILITIES 259 MANAGING CHANGE 261 CHANGE REQUEST 261 CHANGE
TRACKING SYSTEM 263 CHANGE CLASSIFICATION 264 CHANGE AUTHORIZATION 265
CHANGE ADVISORY BOARD 265 CHANGE ADVISORY BOARD MEETINGS 266 CHANGE
EVALUATION 267 APPROVING, REJECTING, OR RESCHEDULING CHANGES 269 CHANGE
DEVELOPMENT 270 CHANGE REVIEW AND REPORTING 271 CONCLUSION 272 14 UPDATE
TESTING 273 TEST STRATEGY 273 TEST PLANNING 275 TEST SCOPE: WHAT IS
GOING TO BE TESTED? 276 TEST ASSIGNMENT: WHO WILL DO THE TESTING? 276
WHAT TYPES OF TESTS WILL BE CONDUCTED? 277 DEPLOYMENT AND ROLLBACK 279
TEST FACILITIES 279 SOFTWARE 281 REFERENCE MATERIALS 282 STAFFING 283
OPERATOR/TESTER 284 TEST DEVELOPMENT 285 TEST PROCEDURE: TURNING GOALS
INTO TARGETS 285 TEST SUITE 285 TEST CASE 285 TEST AUTOMATION 288 TEST
TIPS AND TRICKS 290 ONLY TEST WHAT NEEDS TO BE TESTED 290 PRIORITIZE
YOUR TESTS 290 MAXIMIZE COVERAGE 291 USE THE BEST TOOLS 292 MINIMIZE
TARGET INTERACTIONS 292 LEVERAGE SYSTEM AUTOMATION 292 LEVERAGE SYSTEM
LOGGING 294 ONE PIECE AT A TIME 295 WATCH YOUR P'S AND F'S 295
CONCLUSION 295 CONTENTS * XV 15 PATCH/UPDATE MANAGEMENT: DEPLOY TASKS
297 DEPLOYMENT PREPARATION 298 PRODUCTION STAGING 298 SELECT TARGET
GROUPS 302 TRAINING 302 BACKUP 303 COMMUNICATE ROLLOUT SCHEDULE 304
DISTRIBUTE AND INSTALL 304 DISTRIBUTE 304 SUMMARY 307 INSTALL 309
PRIVILEGE/PERMISSIONS 310 AVAILABLE DISK SPACE 311 FILE USAGE 312 MANUAL
INSTALLATION 312 INSTALLATION TRIGGERS 313 PRIMARY AND SECONDARY
DEPLOYMENT 313 PILOT DEPLOYMENTS 315 DEPLOYING TO BUILD ENVIRONMENTS 316
MONITORING AND REPORTING 317 VERIFYING SUCCESSFUL INSTALLATION 317
REPORTING DEPLOYMENT PROGRESSION 318 HANDLING ISSUES AND EXCEPTIONS 318
VERIFYING ISSUES 319 DETERMINING IMPACT 319 ROLLING BACK DEPLOYMENTS 319
GRANTING EXCEPTIONS 320 REVIEW DEPLOYMENT 320 CONCLUSION 321 16 BASELINE
COMPLIANCE MANAGEMENT PROCESSES 323 ROLE OF BASELINE COMPLIANCE
MANAGEMENT 324 PROGRAM REQUIREMENTS 324 BASELINE COMPLIANCE PROCESS 327
TASK 1: IDENTIFY AND CLASSIFY ASSETS 328 TASK 2: ESTABLISH OWNERSHIP 330
TASK 3: DEFINE BASELINES 331 TASK 4: SCAN AND MEASURE COMPLIANCE 333
TASK 5: ENFORCE COMPLIANCE 335 TASK 6: CONTINUOUSLY IMPROVE 338 DEALING
WITH UNMANAGED SYSTEMS 339 CONCLUSION 343 XVI * CONTENTS 17 TECHNOLOGIES
AND RESOURCES 345 TIPS AND BEST PRACTICES 345 TOOL TYPES 346
CONFIGURATION MANAGEMENT TOOLS 346 INVENTORY TOOLS 346 BUILD AND
HARDENING TOOLS 348 CMDB TOOLS 352 UPDATE AND COMPLIANCE MANAGEMENT
TOOLS 352 UPDATE MANAGEMENT 352 COMPLIANCE MANAGEMENT 354 NETWORK
DISCOVERY TOOLS 355 MICROSOFT NBTSTAT 355 FOUNDSTONE/SYMANTEC SUPERSCAN
355 SOLARWINDS SNMP SWEEP 356 NETWORK MAPPER 356 SERVICES 357 MICROSOFT
NETWORK ACCESS PROTECTION 357 CISCO NETWORK ADMISSION CONTROL 358
NOTIFICATION SERVICES AND RESOURCES 358 FRENCH SECURITY INCIDENT
RESPONSE TEAM 359 SECURITYTRACKER 359 CHANGE MANAGEMENT RESOURCES 360
COMPUTER ASSOCIATES ENTERPRISE CHANGE MANAGEMENT 360 TIDEWAY CHANGE
MANAGEMENT SYSTEM 360 TESTING TOOLS 361 IBM RATIONAL SOFTWARE 361
SCRIPTING LANGUAGES 361 SIMULATORS 361 MAPPING TOOLS 362 PACKAGING AND
ROLLBACK TOOLS 363 MICROSOFT SYSDIFF 363 MACROVISION INSTALLSHIELD 363
ONDEMAND SOFTWARE WINLNSTALL DESKTOP MANAGEMENT SUITE.364 REPORTING
TOOLS 364 CRYSTAL REPORTS 364 MS SQL REPORTING SERVICE 364
MONITORING/AUDIT TOOLS 364 MICROSOFT OPERATIONS MANAGER 364 OPEN SOURCE
AND FREEWARE TOOLS 365 SHAVLIK HFNETCHKPRO 365 CONTENTS * XVII STANDARDS
AND FRAMEWORKS 365 INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY 365
COBIT 366 INTERNATIONAL ORGANIZATION FOR STANDARDIZATION 366 NATIONAL
INSTITUTE OF STANDARDS AND TECHNOLOGY 366 CONCLUSION 367 GLOSSARY. 369
APPENDIX A REQUEST FOR CHANGE (RFC) TEMPLATE 373 APPENDIX B SYSTEM OWNER
ROLES AND RESPONSIBILITIES 375 APPENDIX C UPDATE MANAGEMENT PROCESS
DIAGRAMS 377 INDEX 381 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Stackpole, Bill |
author_facet | Stackpole, Bill |
author_role | aut |
author_sort | Stackpole, Bill |
author_variant | b s bs |
building | Verbundindex |
bvnumber | BV023275562 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.C69 |
callnumber-search | QA76.76.C69 |
callnumber-sort | QA 276.76 C69 |
callnumber-subject | QA - Mathematics |
classification_rvk | SR 860 |
ctrlnum | (OCoLC)70173628 (DE-599)GBV513934766 |
dewey-full | 005.1/6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1/6 |
dewey-search | 005.1/6 |
dewey-sort | 15.1 16 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01624nam a2200433 c 4500</leader><controlfield tag="001">BV023275562</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080425 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080424s2008 ad|| j||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0849358000</subfield><subfield code="c">(hbk.)</subfield><subfield code="9">0-8493-5800-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780849358005</subfield><subfield code="c">(hbk.)</subfield><subfield code="9">978-0-8493-5800-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)70173628</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV513934766</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1051</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.76.C69</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1/6</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 860</subfield><subfield code="0">(DE-625)143367:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stackpole, Bill</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Software deployment, updating, and patching</subfield><subfield code="c">Bill Stackpole ; Patrick Hanrion</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY [u.a.]</subfield><subfield code="b">Auerbach</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 397 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Configuration management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software maintenance</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Update</subfield><subfield code="0">(DE-588)4255930-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwarewartung</subfield><subfield code="0">(DE-588)4197459-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4173536-5</subfield><subfield code="a">Patentschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Softwarewartung</subfield><subfield code="0">(DE-588)4197459-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Update</subfield><subfield code="0">(DE-588)4255930-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hanrion, Patrick</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016460468&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016460468</subfield></datafield></record></collection> |
genre | (DE-588)4173536-5 Patentschrift gnd-content |
genre_facet | Patentschrift |
id | DE-604.BV023275562 |
illustrated | Illustrated |
index_date | 2024-07-02T20:37:46Z |
indexdate | 2024-07-09T21:14:44Z |
institution | BVB |
isbn | 0849358000 9780849358005 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016460468 |
oclc_num | 70173628 |
open_access_boolean | |
owner | DE-1051 |
owner_facet | DE-1051 |
physical | XX, 397 S. Ill., graph. Darst. 24cm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Auerbach |
record_format | marc |
spelling | Stackpole, Bill Verfasser aut Software deployment, updating, and patching Bill Stackpole ; Patrick Hanrion New York, NY [u.a.] Auerbach 2008 XX, 397 S. Ill., graph. Darst. 24cm txt rdacontent n rdamedia nc rdacarrier Computer security Configuration management Software maintenance Update (DE-588)4255930-3 gnd rswk-swf Softwarewartung (DE-588)4197459-1 gnd rswk-swf (DE-588)4173536-5 Patentschrift gnd-content Softwarewartung (DE-588)4197459-1 s Update (DE-588)4255930-3 s DE-604 Hanrion, Patrick Sonstige oth GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016460468&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Stackpole, Bill Software deployment, updating, and patching Computer security Configuration management Software maintenance Update (DE-588)4255930-3 gnd Softwarewartung (DE-588)4197459-1 gnd |
subject_GND | (DE-588)4255930-3 (DE-588)4197459-1 (DE-588)4173536-5 |
title | Software deployment, updating, and patching |
title_auth | Software deployment, updating, and patching |
title_exact_search | Software deployment, updating, and patching |
title_exact_search_txtP | Software deployment, updating, and patching |
title_full | Software deployment, updating, and patching Bill Stackpole ; Patrick Hanrion |
title_fullStr | Software deployment, updating, and patching Bill Stackpole ; Patrick Hanrion |
title_full_unstemmed | Software deployment, updating, and patching Bill Stackpole ; Patrick Hanrion |
title_short | Software deployment, updating, and patching |
title_sort | software deployment updating and patching |
topic | Computer security Configuration management Software maintenance Update (DE-588)4255930-3 gnd Softwarewartung (DE-588)4197459-1 gnd |
topic_facet | Computer security Configuration management Software maintenance Update Softwarewartung Patentschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016460468&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT stackpolebill softwaredeploymentupdatingandpatching AT hanrionpatrick softwaredeploymentupdatingandpatching |