e-books Engels

 | 

Informatica

 | 

Systeemanalyse en -theorie




1 2 Volgende




ABC of ICT / version 1.0

ABC of ICT / version 1.0




Paul Wilkinson

This introduction, the sister publication to the ABC Card Deck is a new approach to dry and formal training and change programs. Making strong and sound points with a dash of humor, it was designed and drawn by Paul Wilkinson and Jan Schilt. It covers the soft skills, which are ultimately pivotal to any ICT operation. Key Features Covers 'Attitude, Behaviour and Culture' concepts that are critical to make ICT really happen 35 fantastic case studies and examples from industry experts of where things can go wrong - and how to make them right Used globally by leading consultants and trainers in the field Assess worst practices and take first practical steps in solving them 








Euro 48.34


Voorraad: Direct te downloaden


Aantal  




Archimate 2.0 specification

Archimate 2.0 specification



ArchiMate®, an Open Group Standard, is an open and independent modeling language for Enterprise Architecture that is supported by different tool vendors and consulting firms. ArchiMate provides instruments to enable enterprise architects to describe, analyze, and visualize the relationships among business domains in an unambiguous way.








Euro 45.92


Voorraad: Direct te downloaden


Aantal  




ArchiMate 2.0 specification

ArchiMate 2.0 specification



ArchiMate®, an Open Group Standard, is an open and independent modeling language for Enterprise Architecture that is supported by different tool vendors and consulting firms. ArchiMate provides instruments to enable enterprise architects to describe, analyze, and visualize the relationships among business domains in an unambiguous way.

EPUB versie: ePub 2






Euro 45.92


Voorraad: Direct te downloaden



Aantal  




Archimate2.0 specification

Archimate2.0 specification



ArchiMate®, an Open Group Standard, is an open and independent modeling language for Enterprise Architecture that is supported by different tool vendors and consulting firms. ArchiMate provides instruments to enable enterprise architects to describe, analyze, and visualize the relationships among business domains in an unambiguous way. This Pocket Guide is based on ArchiMate® 2.0. It gives a concise introduction to ArchiMate. What's more, it's authoritative with material derived from the official ArchiMate documentation. Topics covered include: A high-level introduction to ArchiMate and its relationship to Enterprise Architecture The Business Layer, which includes the modeling concepts relevant in the business domain The Application Layer, which includes modeling concepts relevant for software applications The Technology Layer, which includes modeling concepts relevant for system software applications and infrastructure The relationships that the ArchiMate language includes to model the links between elements, and also the relationships to model the cross-layer dependencies The Motivation Extension The Implementation and Migration Extension The ArchiMate framework for defining and classifying ArchiMate viewpoints, including a summary of all the viewpoints in the ArchiMate 2.0 Standard The ArchiSurance Case Study, a fictitious example developed to illustrate use of the Modeling language in the context of the TOGAF Framework 








Euro 19.30


Voorraad: Direct te downloaden


Aantal  




ArchiMate® 2 - Certification Study Guide

ArchiMate® 2 - Certification Study Guide




Andrew Josey

This title is a Study Guide preparing for the ArchiMate 2 Part 1 and 2 Examinations. It gives an overview of every learning objective for the ArchiMate certification syllabus and in-depth coverage on preparing and taking the ArchiMate 2 Examinations. It is specifically designed to help individuals prepare for certification. This Study Guide is excellent material for: - Individuals who require a basic understanding of the ArchiMate modeling language; - Professionals who are working in roles associated with an architecture project and who need to understand architecture artefacts developed using the ArchiMate modelling language; - Individuals who want to achieve a recognized qualification to demonstrate their knowledge of the ArchiMate modelling language. A prior knowledge of Enterprise Architecture and architecture modelling is advantageous but not required. While reading this Study Guide, the reader should refer to the ArchiMate Version 2.1 Specification (manual), available as hard copy and eBook, from www.vanharen.net and online booksellers, and also available online at www.opengroup.org. 

EPUB versie: ePub 2






Euro 60.44


Voorraad: Direct te downloaden


Aantal  




ArchiMate® 3.0 specification



The ArchiMate® Specification, an Open Group Standard, defines an open and independent modeling language for Enterprise Architecture that is supported by different tool vendors and consulting firms. The ArchiMate language enables Enterprise Architects to describe, analyze, and visualize the relationships among business domains in an unambiguous way. This book is the official specification of the ArchiMate 3.0 modeling language from The Open Group. ArchiMate 3.0 is a major update to ArchiMate 2.1.The ArchiMate 3.0 Specification supports modeling throughout the TOGAF® Architecture Development Method (ADM). New features in Version 3.0 include elements for modeling the enterprise at a strategic level, such as capability, resource, and outcome. It also includes support to model the physical world of materials and equipment. Furthermore, the consistency and structure of the language have been improved, definitions have been aligned with other standards, and its usability has been enhanced in various other ways. The intended audience is threefold: * Enterprise Architecture practitioners, such as architects (e.g., business, application, information, process, infrastructure, and, obviously, enterprise architects), senior and operational management, project leaders, and anyone committed to work within the reference framework defined by the Enterprise Architecture. * Those who intend to implement the ArchiMate language in a software tool; they will find a complete and detailed description of the language in this book. * The academic community, on which we rely for amending and improving the language, based on state-of-the-art research results in the Enterprise Architecture field. 








Euro 45.92


Voorraad: Direct te downloaden


Aantal  




ArchiMate® 3.0 Specification



The ArchiMate® Specification, an Open Group Standard, defines an open and independent modeling language for Enterprise Architecture that is supported by different tool vendors and consulting firms. The ArchiMate language enables Enterprise Architects to describe, analyze, and visualize the relationships among business domains in an unambiguous way. This book is the official specification of the ArchiMate 3.0 modeling language from The Open Group. ArchiMate 3.0 is a major update to ArchiMate 2.1.The ArchiMate 3.0 Specification supports modeling throughout the TOGAF® Architecture Development Method (ADM). New features in Version 3.0 include elements for modeling the enterprise at a strategic level, such as capability, resource, and outcome. It also includes support to model the physical world of materials and equipment. Furthermore, the consistency and structure of the language have been improved, definitions have been aligned with other standards, and its usability has been enhanced in various other ways. The intended audience is threefold: * Enterprise Architecture practitioners, such as architects (e.g., business, application, information, process, infrastructure, and, obviously, enterprise architects), senior and operational management, project leaders, and anyone committed to work within the reference framework defined by the Enterprise Architecture. * Those who intend to implement the ArchiMate language in a software tool; they will find a complete and detailed description of the language in this book. * The academic community, on which we rely for amending and improving the language, based on state-of-the-art research results in the Enterprise Architecture field. 

EPUB versie: ePub 2






Euro 45.92


Voorraad: Direct te downloaden


Aantal  




Cloud: The Business Guide

Cloud: The Business Guide



The Open Groups long awaited guidance on Cloud is now published! Cloud Computing is the major evolution today in computing. It describes how the internet has enabled organizations to access computing resources as a commodity and when needed in much the same way as households access household utilities. For Enterprises with complex and expensive IT systems, the idea of paying on demand for someone else to provide IT services is attractive. This authoritative guide is specifically designed for business managers to understand the benefits that can be achieved; including Improved timeliness and agility Resource optimisation Control and reduction of costs More innovation Increased security Decreased exposure to risk Demonstration of compliance Improved quality of support Improved business continuity resource The authoritative title, published by the globally respected Open Group, gives Managers reliable and independent guidance that will help to support decisions and actions in this key operational area.








Euro 48.34


Voorraad: Direct te downloaden


Aantal  




IT4IT™ for managing the business of IT

IT4IT™ for managing the business of IT




Rob Akershoek

The IT4IT Management Guide provides guidance on how the IT4IT Reference Architecture can be used within an IT organization to manage the business of IT. It is designed to provide a guide to business managers, CIOs, IT executives, IT professionals, and all individuals involved or interested in how to transition an IT organization to become a Lean and Agile IT service provider. After reading this document you should be able to: • Understand why the IT4IT approach is needed to improve the performance of the IT function; and support the business to leverage new IT in the digital age • Understand the vision, scope, and content of the IT4IT Reference Architecture (from a high-level perspective) • Understand the benefits of using the IT4IT Reference Architecture within the IT function • Initiate the first steps to implement the IT4IT standard in your own IT organization The audience for this Management Guide is: • CIOs and other IT executive managers who would like to transform their IT organization to support end-to-end value streams • Senior leaders and executives in the business and IT responsible for how IT is organized, managed, and improved • Enterprise Architects involved in the implementation of IT management solutions within the IT organization • IT professionals and consultants involved in the transition of their organizations to a new streamlined IT factory 

EPUB versie: ePub 2




geen inkijk exemplaar beschikbaar



Euro 28.44


Voorraad: Direct te downloaden


Aantal  




IT4IT™ for managing the business of IT

IT4IT™ for managing the business of IT




Rob Akershoek

The IT4IT Management Guide provides guidance on how the IT4IT Reference Architecture can be used within an IT organization to manage the business of IT. It is designed to provide a guide to business managers, CIOs, IT executives, IT professionals, and all individuals involved or interested in how to transition an IT organization to become a Lean and Agile IT service provider. After reading this document you should be able to: • Understand why the IT4IT approach is needed to improve the performance of the IT function; and support the business to leverage new IT in the digital age • Understand the vision, scope, and content of the IT4IT Reference Architecture (from a high-level perspective) • Understand the benefits of using the IT4IT Reference Architecture within the IT function • Initiate the first steps to implement the IT4IT standard in your own IT organization The audience for this Management Guide is: • CIOs and other IT executive managers who would like to transform their IT organization to support end-to-end value streams • Senior leaders and executives in the business and IT responsible for how IT is organized, managed, and improved • Enterprise Architects involved in the implementation of IT management solutions within the IT organization • IT professionals and consultants involved in the transition of their organizations to a new streamlined IT factory 








Euro 28.44


Voorraad: Direct te downloaden


Aantal  




IT4IT™ Foundation study guide




Andrew Josey

This title is a Study Guide for the IT4IT Foundation Certification examination. It gives an overview of every learning objective for the IT4IT Foundation certification syllabus and in-depth coverage on preparing and taking the IT4IT Part 1 Examination. It is specifically designed to help individuals to prepare for certification. This Study Guide is excellent material for: • Individuals who require a basic understanding of the IT4IT Reference Architecture • IT Professionals/Practitioners who are responsible for delivering services in a way that is flexible, traceable, and cost-effective • IT Professionals who want to achieve a higher level certification in the IT4IT Certification Program (expected in 2017) in a stepwise approach A prior knowledge of IT service management is advantageous but not required. While reading this Study Guide, the reader should also refer to the IT4IT documentation available at www.opengroup.org/it4it 






geen inkijk exemplaar beschikbaar



Euro 36.24


Voorraad: Direct te downloaden


Aantal  




IT4IT™ Foundation study guide




Andrew Josey

This title is a Study Guide for the IT4IT Foundation Certification examination. It gives an overview of every learning objective for the IT4IT Foundation certification syllabus and in-depth coverage on preparing and taking the IT4IT Part 1 Examination. It is specifically designed to help individuals to prepare for certification. This Study Guide is excellent material for: • Individuals who require a basic understanding of the IT4IT Reference Architecture • IT Professionals/Practitioners who are responsible for delivering services in a way that is flexible, traceable, and cost-effective • IT Professionals who want to achieve a higher level certification in the IT4IT Certification Program (expected in 2017) in a stepwise approach A prior knowledge of IT service management is advantageous but not required. While reading this Study Guide, the reader should also refer to the IT4IT documentation available at www.opengroup.org/it4it 

EPUB versie: ePub 2






Euro 36.24


Voorraad: Direct te downloaden


Aantal  




O-TTPS: for ICT Product Integrity and Supply Chain Security




Sally Long

This Management Guide provides guidance on why a technology provider should use the Open Trusted Technology Provider Standard (O-TTPS) - Mitigating the Risk of Tainted and Counterfeit Products (approved by ISO/IEC as ISO/IEC 20243:2015) and why they should consider certification to publicly register their conformance to the standard. The O-TTPS is the first standard with a certification program that specifies measurable conformance criteria for both product integrity and supply chain security practices. The standard defines a set of best practices that ICT providers should follow throughout the full life cycle of their products from design through disposal, including their supply chains, in order to mitigate the risk of tainted and counterfeit components. The introduction of tainted products into the supply chain poses significant risk to organizations because altered products can introduce the possibility of untracked malicious behavior. A compromised electronic component or piece of malware enabled software that lies dormant and undetected within an organization could cause tremendous damage if activated remotely. Counterfeit products can also cause significant damage to customers and providers resulting in rogue functionality, failed or inferior products, or revenue and brand equity loss. As a result, customers now need assurances they are buying from trusted technology providers who follow best practices with their own in-house secure development and engineering practices and also in securing their out-sourced components and their supply chains. This guide offers an approach to providing those assurances to customers. It includes the requirements from the standard and an overview of the certification process, with pointers to the relevant supporting documents, offering a practical introduction to executives, managers, and those involved directly in implementing the best practices defined in the standard. As the certification program is open to all constituents involved in a product's life cycle this guide should be of interest to: * ICT provider companies (e.g. OEMs, hardware and software component suppliers, value-add distributors, and resellers), * Business managers, procurement managers, product managers and other individuals who want to better understand product integrity and supply chain security risks and how to protect against those risks and, * Government and commercial customers concerned about reducing the risk of damage to their business enterprises and critical infrastructures, which all depend heavily on secure ICT for their day-to-day operations. 








Euro 30.14


Voorraad: Binnenkort beschikbaar


Aantal  




O-TTPS: for ICT Product Integrity and Supply Chain Security




Sally Long

This Management Guide provides guidance on why a technology provider should use the Open Trusted Technology Provider Standard (O-TTPS) - Mitigating the Risk of Tainted and Counterfeit Products (approved by ISO/IEC as ISO/IEC 20243:2015) and why they should consider certification to publicly register their conformance to the standard. The O-TTPS is the first standard with a certification program that specifies measurable conformance criteria for both product integrity and supply chain security practices. The standard defines a set of best practices that ICT providers should follow throughout the full life cycle of their products from design through disposal, including their supply chains, in order to mitigate the risk of tainted and counterfeit components. The introduction of tainted products into the supply chain poses significant risk to organizations because altered products can introduce the possibility of untracked malicious behavior. A compromised electronic component or piece of malware enabled software that lies dormant and undetected within an organization could cause tremendous damage if activated remotely. Counterfeit products can also cause significant damage to customers and providers resulting in rogue functionality, failed or inferior products, or revenue and brand equity loss. As a result, customers now need assurances they are buying from trusted technology providers who follow best practices with their own in-house secure development and engineering practices and also in securing their out-sourced components and their supply chains. This guide offers an approach to providing those assurances to customers. It includes the requirements from the standard and an overview of the certification process, with pointers to the relevant supporting documents, offering a practical introduction to executives, managers, and those involved directly in implementing the best practices defined in the standard. As the certification program is open to all constituents involved in a product's life cycle this guide should be of interest to: * ICT provider companies (e.g. OEMs, hardware and software component suppliers, value-add distributors, and resellers), * Business managers, procurement managers, product managers and other individuals who want to better understand product integrity and supply chain security risks and how to protect against those risks and, * Government and commercial customers concerned about reducing the risk of damage to their business enterprises and critical infrastructures, which all depend heavily on secure ICT for their day-to-day operations. 

EPUB versie: ePub 2






Euro 30.14


Voorraad: Binnenkort beschikbaar


Aantal  




Open information Security Management Maturity Model (O-ISM3)

Open information Security Management Maturity Model (O-ISM3)



The O-ISM3 standard focuses on the common processes of information security. It is technology-neutral, very practical and considers the business aspect in depth. This means that practitioners can use O-ISM3 with a wide variety of protection techniques used in the marketplace. In addition it supports common frameworks such as ISO 9000, ISO 27000, COBIT and ITIL. Covers: risk management, security controls, security management and how to translate business drivers into security objectives and targets. All businesses need information security to protect our systems from the risk of threats. This Open Information Security Management Maturity Model (O-ISM3) supports information security practitioners in this fundamental task by covering the key areas required to minimise these threats: *Risk Management : identifying and estimating levels of exposure to the likelihood of loss and how to manage those risks of loss; *Security Controls : crafting the IT Security Policy which assures operations are as secure as they need to be; *Security Management : supporting the selection, maintenance, and overall Security Policy for the security controls deployed in a business enterprise. The O-ISM3 standard focuses on the common processes of information security. It is technology-neutral, very practical and considers the business aspect in depth. This means that practitioners can use O-ISM3 with a wide variety of protection techniques used in the marketplace. The distinctive benefits of O-ISM3 are: *A fully process-based approach It breaks information security management down into a comprehensive but manageable number of processes, with specifically relevant security control(s) being identified. In addition it covers the principles of continuous improvement that O-ISM3 supports. *Maturity coverage O-ISM3 defines information security management maturity in terms of the operation of an appropriate complementary set of ISM3 information security processes. *A business approach The coverage considers the business drivers and also the specific business challenges of outsourcing and partnering. The critical issue of how to translate key business objectives to security objectives and targets is covered in depth. *Compatibility with ISO 9000 Quality Management With similarities in structure and approach to quality management methods like ISO 9000, O-ISM3 also emphasises the practical and the measurable so that ISMSs can adapt without re-engineering in the face of changes to technology and risk. *Compatibility with ISO/IEC 27000 ISM3 is compatible in many ways with the ISO/IEC 27000:2009 standard, in addition provides a comprehensive framework for selecting, implementing, and managing a set of security processes to meet measurable business goals. *Compatibility with COBIT O-ISM3 implementations use a management responsibilities framework consistent with the ISACA COBIT framework model. *Compatibility with ITIL ITIL users can use the O-ISM3 process orientation to strengthen their ITIL security processes. 








Euro 36.24


Voorraad: Direct te downloaden


Aantal  




Process management based on Sqeme / 2008

Process management based on Sqeme / 2008



This pocket guide is a practical book and more or less compulsory reading material for anyone who wants to get to know more about SqEME® process management or intends using SqEME. Besides it is an `instruction book with directives and tips showing an efficient approach for structuring, mastering and improving processes; complemented by examples from the same practice. It explains the essentials of SqEME® process management. The contents is broken down into four parts: Constitution Correspondence Chemistry Construction The language and drawing conventions for SqEME are dealt with as key issues. You are ready to get to work. The SqEME® Foundation is a platform for discussing the method and its application, where insights into the basic assumptions and backgrounds are shared: www.sqeme.org 








Euro 19.30


Voorraad: Direct te downloaden


Aantal  




SOA Source Book

SOA Source Book



The book is a collection of source material for use by enterprise architects working with Service-Oriented Architecture (SOA). It consists of material that has been considered and in part developed by The Open Group SOA Working Group1. The SOA Working Group is engaged in a work program to produce definitions, analyses, recommendations, reference models, and standards to assist business and information technology professionals within and outside of The Open Group to understand and adopt SOA. This Source Book does not represent the final output of that work program, which will be published as a collection of Open Group Standards and Guides. It is an interim publication, and its content will not necessarily be reflected in the final output. 








Euro 36.24


Voorraad: Direct te downloaden


Aantal  




System reliability

System reliability




K.B. Klaassen

System Reliability

Concepts and applications

The mind-boggling rate of industrial expansion of recent decades has produced innumerable technical devices and systems on which we rely in our daily life for modern convenience, safety, and sometimes even preservation of human lives. These modern artifacts cover a broad spectrum ranging from a relatively simple electronic watch to very complex transportation systems such as airplanes or spacecraft. Often, one is not even aware of the use of particular systems (part of our electrical energy is generated by nuclear reactors) until one is most unpleasantly reminded (Chernobyl disaster).

It is a proven fact that all these technical systems are producible, in other words: one can at least make them work at the time of first use. A higher order requirement, however, is that they remain serviceable throughout their expected useful life; i.e. that they are reliable. The consequences of an unreliable functioning of these systems may vary from inconvenience, extra costs, environmental damage, to even death. Such inability to perform reliably may not only arise from the product itself (usually manifested in hardware or software failures), but also from human errors. Take for instance the (pilot) error where an aircraft is put down on the runway extremely hard. As the cover picture shows, this can result in a cracked fusilage and the dragging of the entire tail section over the runway until the aircraft comes to a complete stop.

The aim of this textbook is to familiarise the reader with the principles and terminology of reliability engineering:

Methods for improving reliability are discussed in detail;

The approaches of deterministic and statistical reliability engineering are explained in such a way that the practical implications of the equations are clear;

The book discusses methods of handling the reliability of large and complex systems;

A chapter is devoted to the important topic of software reliability;

The book contains a wonderful set of exercises and solutions manual.

Contents:

Preface

1 Introduction 

2 Deterministic reliability 

3 Statistical reliability 

4 Statistical failure of components 

5 Reliability models 

6 Non-maintained systems 

7 Maintained systems 

8 Evaluation methods 

9 Reliability of computer software 

Solutions to problems 

Appendix 

Literature 

Index 


http://www.vssd.nl/hlf/e003.htm










Euro 23.00


Voorraad: Direct te downloaden


Aantal  




The IT4IT reference architecture

The IT4IT reference architecture




Andrew Josey

This Pocket Guide provides a concise introduction to the IT4IT™ Reference Architecture, Version 2.0, an Open Group Standard. The IT4IT standard provides a vendor-neutral, technology-agnostic, and industry-agnostic reference architecture for managing the business of IT, enabling insight for continuous improvement. This Pocket Guide is based on the IT4IT Reference Architecture Version 2.0. What’s more, it’s authoritative with material derived from the official IT4IT documentation and contributions from members of the IT4IT Forum. The audience for this Pocket Guide is: • Individuals who require a basic understanding of the IT Value Chain and IT4IT Reference Architecture • IT Professionals who are responsible for delivering services in a way that is flexible, traceable, and cost-effective • IT Professionals / Practitioners who are focused on instrumenting the IT management landscape • IT leaders who are concerned about their operating model • Enterprise Architects who are responsible for IT business transformation Topics covered include: • An introduction to the IT4IT Reference Architecture, the structure of the IT4IT standard, and the positioning of the IT4IT standard in the standards landscape • The IT Value Chain and IT4IT Reference Architecture concepts, including Value Streams • The Strategy to Portfolio (S2P) Value Stream • The Requirement to Deploy (R2D) Value Stream • The Request to Fulfill (R2F) Value Stream • The Detect to Correct (D2C) Value Stream • A summary of the differences between the IT4IT Reference Architecture and ITIL 

EPUB versie: ePub 2




geen inkijk exemplaar beschikbaar



Euro 19.30


Voorraad: Direct te downloaden


Aantal  




The IT4IT reference architecture, version 2.0

The IT4IT reference architecture, version 2.0




Andrew Josey

This Pocket Guide provides a concise introduction to the IT4IT™ Reference Architecture, Version 2.0, an Open Group Standard. The IT4IT standard provides a vendor-neutral, technology-agnostic, and industry-agnostic reference architecture for managing the business of IT, enabling insight for continuous improvement. This Pocket Guide is based on the IT4IT Reference Architecture Version 2.0. What’s more, it’s authoritative with material derived from the official IT4IT documentation and contributions from members of the IT4IT Forum. The audience for this Pocket Guide is: • Individuals who require a basic understanding of the IT Value Chain and IT4IT Reference Architecture • IT Professionals who are responsible for delivering services in a way that is flexible, traceable, and cost-effective • IT Professionals / Practitioners who are focused on instrumenting the IT management landscape • IT leaders who are concerned about their operating model • Enterprise Architects who are responsible for IT business transformation Topics covered include: • An introduction to the IT4IT Reference Architecture, the structure of the IT4IT standard, and the positioning of the IT4IT standard in the standards landscape • The IT Value Chain and IT4IT Reference Architecture concepts, including Value Streams • The Strategy to Portfolio (S2P) Value Stream • The Requirement to Deploy (R2D) Value Stream • The Request to Fulfill (R2F) Value Stream • The Detect to Correct (D2C) Value Stream • A summary of the differences between the IT4IT Reference Architecture and ITIL 






geen inkijk exemplaar beschikbaar



Euro 19.30


Voorraad: Direct te downloaden


Aantal  




The IT4IT™ reference architecture

The IT4IT™ reference architecture



The Open Group IT4IT™ Reference Architecture, Version 2.0, an Open Group Standard, provides a vendor-neutral, technology-agnostic, and industry-agnostic reference architecture for managing the business of IT. The Open Group IT4IT Reference Architecture standard comprises a reference architecture and a value chain-based operating model. The IT Value Chain has four value streams supported by a reference architecture to drive efficiency and agility. The four value streams are: • Strategy to Portfolio • Request to Fulfill • Requirement to Deploy • Detect to Correct Each IT Value Stream is centered on a key aspect of the service model, the essential data objects (information model), and functional components (functional model) that support it. Together, the four value streams play a vital role in helping IT control the service model as it advances through its lifecycle. The IT4IT Reference Architecture: • Provides prescriptive guidance on the specification of and interaction with a consistent service model backbone (common data model/context) • Supports real-world use-cases driven by the Digital Economy (e.g., Cloud-sourcing, Agile, DevOps, and service brokering) • Embraces and complements existing process frameworks and methodologies (e.g., ITIL®, CoBIT®, SAFe, and TOGAF®) by taking a data-focused implementation model perspective, essentially specifying an information model across the entire value chain The audience for this standard is: • IT Professionals who are responsible for delivering services in a way that is flexible, traceable, and cost-effective • IT Professionals / Practitioners who are focused on instrumenting the IT management landscape • IT Leaders who are concerned about their operating model • Enterprise Architects who are responsible for IT business transformation Topics covered include: • An introduction to the standard and the purpose of the IT4IT work • Key terminology of the standard • An introduction for executives and others introducing the IT Value Chain and IT4IT Reference Architecture concepts • IT4IT Core, which defines the structure of the IT4IT standard as well as the process and document structure used by the IT4IT standard • The Strategy to Portfolio (S2P) Value Stream • The Requirement to Deploy (R2D) Value Stream • The Request to Fulfill (R2F) Value Stream • The Detect to Correct (D2C) Value Stream • Background information on the standard.

EPUB versie: ePub 2




geen inkijk exemplaar beschikbaar



Euro 45.92


Voorraad: Direct te downloaden


Aantal  




The IT4IT™ Reference Architecture

The IT4IT™ Reference Architecture



The Open Group IT4IT™ Reference Architecture, Version 2.0, an Open Group Standard, provides a vendor-neutral, technology-agnostic, and industry-agnostic reference architecture for managing the business of IT. The Open Group IT4IT Reference Architecture standard comprises a reference architecture and a value chain-based operating model. The IT Value Chain has four value streams supported by a reference architecture to drive efficiency and agility. The four value streams are: • Strategy to Portfolio • Request to Fulfill • Requirement to Deploy • Detect to Correct Each IT Value Stream is centered on a key aspect of the service model, the essential data objects (information model), and functional components (functional model) that support it. Together, the four value streams play a vital role in helping IT control the service model as it advances through its lifecycle. The IT4IT Reference Architecture: • Provides prescriptive guidance on the specification of and interaction with a consistent service model backbone (common data model/context) • Supports real-world use-cases driven by the Digital Economy (e.g., Cloud-sourcing, Agile, DevOps, and service brokering) • Embraces and complements existing process frameworks and methodologies (e.g., ITIL®, CoBIT®, SAFe, and TOGAF®) by taking a data-focused implementation model perspective, essentially specifying an information model across the entire value chain The audience for this standard is: • IT Professionals who are responsible for delivering services in a way that is flexible, traceable, and cost-effective • IT Professionals / Practitioners who are focused on instrumenting the IT management landscape • IT Leaders who are concerned about their operating model • Enterprise Architects who are responsible for IT business transformation Topics covered include: • An introduction to the standard and the purpose of the IT4IT work • Key terminology of the standard • An introduction for executives and others introducing the IT Value Chain and IT4IT Reference Architecture concepts • IT4IT Core, which defines the structure of the IT4IT standard as well as the process and document structure used by the IT4IT standard • The Strategy to Portfolio (S2P) Value Stream • The Requirement to Deploy (R2D) Value Stream • The Request to Fulfill (R2F) Value Stream • The Detect to Correct (D2C) Value Stream • Background information on the standard.






geen inkijk exemplaar beschikbaar



Euro 45.92


Voorraad: Direct te downloaden


Aantal  




Togaf / Version 9.1

Togaf / Version 9.1




Andrew Josey

his is the official Open Group Pocket Guide for TOGAF Version 9.1 and is published in hard copy and electronic format by Van Haren Publishing on behalf of The Open Group. TOGAF®, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world's leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment.

EPUB versie: ePub 2






Euro 19.30


Voorraad: Direct te downloaden



Aantal  




TOGAF 9 certified / Study guide

TOGAF 9 certified / Study guide




Rachel Harrison

The TOGAF 9 certification program is a knowledge-based certification program. It has two levels, leading to certification for TOGAF 9 Foundation and TOGAF 9 Certified, respectively. The purpose of certification to TOGAF 9 Certified is to provide validation that, in addition to the knowledge and comprehension of TOGAF 9 Foundation level, the Candidate is able to analyze and apply this knowledge. The learning objectives at this level therefore focus on application and analysis in addition to knowledge and comprehension. This Study Guide supports students in preparation for the TOGAF 9 Part 2 Examination, leading to TOGAF 9 Certified.

EPUB versie: ePub 2






Euro 48.34


Voorraad: Direct te downloaden



Aantal  




TOGAF 9 certified study guide / deel Study guide

TOGAF 9 certified study guide / deel Study guide




Rachel Harrison

The TOGAF 9 certification program is a knowledge-based certification program. It has two levels, leading to certification for TOGAF 9 Foundation and TOGAF 9 Certified, respectively. The purpose of certification to TOGAF 9 Certified is to provide validation that, in addition to the knowledge and comprehension of TOGAF 9 Foundation level, the Candidate is able to analyze and apply this knowledge. The learning objectives at this level therefore focus on application and analysis in addition to knowledge and comprehension. This Study Guide supports students in preparation for the TOGAF 9 Part 2 Examination, leading to TOGAF 9 Certified.








Euro 48.34


Voorraad: Direct te downloaden


Aantal  




TOGAF version 9

TOGAF version 9




The Open Group

This is the Official Hardcopy publication of The Open Group Architecture Framework This Pocket Guide is based on TOGAF Version 9 Enterprise Edition. It is intended to help architects focus on the efficient and effective operations of their organization and senior managers understand the basics of TOGAF with materials derived from The Open Group's TOGAF 9 documentation and contributions from members of The Open Group Architecture Forum. Target Groups Enterprise architects, business architects, IT architects, data architects, systems architects, solutions architects, and senior managers seeking a first introduction to TOGAF A prior knowledge of enterprise architecture is not required. After reading this pocket guide, the reader can refer to the TOGAF 9 documentation available at www.opengroup.org for further information.

EPUB versie: ePub 2






Euro 19.30


Voorraad: Direct te downloaden



Aantal  




TOGAF Version 9.1

TOGAF Version 9.1



TOGAF is a framework - a detailed method and a set of supporting tools - for developing an enterprise architecture, developed by members of The Open Group Architecture Forum. TOGAF Version 9.1 is a maintenance update to TOGAF 9, addressing comments raised since the introduction of TOGAF 9 in 2009. It retains the major features and structure of TOGAF 9, thereby preserving existing investment in TOGAF, and adds further detail and clarification to what is already proven.It may be used freely by any organization wishing to develop an enterprise architecture for use within that organization (subject to the Conditions of Use).








Euro 90.75


Voorraad: Direct te downloaden


Aantal  




TOGAF Version 9.1 / deel a pocket guide

TOGAF Version 9.1 / deel a pocket guide



This is the official Open Group Pocket Guide for TOGAF Version 9.1 and is published in hard copy and electronic format by Van Haren Publishing on behalf of The Open Group. TOGAF®, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world's leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment.








Euro 19.30


Voorraad: Direct te downloaden


Aantal  




TOGAF® / 9

TOGAF® / 9



This is the Official Hardcopy publication of The Open Group Architecture Framework. TOGAF is a framework - a detailed method and a set of supporting tools - for developing an enterprise architecture, developed by members of The Open Group Architecture Forum. TOGAF Version 9 provides a wide-ranging set of revisions to the TOGAF specification to improve the value of the TOGAF framework. It is an evolution from TOGAF 8.1.1, thereby preserving existing investment in TOGAF, and adds further detail and clarification to what is already proven. It may be used freely by any organization wishing to develop an enterprise architecture for use within that organization (subject to the Conditions of Use). In this book, you will find answers to questions such as: What is an architecture framework? What kind of 'architecture' are we talking about? How does my organization benefit from using TOGAF? 

EPUB versie: ePub 2






Euro 90.75


Voorraad: Direct te downloaden



Aantal  




TOGAF® / 9 Certified

TOGAF® / 9 Certified




Rachel Harrison

This is a companion document to the TOGAF 9 Foundation Study Guide and provides an overview of every learning objective for the TOGAF 9 Certified Syllabus beyond TOGAF 9 Foundation. It is specifically designed to help individuals prepare for the TOGAF 9 Part 2 Examination or Section 2 of the TOGAF 8 9 Advanced Bridge Examination, leading to TOGAF 9 Certified. The purpose of certification to TOGAF 9 Certified is to provide validation that, in addition to the knowledge and comprehension of TOGAF 9 Foundation, the Candidate is able to analyze and apply this knowledge. The learning objectives at this level therefore focus on application and analysis in addition to knowledge and comprehension. 

EPUB versie: ePub 2






Euro 48.34


Voorraad: Direct te downloaden



Aantal  





1 2 Volgende