Open Source For The Enterprise


Download Open Source For The Enterprise PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Open Source For The Enterprise book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Open Source for the Enterprise


Open Source for the Enterprise

Author: Dan Woods

language: en

Publisher: "O'Reilly Media, Inc."

Release Date: 2005-07-27


DOWNLOAD





This book provides something far more valuable than either the cheerleading or the fear-mongering one hears about open source. The authors are Dan Woods, former CTO of TheStreet.com and a consultant and author of several books about IT, and Gautam Guliani, Director of Software Architecture at Kaplan Test Prep & Admissions. Each has used open source software for some 15 years at IT departments large and small. They have collected the wisdom of a host of experts from IT departments, open source communities, and software companies. Open Source for the Enterprise provides a top to bottom view not only of the technology, but of the skills required to manage it and the organizational issues that must be addressed.

Open Source Strategies for the Enterprise


Open Source Strategies for the Enterprise

Author: Simon Phipps

language: en

Publisher: "O'Reilly Media, Inc."

Release Date: 2012-07-12


DOWNLOAD





So you're thinking of creating an open source community around your code? Here are some things you ought to know before you make your plans too firm. Community Types: There is no single "open source community." Rather, there are many groups of people gathered around many free software commons. Those gatherings are themselves of several different types; you really need to understand those differences. Payment at the Point of Value: Open source is of course free software. But the freedom you're finding brings you value varies depending on the role you play with respect to the software. "Free" doesn't mean the same to everyone. Open Core Is Bad For You: The "open core" business model is popular with VC-funded startup companies but does not deliver the core freedoms from which lasting business value for customers is derived. Transparency and Privacy: The key success factor in an open source community is the equality of all the participants. A strong community is characterized by high levels of transparency about the project coupled with strong respect for the privacy of the participants. Read why you should not impose your business model on anyone.

Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II


Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II

Author: Anand Handa

language: en

Publisher: CRC Press

Release Date: 2023-07-27


DOWNLOAD





Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.