did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780132213073

Policy Technologies for Self-Managing Systems

by ; ; ; ;
  • ISBN13:

    9780132213073

  • ISBN10:

    0132213079

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2009-01-01
  • Publisher: IBM Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $64.99
We're Sorry.
No Options Available at This Time.

Summary

IT policies can be used to guide and automate decision making in the management of computer and network infrastructure, helping IT organizations reduce costs, improve service quality, and enhance business agility. Now, a team of top IBM researchers introduces the latest innovations in policies and autonomic computing and demonstrates how to put them to work in your organization.

Author Biography

Dakshi Agrawal and Kang-Won Lee, research staff members at IBM T. J. Watson Research Center's Policy Networking Department, co-developed the Policy Management Toolkit for IBM Autonomic Computing and applied it to configuration management of storage area networks Seraphin Calo currently manages the Policy Technologies group at IBM Research Jorge Lobo joined IBM T. J. Watson Research Center in 2004 after serving as principal architect at Teltier Technologies (now Cisco) Dinesh Verma manages the Networking Technologies group at IBM T.J. Watson Research Center. His books include Policy Based Networking and Supporting Service Level Agreements on IP Networks

Table of Contents

Forewordp. xi
Prefacep. xiii
Policy Definition and Usage Scenariosp. 1
Formal Definition of Policyp. 2
Types, Nature, and Usage of Policiesp. 6
Policy-Based Self-Configurationp. 10
Policy-Based Self-Protection in Computer Networksp. 13
Policy-Based Self-Optimization in Computer Systemsp. 15
Policy-Based Self-Healingp. 16
Building a Policy-Based Management Systemp. 17
Summaryp. 20
Policy Lifecycle-Creation, Distribution, and Enforcementp. 21
A Holistic View of the Policy Lifecyclep. 22
Instances of Policy-Based Systemsp. 25
Network QoS Controlp. 25
Privacy Policy Publicationp. 27
Policy-Based Management of Enterprise Network Accessp. 28
Policy Creationp. 30
Policy Distributionp. 31
Policy Distribution Using Repositoriesp. 35
Grouping of Policies by System Components Rolep. 36
Grouping of Policy Componentsp. 37
Policy Creation and Distribution for Multiple Administrative Domainsp. 38
Policy Enforcementp. 41
Policy Evaluation Triggerp. 42
Policy Enforcement Contextp. 44
Data Gatheringp. 45
Policy Evaluationp. 46
Decision Executionp. 49
Summaryp. 50
Policy Information Modelp. 51
How Is an Information Model Described?p. 52
Policy Information Modelsp. 54
Why Use Information Modelsp. 55
Condition-Action Information Modelp. 56
Event-Condition-Action Information Modelp. 59
Mode-Subject-Action-Target Information Modelp. 59
Grouping, Scope, and Prioritiesp. 60
A Standardized Policy Modelp. 62
The Common Information Model (CIM)p. 62
The CIM Policy Modelp. 63
Summaryp. 69
Policy Languagesp. 71
Declarative Nature of Policy Languagesp. 72
Survey of Policy Languagesp. 73
PDLp. 73
Ponderp. 76
CQLp. 79
XACMLp. 81
ACPLp. 81
CIM-SPLp. 82
CIM-SPL Policy Rulesp. 82
Policy Groupsp. 87
An Example of CIM-SPL Policyp. 89
Summaryp. 91
Policy Transformation and Analysisp. 93
Policy Transformationp. 94
Design-Time Techniques for Policy Transformationp. 95
Transformation Using Analytical Modelsp. 96
Transformation Using Static Rulesp. 96
Transformation by Policy Table Lookupp. 97
Transformation Using Case-Based Reasoningp. 99
Real-Time Policy Transformationp. 104
Policy Analysisp. 106
Conflict Checkingp. 106
Conflict Resolutionp. 109
Coverage Checkingp. 111
What-If Analysisp. 112
Related Workp. 113
Summaryp. 114
Policy-Based Configuration Managementp. 115
Configuration Management Overviewp. 116
Policy-Based Configuration Managementp. 118
Policy-Based Simplification of Configuration Managementp. 118
Policy-Based Tuning of System Configurationp. 119
Policy-Based Checking of System Configurationp. 120
Example in Storage Area Networksp. 121
Configuration Checking of Storage Area Networksp. 122
Policy Modeling and Representationp. 125
Architecture of a Policy-Based SAN Configuration Checkerp. 128
Example in Hosted Server Environmentp. 131
Architecture for Self-Configurationp. 133
Variations on the Architecturep. 136
Summaryp. 137
Policy-Based Fault Managementp. 139
Fault Management Overviewp. 139
Fault Management in Networksp. 141
Fault Management in Web-Based Applicationsp. 144
Policy-Based Fault Managementp. 145
Policy-Based Acquisition of Fault Informationp. 146
Policy-Based Format Conversionp. 147
Policy-Based Event Volume Reductionp. 149
Policy-Based Root Cause Analysisp. 150
Policy-Based Remedial Actionp. 151
Architecture of a Policy-Based Fault Management Systemp. 153
Summaryp. 156
Policy-Based Security Managementp. 157
Overview of Security Managementp. 158
Policy Applications in Securityp. 159
Policy-Driven Access Controlp. 160
Higher-Level Access Policiesp. 163
Policy-Based Self-Protectionp. 164
Policy-Based Communication Assurancep. 168
Policy-Based Security Assurance for IPsec Protocolp. 168
Business Needs Satisfied by the Security Assurance Toolp. 169
Communication Control Policies for IPsec Protocolp. 170
Generating the Communication Control Policiesp. 172
Summaryp. 173
Related Topicsp. 175
Production Rulesp. 175
Business Rules and Processesp. 177
IT Processesp. 179
Event Correlation and Notification Systemsp. 180
Service Level Agreementsp. 183
Regulatory Compliancep. 185
Proliferation of Policy-Based Technologiesp. 186
Referencesp. 189
Indexp. 195
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program