Capturing the Organization Organism: An Outside-In Approach to Enterprise Architecture

Technics Publications
Free sample

This book will demystify Enterprise Architecture (EA), demonstrate its usefulness, and empower you to make EA an integral part of your organization’s business management and forward planning.

An organization is like a living organism. The architecture of an organism’s internal structures must allow that organism to thrive within the environment in which it is operating. These “internal structures” within an organism might be organs or tissues; in an organization, though, they are the “information systems”.

As an organism’s environment changes, its internal systems and structures must adapt. We will use this analogy as a starting point to discuss the “why” and “what” questions of enterprise architecture for information systems in organizations. To begin this process, we must switch from the traditional EA approach of looking only at internal factors, to a new, holistic view that considers the external environment. In other words, while most EA discussions are “inside-out,” in this book, we will attempt to go “outside-in.”

Capturing the Organization Organism

Outlines a structure for organizations which is common to all organizations, regardless of the enterprise that they are involved with. Uses data subject areas from one part of enterprise architecture, the enterprise data model artifact, to describe what is internal and what is external to the organization. Provides connections between what is external and what is internal. This means describing how change is transmitted from external to internal environments, and how that change affects the architecture. Defines the enterprise architecture of business functions and business application systems that, at a broad level, are common to all organizations. Explores how common business application systems for organizations need to be different due to the different business environments in which they operate. Explains the integration requirements across an organization’s business application systems, and how to address these requirements with a disparate COTS-based portfolio, while also exploring the Artificial Intelligence (AI) possibilities of an integrated environment. Reveals six key questions to help get started in understanding the organization and its operating environment.
Read more
Collapse

About the author

 Having started his career in industrial relations in the Australian shipping industry, John eventually grew frustrated listening to “people problems.” He decided to switch to programming computers, where the problems were solvable (at least, until SQL Cartesian products came along). From there, John never refused a new challenge, venturing into data analysis and data management, then enterprise architecture, onto project management, and finally senior consulting. His consulting work landed him in various roles and organizations, mainly telecoms companies, in many different countries. On one such gig in the mid 1990’s during a serious discussion (lubricated with beer), a question was asked that John felt compelled to answer. There were some things outside organizations that drove changes to their enterprise architectures – but what were these and what were the links? John’s search for the answer to this question led him to even more unique experiences in different places, and finally to the writing of this book. 

Read more
Collapse
Loading...

Additional Information

Publisher
Technics Publications
Read more
Collapse
Published on
Oct 20, 2018
Read more
Collapse
Pages
198
Read more
Collapse
ISBN
9781634624152
Read more
Collapse
Read more
Collapse
Read more
Collapse
Language
English
Read more
Collapse
Genres
Computers / Enterprise Applications / General
Computers / Management Information Systems
Computers / Systems Architecture / General
Read more
Collapse
Content Protection
This content is DRM protected.
Read more
Collapse
Read Aloud
Available on Android devices
Read more
Collapse

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.

Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.

This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.

Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.
©2019 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.