전남대학교 중앙도서관

  • 중앙도서관
  • 여수캠퍼스도서관
  • 법학도서관
  • 치의학도서관
  • 의학도서관

주메뉴

전체메뉴


  • 홈
  • 상세정보

상세정보

상세정보

부가기능

Working with Legacy Systems [electronic resource] : a Practical Guide to Looking after and Maintaining the Systems We Inherit

상세 프로파일

상세정보
자료유형e-Book
서명/저자사항Working with Legacy Systems [electronic resource]: a Practical Guide to Looking after and Maintaining the Systems We Inherit.
개인저자Annett, Robert. 
발행사항Birmingham: Packt Publishing, Limited, 2019.
형태사항1 online resource (152 pages).
기타형태 저록Print version: Annett, Robert. Working with Legacy Systems : A Practical Guide to Looking after and Maintaining the Systems We Inherit. Birmingham : Packt Publishing, Limited, 짤2019 9781838982560
ISBN1838988572
9781838988579
내용주기Cover; FM; Table of Contents; Preface; Chapter 1: Definition, Issues, and Strategy; What is Legacy?; An IT-Centric View of the World; Systems Development in Context; Systems Development Scaled with Time; Examples of Real Legacy Systems; Common Issues; No Documentation; Lost Knowledge; Hidden Knowledge; Unused Functionality; No Coherent Design/Inconsistent Implementation; Fragility (versus Stability); Tight Coupling; Loose Coupling; Zombie Technologies; Licensing; Regulation; Politics; Organization Constraints and Change are Reflected in the System
External Processes Have Evolved to Fit around the SystemExternal Systems Have Evolved to Fit around the System; Decaying Data; Now What?; Reasons to be Cheerful; A Legacy System is a Successful System; You Have Real Users You Can Talk To; You Can Learn a Lot about the Business; You Can Have a Large Impact Quickly; It's Important, But Not Trendy, So You'll Get Paid Well!; Strategies; Ignore It; What is it?; Investigation; Maintenance; Upgrade; Migration; Incremental Improvements; Replacement; A Special Note on Decommissioning; Conclusion; Chapter 2: Investigation and System Review
Architectural Description and ReviewStakeholders; Locate the stakeholders; End Users; Support Staff; System's Infrastructure Staff; Audit and Compliance; Budget Holders; Third-Party Suppliers; Developers/Software Engineers/Database Analysts; Document the Stakeholders; Architectural Sketches; Why Sketch?; Context Diagram; Container Diagram; Component Diagram; C4 -- Classes; Further Analysis; What Else Can Be Done?; Further Static Analysis; Further Dynamic Analysis; Security Considerations; Passwords; Account Maintenance and Life cycle; Cryptographic Keys; Certificates
Third-Party Passwords and KeysLack of Patching; Moving from Closed to Open Networks; Modernizing Data Formats; New Development and Copied Data; Server and Infrastructure Consolidation; Improved Backup Processes; Checklist of Questions and Actions; Chapter 3: Making Changes; Safely Making Changes; Virtualization Is Your Friend; 50,000-Foot View of the Virtualization Process; Actions to Make a System Safe to Change; Preparation Issues; External Dependencies Required for Testing; Duplicate Test System Data Becomes Stale Quickly; Internal Coupling Stops You Swapping Components
Changes Cause Unexpected ErrorsLicensing and Regulation Issues Running Multiple Copies; Structural Changes for Disaster Recovery/High Availability; Stabilization; Why Stability?; What Have We Achieved Already?; Bad Data; Removing Unwanted Data; Data Cleansing; Removing Unneeded Components; Removing Unneeded Tasks; Process Cleansing; Removing Unused User Options; Don't Underestimate a Resource Boost; Re-Examine your Application Settings; Optimize the Users' Actions; Leaving a Good Legacy; Why Bother Leaving a Good Legacy?; Documentation; Tests; Design Considerations; Appendix A: Example Legacy Scenario.
요약The IT industry is obsessed with new technologies. Courses, books, and magazines mostly focus on what is new. Starting with what a legacy system looks like to applying various techniques for maintaining and securing these systems, this book gives you all the knowledge you need to maintain a legacy system.
일반주제명Software reengineering.
Software maintenance --Management.
Computer architecture.
Computer architecture.
Software maintenance --Management.
Software reengineering.
분류기호(DDC)005.16
언어영어
바로가기URL
QR Code

소장정보

  • 소장정보

보존/밀집/기증 자료 신청 보존/밀집/기증 자료 신청 분관대출 분관대출 서가부재도서 서가부재도서 무인예약대출 이미지 무인예약대출 배달서비스 배달서비스 소장위치출력 소장위치출력

메세지가 없습니다
No. 등록번호 청구기호 소장처 밀집번호 도서상태 반납예정일 예약 서비스 매체정보
1 E190910 EB 005.16 중앙도서관[본관]/E-Book/ 대출가능 무인예약대출 이미지
true|true|true|true |true|true |
 

서평

  • 서평

태그

  • 태그

나의 태그

나의 태그 (0)

모든 이용자 태그

모든 이용자 태그 (0) 태그 목록형 보기 태그 구름형 보기
 
메세지가 없습니다

QUICK LINK

  • 희망도서신청
  • 대출/연장조회
  • 서가부재도서
  • 이용교육

마이메뉴추가


QRCode
  • 개인정보호정책
  • 이메일무단수집거부
  • 도서관이용문의

  • 도서관자치위원회  원격제어  Instagram  facebook  w  kakao 플친
500-757 광주광역시 북구 용봉로 77   TEL  062)530-3571~2(대출반납실)   FAX  062)530-3529
  • 17817
  • 129791636