积分充值
 首页
前端开发
AngularDartElectronFlutterHTML/CSSJavaScriptReactSvelteTypeScriptVue.js构建工具
后端开发
.NetC#C++C语言DenoffmpegGoIdrisJavaJuliaKotlinLeanMakefilenimNode.jsPascalPHPPythonRISC-VRubyRustSwiftUML其它语言区块链开发测试微服务敏捷开发架构设计汇编语言
数据库
Apache DorisApache HBaseCassandraClickHouseFirebirdGreenplumMongoDBMySQLPieCloudDBPostgreSQLRedisSQLSQLiteTiDBVitess数据库中间件数据库工具数据库设计
系统运维
AndroidDevOpshttpdJenkinsLinuxPrometheusTraefikZabbix存储网络与安全
云计算&大数据
Apache APISIXApache FlinkApache KarafApache KyuubiApache OzonedaprDockerHadoopHarborIstioKubernetesOpenShiftPandasrancherRocketMQServerlessService MeshVirtualBoxVMWare云原生CNCF机器学习边缘计算
综合其他
BlenderGIMPKiCadKritaWeblate产品与服务人工智能亿图数据可视化版本控制笔试面试
文库资料
前端
AngularAnt DesignBabelBootstrapChart.jsCSS3EchartsElectronHighchartsHTML/CSSHTML5JavaScriptJerryScriptJestReactSassTypeScriptVue前端工具小程序
后端
.NETApacheC/C++C#CMakeCrystalDartDenoDjangoDubboErlangFastifyFlaskGinGoGoFrameGuzzleIrisJavaJuliaLispLLVMLuaMatplotlibMicronautnimNode.jsPerlPHPPythonQtRPCRubyRustR语言ScalaShellVlangwasmYewZephirZig算法
移动端
AndroidAPP工具FlutterFramework7HarmonyHippyIoniciOSkotlinNativeObject-CPWAReactSwiftuni-appWeex
数据库
ApacheArangoDBCassandraClickHouseCouchDBCrateDBDB2DocumentDBDorisDragonflyDBEdgeDBetcdFirebirdGaussDBGraphGreenPlumHStreamDBHugeGraphimmudbIndexedDBInfluxDBIoTDBKey-ValueKitDBLevelDBM3DBMatrixOneMilvusMongoDBMySQLNavicatNebulaNewSQLNoSQLOceanBaseOpenTSDBOracleOrientDBPostgreSQLPrestoDBQuestDBRedisRocksDBSequoiaDBServerSkytableSQLSQLiteTiDBTiKVTimescaleDBYugabyteDB关系型数据库数据库数据库ORM数据库中间件数据库工具时序数据库
云计算&大数据
ActiveMQAerakiAgentAlluxioAntreaApacheApache APISIXAPISIXBFEBitBookKeeperChaosChoerodonCiliumCloudStackConsulDaprDataEaseDC/OSDockerDrillDruidElasticJobElasticSearchEnvoyErdaFlinkFluentGrafanaHadoopHarborHelmHudiInLongKafkaKnativeKongKubeCubeKubeEdgeKubeflowKubeOperatorKubernetesKubeSphereKubeVelaKumaKylinLibcloudLinkerdLonghornMeiliSearchMeshNacosNATSOKDOpenOpenEBSOpenKruiseOpenPitrixOpenSearchOpenStackOpenTracingOzonePaddlePaddlePolicyPulsarPyTorchRainbondRancherRediSearchScikit-learnServerlessShardingSphereShenYuSparkStormSupersetXuperChainZadig云原生CNCF人工智能区块链数据挖掘机器学习深度学习算法工程边缘计算
UI&美工&设计
BlenderKritaSketchUI设计
网络&系统&运维
AnsibleApacheAWKCeleryCephCI/CDCurveDevOpsGoCDHAProxyIstioJenkinsJumpServerLinuxMacNginxOpenRestyPrometheusServertraefikTrafficUnixWindowsZabbixZipkin安全防护系统内核网络运维监控
综合其它
文章资讯
 上传文档  发布文章  登录账户
IT文库
  • 综合
  • 文档
  • 文章

无数据

分类

全部系统运维(14)网络与安全(14)

语言

全部英语(14)

格式

全部DOC文档 DOC(11)PDF文档 PDF(2)PPT文档 PPT(1)
 
本次搜索耗时 0.013 秒,为您找到相关结果约 14 个.
  • 全部
  • 系统运维
  • 网络与安全
  • 全部
  • 英语
  • 全部
  • DOC文档 DOC
  • PDF文档 PDF
  • PPT文档 PPT
  • 默认排序
  • 最新排序
  • 页数排序
  • 大小排序
  • 全部时间
  • 最近一天
  • 最近一周
  • 最近一个月
  • 最近三个月
  • 最近半年
  • 最近一年
  • pdf文档 MITRE Defense Agile Acquisition Guide - Mar 2014

    information during the development process. User Story – Description of functionality a user wants, small enough to complete in a single sprint Epic – A large user story often defined for a release that spans of user stories or epics that may span multiple releases Teams often capture requirements in user stories and epics to provide a clear operational perspective of the capability’s purpose. User stories be completed. Epics are aggregations of user stories, often used to capture strategic intent. Epics may span multiple sprints and form a release, while user stories should be implemented within a single
    0 码力 | 74 页 | 3.57 MB | 5 月前
    3
  • word文档 A Seat at the Table: IT Leadership in the Age of Agility - Part 2

    time through incremental investments.  Managing the EA asset is an art, just as all strategic management is an art. Just as the CMO must sense market opportunities, weigh tactics for communicating with of buying off the shelf.  The risk of developing a system incrementally and altering it based on user feedback is often lower than that of buying a finished product that is hard to change.  The advantages product that does not fit our business and customize it until it does.  We offer our business users a user interface that is clunky because it was designed for users in the abstract across many possible companies
    0 码力 | 7 页 | 387.61 KB | 5 月前
    3
  • word文档 The DevOps Handbook

    operations will derive NFRs. Codify these into the tests and pipeline f. BUILD REUSABLE OPERATIONS USER STORIES INTO DEVELOPMENT i. Goal – make recurring work as repeatable and deterministic as possible; testing efforts – Part 6: The Technical Practices of Integrating Information Security, Change Management, and Compliance 1. Introduction a. Goal to simultaneously achieve Information Security goals Pipeline a. INTEGRATE SECURITY AND COMPLIANCE INTO CHANGE APPROVAL PROCESSES i. Effective change management recognized different risks associated with different types of changes, to be handled differently
    0 码力 | 9 页 | 25.13 KB | 5 月前
    3
  • word文档 The DevOps Handbook

    are being achieved. iii. Logging Levels 1. Debug – anything that happens in the program 2. Info – user driven actions or system specific 3. Warn – conditions that could become an error and will likely a termination iv. Examples of potentially significant events (Gartner’s GTP Security & Risk Management group) 1. Authentication/authorization decisions 2. System and data access 3. System and application INTEGRATING A/B TESTING INTO OUR FEATURE TESTING i. Random subset of users shown differing versions. User groups define a cohort. Statistical analysis of cohort’s outcomes from differing versions used to
    0 码力 | 8 页 | 24.02 KB | 5 月前
    3
  • word文档 A Seat at the Table - IT Leadership in the Age of Agility

    through hands-on “shipping” of product. Management for the sake of management is not respected.  Get things done: The hierarchy must be flattened. Layers of management get in the way of goals. The employee employee wants the shortest possible path to shipping code without needing layers of approval. Management should be close enough to the action that they can demonstrate understanding—witnessing employees’ information, IT can lead the organization in learning and in deriving business value from good risk management and from making the most of opportunities that present themselves. Steward of Assets: senior IT
    0 码力 | 7 页 | 387.48 KB | 5 月前
    3
  • ppt文档 No Silver Bullet – Essence and Accident in Software Engineering

    in Software Engineering Mike Ballou“There is no single development, in either technology or management technique, which by itself promises even one order-of- magnitude improvement within a decade abstract away its complexity often abstract away its essence • Not only technical problems but management problems as well comes from the complexity • It creates the tremendous learning and understanding I can help them I need…” • to Containerize the software, but to run that I need… • a Container Management Platform, but to network it I need… • a Service Mesh, but to secure it I need… • an automated Certificate
    0 码力 | 35 页 | 1.43 MB | 5 月前
    3
  • word文档 安全简介

     working off a single backlog of features, driven by vision and roadmap  product and release management, release planning  program psi objectives  common sprint lengths - system continuous integration  business epics  architectural epics  kanban epic system – limit WIP  program portfolio management, enterprise architect  value streams  investment themes - provide operating budgets for release
    0 码力 | 2 页 | 304.16 KB | 5 月前
    3
  • pdf文档 Agile Summit One-Pager

    dings Agile and EVMS They Can Co-exist! ( per John McGregor Deputy Director for Earned Value Management, PARCA, Office of the Assistant Secretary of Defense for Acquisition) https://www.acq.osd.mil/evm/ improving the defense acquisition process ... Agile in DHS: Bill Pratt, Director Strategic Technology Management, DHS OCTO. (linkedin.com/in/bill-pratt- 2431335)
    0 码力 | 2 页 | 347.35 KB | 5 月前
    3
  • word文档 DevOps Meetup

    Development  Operations (Operational Waterfall)  Infrastructure Ops  Product Ops  Product Management  Every technology under the sun  Solaris, Windows, Linux  Apache, IIS, TCServer, etc.  homogenization and assimilation – no snowflakes  Deployment methodologies, automation, monitoring, and management tested continuously. Steve Barr steve.barr@csgi.com @srbarr1 Overall Quality improvements, “it”
    0 码力 | 2 页 | 246.04 KB | 5 月前
    3
  • word文档 DoD CIO Enterprise DevSecOps Reference Design - Summary

    Security Stack enables: correlated and centralized logs, container security, east/west traffic management, a zero-trust model, a whitelist, Role-Based Access Control (RBAC), continuous monitoring, signature-based This can also be used to send notifications when there is anomalous behavior. 4. Vulnerability Management 5. A service mesh proxy to connect to the service mesh 6. Zero Trust down to the container
    0 码力 | 8 页 | 3.38 MB | 5 月前
    3
共 14 条
  • 1
  • 2
前往
页
相关搜索词
MITREDefenseAgileAcquisitionGuideMar2014SeatattheTableITLeadershipinAgeofAgilityPartTheDevOpsHandbookNoSilverBulletEssenceandAccidentSoftwareEngineering安全简介SummitOnePagerMeetupDoDCIOEnterpriseDevSecOpsReferenceDesignSummary
IT文库
关于我们 文库协议 联系我们 意见反馈 免责声明
本站文档数据由用户上传或本站整理自互联网,不以营利为目的,供所有人免费下载和学习使用。如侵犯您的权益,请联系我们进行删除。
IT文库 ©1024 - 2025 | 站点地图
Powered By MOREDOC AI v3.3.0-beta.70
  • 关注我们的公众号【刻舟求荐】,给您不一样的精彩
    关注我们的公众号【刻舟求荐】,给您不一样的精彩