EPT Publications

Efficient Systems Management has made its way into the mainstream and it wasn’t always the case. Having worked with technology companies during my 40 years in the industry gives me a unique perspective. That perspective appreciates a solution capable of satisfying the most demanding technology stacks. EPT published books address many real world problems facing technology businesses of all sizes.

Those who have implemented Oracle Enterprise Manager Cloud Control (OEMCC) have done so with a purpose. So how about the unused functionality and how has it been a benefit for others who have? This book documents OEMCC functionality tab by tab, and provides insight as to how the functionality was implemented and in many cases, why. Each tab is discussed and for those already using the product, this EPT published book delivers alternate solutions for many of the same problems.

Covered in this book are decisions for how OEMCC can be installed, screenshots of an actual installation, problem avoidance, high availability, implementation, and a real world example of a hardware failure (disk failure) in the OMS server and recovery. This failure and recovery allowed me to continue using OEMCC without performing a complete system recovery or reinstall. The specific recovery method was tested inside and outside my lab and would leave you with a fully supported system.

EPT Published Books

Click below get your copy today from our store !!!

Secured Systems By Design

Technology systems are threatened by inside and outside actors. Secured systems by design, allow administrators to sleep comfortably at night. Online retailing has displaced in-store shopping as the method of choice for consumer goods. Computer security, also called cybersecurity, is the protection of computer systems from harm, theft, and unauthorized access. Computer hardware is protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms.

Some of the most common risks to the security of a computer include malware infections and phishing attacks. The most egregious attacks were made possible by weak passwords, unpatched software vulnerabilities, and social engineering. Some major risks include data breaches, insider threats, and denial-of-service attacks. By far, the target of hackers is the companies private data.

The book presents the industry's best practices for securing the complete technology stack. The tech stack is divided into pillars and their unique security requirements. Coordinating activities between actors for each pillar is challenging and the book highlights actual experiences performed by the staff responsible for those pillars. The commonality is to provide a system hardened against attacks auditors cannot complain about.

Building Secured Systems By Design

Writing this book was an eye-opening experience. What became obvious is this topic could have been broken up into multiple books. Each vendor's platform in the tech stack has its own expectations requiring admins to take specific guidance. The true value of this book is it provides a roadmap for managing IT systems. The number of pages in the book was capped at 1000 pages.

The link below takes you to a viewer where you can see what gets covered in the book. The book is complete and the real-world examples of actual hacks and their prevention methods highlight errors made by admins.. Also included in the book is a section for retrofitting existing systems. What I observed in the industry is how difficult patching online systems can be and many companies push it off. Pushing off maintenance was the reason systems have been hacked. This is covered in detail and real-live examples have been provided for dealing with his scenario. Please give the book a look, it truly has something for everyone.

.blockspare-a9d250f3-b23f-4 .blockspare-block-button{text-align:center;margin-top:30px;margin-bottom:30px;margin-left:0px;margin-right:0px}.blockspare-a9d250f3-b23f-4 .blockspare-block-button span{color:#fff;border-width:2px;font-size:16px}.blockspare-a9d250f3-b23f-4 .blockspare-block-button .blockspare-button{background-color:var(--bgcolor)}.blockspare-a9d250f3-b23f-4 .blockspare-block-button .blockspare-button:visited{background-color:var(--bgcolor)}.blockspare-a9d250f3-b23f-4 .blockspare-block-button .blockspare-button:focus{background-color:var(--bgcolor)}.blockspare-a9d250f3-b23f-4 .blockspare-block-button i{font-size:16px}.blockspare-a9d250f3-b23f-4 .blockspare-block-button a{padding-top:12px;padding-bottom:12px;padding-right:22px;padding-left:22px}@media screen and (max-width:1025px){.blockspare-a9d250f3-b23f-4 .blockspare-block-button span{font-size:14px}.blockspare-a9d250f3-b23f-4 .blockspare-block-button i{font-size:14px}}@media screen and (max-width:768px){.blockspare-a9d250f3-b23f-4 .blockspare-block-button span{font-size:14px}.blockspare-a9d250f3-b23f-4 .blockspare-block-button i{font-size:14px}}

Secured By Design

Secure By Design is a book dedicated to guiding for securing modern technology stacks. A Technology Stack" is the company infrastructure responsible for delivering services to and from computer systems. Almost daily, you hear about businesses being hacked and their critical data stolen. Sadly, many breaches are the result of relaxed or delayed business processes.

To be fair, the internet has been a blessing and a curse. The internet represents unavoidable technological advancements necessary to conduct business in a new way. Drilling into technology, it is the advent of computer-based network(s) that makes security the nightmare it has become. Before the network, computers, monitors, printers, etc. were hard-wired making it almost impossible to break into a system. Now that we have networks, companies have had to think hard and fast and develop processes and procedures to secure these systems. Computer systems consist of multiple pillars. Each pillar has it's own needs to security and to deliver on its purpose. Internet-facing systems suffer from the need to always be available. Pre-internet, systems could be taken down at scheduled intervals, maintained, and returned to service. Post-internet, all companies are www enabled, and the push for 100% online availability drives IT system management insane.

Value Proposition

Secure By Design walks you through and provides examples of how large companies have been hacked. The book describes how these problems could have been proactively addressed. It is not my intent to bash anyone, but the ease of how systems remained exposed was more about "look" instead of protecting the brand. Maintaining systems after exposure and resulting public humiliation is easier. Unfortunately, in many cases, the wrong person got fired after patching identified holes they were not allowed to fix. My book was written after having assisted many companies with analysis and the return of their systems to operations. This book is over 1200 pages and trust me, the contents only scratch the surface. Securing systems is an evolving process. My book does one better than getting you started securing your environment, it shows how it can be done. Available in eBook format.

.blockspare-8ecbfd99-70a7-4 .blockspare-block-button{text-align:center;margin-top:30px;margin-bottom:30px;margin-left:0px;margin-right:0px}.blockspare-8ecbfd99-70a7-4 .blockspare-block-button span{color:#fff;border-width:2px;font-size:16px}.blockspare-8ecbfd99-70a7-4 .blockspare-block-button .blockspare-button{background-color:var(--bgcolor)}.blockspare-8ecbfd99-70a7-4 .blockspare-block-button .blockspare-button:visited{background-color:var(--bgcolor)}.blockspare-8ecbfd99-70a7-4 .blockspare-block-button .blockspare-button:focus{background-color:var(--bgcolor)}.blockspare-8ecbfd99-70a7-4 .blockspare-block-button i{font-size:16px}.blockspare-8ecbfd99-70a7-4 .blockspare-block-button a{padding-top:12px;padding-bottom:12px;padding-right:22px;padding-left:22px}@media screen and (max-width:1025px){.blockspare-8ecbfd99-70a7-4 .blockspare-block-button span{font-size:14px}.blockspare-8ecbfd99-70a7-4 .blockspare-block-button i{font-size:14px}}@media screen and (max-width:768px){.blockspare-8ecbfd99-70a7-4 .blockspare-block-button span{font-size:14px}.blockspare-8ecbfd99-70a7-4 .blockspare-block-button i{font-size:14px}}

Oracle Enterprise Manager

Oracles Enterprise Manager stands alone in the enterprise management space because it does what no other products can do. Functionality delivered out of the box is second to none. The author of this book has an extensive engineering background in the aerospace/technology business. While those disciplines may not seem applicable to developing consumer products, a deep problem-solving ability translates directly into what we do. Two books have been published addressing significant problems in today's technology business.

Solutions provided have been a result of hands-on experience across a wide swath of businesses. The exposure does not age itself out as technology changes but has provided the foundation for continued forward progress. We write technical books to provide those coming behind us with insight that helps make complex tasks more manageable. Here is our recent example, a book on Oracles Enterprise Manager, Cloud Control aka OEMCC.

As hard as they try, companies implement disparate hardware and software because they have to. The challenge that brings is how do you manage them. Management includes software and hardware maintenance, and notification when there is a problem. I have personally implemented this technology at various customer sites, all of which had the same problem managing their environment. So this book has been written using lessons learned. Those lessons learned are customer-centric and all had the same requirements. This product is open-ended meaning anything it won't do out of the box can be integrated using new or existing methods.

Oracles Enterprise Manager Cloud Control Value Proposition

The genius of this product is it will manage almost ANY front-line technology today. OEMCC taps into multiple technology pillars. This product is web based so anyone with the need to know can gain secure access and share data. This book was written using current software versions so obsolescence is not on the horizon. Click visit our store at EPT publications and get your copy in softcover or eBook format today !!!!

.blockspare-9a732943-ae21-4 .blockspare-block-button{text-align:center;margin-top:30px;margin-bottom:30px;margin-left:0px;margin-right:0px}.blockspare-9a732943-ae21-4 .blockspare-block-button span{color:#fff;border-width:2px;font-size:16px}.blockspare-9a732943-ae21-4 .blockspare-block-button .blockspare-button{background-color:var(--bgcolor)}.blockspare-9a732943-ae21-4 .blockspare-block-button .blockspare-button:visited{background-color:var(--bgcolor)}.blockspare-9a732943-ae21-4 .blockspare-block-button .blockspare-button:focus{background-color:var(--bgcolor)}.blockspare-9a732943-ae21-4 .blockspare-block-button i{font-size:16px}.blockspare-9a732943-ae21-4 .blockspare-block-button a{padding-top:12px;padding-bottom:12px;padding-right:22px;padding-left:22px}@media screen and (max-width:1025px){.blockspare-9a732943-ae21-4 .blockspare-block-button span{font-size:14px}.blockspare-9a732943-ae21-4 .blockspare-block-button i{font-size:14px}}@media screen and (max-width:768px){.blockspare-9a732943-ae21-4 .blockspare-block-button span{font-size:14px}.blockspare-9a732943-ae21-4 .blockspare-block-button i{font-size:14px}}