Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200793Ii 4500 
001    990802555 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cnu|||unuuu 
008    170623s2017    ca      o     001 0 eng d 
019    992147529|a1227645656 
020    9781491917800|q(electronic bk.) 
020    1491917806|q(electronic bk.) 
029 1  GBVCP|b1004860293 
029 1  AU@|b000067099351 
035    (OCoLC)990802555|z(OCoLC)992147529|z(OCoLC)1227645656 
037    CL0500000870|bSafari Books Online 
040    N$T|beng|erda|epn|cN$T|dEBLCP|dN$T|dYDX|dUMI|dOCLCF|dMERER
       |dTOH|dOCLCQ|dCOO|dOCLCA|dUOK|dCEF|dKSU|dVT2|dOCLCQ|dWYU
       |dC6I|dUAB|dUKAHL|dCNCEN|dOCLCQ|dPBF|dOCLCQ|dHS0|dOCLCO
       |dOCLCQ|dOCLCO|dOCLCL 
049    INap 
082 04 004.068 
082 04 004.068|223 
099    eBook O'Reilly for Public Libraries 
100 1  Schnepp, Rob,|eauthor. 
245 10 Incident management for operations /|cRob Schnepp, Ron 
       Vidal, and Chris Hawley.|h[O'Reilly electronic resource] 
250    First edition. 
264  1 Sebastopol, CA :|bO'Reilly Media,|c2017. 
264  4 |c©2017 
300    1 online resource 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
500    Includes index. 
505 0  Copyright; Table of Contents; Foreword; Preface; 
       Conventions Used in This Book; O'Reilly Safari; How to 
       Contact Us; Acknowledgments; Chapter 1. Evaluating the 
       Incident Response PROCESS; Summary; Chapter 2. The 
       Incident Management System (IMS); Overview of Incident 
       Command; The Culture of Incident Response; Common 
       Terminology for Job Functions; Summary; Chapter 3. The 
       Incident Commander (IC); Resolving the Incident; 
       Communication Methods; Developing the Incident Action 
       Plan; Size Up the Incident; Triage; Act; Review; It's All 
       About TIME; Tone; Interaction; Management; Engagement; 
       Summary. 
505 8  Chapter 4. Scaling the Incident ResponseIncident Response 
       and Escalation; Span of Control; Transfer of Command; 
       Summary; Chapter 5. Unified Command (UC); UC in Action; 
       The UC Planning Wheel; Planning Wheel in Action; UC Org 
       Chart; UC Case Study; Launching UC: The Programmatic 
       Backend; Key UC Positions and Checklists; Summary; Chapter
       6. After Action Review (AAR); The Name Is Important; AAR 
       as an Integrated Effort; AAR Documentation and Data 
       Collection; Documenting an Incident: A Case Study; 
       Timeline; Case Study AAR; Training; Accountability; 
       Leadership; Empowerment; Notification; Trust. 
505 8  AAR Case Study: The New SMEIssue Identified During the 
       AAR; Change Recommendations from the AAR; Summary; Index; 
       About the Authors. 
520    Are you satisfied with the way your company responds to IT
       incidents? How prepared is your response team to handle 
       critical, time-sensitive events such as service 
       disruptions and security breaches? IT professionals 
       looking for effective response models have successfully 
       adopted the Incident Management System (IMS) used by 
       firefighters throughout the US. This practical book shows 
       you how to apply the same response methodology to your own
       IT operation. You'll learn how IMS best practices for 
       leading people and managing time apply directly to IT 
       incidents where the stakes are high and outcomes are 
       uncertain. This book provides use cases of some of the 
       largest (and smallest) IT operations teams in the world. 
       There is a better way to respond. You just found it. 
       Assess your IT incident response with the PROCESS 
       programmatic evaluation tool Get an overview of the IMS 
       all-hazard, all-risk framework Understand the 
       responsibilities of the Incident Commander Form a unified 
       command structure for events that affect multiple business
       units Systematically evaluate what broke and how the 
       incident team responded. 
588 0  Vendor-supplied metadata. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Computer system failures. 
650  0 Computer security. 
650  6 Pannes système (Informatique) 
650  6 Sécurité informatique. 
650  7 Computer security|2fast 
650  7 Computer system failures|2fast 
700 1  Vidal, Ron,|eauthor. 
700 1  Hawley, Chris,|eauthor. 
776    |z1-4919-1762-8 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781491917619/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    Askews and Holts Library Services|bASKH|nAH32922292 
938    Askews and Holts Library Services|bASKH|nAH32906483 
938    ProQuest Ebook Central|bEBLB|nEBL4882037 
938    EBSCOhost|bEBSC|n1539016 
938    YBP Library Services|bYANK|n14649581 
994    92|bJFN