The paper presents the reader into the issue of ITIL ® and provides it as a basic overview of the concepts, terminology and philosophyof IT Service management. All this information is contained in 5 key ITIL ® publications on around 1400 pages. The aim therefore is a brief summary of the issue, which also serves as an introduction to the following articles (Differences Between ITIL® v2 and ITIL® v3, ITIL® and Information Security, ITIL® Tools and ITIL® Implementation).

1.
Bucksteeg
,
Martin
.
ITIL 2011. 1. vyd.
Brno
:
Computer Press
,
2012
,
216
s. ISBN 978-80-251-3732-1.
2.
ITIL continual service improvement [online]
. 2nd ed.
London
:
TSO
,
2011
,
xi
,
246
s. [cit. 2013-07-22].
Best Management Practice
. ISBN 978-0-11-331308-2. Dostupné z: http://www.best-management-practice.com
3.
ITIL service transition [online]
. 2nd ed.
London
:
TSO
,
2011
,
xii
,
347
s. [cit. 2013-07-22].
Best Management Practice
. ISBN 978-0-11-331306-8. Dostupné z: http://www.best-management-practice.com
4.
ITIL service design [online]
. 2nd ed.
London
:
TSO
,
2011
,
xi
,
442
s. [cit. 2013-07-22].
Best Management Practice
. ISBN 978-0-11-331305-1. Dostupné z: http://www.best-management-practice.com
5.
ITIL service operation [online]
. 2nd ed.
London
:
TSO
,
2011
,
xi
,
370
s. [cit. 2013-07-22].
Best Management Practice
. ISBN 978-0-11-331307-5. Dostupné z: http://www.best-management-practice.com
6.
ITIL: service strategy [online]
.
London
:
Stationery Office
,
2011
,
xii
,
264
s. [cit. 2013-07-22]. ISBN 978-011-3310-456. Dostupné z: http://www.best-management-practice.com/
7.
ISO/IEC 20000
.
Information technology – Service management
.
Geneva, Switzerland
:
International Organization for Standardization
,
2011
.
8.
ISO/IEC 27000
.
Information technology – Security techniques
.
Geneva, Switzerland
:
International Organization for Standardization
,
2011
.
9.
Jašek
,
Roman
,
Szmit
,
Anna
,
Szmit
,
Maciej
. Usage of Modern Exponential-Smoothing Models in Network Traffic Modelling.
In Nostradamus 2013: Prediction, Modeling and Analysis of Complex Systems
.
Heidelberg
:
Springer-Verlag Berlin
,
2013
, s.
435
444
.
ISSN 2194-5357
. ISBN 978-3-319-00541-6.
10.
Jašek
,
Roman
,
Szmit
,
Anna
,
Szmit
,
Maciej
. Usage of Modern Exponential-Smoothing Models in Network Traffic Modelling.
In Nostradamus 2013: Prediction, Modeling and Analysis of Complex Systems
.
Heidelberg
:
Springer-Verlag Berlin
,
2013
, s.
435
444
.
ISSN 2194-5357
. ISBN 978-3-319-00541-6.
11.
Jašek
,
Roman
,
Kolařík
,
Martin
,
Výmola
,
Tomáš
. APT Detection System Using Honeypots. In
Proceedings of the 14th WSEAS International Conference on Automation & Information (ICAI ’13)
.
Montreux
:
WSEAS Press
,
2013
, s.
25
29
.
ISSN 1790-5117
. ISBN 978-960-474-316-2.
12.
Krbeček
,
Michal
,
Schauer
,
František
,
Jašek
,
Roman
.
Security aspects of remote e-laboratories
.
International Journal of Online Engineering
,
2013
, roč.
9
, č.
3
, s.
34
39
.
ISSN 1868-1646
.
13.
Vala
,
Radek
;
Malaník
,
David
;
Jašek
,
Roman
. Usability of software intrusion-detection system in web applications. In
International Joint Conference CISIS ´12-ICEUTE ´12-SOCO ´12
.
Heidelberg
:
Springer-Verlag Berlin
,
2013
, s.
159
166
.
ISSN 2194-5357
. ISBN 978-3-642-33017-9.
14.
Kufner
,
Vladimír.
ITIL V3: Změny v klíčovýchpublikacích
.
DSM – data security management
.
2012
, č.
2
, s.
7
.
This content is only available via PDF.
You do not currently have access to this content.