Vi bøger
Levering: 1 - 2 hverdage
Filter
Filter
Sorter efterSorter Populære
  • - Best Practices for Securing Infrastructure
    af Lee Brotherston & Amanda Berlin
    397,95 - 572,95 kr.

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations dont have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring

  • af Peter H. Gregory
    443,95 kr.

    Provides 100% coverage of every objective on the 2022 CISM examThis integrated self-study guide enables you to take the 2022 version of the challenging CISM exam with complete confidence. Written by an expert in the field, the book offers exam-focused coverage of information security governance, information risk management, information security program development and management, and information security incident management.CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition features learning objectives, exam tips, practice questions, and in-depth explanations. All questions closely match those on the live test in tone, format, and content. Special design elements throughout provide real-world insight and call out potentially harmful situations. Beyond fully preparing you for the exam, the book also serves as a valuable on-the-job reference.Features complete coverage of all 2022 CISM exam domainsOnline content includes 300 practice questions in the customizable TotalTester(TM) exam engineWritten by a cybersecurity expert, author, and lecturer

  • af Mark Simos
    597,95 kr.

    Enhance your cybersecurity and agility with this thorough playbook, featuring actionable guidance, insights, and success criteria from industry expertsKey FeaturesGet simple, clear, and practical advice for everyone from CEOs to security operationsOrganize your Zero Trust journey into role-by-role execution stagesIntegrate real-world implementation experience with global Zero Trust standardsPurchase of the print or Kindle book includes a free eBook in the PDF formatBook DescriptionZero Trust is cybersecurity for the digital era and cloud computing, protecting business assets anywhere on any network. By going beyond traditional network perimeter approaches to security, Zero Trust helps you keep up with ever-evolving threats.The playbook series provides simple, clear, and actionable guidance that fully answers your questions on Zero Trust using current threats, real-world implementation experiences, and open global standards.The Zero Trust playbook series guides you with specific role-by-role actionable information for planning, executing, and operating Zero Trust from the boardroom to technical reality.This first book in the series helps you understand what Zero Trust is, why it's important for you, and what success looks like. You'll learn about the driving forces behind Zero Trust - security threats, digital and cloud transformations, business disruptions, business resilience, agility, and adaptability. The six-stage playbook process and real-world examples will guide you through cultural, technical, and other critical elements for success.By the end of this book, you'll have understood how to start and run your Zero Trust journey with clarity and confidence using this one-of-a-kind series that answers the why, what, and how of Zero Trust!What you will learnFind out what Zero Trust is and what it means to youUncover how Zero Trust helps with ransomware, breaches, and other attacksUnderstand which business assets to secure firstUse a standards-based approach for Zero TrustSee how Zero Trust links business, security, risk, and technologyUse the six-stage process to guide your Zero Trust journeyTransform roles and secure operations with Zero TrustDiscover how the playbook guides each role to successWho this book is forWhether you're a business leader, security practitioner, or technology executive, this comprehensive guide to Zero Trust has something for you. This book provides practical guidance for implementing and managing a Zero Trust strategy and its impact on every role (including yours!). This is the go-to guide for everyone including board members, CEOs, CIOs, CISOs, architects, engineers, IT admins, security analysts, program managers, product owners, developers, and managers. Don't miss out on this essential resource for securing your organization against cyber threats.Table of ContentsZero Trust - This Is the WayReading the Zero Trust Playbook SeriesZero Trust is Security for Today's WorldStandard Zero Trust CapabilitiesArtificial Intelligence (AI) and Zero TrustHow to Scope, Size, and Start Zero TrustWhat Zero Trust Success Looks LikeAdoption with the Three-Pillar ModelThe Zero Trust Six-Stage PlanZero Trust Playbook Roles

  • af Katharine Jarmul
    523,95 kr.

    Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differential privacy, federated learning, and encrypted computation. Based on hard-won lessons, this book provides solid advice and best practices for integrating breakthrough privacy-enhancing technologies into production systems. Practical Data Privacy answers important questions such as: What do privacy regulations like GDPR and CCPA mean for my data workflows and data science use cases? What does "anonymized data" really mean? How do I actually anonymize data? How does federated learning and analysis work? Homomorphic encryption sounds great, but is it ready for use? How do I compare and choose the best privacy-preserving technologies and methods? Are there open-source libraries that can help? How do I ensure that my data science projects are secure by default and private by design? How do I work with governance and infosec teams to implement internal policies appropriately?

  • - Visual Presentation for the Web
    af Eric A. Meyer & Estelle Weyl
    712,95 kr.

    If youre a web designer or app developer interested in sophisticated page styling, improved accessibility, and saving time and effort, this book is for you. This revised edition provides a comprehensive guide to CSS implementation, along with a thorough review of the latest CSS specifications.CSS is a constantly evolving language for describing the presentation of web content on screen, printers, speech synthesizers, screen readers, and chat windows. It is used by all browsers on all screen sizes on all types of IoT devices, including phones, computers, video games, televisions, watches, kiosks, and auto consoles. Authors Eric Meyer and Estelle Weyl show you how to improve user experience, speed development, avoid potential bugs, and add life and depth to your applications through layout, transitions and animations, borders, backgrounds, text properties, and many other tools and techniques.This guide covers:Selectors, specificity, and the cascadeValues, units, fonts, and text propertiesPadding, borders, outlines, and marginsColors, backgrounds, and gradientsFloats and positioning tricksFlexible box layoutThe new Grid layout system2D and 3D transforms, transitions, and animationFilters, blending, clipping, and maskingMedia and feature queries

  • af Rod Stephens
    419,95 kr.

    A concise introduction to database design concepts, methods, and techniques in and out of the cloudIn the newly revised second edition of Beginning Database Design Solutions: Understanding and Implementing Database Design Concepts for the Cloud and Beyond, Second Edition, award-winning programming instructor and mathematician Rod Stephens delivers an easy-to-understand guide to designing and implementing databases both in and out of the cloud. Without assuming any prior database design knowledge, the author walks you through the steps you'll need to take to understand, analyze, design, and build databases.In the book, you'll find clear coverage of foundational database concepts along with hands-on examples that help you practice important techniques so you can apply them to your own database designs, as well as:* Downloadable source code that illustrates the concepts discussed in the book* Best practices for reliable, platform-agnostic database design* Strategies for digital transformation driven by universally accessible database designAn essential resource for database administrators, data management specialists, and database developers seeking expertise in relational, NoSQL, and hybrid database design both in and out of the cloud, Beginning Database Design Solutions is a hands-on guide ideal for students and practicing professionals alike.

  • af Alexander Loth
    225,95 kr.

  • - Powerful tools and techniques for collaborative software development
    af Jon Loeliger & Matthew McCullough
    523,95 kr.

    Get up to speed on Git for tracking, branching, merging, and managing code revisions. Through a series of step-by-step tutorials, this practical guide takes you quickly from Git fundamentals to advanced techniques, and provides friendly yet rigorous advice for navigating the many functions of this open source version control system.This thoroughly revised edition also includes tips for manipulating trees, extended coverage of the reflog and stash, and a complete introduction to the GitHub repository. Git lets you manage code development in a virtually endless variety of ways, once you understand how to harness the systems flexibility. This book shows you how.Learn how to use Git for several real-world development scenariosGain insight into Gits common-use cases, initial tasks, and basic functionsUse the system for both centralized and distributed version controlLearn how to manage merges, conflicts, patches, and diffsApply advanced techniques such as rebasing, hooks, and ways to handle submodulesInteract with Subversion (SVN) repositoriesincluding SVN to Git conversionsNavigate, use, and contribute to open source projects though GitHub

  • af Dan Sullivan
    327,95 kr.

    Quickly and efficiently prepare for the Google Associate Cloud Engineer certification with the proven Sybex methodIn the newly updated Second Edition of Google Cloud Certified Associate Cloud Engineer Study Guide, expert engineer and tech educator Dan Sullivan delivers an essential handbook for anyone preparing for the challenging Associate Cloud Engineer exam offered by Google and for those seeking to upgrade their Google Cloud engineering skillset.The book provides readers with coverage of every domain and competency tested by the Associate Cloud Engineer exam, including how to select the right Google compute service from the wide variety of choices, how to choose the best storage option for your services, and how to implement appropriate security controls and network functionality.This guide also offers:* A strong emphasis on transforming readers into competent, job-ready applicants, with a focus on building skills in high demand by contemporary employers* Concrete test-taking strategies, techniques, and tips to help readers conquer exam anxiety* Complimentary access to a comprehensive online learning environment, complete with practice testsA must-have resource for practicing and aspiring Google Cloud engineers, Google Cloud Certified Associate Cloud Engineer Study Guide allows you to prepare for this challenging certification efficiently and completely.

  • af Ashish Agrawal
    377,95 kr.

    Prepare for Microsoft Exam AZ-305 and help demonstrate your real-world expertise in designing cloud and hybrid solutions that run on Microsoft Azure, including identity, governance, monitoring, data storage, business continuity, and infrastructure. Designed for modern IT professionals, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Expert level.Focus on the expertise measured by these objectives:Design identity, governance, and monitoring solutionsDesign data storage solutionsDesign business continuity solutionsDesign infrastructure solutionsThis Microsoft Exam Ref:Organizes its coverage by exam objectivesFeatures strategic, what-if scenarios to challenge youAssumes you have advanced experience and knowledge of IT operations, as well as experience in Azure administration, Azure development, and DevOps processesAbout the ExamExam AZ-305 focuses on knowledge needed to design logging, monitoring, authentication, and authorization solutions; design governance, identities, and application access; design relational and non-relational data storage solutions; design data integration; recommend data storage solutions; design backup and disaster recovery solutions; design for high availability; design compute and network solutions, application architecture, and migration.About Microsoft CertificationIf you hold Microsoft Certified: Azure Administrator Associate certification, passing this exam fulfills your requirements for the Microsoft Certified: Azure Solutions Architect Expert credential. Passing this exam demonstrates your expert-level skills in advising stakeholders and translating business requirements into designs for secure, scalable, and reliable Azure solutions; and in partnering with others to implement these solutions.See full details at: microsoft.com/learn

  • - Design Patterns for Great Software
    af Elecia White
    354,95 - 442,95 kr.

    Interested in developing embedded systems? Since they dont tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate a host of good development practices, based on classic software design patterns and new patterns unique to embedded programming. Learn how to build system architecture for processors, not operating systems, and discover specific techniques for dealing with hardware difficulties and manufacturing requirements.Written by an expert whos created embedded systems ranging from urban surveillance and DNA scanners to childrens toys, this book is ideal for intermediate and experienced programmers, no matter what platform you use.Optimize your system to reduce cost and increase performanceDevelop an architecture that makes your software robust in resource-constrained environmentsExplore sensors, motors, and other I/O devicesDo more with less: reduce RAM consumption, code space, processor cycles, and power consumptionLearn how to update embedded code directly in the processorDiscover how to implement complex mathematics on small processorsUnderstand what interviewers look for when you apply for an embedded systems job"e;Making Embedded Systems is the book for a C programmer who wants to enter the fun (and lucrative) world of embedded systems. Its very well writtenentertaining, evenand filled with clear illustrations."e;Jack Ganssle, author and embedded system expert.

  • - Introduktion til en teknologi, der kan ændre verden
    af Sebastian Merz
    57,95 - 135,95 kr.

    Bloker kæde, mest kendt som rygraden teknologien bag Bitcoin, er en af de hotteste og mest spændende teknologier i øjeblikket på markedet, men hvad er det - og kan det på en måde hjælpe dig? Kort sagt, Blok Chain er den digitale ækvivalent af en bankmand hovedbog, en, journaler og sikrer transaktioner mellem to parter. Indstil til cyberspace, denne form for programmering tillader overførsel af ikke blot data, men af værdi - hvilket gør det til et unikt og grundlæggende byggesten i vores spirende fremtid. "Bloker kæde teknologi" blev oprindeligt udviklet i 2009 for at gøre det muligt for enkeltpersoner og organisationer til at behandle transaktioner uden behov for en centralbank eller en anden mellemmand, ved hjælp af komplekse algoritmer og enighed om at verificere transaktioner. Nu er det blevet vedtaget og ændret af virksomheder og nystartede virksomheder verden over, og er ved at blive nøje gransket af verden Banker som det næste logiske skridt i digital finansiering. Denne bog forklarer Block Kæde i sin helhed; dets historie, anvendelser, potentiale, ulemper og endda sin fremtid. Forståelse denne værdifulde, åbne system er afgørende for at skabe den økonomiske frihed du tørster. Digital valuta er ikke længere en ønskedrøm af kælderen gamer, dens virkelige, er det her, og du har brug for at forstå, hvordan det bevæger sig og er sikret med henblik på at planlægge en fremtid, der vil se en revolution i vores nuværende banksystem.

  • af Pawan Kumar Goel
    2.076,95 - 3.312,95 kr.

    Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike.

  • af Gaurav Mahajan
    426,95 kr.

    Unlock over 100 recipes for mastering Microsoft 365. Boost productivity with Copilot, collaborate with SharePoint and Teams, automate tasks, create apps and reports using Power Automate (with RPA), Power Apps, Power BI, and more.Print or Kindle book purchase includes a free PDF eBook.Key FeaturesEnhance collaboration and productivity using SharePoint, Teams, OneDrive, Viva, Planner, and Microsoft FormsAutomate processes, build apps, bots, and dashboards with Power Automate (with RPA), Power Apps, Copilot Studio, and Power BIHarness Copilot, the new AI virtual assistant, for seamless support in your everyday tasksBook DescriptionMicrosoft 365 offers tools for content management, communication, process automation, and report creation. Microsoft 365 and SharePoint Online Cookbook maximizes workplace collaboration and productivity using SharePoint Online, Teams, OneDrive, Delve, M365 Search, Copilot, Power Platform, Viva, Planner, and Microsoft Forms.You will find thoroughly updated recipes for SharePoint Online, covering sites, lists, libraries, pages, web parts, and learn SharePoint Framework (SPFx) basics for building solutions. You will explore many Microsoft Teams recipes to prepare it to be your organization's central collaboration hub. You will be able to unlock Power Platform potential with recipes for Power Apps to enable low-code/no-code app development and learn to automate tasks with Power Automate and Power Automate Desktop. The book teaches you data visualization with Power BI, and chatbot creation with Power Virtual Agents (Copilot Studio). Finally, you will also learn about the cutting-edge Copilot and Gen AI functionality in Microsoft 365 and Power Platform. By the end, you will be equipped with skills to effectively use Microsoft 365, SharePoint Online, and the Power Platform.Whether it's enhancing career prospects or improving business operations, this book is a perfect companion on your journey through the Microsoft Office 365 suite.What you will learnCollaborate effectively with SharePoint, Teams, OneDrive, Delve, Search, and VivaBoost creativity and productivity with Microsoft CopilotDevelop and deploy custom applications using Power AppsCreate custom bots using Power Virtual Agents (Copilot Studio)Integrate with other apps, automate workflows and repetitive processes with Power Automate/Desktop (RPA)Design reports and engaging dashboards with Power BIUtilize Planner, To Do, and gather feedback with polls and surveys in Microsoft FormsExperience seamless integration in the mobile platforWho this book is forThis cookbook caters to professionals stepping into the world of Microsoft 365 and SharePoint Online. It is tailored for a broad spectrum of skillsets including general business professionals, IT administrators, and enterprise architects who are newcomers to Microsoft 365, offering valuable insights for establishing a contemporary, digital workplace effectively.Table of ContentsOverview of Microsoft 365Introduction to SharePoint OnlineModern Sites in SharePoint OnlineLists and Libraries in SharePoint OnlineDocument Management in SharePoint OnlineOneDriveMicrosoft TeamsPower Automate (Microsoft Flow)Creating Power AppsApplying Power AppsPower BIOverview of Copilot in Microsoft 365 and Power PlatformTerm Store and Content Types in SharePoint OnlineSearch in Microsoft 365Microsoft DelveMicrosoft 365 GroupsPower Automate Desktop for RPAPower Virtual Agents(N.B. Please use the Look Inside option to see further chapters)

  • af Shui Yu
    1.391,95 kr.

    In this book, the authors highlight the latest research findings on the security and privacy of federated learning systems. The main attacks and counterattacks in this booming field are presented to readers in connection with inference, poisoning, generative adversarial networks, differential privacy, secure multi-party computation, homomorphic encryption, and shuffle, respectively. The book offers an essential overview for researchers who are new to the field, while also equipping them to explore this ¿uncharted territory.¿ For each topic, the authors first present the key concepts, followed by the most important issues and solutions, with appropriate references for further reading. The book is self-contained, and all chapters can be read independently. It offers a valuable resource for master¿s students, upper undergraduates, Ph.D. students, and practicing engineers alike.

  • af Raghu Boddu
    476,95 kr.

    A practical guide to deploying, managing, and leveraging the power of Microsoft's unified security solutionKey Features:Learn how to leverage Microsoft's XDR and SIEM for long-term resilienceExplore ways to elevate your security posture using Microsoft Defender tools such as MDI, MDE, MDO, MDA, and MDCDiscover strategies for proactive threat hunting and rapid incident responsePurchase of the print or Kindle book includes a free PDF eBookBook Description:Tired of dealing with fragmented security tools and navigating endless threat escalations? Take charge of your cyber defenses with the power of Microsoft's unified XDR and SIEM solution.This comprehensive guide offers an actionable roadmap to implementing, managing, and leveraging the full potential of the powerful unified XDR + SIEM solution, starting with an overview of Zero Trust principles and the necessity of XDR + SIEM solutions in modern cybersecurity. From understanding concepts like EDR, MDR, and NDR and the benefits of the unified XDR + SIEM solution for SOC modernization to threat scenarios and response, you'll gain real-world insights and strategies for addressing security vulnerabilities. Additionally, the book will show you how to enhance Secure Score, outline implementation strategies and best practices, and emphasize the value of managed XDR and SIEM solutions. That's not all; you'll also find resources for staying updated in the dynamic cybersecurity landscape.By the end of this insightful guide, you'll have a comprehensive understanding of XDR, SIEM, and Microsoft's unified solution to elevate your overall security posture and protect your organization more effectively.What You Will Learn:Optimize your security posture by mastering Microsoft's robust and unified solutionUnderstand the synergy between Microsoft Defender's integrated tools and Sentinel SIEM and SOARExplore practical use cases and case studies to improve your security postureSee how Microsoft's XDR and SIEM proactively disrupt attacks, with examplesImplement XDR and SIEM, incorporating assessments and best practicesDiscover the benefits of managed XDR and SOC services for enhanced protectionWho this book is for:This comprehensive guide is your key to unlocking the power of Microsoft's unified XDR and SIEM offering. Whether you're a cybersecurity pro, incident responder, SOC analyst, or simply curious about these technologies, this book has you covered.CISOs, IT leaders, and security professionals will gain actionable insights to evaluate and optimize their security architecture with Microsoft's integrated solution. This book will also assist modernization-minded organizations to maximize existing licenses for a more robust security posture.

  • af Noor Zaman Jhanjhi
    2.126,95 kr.

    Cybersecurity Issues and Challenges in the Drone Industry is a comprehensive exploration of the critical cybersecurity problems faced by the rapidly expanding drone industry. With the widespread adoption of drones in military, commercial, and recreational sectors, the need to address cybersecurity concerns has become increasingly urgent. In this book, cybersecurity specialists collaborate to present a multifaceted approach to tackling the unique challenges posed by drones. They delve into essential topics such as establishing robust encryption and authentication systems, conducting regular vulnerability assessments, enhancing software security, advocating industry-wide standards and best practices, and educating drone users about the inherent cybersecurity risks. As drones, or unmanned aerial vehicles (UAVs), gain popularity and are deployed for various applications, ranging from aerial photography and surveillance to delivery services and infrastructure inspections, this book emphasizes the criticality of safeguarding the security, integrity, and privacy of drone systems and the data they handle. It highlights the growing vulnerability of drones to cybersecurity threats as these devices become increasingly connected and integrated into our everyday lives. This book is an invaluable resource for drone manufacturers, government agencies, regulators, cybersecurity professionals, and academia and research institutions invested in understanding and mitigating the cybersecurity risks in the drone industry.

  • af Rabiya Hanfi
    344,95 kr.

    Great amount of data is being accumulated very rapidly in the Internet era. Consequently, it takes a lot of time and effort to process these data for knowledge discovery and decision making. Compressed transaction data set methods is much better as compare to the other methods a more efficient approach, called Mining Merged Transactions with the Quantification Table (MMTQT) is proposed, which can compress the original database into a smaller one and perform the data mining process without the above problems.

  • af Bruno Rodrigues
    422,95 kr.

    Gain the expertise needed for the Google Cloud Digital Leader certification with the help of industry insights, effective testing strategies, and exam questions designed to help you make informed tech decisions aligned with business goalsKey FeaturesLearn about data management, AI, monetization, security, and the significance of infrastructure modernizationBuild a solid foundation in Google Cloud, covering all technical essentials necessary for a Google Cloud Digital LeaderTest your knowledge of cloud and digital transformation through realistic exam questionsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionTo thrive in today's world, leaders and technologists must understand how technology shapes businesses. As organizations shift from self-hosted to cloud-native solutions, embracing serverless systems, strategizing data use, and defining monetization becomes imperative. The Google Cloud Digital Leader Certification Guide lays a solid foundation of industry knowledge, focused on the Google Cloud platform and the innovative ways in which customers leverage its technologies.The book starts by helping you grasp the essence of digital transformation within the Google Cloud context. You'll then cover core components of the platform, such as infrastructure and application modernization, data innovation, and best practices for environment management and security. With a series of practice exam questions included, this book ensures that you build comprehensive knowledge and prepare to certify as a Google Cloud Digital Leader. Going beyond the exam essentials, you'll also explore how companies are modernizing infrastructure, data ecosystems, and teams in order to capitalize on new market opportunities through platform expertise, best practices, and real-world scenarios.By the end of this book, you'll have learned everything you need to pass the Google Cloud Digital Leader certification exam and have a reference guide for future requirements.What you will learnLeverage Google Cloud's AI and ML solutions to create business valueIdentify Google Cloud solutions for data management and smart analyticsAcquire the skills necessary to modernize infrastructure and applications on GCPUnderstand the value of APIs and their applications in cloud environmentsMaster financial governance and implement best practices for cost managementUnderstand the cloud security approach and benefits of Google Cloud securityFind out how IT operations must adapt to thrive in the cloudWho this book is forThis Google Cloud fundamentals book is suitable for individuals with both technical and non-technical backgrounds looking for a starting point to pursue more advanced Google Cloud certifications. No prior experience is required to get started with this book; only a keen interest in learning and exploring cloud concepts, with a focus on Google Cloud.Table of ContentsCloud Computing Fundamentals - An Introduction to Digital TransformationThe Shift to Public CloudUnderstanding the Different Cloud Computing ModelsThe Role of Data in Digital TransformationGoogle Cloud Solutions for Data ManagementMachine Learning and Artificial Intelligence on Google CloudModernizing IT Infrastructure with Google CloudModernizing Applications with Google CloudThe Value of APIsGoogle Cloud's Approach to SecurityIT Operations in the CloudResource Monitoring and Application Performance Management on Google CloudSample Questions: Exam Preparation

  • af Subash Natarajan
    475,95 kr.

    Explore proven techniques and best practices for designing, deploying, and managing cloud-native applications in multi-cloud environments with the help of real-world examples, success stories, and emerging technologiesKey FeaturesDiscover optimal solutions in multi-cloud environments using AWS, Azure, and GCP tools and technologiesExcel in designing, developing, and securing cloud-native apps with Docker, Kubernetes, and IstioLearn design patterns, cost optimization, best practices, and pitfalls to avoid in multi-cloud appsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionUnleash the power of cloud computing with Multi-Cloud Handbook for Developers, your guide to mastering the nuances of cloud-native and multi-cloud, covering practical strategies for design, development, and management. Explore the essential concepts, challenges, and methodologies critical for navigating the complex landscape of modern cloud computing. Using core architectural and design principles (such as microservices and 12-factor architecture) and advanced strategies (such as distributed application design patterns, domain-driven design (DDD), and API-first strategies), you'll learn how to build portable and efficient apps across various cloud platforms. You'll understand how to leverage Infrastructure as Code (IaC), continuous integration and deployment (CI/CD), GitOps, and DevOps practices, along with containerization and orchestration techniques using Docker and Kubernetes. You'll also get to grips with data, security, compliance, and cloud cost management strategies in multi-cloud environments.With real-world case studies, best practices, and insights into future trends, this book will equip you with the skills to develop, manage, troubleshoot, and innovate cloud-native applications across diverse cloud platforms, positioning you at the forefront of the cloud computing revolution.What you will learnUnderstand the core structures and implications of cloud-native and multi-cloud appsExplore key principles and patterns to build agile, scalable, and future-proof appsMaster cloud-native essentials: service mesh, DDD, and API-centric approachesImplement deployment pipelines with advanced IaC, CI/CD, DevSecOps, and GitOps techniquesManage and monitor data, security, compliance, and identity access in multi-cloud scenariosOptimize your cloud costs with shift-left and FinOps practicesGet ready for the future of cloud-native and multi-cloud technologyWho this book is forIdeal for cloud-native and cloud developers, platform engineers, software architects, and IT professionals focused on building and managing cloud-native applications in multi-cloud environments, this book is an indispensable guide for students and researchers seeking insights into cloud-native concepts and multi-cloud architectures. A basic understanding of cloud computing, contemporary software development, system design, and cloud platforms such as AWS, Azure, and GCP, will prove useful.Table of ContentsDiscovering the Multi-Cloud and Cloud-Native UniverseBuilding the Backbone of Cloud-Native ApplicationsDesigning for Diversity with Multi-Cloud Application StrategiesCrafting and Deploying in the Multi-Cloud as a DeveloperManaging Security, Data, and Compliance on Multi-CloudMaximizing Value and Minimizing Cost of Multi-CloudTroubleshooting Multi-Cloud ApplicationsLearning from Pioneers and Case StudiesBringing Your Cloud-Native Application to LifeFuture-Proofing Your Cloud Computing Skills

  • af Yves Guéchi
    231,95 kr.

    Le networking : Développez votre réseau professionnel" est un guide pratique et complet qui vous accompagnera dans l'art du networking et vous aidera à bâtir un réseau professionnel solide et durable.Que vous soyez un professionnel en début de carrière ou un entrepreneur chevronné, ce livre vous fournira les outils et les stratégies nécessaires pour tirer le meilleur parti de vos relations professionnelles.Divisé en trois parties stratégiques, ce livre aborde tous les aspects du networking. Dans la première partie, vous apprendrez à penser votre stratégie de networking en intégrant les principes fondamentaux du réseau, en clarifiant vos objectifs et en analysant vos réseaux actuels. Vous découvrirez également comment vous appuyer sur des mentors pour vous guider dans votre parcours professionnel. La deuxième partie du livre vous aidera à préparer vos outils de networking et à vous lancer efficacement.Vous apprendrez à vérifier et optimiser vos outils actuels, à soigner votre présence sur LinkedIn, à utiliser de manière stratégique la fonction recherche de cette plateforme, et à étendre votre stratégie en ligne aux autres réseaux sociaux pertinents.Vous comprendrez aussi l'importance d'adopter le bon comportement sur les réseaux sociaux pour créer des connexions authentiques. La troisième partie du livre se concentre sur l'entretien de votre réseau professionnel. Vous découvrirez comment développer votre réseau actuel en établissant des relations solides, comment apporter de la valeur à vos contacts, comment solliciter vos contacts de manière intelligente et comment élargir votre réseau en dehors du monde virtuel.Vous apprendrez également à entretenir votre réseau dans le temps en restant actif et en cultivant des relations durables. Avec des conseils pratiques, des études de cas inspirantes et des exemples concrets, "Le networking : Développez votre réseau professionnel" vous aidera à devenir un expert du networking. Que vous cherchiez à trouver de nouvelles opportunités professionnelles, à établir des partenariats fructueux ou à développer votre entreprise, ce livre vous fournira les stratégies et les compétences nécessaires pour atteindre vos objectifs grâce à un réseau professionnel solide et dynamique.

  • af Shamshekhar S. Patil
    787,95 kr.

    Diese Forschungsarbeit konzentriert sich auf den Entwurf und die Entwicklung effizienter Algorithmen für die sichere Kommunikation im Kontext des Internets der Dinge (IoT). Die Studie zielt darauf ab, Sicherheits- und Datenschutzbelange in IoT-Geräten unter Berücksichtigung ihrer Ressourcenbeschränkungen anzugehen. Im Rahmen der Forschung werden neue kryptografische Protokolle, Schlüsselverwaltungssysteme und Authentifizierungsmechanismen vorgeschlagen, die für IoT-Umgebungen optimiert sind. Es werden verschiedene Kommunikationsmodelle und Netzwerktopologien untersucht, und die Algorithmen werden anhand von Leistungskennzahlen wie Rechenkomplexität, Speichernutzung und Energieverbrauch bewertet. Die Ergebnisse dieser Forschung werden zur Entwicklung von sicheren Kommunikationslösungen für das Internet der Dinge beitragen, von denen verschiedene Bereiche wie Smart Homes, Gesundheitswesen und industrielle Automatisierung profitieren.

  • af Vasanthi V.
    743,95 kr.

    Internet-of-Things (IoT) has enormous interest from the research community in smart applications due to its ability to link any electronic object to a network. The IoT networks are centered over the Wireless Sensor Networks (WSN) and hence the IoT networks suffer from batter constraint problems similar to WSN. In the first contribution, Fractional Firefly Algorithm (FFA) and Chicken Swarm Optimization (CSO) algorithms are used to develop the FFA+CSO based multipath routing protocol. This model utilizes FFA for the optimal selection of cluster heads and CSO for optimal routing path selection based on different routing network metrics such as energy, delay, link quality, lifetime and hop count. The second contribution analyzes the fault tolerance limitations of FA+CSO and FFA+CSO to develop Fractional Gaussian Firefly Algorithm (FGFA) and Darwinian Chicken Swarm Optimization (DCSO) algorithms were developed to form FGFA+DCSO based multipath routing protocol by improving the FFA and CSO to adapt the energy efficiency in CH selection and fault tolerance in optimal route selection.

  • af Yueheng Li
    367,95 kr.

    Accompanied with the development of the wireless communication technologies, the high data traffic is more necessary for civil and industrial applications than ever The concept of an intelligent reflective surface (IRS) has attracted considerable attention recently as a low-cost solution. As the main contribution, the dissertation creates new state-of-the-art and formulates a solid milestone for the IRS research field.

  • af Rob Botwright
    384,95 kr.

    ¿¿¿¿ DOCKER: ZERO TO HERO BOOK BUNDLE ¿¿¿¿Ready to level up your Docker skills and become a containerization pro? Look no further! Introducing the Docker: Zero to Hero book bundle, your ultimate guide to building, testing, and deploying applications fast. With four comprehensive books covering everything from Docker basics to expert-level techniques, this bundle has everything you need to master Docker and revolutionize your development workflow.¿¿¿¿ BOOK 1: DOCKER DEMYSTIFIED ¿¿¿¿ New to Docker? No problem! Dive into the world of containerization with Docker Demystified, a beginner's guide that breaks down complex concepts into easy-to-understand lessons. Learn how Docker works, create and manage containers, and discover the power of containerization for modern software development.¿¿¿¿ BOOK 2: MASTERING DOCKER ¿¿¿¿ Ready to take your Docker skills to the next level? Mastering Docker is your roadmap to advanced techniques and best practices. Optimize Docker images, implement networking and storage solutions, and orchestrate multi-container applications with Docker Compose. Whether you're deploying in the cloud or on-premises, this book has you covered.¿¿¿¿ BOOK 3: DOCKER DEPLOYMENT STRATEGIES ¿¿¿¿ Scaling and orchestrating containers at scale is a breeze with Docker Deployment Strategies. Explore different deployment strategies, from setting up Docker Swarm clusters to rolling updates and service scaling. Plus, learn advanced networking and security considerations for deploying Docker in production environments.¿¿¿¿ BOOK 4: EXPERT DOCKER ¿¿¿¿ Ready to become a Docker expert? Expert Docker is your guide to building complex microservices architectures with confidence. Architect and deploy sophisticated, distributed systems using Docker, and design scalable, resilient, and maintainable microservices architectures that stand the test of time.With over 3000 characters of expert guidance and practical advice, the Docker: Zero to Hero book bundle is your ticket to mastering Docker and transforming your development workflow. Don't miss out on this opportunity to become a Docker hero - grab your bundle today and start building, testing, and deploying applications faster than ever before! ¿¿¿¿¿¿¿¿

  • af Naveen Pakalapati
    100,95 kr.

    Forge Your Future with Fortified Cloud SecurityImagine elevating your business's cloud security to an unprecedented level, where each line of code propels you towards unmatched resilience and efficiency. Blueprints of DevSecOps: Foundations to Fortify Your Cloud is the essential guide for IT professionals, business leaders, and security enthusiasts poised to transform their approach to cloud security through the powerful amalgamation of development, security, and operations-DevSecOps.Embark on a journey that demystifies the nuances of establishing a robust DevSecOps culture within your organization, starting with a comprehensive introduction that sets the stage for a deep-seated understanding of DevSecOps in the context of cloud innovation. Grapple with the strategic imperatives as Chapter 1 uncovers the growing importance of DevSecOps in the enterprise cloud domain, contrasting it with traditional security models.Steer through Chapter 2 to assimilate the core principles and cultural pillars that reinforce a truly effective DevSecOps team. Learn not just the 'how', but also the 'who', defining roles and responsibilities that create a mesh of accountability and proficiency.As you unfold the architectural blueprints for DevSecOps, you'll uncover the secrets of centralized logging, account vending, and sophisticated design patterns that mitigate risks and optimize processes.Push the boundaries of code quality with Chapter 4's insights into cutting-edge continuous integration and deployment methodologies. Each commit, build, test, and deployment phase is dissected, revealing tools and tactics primed for fortifying your security posture.Dive into the realm of Infrastructure as Code (IaC) and grasp its pivotal role within DevSecOps. Chapter 5's lucid elucidation of best practices buttresses your knowledge and prepares you to harness IaC in the most complex cloud landscapes.Venture further into the specific and the agnostic, as subsequent chapters lay out an arsenal of cloud provider-centric tools alongside cloud-agnostic processes that assure fluidity and constancy across diverse environments.The final chapters impart a treasure trove of real-world case studies, offering tangible insights and actionable strategies. With the appendixes providing valuable resources and a glossary demystifying jargon, you're equipped not just to read but to lead and innovate.Blueprints of DevSecOps: Foundations to Fortify Your Cloud is more than just a book; it's a manifesto for a stronger, smarter, and more secure future in the cloud. Secure your copy today and transform your enterprise's security architecture into a fortress of innovation.

  • af Meysam Azad
    405,95 kr.

    Unlock the Power of Docker to Revolutionize Your Development and Deployment StrategieBook DescriptionEmbark on an enriching Docker journey with this definitive guide meticulously designed to take you from foundational knowledge to advanced mastery.This book adopts a holistic approach to containerization, starting with essential concepts, Docker's intricacies, and then moving on to an exploration of core concepts and architecture. You will then move seamlessly through building and managing Docker images, navigating networking challenges, and mastering the art of persistent data management. Each chapter builds upon the last, ensuring a thorough grasp of Docker's intricacies.The book will help you streamline deployment with Docker Compose, scale applications through Docker Swarm, fortify deployments with security insights, and seamlessly integrate Docker into your CI/CD pipelines. Push the boundaries further with discussions on Docker in cloud platforms, an introduction to Kubernetes, and advanced Docker concepts.Authored by a seasoned Senior Site Reliability Engineer (SRE), this book goes beyond the theoretical by providing insider insights, best practices, and real-world scenarios. Bridging the gap between concepts and applications, it serves as your trusted companion in navigating Docker complexities.Table of Contents1. Introduction to Docker2. Docker Architecture and Components3. Building and Managing Docker Images4. Docker Networking5. Persistent Data Management with Docker6. Docker Compose for Simplified Application Deployment7. Scaling Applications with Docker Swarm8. Securing Docker Deployments9. Docker in Continuous Integration and Deployment10. Docker on Cloud Platforms11. Introduction to Kubernetes12. Exploring Advanced Docker Concepts13. Future Trends in Containerization Appendix A: All-in-One Cheatsheet Index

  • af Tom Wall
    627,95 kr.

    Con la crescente diffusione e ubiquità delle TIC e dei sistemi di elaborazione dei dati, si è diffusa l'adozione di una topologia client/server distribuita per soddisfare le esigenze informatiche aziendali e personali. La connettività standard di una tipica stazione di lavoro si basa su un Personal Computer collegato a un gruppo di nodi e server locali (Local Area Network) e, tramite una connessione esterna, a una miriade di risorse Internet in tutto il mondo. Questo modello fornisce al lavoratore della conoscenza e all'utente privato di sistemi TIC l'accesso a una gamma completa di servizi TIC in modo rapido ed efficiente, creando un nesso globale tra gli utenti di computer online e le soluzioni e i servizi TIC da loro scelti. Tuttavia, alcuni componenti della soluzione TIC (compresi i dati critici e la potenza di elaborazione) sono esposti a contatti fortuiti e al rischio di interferenze, uso improprio e furto a causa di standard di sicurezza inadeguati. Inoltre, le unità Client/Server consumano un'eccessiva quantità di energia, con conseguenti scarse prestazioni ecologiche di un miliardo di postazioni di lavoro in tutto il mondo. Una sinergia affidabile di nuove tecnologie - virtualizzazione, Thin Client e un'interconnessione remota (RCP) potenziata - può ora migliorare significativamente questo modello.

  • af Tom Uoll
    627,95 kr.

    Po mere togo kak IKT i sistemy obrabotki dannyh stanowilis' wse bolee obshirnymi i powsemestnymi, shiroko rasprostranilas' topologiq raspredelennogo klienta/serwera dlq udowletworeniq potrebnostej biznesa i personal'nyh wychislenij. Standartnoe podklüchenie tipichnoj rabochej stancii stroitsq na baze personal'nogo komp'ütera, swqzannogo s gruppoj lokal'nyh uzlow i serwerow (lokal'naq wychislitel'naq set'), a takzhe cherez wneshnee podklüchenie k mnogochislennym resursam Interneta po wsemu miru. Jeta model' obespechiwaet rabotnikam sfery znanij i chastnym pol'zowatelqm IKT-sistem bystryj i äffektiwnyj dostup ko wsemu spektru IKT-uslug, sozdawaq global'nyj uzel pol'zowatelej komp'üterow w rezhime onlajn i wybrannyh imi IKT-reshenij i uslug. Odnako nekotorye komponenty IKT-reshenij (wklüchaq kriticheski wazhnye dannye i wychislitel'nuü moschnost') podwerzheny sluchajnym kontaktam i risku wmeshatel'stwa, neprawil'nogo ispol'zowaniq i krazhi iz-za nizkih standartow bezopasnosti. Krome togo, ustrojstwa "klient-serwer" potreblqüt chrezmernoe kolichestwo änergii, chto priwodit k uhudsheniü äkologicheskih harakteristik do milliarda rabochih stancij po wsemu miru. Nadezhnaq sinergiq nowyh tehnologij - wirtualizacii, tonkogo klienta i usowershenstwowannogo soedineniq Remote (RCP) - teper' mozhet znachitel'no uluchshit' ätu model'.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.