Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Introducing the NIST Cloud Security Book Bundle!Are you ready to take your cloud security knowledge to the next level? Look no further than our comprehensive book bundle, NIST Cloud Security: Cyber Threats, Policies, and Best Practices. This bundle includes four essential volumes designed to equip you with the skills and insights needed to navigate the complex world of cloud security.Book 1: NIST Cloud Security 101: A Beginner's Guide to Securing Cloud Environments Perfect for those new to cloud security, this book provides a solid foundation in the basics of cloud computing and essential security principles. Learn how to identify common threats, implement basic security measures, and protect your organization's cloud infrastructure from potential risks.Book 2: Navigating NIST Guidelines: Implementing Cloud Security Best Practices for Intermediate Users Ready to dive deeper into NIST guidelines? This volume is tailored for intermediate users looking to implement cloud security best practices that align with NIST standards. Explore practical insights and strategies for implementing robust security measures in your cloud environment.Book 3: Advanced Cloud Security Strategies: Expert Insights into NIST Compliance and Beyond Take your cloud security expertise to the next level with this advanced guide. Delve into expert insights, cutting-edge techniques, and emerging threats to enhance your security posture and achieve NIST compliance. Discover how to go beyond the basics and stay ahead of evolving cyber risks.Book 4: Mastering NIST Cloud Security: Cutting-Edge Techniques and Case Studies for Security Professionals For security professionals seeking mastery in NIST compliance and cloud security, this book is a must-read. Gain access to cutting-edge techniques, real-world case studies, and expert analysis to safeguard your organization against the most sophisticated cyber threats. Elevate your skills and become a leader in cloud security.This book bundle is your go-to resource for understanding, implementing, and mastering NIST compliance in the cloud. Whether you're a beginner, intermediate user, or seasoned security professional, the NIST Cloud Security Book Bundle has something for everyone. Don't miss out on this opportunity to enhance your skills and protect your organization's assets in the cloud. Order your copy today!
Introducing "Edge Computing 101: Novice to Pro" - your ultimate guide to mastering edge computing from beginner to expert level. This comprehensive book bundle includes four essential volumes packed with expert techniques and practical applications to propel your understanding and proficiency in edge computing.Book 1, "Edge Computing Fundamentals: A Beginner's Guide to Distributed Systems," provides a solid foundation for understanding the core principles of distributed systems. Whether you're new to the field or seeking to reinforce your knowledge, this book equips you with the fundamental concepts necessary to embark on your journey into the world of edge computing.In Book 2, "Edge Computing Architectures: Design Principles and Best Practices," you'll delve deeper into the intricacies of designing effective edge computing architectures. From deployment models to optimization techniques, this volume offers invaluable insights and best practices to help you build robust and scalable edge systems.For those looking to advance their skills, Book 3, "Advanced Edge Computing: Scalability, Security, and Optimization Strategies," explores advanced techniques and strategies for overcoming scalability challenges, enhancing security measures, and optimizing performance in edge environments. With real-world examples and case studies, you'll gain practical expertise to tackle complex issues and achieve optimal outcomes.Finally, Book 4, "Edge Computing in Industry 4.0: Practical Applications and Future Trends," focuses on the practical applications of edge computing across various industries, with a special emphasis on Industry 4.0. Discover how edge computing is transforming manufacturing, healthcare, smart cities, and more, and gain insights into future trends shaping the industry.Whether you're a novice looking to build a strong foundation or a seasoned professional aiming to stay ahead of the curve, "Edge Computing 101: Novice to Pro" has you covered. With its comprehensive coverage, expert guidance, and practical insights, this book bundle is your essential companion for mastering the dynamic world of edge computing. Get your copy today and take your edge computing skills to the next level!
Build scalable, cost-effective, high-performance, and secure architectures using AWS Outposts, AWS Local Zones, AWS Wavelength, and AWS Snow services guided by best practices and practical examplesKey FeaturesTake advantage of the opportunities and challenges arising from the exponential growth of connected devicesUse AWS edge compute services to extend your applications to wherever they are neededFollow guided tutorials for building an IIoT gateway and a distributed edge application with AWS servicesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe surge in connected edge devices has driven organizations to capitalize on the opportunities presented by the massive amounts of data generated by these devices. However, adapting to this landscape demands significant changes in application architectures.This book serves as your guide to edge computing fundamentals, shedding light on the constraints and risks inherent in selecting solutions within this domain. You'll explore an extensive suite of edge computing services from AWS, gaining insights into when and how to use AWS Outposts, AWS Wavelength, AWS Local Zones, AWS Snow Family, and AWS IoT Greengrass. With detailed use cases, technical requirements, and architectural patterns, you'll master the practical implementation of these services and see how they work in real life through step-by-step examples, using the AWS CLI and AWS Management Console. To conclude, you'll delve into essential security and operational considerations to maximize the value delivered by AWS services.By the end of this book, you'll be ready to design powerful edge computing architectures and handle complex edge computing use cases across multiple AWS services.What you will learnOvercome network challenges faced at the near and far edgeLeverage services in over 450 points of presence at the edge of the AWS global backboneDeploy edge solutions in disconnected scenarios using AWS Snow FamilyBuild multi-access edge (MEC) solutions with 5G and AWS WavelengthReduce latency for your users with AWS Local ZonesConfigure AWS Snowcone as an IIoT gateway with AWS IoT GreengrassExtend your AWS VPC into your on-premise data center with AWS OutpostsDeploy distributed applications for core, near, and far edge cloud servicesWho this book is forThis book is designed for cloud architects, cloud engineers, solutions architects, and IoT architects tasked with building edge compute solutions using AWS. If you want to master the full range of edge computing services offered by AWS, this book is for you. A basic understanding of AWS services and networking is assumed.Table of ContentsGetting Started with Edge Computing on AWSUnderstanding Network and Security for Near Edge ComputingUnderstanding Network and Security for Far Edge ComputingAddressing Disconnected Scenarios with AWS Snow FamilyIncorporating AWS Outposts into Your On Premises DatacenterLowering First-Hop Latency with AWS Local ZonesUsing AWS Wavelength Zones on Public 5G NetworksUtilizing the Capabilities of the AWS Global NetworkArchitecting for Disconnected Edge Computing ScenariosBuilding Multi-Access Edge Architectures (MEC)Addressing the Requirements of Immersive Experiences with AWSConfiguring an AWS Snowcone to be an IoT GatewayDeploying a Distributed OpenRAN NFV to the AWS CloudExploring the Future of AWS Edge Computing Services
This monograph reports the findings of a workshop held at Google (co-organized by Stanford University and the University of Wisconsin-Madison) on the dual-use dilemma posed by GenAI.
This cert guide is Cisco's official, comprehensive self-study resource for the CCNP SPCOR 350-501 certification. It prepares students to demonstrate knowledge of implementing core service provider network technologies including core architecture, services, networking, automation, quality of services, security, and network assurance. This book serves as a valuable resource, offering foundational insights into every aspect of the Service Providers' technologies. In each chapter, there are review questions that allow students to assess their understanding of the pertinent information, from the big picture down to the finer details, all of which are illustrated through practical examples. Furthermore, each chapter imparts useful design tips that will steer students toward a more visionary approach, particularly within the context of Service Provider networks. This Official Cert Guide covers every exam objective concisely and logically, with extensive teaching features designed to promote retention and understanding. This complete study package includes A test-preparation routine proven to help you pass the exams Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section Chapter-ending Key Topic tables, which help you drill on key concepts you must know thoroughly Practice exercises that help you enhance your knowledge An online interactive Flash Cards application to help you drill on Key Terms by chapter A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time
Embark on a journey through the dynamic world of the Internet of Things (IoT) with Internet of Things - New Insight. This innovative book offers a concise yet comprehensive exploration of IoT¿s technological evolution, diverse applications, and prospects. From its roots in ubiquitous computing to real-world applications in health care, agriculture, and smart cities, each chapter unveils the transformative impact of IoT on our interconnected world.Key Features:Applications across Domains: Explore real-world examples showcasing how IoT enhances efficiency and quality of life.Challenges and Solutions: Confront the hurdles of rapid IoT proliferation and discover insightful perspectives and solutions.Future Prospects: Peer into the future, exploring potential advancements in AI integration, edge computing, and 6G connectivity.Whether you are a professional seeking deeper insights or an enthusiast eager to understand the complexities of IoT, this book is your gateway to a revolutionary technological landscape that continues to redefine connectivity and innovation.
Explore the dynamics of digital identity, a crucial component in today¿s modern technology-driven era. This engaging book offers a deep understanding of how digital identity is evolving rapidly, why it¿s so significant, and offers organizations, regulatory bodies, and academicians the strategies needed to adopt secure decentralized digital identity features effectively. It¿s a must-read for those aiming to grasp the intricacies of digital identity and leverage it for future innovation and security.The book begins by redefining digital identity, examining its evolution and the profound impact it has on both individuals and organizations. It then delves into the development of digital identity strategies, laying the foundation for future digital transformations. Covering a wide range of topics, the book discusses the innovation, challenges, and technological exploration in digital identity. A special focus is given to biometric technologies and the implementation of decentralized digital identities, addressing critical areas such as identity governance, blockchain, AI and advanced biometrics. The book also investigates the implications of digital identity across various industries, including cross border travel, healthcare, social media, finance, metaverse, IoT etc. finally the book provides not only emerging trends but offers a glimpse into the future digital identity. Whether yoüre a tech professional, business leader, student or simply keen on understanding the impact of digital advancements, this book promises to offer insightful perspectives and practical solutions for navigating the complex world of digital identity. It underscores the importance of identity in spearheading digital innovation, making it a key resource for anyone looking to stay ahead in the digital landscape. As you reach its conclusion, yoüll be equipped with a wealth of knowledge and insights that are crucial in today¿s digital era.What You'll LearnDigital identity strategies and their role in shaping the future of digital identityDifferent facets of digital identitySpecifics of biometric technologies and decentralized digital identity Industry specific digital identity and its implementationCrucial aspects of privacy, ethics, and secure in the context of digital identityWho This Book Is ForSoftware professionals, security practitioners, architects, senior managers, executives, and students who are interested in digital identity.
Explore cloud economics and cost optimization for Azure, AWS, and GCP with this practical guide covering methods, strategies, best practices, and real-world examples, bridging theory and applicationKey FeaturesLearn cost optimization best practices on different cloud services using FinOps principles and examplesGain hands-on expertise in improving cost estimations and devising cost reduction plans for Azure, AWS, and GCPAnalyze case studies that illustrate the application of FinOps in diverse real-world scenariosPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIn response to the escalating challenges of cloud adoption, where balancing costs and maximizing cloud values is paramount, FinOps practices have emerged as the cornerstone of fi nancial optimization. This book serves as your comprehensive guide to understanding how FinOps is implemented in organizations worldwide through team collaboration and proper cloud governance.Presenting FinOps from a practical point of view, covering the three phases-inform, optimize, and operate-this book demonstrates an end-to-end methodology for optimizing costs and performing financial management in the cloud. You'll learn how to design KPIs and dashboards for judicious cost allocation, covering key features of cloud services such as reserved instances, rightsizing, scaling, and automation for cost optimization. This book further simplifi es architectural concepts and best practices, enabling you to design superior and more optimized solutions. Finally, you'll discover potential synergies and future challenges, from the integration of artifi cial intelligence to cloud sustainability considerations, to prepare for the future of cloud FinOps.By the end of this book, you'll have built the expertise to seamlessly implement FinOps practices across major public clouds, armed with insights and ideas to propel your organization toward business growth.What you will learnExamine challenges in cloud adoption and cost optimizationGain insight into the integration of FinOps within organizationsExplore the synergies between FinOps and DevOps, IaC, and change managementLeverage tools such as Azure Advisor, AWS CUDOS, and GCP cost reportsEstimate and optimize costs using cloud services key features and best practicesImplement cost dashboards and reports to improve visibility and controlUnderstand FinOps roles and processes crucial for organizational successApply FinOps through real-life examples and multicloud architecturesWho this book is forThis book is for cloud engineers, cloud and solutions architects, as well as DevOps and SysOps engineers interested in learning more about FinOps and cloud financial management for efficiently architecting, designing, and operating software solutions and infrastructure using the public clouds. Additionally, team leads, project managers, and financial teams aiming to optimize cloud resources will also find this book useful. Prior knowledge of cloud computing and major public clouds is assumed.Table of ContentsIntroduction to FinOps PrinciplesUnderstanding How FinOps Fits in Cloud GovernanceDesigning and Executing the Tagging and Naming Convention StrategiesEstimating Cloud Solutions Costs and Initiative SavingsImproving Cost visibility with Dashboards and ReportsImplementing IaaS Compute OptimizationImplementing PaaS and Other Compute Optimization InitiativesImplementing Databases OptimizationImplementing Storage Optimization(N.B. Please use the Look Inside option to see further chapters)
Explore use cases and best practices to seamlessly migrate and scale legacy enterprise-grade applications running on on-premises vSphere environments to VMware Cloud SDDCs running on AWS infrastructureKey FeaturesUnderstand data center extension, migration, disaster recovery, and app modernization through a variety of use casesBecome an expert at configuring, automating, and troubleshooting VMC on AWS SDDCImplement design considerations, best practices, and onboarding preflight checklist for optimal performance on VMC on AWSPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIf you're looking to effortlessly transition from on-premises VMware vSphere environments or capital expenditure (CAPEX) to an agile operational expenditure (OPEX) model, trust the VMware Cloud (VMC) on AWS platform for swift re-platforming of legacy applications into cloud-native framework. This comprehensive guide addresses hybrid cloud challenges, offering detailed solutions within the VMware Cloud on AWS ecosystem.Covering the foundational architecture, software-defined data center (SDDC) components of VMware Cloud on AWS, network and security configurations, and AWS service integrations, this book lays the foundation for you to advance to vCenter management, vSAN storage policies, NSX architecture, compute policies, SDDC console management, and the EDRS mechanism for cluster scaling. You'll also explore integrated services such as VMware HCX for migration, VMware Aria suite, Tanzu Managed Kubernetes, and disaster recovery.Further, the book takes you through VMware Cloud APIs and guides you in managing workloads with VMware Cloud on AWS Outposts. With the help of practical insights, configuration tips, and best practices, you'll unlock the full potential of VMC on AWS.By the end of this book, you'll be equipped to successfully architect and manage VMware Cloud on AWS SDDCs, handling day-to-day operations expertly.What you will learnExamine the foundational architecture components of VMware Cloud on AWS, including vSphere, vSAN, and NSXExplore the various integrated services available within VMware Cloud on AWSDelve into VMware Cloud on AWS SDDC, vCenter, and vSAN optimizationsBuild applications and apply best practices within the VMware Cloud on AWS to manage day-to-day operationsStreamline infrastructure management for VMware Cloud on AWS with Infrastructure as Code (IaC)Extend cloud capabilities to on-premises environments using VMware Cloud on AWS OutpostsWho this book is forThe book is intended for cloud and solutions architects, DevOps engineers, site reliability engineers (SREs), system and network admins, and cloud engineers with experience in on-premises VMware or AWS administration, facilitating the seamless integration of VMware cloud technologies. Prior understanding of cloud computing, virtualization principles, VMware vSphere administration, vSAN, and NSX along with AWS cloud basics will be helpful.Table of ContentsUnderstanding the architecture of VMC on AWS componentsExploring networking, security, and AWS integrations Discovering migration services for VMC on AWS Configuring your first SDDC from scratchConfiguring vCenter, vSAN, and VMC console Understanding Networking and security configurationsExploring add-on services configurationBuilding applications and managing operationsUsing infrastructure as code on VMC on AWSManaging workload sizing and Cloud costsKnowing the best practices, FAQs, and Common pitfallsAppendix- Preflight checklist before onboarding
This book is for enterprise and solution architects, systems integrators, and anyone managing enterprise-scale, multi-cloud or hybrid IT landscapes. The book examines usage of Azure Arc for governance and systems management with security as an overarching theme. It is not an implementation manual but provides high-level guidance on best practices and links to detailed guidance. It offers insight into the types of problems that Azure Arc can solve, and will help you determine whether it is the right choice for your organization.Modern enterprise computing is an astonishing luxury land filled with never-before-seen hosting options on commercial clouds as well as advancements in the areas of private cloud and edge computing. The challenge with this plethora of choices is to manage and coordinate large IT estates which may bridge multiple public clouds and private datacenters. Visibility of operations to achieve security, cost control, and efficiency is often difficult to achieve. Data management is another area which is particularly fraught with complexity and risk.Industry leaders have made serious investments in the design of control plane products to address these gaps with varying approaches and degrees of success. Azure Arc is designed to provide a consolidated view of assets such as databases and Kubernetes installations across major cloud providers, edge locations, and customer-owned datacenters. It facilitates deployment of new infrastructure, patching and upgrades, monitoring, policy, and security controls for assets living on-premises or in competitor clouds as if they were native to Azure. While competitive products exist, at this writing none have the flexibility and reach of Arc to effectively manage very large hybrid estates.Readers will appreciate the author¿s approach of walking through typical enterprise computing scenarios while listing industry- or scenario-specific challenges that are difficult to overcome, and then reinforcing understanding by restating the challenges while explaining how Azure Arc can be utilized to remediate them.What You Will LearnDiscover what Azure Arc is, the types of problems it is intended to solve, and how to map your requirements to its capabilitiesStreamline and secure large Arc-enabled Kubernetes deployments via modern GitOps practicesUse Azure Arc to consolidate management across a broad range of hybrid and multi-cloud ecosystems through policy-driven governanceApply monitoring and automation to defend systems against security threats that are beyond the ability of manual administration to deflectUncover practical guidance that is written in a way that makes basic precepts approachable to non-technical stakeholders and then branches out into areas that will offer advanced readers new insights and consolidate a broad topic into a usable directionWho This BookIs ForEnterprise and solution architects, systems integrators, and anyone else looking to solve enterprise-scale administration problems across a multi-cloud or hybrid architecture
The issue of Cybersecurity is of paramount importance in the digital age. With near-continuous revelations about incidents and breaches in the media, organizations and individuals are faced with the challenge of finding the balance between risk, innovation, and cost. At the same time, the field of cybersecurity is undergoing dramatic changes, demanding that organizations embrace new practices and skill sets. In this book, I will explore the basics of Cybersecurity and discuss how ordinary people and organizations can best ensure the safety and security of their data. By examining numerous studies, reports, and surveys, I will argue that organizations must embrace a comprehensive approach to cyber security that considers the ever-changing nature of the threat landscape. In the following chapters, it explains the fundamentals of Cybersecurity, and then discuss several case studies on the more prominent security breaches in the last few years to show what can happen to a business.
Unleash Your Networking Potential with the TCP/IP Network+ Protocols and Campus LAN Switching Fundamentals Bundle!Are you ready to master the art of networking? Whether you're a beginner looking to kickstart your networking journey or an experienced professional aiming to refine your skills, the TCP/IP Network+ Protocols and Campus LAN Switching Fundamentals bundle is your ultimate resource.¿¿¿¿ Book 1: TCP/IP Essentials: A Beginner's Guide Are you new to the world of networking? Fear not! Our Beginner's Guide simplifies complex TCP/IP concepts and IP addressing, laying a strong foundation for your networking expertise.¿¿¿¿ Book 2: Network+ Protocols: Intermediate Insights Ready to take your skills up a notch? Dive deeper into networking protocols, subnetting techniques, and routing concepts with Intermediate Insights, equipping you for the next level of networking challenges.¿¿¿¿ Book 3: Advanced TCP/IP and Campus LAN Switching Explore advanced topics such as routing protocols, VLAN design, and high availability strategies. Designed for professionals seeking to manage complex networks across campuses and enterprises.¿¿¿¿ Book 4: Expert TCP/IP Optimization and Troubleshooting Become a networking virtuoso! This book offers invaluable insights into network optimization, performance tuning, and troubleshooting methodologies. Real-world scenarios will transform you into an expert troubleshooter.Why Choose Our Bundle? ¿ Comprehensive Learning: Covering beginner to expert levels, this bundle caters to diverse learning needs. ¿ Real-World Applications: Learn from practical scenarios, equipping you to excel in the field. ¿ Authoritative Guidance: Our authors are networking experts, ensuring you receive top-notch insights. ¿ Career Advancement: Mastering TCP/IP and network protocols opens doors to lucrative networking careers. ¿ Time-Efficient: Four books in one bundle mean you save time and money while maximizing your learning.Don't miss out on this opportunity to become a networking pro! The TCP/IP Network+ Protocols and Campus LAN Switching Fundamentals bundle is your key to networking success. Get it now and unlock the world of networking possibilities.
This book discusses the latest developments and outlines future trends in the fields of microelectronics, electromagnetics and telecommunication. It contains original research works presented at the International Conference on Microelectronics, Electromagnetics and Telecommunication (ICMEET 2021), held in Bhubaneswar, Odisha, India during 27-28 August, 2021. The papers were written by scientists, research scholars and practitioners from leading universities, engineering colleges and R&D institutes from all over the world and share the latest breakthroughs in and promising solutions to the most important issues facing today's society.
The book discusses the latest developments and outlines future trends in the fields of microelectronics, electromagnetics, and telecommunication. It contains original research works presented at the International Conference on Microelectronics, Electromagnetics and Telecommunication (ICMEET 2023), organized by Department of Electronics and Communication Engineering, National Institute of Technology Mizoram, India, during 6¿7 October 2023. The book is divided into two volumes, and it covers papers written by scientists, research scholars, and practitioners from leading universities, engineering colleges, and R&D institutes from all over the world and shares the latest breakthroughs in and promising solutions to the most important issues facing today¿s society.
Content distribution, i.e., distributing digital content from one node to another node or multiple nodes, is the most fundamental function of the Internet. Since Amazon's launch of EC2 in 2006 and Apple's release of the iPhone in 2007, Internet content distribution has shown a strong trend toward polarization. On the one hand, considerable investments have been made in creating heavyweight, integrated data centers ("heavy-cloud") all over the world, in order to achieve economies of scale and high flexibility/efficiency of content distribution. On the other hand, end-user devices ("light-end") have become increasingly lightweight, mobile and heterogeneous, creating new demands concerning traffic usage, energy consumption, bandwidth, latency, reliability, and/or the security of content distribution. Based on comprehensive real-world measurements at scale, we observe that existing content distribution techniques often perform poorly under the abovementioned new circumstances.Motivated by the trend of "heavy-cloud vs. light-end," this book is dedicated to uncovering the root causes of today's mobile networking problems and designing innovative cloud-based solutions to practically address such problems. Our work has produced not only academic papers published in prestigious conference proceedings like SIGCOMM, NSDI, MobiCom and MobiSys, but also concrete effects on industrial systems such as Xiaomi Mobile, MIUI OS, Tencent App Store, Baidu PhoneGuard, and WiFi.com. A series of practical takeaways and easy-to-follow testimonials are provided to researchers and practitioners working in mobile networking and cloud computing. In addition, we have released as much code and data used in our research as possible to benefit the community.
Microsoft Defender for IoT helps organizations identify and respond to threats aimed at IoT devices, increasingly becoming targets for cyberattacks. This book discusses planning, deploying, and managing your Defender for IoT system. The book is a comprehensive guide to IoT security, addressing the challenges and best practices for securing IoT ecosystems.The book starts with an introduction and overview of IoT in Azure. It then discusses IoT architecture and gives you an overview of Microsoft Defender. You also will learn how to plan and work with Microsoft Defender for IoT, followed by deploying OT Monitoring. You will go through air-gapped OT sensor management and enterprise IoT monitoring. You also will learn how to manage and monitor your Defender for IoT systems with network alerts and data. After reading this book, you will be able to enhance your skills with a broader understanding of IoT and Microsoft Defender for IoT-integrated best practices to design, deploy, and manage a secure enterprise IoT environment using Azure.What You Will LearnUnderstand Microsoft security services for IoTGet started with Microsoft Defender for IoTPlan and design a security operations strategy for the IoT environmentDeploy security operations for the IoT environmentManage and monitor your Defender for IoT SystemWho This Book Is ForCybersecurity architects and IoT engineers
Written in a simple and developer-focused style, this book gives you the tools and knowledge you need to ace the GCP Professional Cloud Security Engineer certification exam. The approach is two-fold: introducing and implementing all GCP cloud security concepts and controls based on the certification exam objectives, and demonstrating how these concepts can be applied to real-world scenarios.Your study begins with cloud identities in GCP and different identity types (user accounts, service accounts, groups, and domains) and how separation of duties is implemented with access controls and Identity and Access Management (IAM). Emphasis is placed on the unique GCP approach to managing resources, with its clear distinction between resource ownership and resource billing. Following the defense in depth principle, the book shifts focus to network security and introduces different types of constructs that enable micro-segmentation, as they are implemented in a software-defined network. A chapter devoted to data protection is included. You will learn how to leverage the Data Loss Prevention (DLP) application programming interface (API) to prevent access to your workloads¿ sensitive data from unauthorized use. Examples on how to use the DLP API are provided using the Go language, which is becoming widely adopted in the developer community due to its simplicity, and high-performance networking and multi-processing capabilities. Encryption at rest, in use, and in transit is covered with an overview on how GCP implements confidential computing. The book concludes with an examination of the GCP services you need to know to monitor, audit, and ensure compliance with the laws and regulations where your workloads and infrastructure operate.By the end of the book, you will have acquired the knowledge and confidence to pass the GCP Professional Cloud Security Engineer certification exam and to successfully design, architect, and engineer security solutions with the Google Cloud Platform.Bonus Material: IAM deny policiesWhat You Will Learn Understand the five security principles and how to use them to drive the development of modern security architectures in Google Cloud Secure identities with Cloud Identity and Identity & Access Management (IAM) Secure the network with segmentation and private connectivity Protect sensitive data with the Data Loss Prevention (DLP) API and encryption Monitor, log, audit, and troubleshoot security incidents with the Google Cloud Operations Suite Ensure compliance and address regulatory concerns Who This Book Is ForSoftware engineers specializing in DevOps, SecOps, and DataOps, who possess expertise in the Software Development Life Cycle (SDLC) methodologies within Agile teams. It also targets software architects with proficiency in various domains such as security, network, solution, data, infrastructure, cloud, and enterprise architecture.
Enhance your skills as a cloud investigator to adeptly respond to cloud incidents by combining traditional forensic techniques with innovative approachesKey FeaturesUncover the steps involved in cloud forensic investigations for M365 and Google WorkspaceExplore tools and logs available within AWS, Azure, and Google for cloud investigationsLearn how to investigate containerized services such as Kubernetes and DockerPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionAs organizations embrace cloud-centric environments, it becomes imperative for security professionals to master the skills of effective cloud investigation. Cloud Forensics Demystified addresses this pressing need, explaining how to use cloud-native tools and logs together with traditional digital forensic techniques for a thorough cloud investigation. The book begins by giving you an overview of cloud services, followed by a detailed exploration of the tools and techniques used to investigate popular cloud platforms such as Amazon Web Services (AWS), Azure, and Google Cloud Platform (GCP). Progressing through the chapters, you'll learn how to investigate Microsoft 365, Google Workspace, and containerized environments such as Kubernetes. Throughout, the chapters emphasize the significance of the cloud, explaining which tools and logs need to be enabled for investigative purposes and demonstrating how to integrate them with traditional digital forensic tools and techniques to respond to cloud security incidents. By the end of this book, you'll be well-equipped to handle security breaches in cloud-based environments and have a comprehensive understanding of the essential cloud-based logs vital to your investigations. This knowledge will enable you to swiftly acquire and scrutinize artifacts of interest in cloud security incidents. What you will learnExplore the essential tools and logs for your cloud investigationMaster the overall incident response process and approachFamiliarize yourself with the MITRE ATT&CK framework for the cloudGet to grips with live forensic analysis and threat hunting in the cloudLearn about cloud evidence acquisition for offline analysisAnalyze compromised Kubernetes containersEmploy automated tools to collect logs from M365Who this book is forThis book is for cybersecurity professionals, incident responders, and IT professionals adapting to the paradigm shift toward cloud-centric environments. Anyone seeking a comprehensive guide to investigating security incidents in popular cloud platforms such as AWS, Azure, and GCP, as well as Microsoft 365, Google Workspace, and containerized environments like Kubernetes will find this book useful. Whether you're a seasoned professional or a newcomer to cloud security, this book offers insights and practical knowledge to enable you to handle and secure cloud-based infrastructure.Table of ContentsIntroduction to the CloudTrends in Cyber and Privacy Laws and Their Impact on DFIRExploring the Major Cloud ProvidersDFIR Investigations - Logs in AWSDFIR Investigations - Logs in AzureDFIR Investigations - Logs in GCPCloud Productivity SuitesThe Digital Forensics and Incident Response ProcessCommon Attack Vectors and TTPsCloud Evidence AcquisitionAnalyzing Compromised ContainersAnalyzing Compromised Cloud Productivity Suites
Analyze system crashes and freezes, navigate kernel and complete memory spaces, and diagnose patterns of abnormal software behavior using the WinDbg debugger.
The Chief Data Officer (CDO) role emerged in 2001 and has since become increasingly important in organizations of all kinds. This role continues to raise questions about its relevance, responsibilities, positioning, and authority. Despite recent publications, debates remain lively."Data Office and Chief Data Officers" addresses key questions such as: Is there a need for one or multiple Chief Data Officers? What is the framework for this role? How should it be defined, implemented, and evolved? What are the expected benefits of this role?The book offers a rigorous and didactic analysis, starting with an exposition of the motivations and benefits behind creating a Data Office. Then it shows that this aspect of enterprise architecture is rarely synonymous with a distinct physical organizational entity. In reality, it encompasses a wide variety of organizational structures that create and maintain shared enterprise data management capabilities. Finally, the book effectively illustrates a variety of organizational models, details scenarios for implementing the CDO role, and explains the diverse functions fulfilled by CDOs.
Gain hands-on skills in Kubernetes Secrets management, ensuring a comprehensive overview of the Secrets lifecycle and prioritizing adherence to regulatory standards and business sustainabilityKey FeaturesMaster Secrets encryption, encompassing complex life cycles, key rotation, access control, backup, and recoveryBuild your skills to audit Secrets consumption, troubleshoot, and optimize for efficiency and complianceLearn how to manage Secrets through real-world cases, strengthening your applications' security posturePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionSecuring Secrets in containerized apps poses a significant challenge for Kubernetes IT professionals. This book tackles the critical task of safeguarding sensitive data, addressing the limitations of Kubernetes encryption, and establishing a robust Secrets management system for heightened security for Kubernetes.Starting with the fundamental Kubernetes architecture principles and how they apply to the design of Secrets management, this book delves into advanced Kubernetes concepts such as hands-on security, compliance, risk mitigation, disaster recovery, and backup strategies. With the help of practical, real-world guidance, you'll learn how to mitigate risks and establish robust Secrets management as you explore different types of external secret stores, configure them in Kubernetes, and integrate them with existing Secrets management solutions.Further, you'll design, implement, and operate a secure method of managing sensitive payload by leveraging real use cases in an iterative process to enhance skills, practices, and analytical thinking, progressively strengthening the security posture with each solution.By the end of this book, you'll have a rock-solid Secrets management solution to run your business-critical applications in a hybrid multi-cloud scenario, addressing operational risks, compliance, and controls.What you will learnExplore Kubernetes Secrets, related API objects, and CRUD operationsUnderstand the Kubernetes Secrets limitations, attack vectors, and mitigation strategiesExplore encryption at rest and external secret storesBuild and operate a production-grade solution with a focus on business continuityIntegrate a Secrets Management solution in your CI/CD pipelinesConduct continuous assessments of the risks and vulnerabilities for each solutionDraw insights from use cases implemented by large organizationsGain an overview of the latest and upcoming Secrets management trendsWho this book is forThis handbook is a comprehensive reference for IT professionals to design, implement, operate, and audit Secrets in applications and platforms running on Kubernetes. For developer, platform, and security teams experienced with containers, this Secrets management guide offers a progressive path-from foundations to implementation-with a security-first mindset. You'll also find this book useful if you work with hybrid multi-cloud Kubernetes platforms for organizations concerned with governance and compliance requirements.Table of ContentsUnderstanding Kubernetes Secret ManagementWalking through Kubernetes Secret Management ConceptsEncrypting secrets in transit and at restDebugging and Troubleshooting Kubernetes SecretsSecurity, Auditing and ComplianceDisaster Recovery and BackupsChallenges and Risk for Managing Secrets in Kubernetes Production EnvironmentExploring Secret Storage on AWSExploring Secret Storage on Azure(N.B. Please use the Look Inside option to see further chapters)
Strengthen your security posture in all aspects of CSPM technology, from security infrastructure design to implementation strategies, automation, and remedial actions using operational best practices across your cloud environmentKey FeaturesChoose the right CSPM tool to rectify cloud security misconfigurations based on organizational requirementsOptimize your security posture with expert techniques for in-depth cloud security insightsImprove your security compliance score by adopting a secure-by-design approach and implementing security automationPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThis book will help you secure your cloud infrastructure confidently with cloud security posture management (CSPM) through expert guidance that'll enable you to implement CSPM effectively, ensuring an optimal security posture across multi-cloud infrastructures.The book begins by unraveling the fundamentals of cloud security, debunking myths about the shared responsibility model, and introducing key concepts such as defense-in-depth, the Zero Trust model, and compliance. Next, you'll explore CSPM's core components, tools, selection criteria, deployment strategies, and environment settings, which will be followed by chapters on onboarding cloud accounts, dashboard customization, cloud assets inventory, configuration risks, and cyber threat hunting.As you progress, you'll get to grips with operational practices, vulnerability and patch management, compliance benchmarks, and security alerts. You'll also gain insights into cloud workload protection platforms (CWPPs). The concluding chapters focus on Infrastructure as Code (IaC) scanning, DevSecOps, and workflow automation, providing a thorough understanding of securing multi-cloud environments.By the end of this book, you'll have honed the skills to make informed decisions and contribute effectively at every level, from strategic planning to day-to-day operations.What you will learnFind out how to deploy and onboard cloud accounts using CSPM toolsUnderstand security posture aspects such as the dashboard, asset inventory, and risksExplore the Kusto Query Language (KQL) and write threat hunting queriesExplore security recommendations and operational best practicesGet to grips with vulnerability, patch, and compliance management, and governanceFamiliarize yourself with security alerts, monitoring, and workload protection best practicesManage IaC scan policies and learn how to handle exceptionsWho this book is forIf you're a cloud security administrator, security engineer, or DevSecOps engineer, you'll find this book useful every step of the way-from proof of concept to the secured, automated implementation of CSPM with proper auto-remediation configuration. This book will also help cybersecurity managers, security leads, and cloud security architects looking to explore the decision matrix and key requirements for choosing the right product. Cloud security enthusiasts who want to enhance their knowledge to bolster the security posture of multi-cloud infrastructure will also benefit from this book.Table of ContentsCloud Security Fundamentals Understanding CSPM and the Threat LandscapeCSPM Tools and FeaturesCSPM Tool Selection Deploying the CSPM ToolOnboarding Cloud AccountsOnboarding ContainersExploring Environment SettingsExploring Cloud Asset InventoryDashboard OverviewMajor Configuration RisksInvestigating Threats with Query Explorers and KQL(N.B. Please use the Look Inside option to see further chapters)
Follow a step-by-step roadmap to developing essential competencies in network architecture design, relationship management, systems, and services, coupled with certification guidance and expert tipsKey Features- Grasp the big picture of information technology infrastructure to become a successful network architect- Overcome challenges to improve network performance and configuration management- Advance your career by improving your skills using real-life examples and practical advice from an industry expert- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionBecoming a network architect is challenging-it demands hands-on engineering skills, collaboration with internal teams and C-Suite stakeholders, as well as adeptly managing external entities like vendors and service providers. The author taps into his extensive background in IT and security to help you gain a detailed understanding of the network architect's role and guide you in evolving into an effective network architect within an organization, fostering seamless communication with leadership teams and other stakeholders.Starting with a clear definition of the network architect's role, this book lays out a roadmap and discusses the attributes and mindset for success. You'll explore network architect design, physical infrastructure routing and switching, and network services such as DNS, MLAG, and service insertion. You'll also gain insights into the necessary skills and typical daily challenges faced by network architects. And to thoroughly prepare you to advance in your career, this handbook covers certifications and associated training for maintaining relevance in an organization, along with common interview questions for a network architect's position.By the end of this book, you'll be armed with essential concepts, techniques, and newfound skills to pursue a career as a network architect.What you will learn- Examine the role of a network architect- Understand the key design makers in an organization- Choose the best strategies to meet stakeholder needs- Be well-versed with networking concepts- Prepare for a network architect position interview- Distinguish the different IT architects in an organization- Identify relevant certification for network architects- Understand the various de facto network/fabric architect models used todayWho this book is forThis book is for network engineers and technicians aspiring to transition into the role of a network architect. Whether you are at the beginning of your journey or seeking guidance along the path, this book will support you with its deep coverage of key aspects such as design concepts, architectural requirements, relevant experience, certifications, and advanced education with a special emphasis on cloud best practices. A practical understanding of IT networking is necessary to get the most out of this book.Table of Contents- Understanding the Network Architect's Role- Network Architect in an Organization- Roadmap to Becoming a Network Architect- Attributes of a Network Architect- The Mindset of the Network Architect - the Principles of Design- Foundations of Network Architect - Part 1: Route/Switch- Foundations of Network Architecture - Part 2: Network Services- Foundations of Network Automation- Paradigm Shift to Cloud Computing- Preparing for Certifications and Cracking the Job Interview- The Skills to Become a Better Network Architect and Overcome Daily Challenges- Additional Information and Recommended Books
Kickstart your IoT design and implementation journey with this comprehensive book, covering basics to advanced concepts through practical examples and industry-standard practicesKey FeaturesMaster the different components that make up an IoT system to design and implement solutionsUnlock the powerful capabilities of cloud computing that enhance the efficiency of your IoT deploymentsIntegrate cutting-edge technologies, such as with generative AI, into your IoT projectsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionDevelop the skills essential for building Internet of Things solutions with this indispensable guide. In an era where industries heavily rely on IoT, this book will quickly familiarize you with its foundations, widespread use, implementation guided by best practices, and the crucial technologies that allow it to work effectively.Starting with the use of IoT in real-life scenarios, this book offers comprehensive insights into basic IoT hardware, protocols, and technologies. You'll then learn about architecting and implementing solutions such as wireless sensor networks, cloud computing with AWS, and crucial security considerations. You'll understand how these systems are operated and monitored over time and work with simple to complex, industry-grade systems, adhering to best practices. In later chapters, you'll be apprised of future IoT trends and strategies to manage the risks and opportunities that come with them. You'll also get to grips with a diverse set of tools, including hardware such as ESP32 and Raspberry Pi, and software such as Mosquitto and ChatGPT for generative AI capabilities.By the end of this IoT book, you'll be able to independently build and design complex, industry-standard solutions fully aligned with best practices.What you will learnGain a holistic understanding of IoT basics through real-life use casesExplore communication protocols and technologies integral to IoTUse AWS to build resilient, low-latency networksConstruct complex IoT networks, building upon foundational principlesIntegrate data analytics workloads and generative AI seamlessly with IoTUnderstand the security threat landscape of IoT and how to mitigate these risksDevelop industry-grade projects within the open source IoT communityEmbrace a futuristic perspective of IoT by understanding both risks and rewardsWho this book is forThe book is for novice electronics engineers, embedded systems specialists, and IoT developers as well as intermediate practitioners looking to advance in the world of industry-based IoT applications. While no prior knowledge of IoT is assumed, familiarity with at least one programming language is recommended to get the most out of this book.Table of ContentsAn Introduction to IoT Architecture, Hardware and Real-Life ApplicationsUnderstanding and Designing IoT NetworksIntegrating Application ProtocolsExamining Communication and Connectivity TechnologiesRealizing Wireless Sensor Networks within Smart SpacesCreating Applications on the EdgeWorking with Cloud Computing to Power IoT SolutionsDesigning for InteroperabilityOperating and Monitoring IoT NetworksWorking with Data and AnalyticsExamining Security and Privacy in IoTExploring and Innovating with Open Source IoTDeveloping IoT Solutions for Digital Transformation within Industry 4.0 Architecting Complex, Holistic IoT EnvironmentsLooking Ahead into the Future of IoT
Master edge computing architectures, unlock industry-specific patterns, apply proven best practices, and progress from basics to end-to-end solutionsKey Features:Unlock scalable edge solutions by mastering proven archetypes for real-world successLearn industry-specific patterns, tailoring solutions for diverse sector needsMake strategic decisions between cloud-out and edge-in strategies with confidencePurchase of the print or Kindle book includes a free PDF eBookBook Description:Enriched with insights from a hyperscaler's perspective, Edge Computing Patterns for Solution Architects will prepare you for seamless collaboration with communication service providers (CSPs) and device manufacturers and help you in making the pivotal choice between cloud-out and edge-in approaches.This book presents industry-specific use cases that shape tailored edge solutions, addressing non-functional requirements to unlock the potential of standard edge components. As you progress, you'll navigate the archetypes of edge solution architecture from the basics to network edge and end-to-end configurations. You'll also discover the weight of data and the power of automation for scale and immerse yourself in the edge mantra of low latency and high bandwidth, absorbing invaluable do's and don'ts from real-world experiences. Recommended practices, honed through practical insights, have also been added to guide you in mastering the dynamic realm of edge computing.By the end of this book, you'll have built a comprehensive understanding of edge concepts and terminology and be ready to traverse the evolving edge computing landscape.What You Will Learn:Distinguish edge concepts, recognizing that definitions vary among different audiencesExplore industry-specific architecture patterns that shape custom solutionsAnalyze three proven edge computing archetypes for real-world scalabilityApply best practices judiciously, adapting patterns to meet specific requirementsEvaluate data for storage or discarding based on compliance and industry normsAdvance from the foundational basics to complex end-to-end edge configurationsGain practical insights for achieving low-latency, high-bandwidth edge solutionsWho this book is for:Ideal for VPs of IT infrastructure, enterprise architects, solution architects, and SRE professionals with a background in cloud computing, this book is for individuals involved in crafting edge reference architectures and tailored solutions across diverse industries. It provides valuable insights and practical patterns drawn from real-world implementations in sectors such as retail, telecommunications, and manufacturing. Foundational knowledge of cloud computing is assumed to align with the advanced nature of the content covered.
This book provides the latest research and technology advances in building fire safety and smart firefighting. Different experts systemically review the application of new technologies like Artificial Intelligence, Internet of Things, Virtual Reality, Digitalization, and Metaverse in fire safety areas. These multi-disciplinary research and technology fusion will significantly change the fire resilience design and firefighting practices in the next 20 years. Achieving urban fire safety and resilience also plays a key role in developing future smart buildings and cities. This book attracts more young researchers into the latest multi-disciplinary fire safety research and promotes the application of the new technologies in firefighting.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.