Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
As data management and integration continue to evolve rapidly, storing all your data in one place, such as a data warehouse, is no longer scalable. In the very near future, data will need to be distributed and available for several technological solutions. With this practical book, youll learnhow to migrate your enterprise from a complex and tightly coupled data landscape to a more flexible architecture ready for the modern world of data consumption.Executives, data architects, analytics teams, and compliance and governance staff will learn how to build a modern scalable data landscape using the Scaled Architecture, which you can introduce incrementally without a large upfront investment. Author Piethein Strengholt provides blueprints, principles, observations, best practices, and patterns to get you up to speed.Examine data management trends, including technological developments, regulatory requirements, and privacy concernsGo deep into the Scaled Architecture and learn how the pieces fit togetherExplore data governance and data security, master data management, self-service data marketplaces, and the importance of metadata
Become a Salesforce Data Cloud implementation expert.Book DescriptionSurvival in today's business landscape hinges on delivering exceptional customer experiences, and Customer Data Platforms (CDPs) are pivotal in achieving this goal. The 'Ultimate Salesforce Data Cloud for Customer Experience' is your indispensable guide to unraveling the Salesforce ecosystem, illuminating its applications' significance in diverse business scenarios. Dive into the transformative potential of Customer Data Platforms, understanding their role in unlocking tremendous value for enterprises. Explore the prowess of Salesforce Data Cloud, a leading CDP platform, and gain practical insights into its seamless implementation.The book explores Salesforce Data Cloud architecture, gaining actionable insights for implementing both Customer Data Platforms and Salesforce Data Cloud. It will navigate the pivotal realms of data security and privacy, establishing a sturdy foundation for customer-centric strategies. The book also covers success stories that showcase the transformative outcomes achieved through the utilization of Salesforce Data Cloud. The end of the book serves as a roadmap for those aspiring to conquer the Salesforce Data Cloud Consultant exam.Table of Contents1. Introducing Salesforce Platform2. Introduction to Customer Data Platform3. Going beyond CDP: Salesforce Data Cloud4. Salesforce Data Cloud Architecture5. Implementing a Customer Data Platform6. Implementing Salesforce Customer Data Cloud7. Data Security and Privacy8. Success Stories with Salesforce Data Cloud9. The Way Forward for Creating Great Customer Experiences10. Preparation for the Salesforce Data Cloud Consultant Exam Index
Quickly and efficiently prepare for the Google Associate Cloud Engineer certification with the proven Sybex methodIn the newly updated Second Edition of Google Cloud Certified Associate Cloud Engineer Study Guide, expert engineer and tech educator Dan Sullivan delivers an essential handbook for anyone preparing for the challenging Associate Cloud Engineer exam offered by Google and for those seeking to upgrade their Google Cloud engineering skillset.The book provides readers with coverage of every domain and competency tested by the Associate Cloud Engineer exam, including how to select the right Google compute service from the wide variety of choices, how to choose the best storage option for your services, and how to implement appropriate security controls and network functionality.This guide also offers:* A strong emphasis on transforming readers into competent, job-ready applicants, with a focus on building skills in high demand by contemporary employers* Concrete test-taking strategies, techniques, and tips to help readers conquer exam anxiety* Complimentary access to a comprehensive online learning environment, complete with practice testsA must-have resource for practicing and aspiring Google Cloud engineers, Google Cloud Certified Associate Cloud Engineer Study Guide allows you to prepare for this challenging certification efficiently and completely.
Prepare for Microsoft Exam AZ-305 and help demonstrate your real-world expertise in designing cloud and hybrid solutions that run on Microsoft Azure, including identity, governance, monitoring, data storage, business continuity, and infrastructure. Designed for modern IT professionals, this Exam Ref focuses on the critical thinking and decision-...
A practical guide to deploying, managing, and leveraging the power of Microsoft's unified security solutionKey Features- Learn how to leverage Microsoft's XDR and SIEM for long-term resilience- Explore ways to elevate your security posture using Microsoft Defender tools such as MDI, MDE, MDO, MDA, and MDC- Discover strategies for proactive threat hunting and rapid incident response- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionTired of dealing with fragmented security tools and navigating endless threat escalations? Take charge of your cyber defenses with the power of Microsoft's unified XDR and SIEM solution.This comprehensive guide offers an actionable roadmap to implementing, managing, and leveraging the full potential of the powerful unified XDR + SIEM solution, starting with an overview of Zero Trust principles and the necessity of XDR + SIEM solutions in modern cybersecurity. From understanding concepts like EDR, MDR, and NDR and the benefits of the unified XDR + SIEM solution for SOC modernization to threat scenarios and response, you'll gain real-world insights and strategies for addressing security vulnerabilities. Additionally, the book will show you how to enhance Secure Score, outline implementation strategies and best practices, and emphasize the value of managed XDR and SIEM solutions. That's not all; you'll also find resources for staying updated in the dynamic cybersecurity landscape.By the end of this insightful guide, you'll have a comprehensive understanding of XDR, SIEM, and Microsoft's unified solution to elevate your overall security posture and protect your organization more effectively.What You Will Learn- Optimize your security posture by mastering Microsoft's robust and unified solution- Understand the synergy between Microsoft Defender's integrated tools and Sentinel SIEM and SOAR- Explore practical use cases and case studies to improve your security posture- See how Microsoft's XDR and SIEM proactively disrupt attacks, with examples- Implement XDR and SIEM, incorporating assessments and best practices- Discover the benefits of managed XDR and SOC services for enhanced protectionWho this book is forThis comprehensive guide is your key to unlocking the power of Microsoft's unified XDR and SIEM offering. Whether you're a cybersecurity pro, incident responder, SOC analyst, or simply curious about these technologies, this book has you covered.CISOs, IT leaders, and security professionals will gain actionable insights to evaluate and optimize their security architecture with Microsoft's integrated solution. This book will also assist modernization-minded organizations to maximize existing licenses for a more robust security posture.Table of Contents- Introduction to Zero Trust- Introduction to XDR & SIEM- Microsoft Unified XDR and SIEM Solution- Power of Investigation and SOC Experience with Microsoft XDR + SIEM- Defend attacks with Microsoft XDR + SIEM- Security Misconfigurations & Vulnerability Management- Assess and Improve Secure Score- XDR implementation Strategy, Roadmap and Best Practices- Managed XDR & SIEM- Useful Resources & References
Gain the expertise needed for the Google Cloud Digital Leader certification with the help of industry insights, effective testing strategies, and exam questions designed to help you make informed tech decisions aligned with business goalsKey FeaturesLearn about data management, AI, monetization, security, and the significance of infrastructure modernizationBuild a solid foundation in Google Cloud, covering all technical essentials necessary for a Google Cloud Digital LeaderTest your knowledge of cloud and digital transformation through realistic exam questionsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionTo thrive in today's world, leaders and technologists must understand how technology shapes businesses. As organizations shift from self-hosted to cloud-native solutions, embracing serverless systems, strategizing data use, and defining monetization becomes imperative. The Google Cloud Digital Leader Certification Guide lays a solid foundation of industry knowledge, focused on the Google Cloud platform and the innovative ways in which customers leverage its technologies.The book starts by helping you grasp the essence of digital transformation within the Google Cloud context. You'll then cover core components of the platform, such as infrastructure and application modernization, data innovation, and best practices for environment management and security. With a series of practice exam questions included, this book ensures that you build comprehensive knowledge and prepare to certify as a Google Cloud Digital Leader. Going beyond the exam essentials, you'll also explore how companies are modernizing infrastructure, data ecosystems, and teams in order to capitalize on new market opportunities through platform expertise, best practices, and real-world scenarios.By the end of this book, you'll have learned everything you need to pass the Google Cloud Digital Leader certification exam and have a reference guide for future requirements.What you will learnLeverage Google Cloud's AI and ML solutions to create business valueIdentify Google Cloud solutions for data management and smart analyticsAcquire the skills necessary to modernize infrastructure and applications on GCPUnderstand the value of APIs and their applications in cloud environmentsMaster financial governance and implement best practices for cost managementUnderstand the cloud security approach and benefits of Google Cloud securityFind out how IT operations must adapt to thrive in the cloudWho this book is forThis Google Cloud fundamentals book is suitable for individuals with both technical and non-technical backgrounds looking for a starting point to pursue more advanced Google Cloud certifications. No prior experience is required to get started with this book; only a keen interest in learning and exploring cloud concepts, with a focus on Google Cloud.Table of ContentsCloud Computing Fundamentals - An Introduction to Digital TransformationThe Shift to Public CloudUnderstanding the Different Cloud Computing ModelsThe Role of Data in Digital TransformationGoogle Cloud Solutions for Data ManagementMachine Learning and Artificial Intelligence on Google CloudModernizing IT Infrastructure with Google CloudModernizing Applications with Google CloudThe Value of APIsGoogle Cloud's Approach to SecurityIT Operations in the CloudResource Monitoring and Application Performance Management on Google CloudSample Questions: Exam Preparation
Explore proven techniques and best practices for designing, deploying, and managing cloud-native applications in multi-cloud environments with the help of real-world examples, success stories, and emerging technologiesKey FeaturesDiscover optimal solutions in multi-cloud environments using AWS, Azure, and GCP tools and technologiesExcel in designing, developing, and securing cloud-native apps with Docker, Kubernetes, and IstioLearn design patterns, cost optimization, best practices, and pitfalls to avoid in multi-cloud appsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionUnleash the power of cloud computing with Multi-Cloud Handbook for Developers, your guide to mastering the nuances of cloud-native and multi-cloud, covering practical strategies for design, development, and management. Explore the essential concepts, challenges, and methodologies critical for navigating the complex landscape of modern cloud computing. Using core architectural and design principles (such as microservices and 12-factor architecture) and advanced strategies (such as distributed application design patterns, domain-driven design (DDD), and API-first strategies), you'll learn how to build portable and efficient apps across various cloud platforms. You'll understand how to leverage Infrastructure as Code (IaC), continuous integration and deployment (CI/CD), GitOps, and DevOps practices, along with containerization and orchestration techniques using Docker and Kubernetes. You'll also get to grips with data, security, compliance, and cloud cost management strategies in multi-cloud environments.With real-world case studies, best practices, and insights into future trends, this book will equip you with the skills to develop, manage, troubleshoot, and innovate cloud-native applications across diverse cloud platforms, positioning you at the forefront of the cloud computing revolution.What you will learnUnderstand the core structures and implications of cloud-native and multi-cloud appsExplore key principles and patterns to build agile, scalable, and future-proof appsMaster cloud-native essentials: service mesh, DDD, and API-centric approachesImplement deployment pipelines with advanced IaC, CI/CD, DevSecOps, and GitOps techniquesManage and monitor data, security, compliance, and identity access in multi-cloud scenariosOptimize your cloud costs with shift-left and FinOps practicesGet ready for the future of cloud-native and multi-cloud technologyWho this book is forIdeal for cloud-native and cloud developers, platform engineers, software architects, and IT professionals focused on building and managing cloud-native applications in multi-cloud environments, this book is an indispensable guide for students and researchers seeking insights into cloud-native concepts and multi-cloud architectures. A basic understanding of cloud computing, contemporary software development, system design, and cloud platforms such as AWS, Azure, and GCP, will prove useful.Table of ContentsDiscovering the Multi-Cloud and Cloud-Native UniverseBuilding the Backbone of Cloud-Native ApplicationsDesigning for Diversity with Multi-Cloud Application StrategiesCrafting and Deploying in the Multi-Cloud as a DeveloperManaging Security, Data, and Compliance on Multi-CloudMaximizing Value and Minimizing Cost of Multi-CloudTroubleshooting Multi-Cloud ApplicationsLearning from Pioneers and Case StudiesBringing Your Cloud-Native Application to LifeFuture-Proofing Your Cloud Computing Skills
Navigating Databricks with Ease for Unparalleled Data Engineering Insights.Book DescriptionUltimate Data Engineering with Databricks is a comprehensive handbook meticulously designed for professionals aiming to enhance their data engineering skills through Databricks. Bridging the gap between foundational and advanced knowledge, this book employs a step-by-step approach with detailed explanations suitable for beginners and experienced practitioners alike.Focused on practical applications, the book employs real-world examples and scenarios to teach how to construct, optimize, and maintain robust data pipelines. Emphasizing immediate applicability, it equips readers to address real data challenges using Databricks effectively. The goal is not just understanding Databricks but mastering it to offer tangible solutions.Beyond technical skills, the book imparts best practices and expert tips derived from industry experience, aiding readers in avoiding common pitfalls and adopting strategies for optimal data engineering solutions. This book will help you develop the skills needed to make impactful contributions to organizations, enhancing your value as a data engineering professional in today's competitive job market.What you will learn¿ Acquire proficiency in Databricks fundamentals, enabling the construction of efficient data pipelines.¿ Design and implement high-performance data solutions for scalability.¿ Apply essential best practices for ensuring data integrity in pipelines.¿ Explore advanced Databricks features for tackling complex data tasks.¿ Learn to optimize data pipelines for streamlined workflows.Table of Contents1. Fundamentals of Data Engineering2. Mastering Delta Tables in Databricks3. Data Ingestion and Extraction4. Data Transformation and ETL Processes5. Data Quality and Validation6. Data Modeling and Storage7. Data Orchestration and Workflow Management8. Performance Tuning and Optimization9. Scalability and Deployment Considerations10. Data Security and Governance Last Words Index
Introducing the Ultimate Guide to Azure DevOps Mastery!Are you ready to take your DevOps skills to the next level and become a certified Azure DevOps Engineer? Look no further! Our comprehensive book bundle, "Azure DevOps Engineer: Exam AZ-400 - Designing and Implementing Microsoft DevOps Solutions," is your ticket to success in the world of DevOps.This bundle includes four essential books tailored to help you ace the AZ-400 exam and excel in your DevOps career:Book 1 - Azure DevOps Fundamentals: A Beginner's Guide to Exam AZ-400: Kickstart your journey with this beginner-friendly guide that covers the core concepts of Azure DevOps. From understanding the basics to navigating through the Azure DevOps ecosystem, this book sets the foundation for your success.Book 2 - Mastering Continuous Integration and Continuous Deployment with Azure DevOps: Exam AZ-400: Dive deep into the world of CI/CD pipelines with this comprehensive guide. Learn how to automate software delivery, improve collaboration, and accelerate deployment cycles using Azure DevOps.Book 3 - Advanced Azure DevOps Techniques: Architecting for Scalability and Resilience - Exam AZ-400: Take your skills to new heights with advanced techniques for designing scalable and resilient DevOps solutions. Explore architectural patterns, scalability strategies, and resilience best practices to tackle complex challenges head-on.Book 4 - DevOps Expert: Achieving Mastery in Azure DevOps and Beyond - Exam AZ-400: Become a true DevOps expert with this ultimate guide. Covering a wide range of advanced topics, including security, compliance, and optimization techniques, this book empowers you to overcome any obstacle and excel in your DevOps journey.Whether you're a beginner looking to get started in DevOps or an experienced professional aiming for mastery, this book bundle has something for everyone. Packed with real-world examples, practical exercises, and expert insights, it's the perfect companion for your journey to becoming a certified Azure DevOps Engineer.Don't miss out on this opportunity to level up your DevOps skills and achieve success in your career. Get your copy of "Azure DevOps Engineer: Exam AZ-400 - Designing and Implementing Microsoft DevOps Solutions" today!
Introducing the NIST Cloud Security Book Bundle!Are you ready to take your cloud security knowledge to the next level? Look no further than our comprehensive book bundle, NIST Cloud Security: Cyber Threats, Policies, and Best Practices. This bundle includes four essential volumes designed to equip you with the skills and insights needed to navigate the complex world of cloud security.Book 1: NIST Cloud Security 101: A Beginner's Guide to Securing Cloud Environments Perfect for those new to cloud security, this book provides a solid foundation in the basics of cloud computing and essential security principles. Learn how to identify common threats, implement basic security measures, and protect your organization's cloud infrastructure from potential risks.Book 2: Navigating NIST Guidelines: Implementing Cloud Security Best Practices for Intermediate Users Ready to dive deeper into NIST guidelines? This volume is tailored for intermediate users looking to implement cloud security best practices that align with NIST standards. Explore practical insights and strategies for implementing robust security measures in your cloud environment.Book 3: Advanced Cloud Security Strategies: Expert Insights into NIST Compliance and Beyond Take your cloud security expertise to the next level with this advanced guide. Delve into expert insights, cutting-edge techniques, and emerging threats to enhance your security posture and achieve NIST compliance. Discover how to go beyond the basics and stay ahead of evolving cyber risks.Book 4: Mastering NIST Cloud Security: Cutting-Edge Techniques and Case Studies for Security Professionals For security professionals seeking mastery in NIST compliance and cloud security, this book is a must-read. Gain access to cutting-edge techniques, real-world case studies, and expert analysis to safeguard your organization against the most sophisticated cyber threats. Elevate your skills and become a leader in cloud security.This book bundle is your go-to resource for understanding, implementing, and mastering NIST compliance in the cloud. Whether you're a beginner, intermediate user, or seasoned security professional, the NIST Cloud Security Book Bundle has something for everyone. Don't miss out on this opportunity to enhance your skills and protect your organization's assets in the cloud. Order your copy today!
Introducing "Edge Computing 101: Novice to Pro" - your ultimate guide to mastering edge computing from beginner to expert level. This comprehensive book bundle includes four essential volumes packed with expert techniques and practical applications to propel your understanding and proficiency in edge computing.Book 1, "Edge Computing Fundamentals: A Beginner's Guide to Distributed Systems," provides a solid foundation for understanding the core principles of distributed systems. Whether you're new to the field or seeking to reinforce your knowledge, this book equips you with the fundamental concepts necessary to embark on your journey into the world of edge computing.In Book 2, "Edge Computing Architectures: Design Principles and Best Practices," you'll delve deeper into the intricacies of designing effective edge computing architectures. From deployment models to optimization techniques, this volume offers invaluable insights and best practices to help you build robust and scalable edge systems.For those looking to advance their skills, Book 3, "Advanced Edge Computing: Scalability, Security, and Optimization Strategies," explores advanced techniques and strategies for overcoming scalability challenges, enhancing security measures, and optimizing performance in edge environments. With real-world examples and case studies, you'll gain practical expertise to tackle complex issues and achieve optimal outcomes.Finally, Book 4, "Edge Computing in Industry 4.0: Practical Applications and Future Trends," focuses on the practical applications of edge computing across various industries, with a special emphasis on Industry 4.0. Discover how edge computing is transforming manufacturing, healthcare, smart cities, and more, and gain insights into future trends shaping the industry.Whether you're a novice looking to build a strong foundation or a seasoned professional aiming to stay ahead of the curve, "Edge Computing 101: Novice to Pro" has you covered. With its comprehensive coverage, expert guidance, and practical insights, this book bundle is your essential companion for mastering the dynamic world of edge computing. Get your copy today and take your edge computing skills to the next level!
Build scalable, cost-effective, high-performance, and secure architectures using AWS Outposts, AWS Local Zones, AWS Wavelength, and AWS Snow services guided by best practices and practical examplesKey FeaturesTake advantage of the opportunities and challenges arising from the exponential growth of connected devicesUse AWS edge compute services to extend your applications to wherever they are neededFollow guided tutorials for building an IIoT gateway and a distributed edge application with AWS servicesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe surge in connected edge devices has driven organizations to capitalize on the opportunities presented by the massive amounts of data generated by these devices. However, adapting to this landscape demands significant changes in application architectures.This book serves as your guide to edge computing fundamentals, shedding light on the constraints and risks inherent in selecting solutions within this domain. You'll explore an extensive suite of edge computing services from AWS, gaining insights into when and how to use AWS Outposts, AWS Wavelength, AWS Local Zones, AWS Snow Family, and AWS IoT Greengrass. With detailed use cases, technical requirements, and architectural patterns, you'll master the practical implementation of these services and see how they work in real life through step-by-step examples, using the AWS CLI and AWS Management Console. To conclude, you'll delve into essential security and operational considerations to maximize the value delivered by AWS services.By the end of this book, you'll be ready to design powerful edge computing architectures and handle complex edge computing use cases across multiple AWS services.What you will learnOvercome network challenges faced at the near and far edgeLeverage services in over 450 points of presence at the edge of the AWS global backboneDeploy edge solutions in disconnected scenarios using AWS Snow FamilyBuild multi-access edge (MEC) solutions with 5G and AWS WavelengthReduce latency for your users with AWS Local ZonesConfigure AWS Snowcone as an IIoT gateway with AWS IoT GreengrassExtend your AWS VPC into your on-premise data center with AWS OutpostsDeploy distributed applications for core, near, and far edge cloud servicesWho this book is forThis book is designed for cloud architects, cloud engineers, solutions architects, and IoT architects tasked with building edge compute solutions using AWS. If you want to master the full range of edge computing services offered by AWS, this book is for you. A basic understanding of AWS services and networking is assumed.Table of ContentsGetting Started with Edge Computing on AWSUnderstanding Network and Security for Near Edge ComputingUnderstanding Network and Security for Far Edge ComputingAddressing Disconnected Scenarios with AWS Snow FamilyIncorporating AWS Outposts into Your On Premises DatacenterLowering First-Hop Latency with AWS Local ZonesUsing AWS Wavelength Zones on Public 5G NetworksUtilizing the Capabilities of the AWS Global NetworkArchitecting for Disconnected Edge Computing ScenariosBuilding Multi-Access Edge Architectures (MEC)Addressing the Requirements of Immersive Experiences with AWSConfiguring an AWS Snowcone to be an IoT GatewayDeploying a Distributed OpenRAN NFV to the AWS CloudExploring the Future of AWS Edge Computing Services
Explore cloud economics and cost optimization for Azure, AWS, and GCP with this practical guide covering methods, strategies, best practices, and real-world examples, bridging theory and applicationKey FeaturesLearn cost optimization best practices on different cloud services using FinOps principles and examplesGain hands-on expertise in improving cost estimations and devising cost reduction plans for Azure, AWS, and GCPAnalyze case studies that illustrate the application of FinOps in diverse real-world scenariosPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIn response to the escalating challenges of cloud adoption, where balancing costs and maximizing cloud values is paramount, FinOps practices have emerged as the cornerstone of fi nancial optimization. This book serves as your comprehensive guide to understanding how FinOps is implemented in organizations worldwide through team collaboration and proper cloud governance.Presenting FinOps from a practical point of view, covering the three phases-inform, optimize, and operate-this book demonstrates an end-to-end methodology for optimizing costs and performing financial management in the cloud. You'll learn how to design KPIs and dashboards for judicious cost allocation, covering key features of cloud services such as reserved instances, rightsizing, scaling, and automation for cost optimization. This book further simplifi es architectural concepts and best practices, enabling you to design superior and more optimized solutions. Finally, you'll discover potential synergies and future challenges, from the integration of artifi cial intelligence to cloud sustainability considerations, to prepare for the future of cloud FinOps.By the end of this book, you'll have built the expertise to seamlessly implement FinOps practices across major public clouds, armed with insights and ideas to propel your organization toward business growth.What you will learnExamine challenges in cloud adoption and cost optimizationGain insight into the integration of FinOps within organizationsExplore the synergies between FinOps and DevOps, IaC, and change managementLeverage tools such as Azure Advisor, AWS CUDOS, and GCP cost reportsEstimate and optimize costs using cloud services key features and best practicesImplement cost dashboards and reports to improve visibility and controlUnderstand FinOps roles and processes crucial for organizational successApply FinOps through real-life examples and multicloud architecturesWho this book is forThis book is for cloud engineers, cloud and solutions architects, as well as DevOps and SysOps engineers interested in learning more about FinOps and cloud financial management for efficiently architecting, designing, and operating software solutions and infrastructure using the public clouds. Additionally, team leads, project managers, and financial teams aiming to optimize cloud resources will also find this book useful. Prior knowledge of cloud computing and major public clouds is assumed.Table of ContentsIntroduction to FinOps PrinciplesUnderstanding How FinOps Fits in Cloud GovernanceDesigning and Executing the Tagging and Naming Convention StrategiesEstimating Cloud Solutions Costs and Initiative SavingsImproving Cost visibility with Dashboards and ReportsImplementing IaaS Compute OptimizationImplementing PaaS and Other Compute Optimization InitiativesImplementing Databases OptimizationImplementing Storage Optimization(N.B. Please use the Look Inside option to see further chapters)
Explore use cases and best practices to seamlessly migrate and scale legacy enterprise-grade applications running on on-premises vSphere environments to VMware Cloud SDDCs running on AWS infrastructureKey FeaturesUnderstand data center extension, migration, disaster recovery, and app modernization through a variety of use casesBecome an expert at configuring, automating, and troubleshooting VMC on AWS SDDCImplement design considerations, best practices, and onboarding preflight checklist for optimal performance on VMC on AWSPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIf you're looking to effortlessly transition from on-premises VMware vSphere environments or capital expenditure (CAPEX) to an agile operational expenditure (OPEX) model, trust the VMware Cloud (VMC) on AWS platform for swift re-platforming of legacy applications into cloud-native framework. This comprehensive guide addresses hybrid cloud challenges, offering detailed solutions within the VMware Cloud on AWS ecosystem.Covering the foundational architecture, software-defined data center (SDDC) components of VMware Cloud on AWS, network and security configurations, and AWS service integrations, this book lays the foundation for you to advance to vCenter management, vSAN storage policies, NSX architecture, compute policies, SDDC console management, and the EDRS mechanism for cluster scaling. You'll also explore integrated services such as VMware HCX for migration, VMware Aria suite, Tanzu Managed Kubernetes, and disaster recovery.Further, the book takes you through VMware Cloud APIs and guides you in managing workloads with VMware Cloud on AWS Outposts. With the help of practical insights, configuration tips, and best practices, you'll unlock the full potential of VMC on AWS.By the end of this book, you'll be equipped to successfully architect and manage VMware Cloud on AWS SDDCs, handling day-to-day operations expertly.What you will learnExamine the foundational architecture components of VMware Cloud on AWS, including vSphere, vSAN, and NSXExplore the various integrated services available within VMware Cloud on AWSDelve into VMware Cloud on AWS SDDC, vCenter, and vSAN optimizationsBuild applications and apply best practices within the VMware Cloud on AWS to manage day-to-day operationsStreamline infrastructure management for VMware Cloud on AWS with Infrastructure as Code (IaC)Extend cloud capabilities to on-premises environments using VMware Cloud on AWS OutpostsWho this book is forThe book is intended for cloud and solutions architects, DevOps engineers, site reliability engineers (SREs), system and network admins, and cloud engineers with experience in on-premises VMware or AWS administration, facilitating the seamless integration of VMware cloud technologies. Prior understanding of cloud computing, virtualization principles, VMware vSphere administration, vSAN, and NSX along with AWS cloud basics will be helpful.Table of ContentsUnderstanding the architecture of VMC on AWS componentsExploring networking, security, and AWS integrations Discovering migration services for VMC on AWS Configuring your first SDDC from scratchConfiguring vCenter, vSAN, and VMC console Understanding Networking and security configurationsExploring add-on services configurationBuilding applications and managing operationsUsing infrastructure as code on VMC on AWSManaging workload sizing and Cloud costsKnowing the best practices, FAQs, and Common pitfallsAppendix- Preflight checklist before onboarding
This book is for enterprise and solution architects, systems integrators, and anyone managing enterprise-scale, multi-cloud or hybrid IT landscapes. The book examines usage of Azure Arc for governance and systems management with security as an overarching theme. It is not an implementation manual but provides high-level guidance on best practices and links to detailed guidance. It offers insight into the types of problems that Azure Arc can solve, and will help you determine whether it is the right choice for your organization.Modern enterprise computing is an astonishing luxury land filled with never-before-seen hosting options on commercial clouds as well as advancements in the areas of private cloud and edge computing. The challenge with this plethora of choices is to manage and coordinate large IT estates which may bridge multiple public clouds and private datacenters. Visibility of operations to achieve security, cost control, and efficiency is often difficult to achieve. Data management is another area which is particularly fraught with complexity and risk.Industry leaders have made serious investments in the design of control plane products to address these gaps with varying approaches and degrees of success. Azure Arc is designed to provide a consolidated view of assets such as databases and Kubernetes installations across major cloud providers, edge locations, and customer-owned datacenters. It facilitates deployment of new infrastructure, patching and upgrades, monitoring, policy, and security controls for assets living on-premises or in competitor clouds as if they were native to Azure. While competitive products exist, at this writing none have the flexibility and reach of Arc to effectively manage very large hybrid estates.Readers will appreciate the author¿s approach of walking through typical enterprise computing scenarios while listing industry- or scenario-specific challenges that are difficult to overcome, and then reinforcing understanding by restating the challenges while explaining how Azure Arc can be utilized to remediate them.What You Will LearnDiscover what Azure Arc is, the types of problems it is intended to solve, and how to map your requirements to its capabilitiesStreamline and secure large Arc-enabled Kubernetes deployments via modern GitOps practicesUse Azure Arc to consolidate management across a broad range of hybrid and multi-cloud ecosystems through policy-driven governanceApply monitoring and automation to defend systems against security threats that are beyond the ability of manual administration to deflectUncover practical guidance that is written in a way that makes basic precepts approachable to non-technical stakeholders and then branches out into areas that will offer advanced readers new insights and consolidate a broad topic into a usable directionWho This BookIs ForEnterprise and solution architects, systems integrators, and anyone else looking to solve enterprise-scale administration problems across a multi-cloud or hybrid architecture
How to effectively transition your career into the SRE field¿DESCRIPTION This book is a must-read, providing insights into SRE principles for beginners and experienced professionals. Study the fundamentals and evolution of SRE, gaining a solid foundation for success in today's tech-centric world.Starting with the fundamentals, it expands into the evolution of SRE from traditional IT roles, laying a solid foundation for understanding its pivotal role in today's tech-driven world. The core of the book focuses on practical strategies and advanced techniques. Readers will learn about automating tasks, effective incident management, setting realistic service level objectives, and managing error budgets. These topics are crucial for maintaining system reliability while fostering innovation. Additionally, the book emphasizes performance optimization and scalability, ensuring that systems run smoothly and adapt and grow effectively.High performance SRE emphasizes more than just technical skills. It encourages teamwork, a blame-free culture, and continuous learning, empowering SRE professionals for operational excellence and organizational success.WHAT YOU WILL LEARN¿ Understand core SRE principles and adapt them to various environments.¿ Automate routine tasks for efficiency and error reduction.¿ Efficiently manage and respond to incidents, reducing downtime.¿ Set and manage SLOs and error budgets for balanced development.¿ Optimize system performance and ensure scalability in operations.WHO THIS BOOK IS FORThis book caters to students, application developers, software engineers, system administrators, and anyone who wishes to understand how to have a rewarding career in the field of SRE.
This book features research papers presented at the Second International Conference on Recent Advancements in Artificial Intelligence (ICRAAI 2023), held at Poornima University, Jaipur, India during 15 ¿ 16 December 2023. The book presents original research work in the areas of computational intelligence, artificial intelligence, machine learning, data science and data analytics, cloud computing, and internet of things. The book is beneficial for readers from both academia and industry.
Content distribution, i.e., distributing digital content from one node to another node or multiple nodes, is the most fundamental function of the Internet. Since Amazon's launch of EC2 in 2006 and Apple's release of the iPhone in 2007, Internet content distribution has shown a strong trend toward polarization. On the one hand, considerable investments have been made in creating heavyweight, integrated data centers ("heavy-cloud") all over the world, in order to achieve economies of scale and high flexibility/efficiency of content distribution. On the other hand, end-user devices ("light-end") have become increasingly lightweight, mobile and heterogeneous, creating new demands concerning traffic usage, energy consumption, bandwidth, latency, reliability, and/or the security of content distribution. Based on comprehensive real-world measurements at scale, we observe that existing content distribution techniques often perform poorly under the abovementioned new circumstances.Motivated by the trend of "heavy-cloud vs. light-end," this book is dedicated to uncovering the root causes of today's mobile networking problems and designing innovative cloud-based solutions to practically address such problems. Our work has produced not only academic papers published in prestigious conference proceedings like SIGCOMM, NSDI, MobiCom and MobiSys, but also concrete effects on industrial systems such as Xiaomi Mobile, MIUI OS, Tencent App Store, Baidu PhoneGuard, and WiFi.com. A series of practical takeaways and easy-to-follow testimonials are provided to researchers and practitioners working in mobile networking and cloud computing. In addition, we have released as much code and data used in our research as possible to benefit the community.
Written in a simple and developer-focused style, this book gives you the tools and knowledge you need to ace the GCP Professional Cloud Security Engineer certification exam. The approach is two-fold: introducing and implementing all GCP cloud security concepts and controls based on the certification exam objectives, and demonstrating how these concepts can be applied to real-world scenarios.Your study begins with cloud identities in GCP and different identity types (user accounts, service accounts, groups, and domains) and how separation of duties is implemented with access controls and Identity and Access Management (IAM). Emphasis is placed on the unique GCP approach to managing resources, with its clear distinction between resource ownership and resource billing. Following the defense in depth principle, the book shifts focus to network security and introduces different types of constructs that enable micro-segmentation, as they are implemented in a software-defined network. A chapter devoted to data protection is included. You will learn how to leverage the Data Loss Prevention (DLP) application programming interface (API) to prevent access to your workloads¿ sensitive data from unauthorized use. Examples on how to use the DLP API are provided using the Go language, which is becoming widely adopted in the developer community due to its simplicity, and high-performance networking and multi-processing capabilities. Encryption at rest, in use, and in transit is covered with an overview on how GCP implements confidential computing. The book concludes with an examination of the GCP services you need to know to monitor, audit, and ensure compliance with the laws and regulations where your workloads and infrastructure operate.By the end of the book, you will have acquired the knowledge and confidence to pass the GCP Professional Cloud Security Engineer certification exam and to successfully design, architect, and engineer security solutions with the Google Cloud Platform.Bonus Material: IAM deny policiesWhat You Will Learn Understand the five security principles and how to use them to drive the development of modern security architectures in Google Cloud Secure identities with Cloud Identity and Identity & Access Management (IAM) Secure the network with segmentation and private connectivity Protect sensitive data with the Data Loss Prevention (DLP) API and encryption Monitor, log, audit, and troubleshoot security incidents with the Google Cloud Operations Suite Ensure compliance and address regulatory concerns Who This Book Is ForSoftware engineers specializing in DevOps, SecOps, and DataOps, who possess expertise in the Software Development Life Cycle (SDLC) methodologies within Agile teams. It also targets software architects with proficiency in various domains such as security, network, solution, data, infrastructure, cloud, and enterprise architecture.
Today, machine learning algorithms are often distributed across multiple machines to leverage more computing power and more data. However, the use of a distributed framework entails a variety of security threats. In particular, some of the machines may misbehave and jeopardize the learning procedure. This could, for example, result from hardware and software bugs, data poisoning or a malicious player controlling a subset of the machines. This book explains in simple terms what it means for a distributed machine learning scheme to be robust to these threats, and how to build provably robust machine learning algorithms.Studying the robustness of machine learning algorithms is a necessity given the ubiquity of these algorithms in both the private and public sectors. Accordingly, over the past few years, we have witnessed a rapid growth in the number of articles published on the robustness of distributed machine learning algorithms. We believe it is time to provide a clear foundation to this emerging and dynamic field. By gathering the existing knowledge and democratizing the concept of robustness, the book provides the basis for a new generation of reliable and safe machine learning schemes. In addition to introducing the problem of robustness in modern machine learning algorithms, the book will equip readers with essential skills for designing distributed learning algorithms with enhanced robustness. Moreover, the book provides a foundation for future research in this area.
Gain hands-on skills in Kubernetes Secrets management, ensuring a comprehensive overview of the Secrets lifecycle and prioritizing adherence to regulatory standards and business sustainabilityKey FeaturesMaster Secrets encryption, encompassing complex life cycles, key rotation, access control, backup, and recoveryBuild your skills to audit Secrets consumption, troubleshoot, and optimize for efficiency and complianceLearn how to manage Secrets through real-world cases, strengthening your applications' security posturePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionSecuring Secrets in containerized apps poses a significant challenge for Kubernetes IT professionals. This book tackles the critical task of safeguarding sensitive data, addressing the limitations of Kubernetes encryption, and establishing a robust Secrets management system for heightened security for Kubernetes.Starting with the fundamental Kubernetes architecture principles and how they apply to the design of Secrets management, this book delves into advanced Kubernetes concepts such as hands-on security, compliance, risk mitigation, disaster recovery, and backup strategies. With the help of practical, real-world guidance, you'll learn how to mitigate risks and establish robust Secrets management as you explore different types of external secret stores, configure them in Kubernetes, and integrate them with existing Secrets management solutions.Further, you'll design, implement, and operate a secure method of managing sensitive payload by leveraging real use cases in an iterative process to enhance skills, practices, and analytical thinking, progressively strengthening the security posture with each solution.By the end of this book, you'll have a rock-solid Secrets management solution to run your business-critical applications in a hybrid multi-cloud scenario, addressing operational risks, compliance, and controls.What you will learnExplore Kubernetes Secrets, related API objects, and CRUD operationsUnderstand the Kubernetes Secrets limitations, attack vectors, and mitigation strategiesExplore encryption at rest and external secret storesBuild and operate a production-grade solution with a focus on business continuityIntegrate a Secrets Management solution in your CI/CD pipelinesConduct continuous assessments of the risks and vulnerabilities for each solutionDraw insights from use cases implemented by large organizationsGain an overview of the latest and upcoming Secrets management trendsWho this book is forThis handbook is a comprehensive reference for IT professionals to design, implement, operate, and audit Secrets in applications and platforms running on Kubernetes. For developer, platform, and security teams experienced with containers, this Secrets management guide offers a progressive path-from foundations to implementation-with a security-first mindset. You'll also find this book useful if you work with hybrid multi-cloud Kubernetes platforms for organizations concerned with governance and compliance requirements.Table of ContentsUnderstanding Kubernetes Secret ManagementWalking through Kubernetes Secret Management ConceptsEncrypting secrets in transit and at restDebugging and Troubleshooting Kubernetes SecretsSecurity, Auditing and ComplianceDisaster Recovery and BackupsChallenges and Risk for Managing Secrets in Kubernetes Production EnvironmentExploring Secret Storage on AWSExploring Secret Storage on Azure(N.B. Please use the Look Inside option to see further chapters)
Master edge computing architectures, unlock industry-specific patterns, apply proven best practices, and progress from basics to end-to-end solutionsKey Features:Unlock scalable edge solutions by mastering proven archetypes for real-world successLearn industry-specific patterns, tailoring solutions for diverse sector needsMake strategic decisions between cloud-out and edge-in strategies with confidencePurchase of the print or Kindle book includes a free PDF eBookBook Description:Enriched with insights from a hyperscaler's perspective, Edge Computing Patterns for Solution Architects will prepare you for seamless collaboration with communication service providers (CSPs) and device manufacturers and help you in making the pivotal choice between cloud-out and edge-in approaches.This book presents industry-specific use cases that shape tailored edge solutions, addressing non-functional requirements to unlock the potential of standard edge components. As you progress, you'll navigate the archetypes of edge solution architecture from the basics to network edge and end-to-end configurations. You'll also discover the weight of data and the power of automation for scale and immerse yourself in the edge mantra of low latency and high bandwidth, absorbing invaluable do's and don'ts from real-world experiences. Recommended practices, honed through practical insights, have also been added to guide you in mastering the dynamic realm of edge computing.By the end of this book, you'll have built a comprehensive understanding of edge concepts and terminology and be ready to traverse the evolving edge computing landscape.What You Will Learn:Distinguish edge concepts, recognizing that definitions vary among different audiencesExplore industry-specific architecture patterns that shape custom solutionsAnalyze three proven edge computing archetypes for real-world scalabilityApply best practices judiciously, adapting patterns to meet specific requirementsEvaluate data for storage or discarding based on compliance and industry normsAdvance from the foundational basics to complex end-to-end edge configurationsGain practical insights for achieving low-latency, high-bandwidth edge solutionsWho this book is for:Ideal for VPs of IT infrastructure, enterprise architects, solution architects, and SRE professionals with a background in cloud computing, this book is for individuals involved in crafting edge reference architectures and tailored solutions across diverse industries. It provides valuable insights and practical patterns drawn from real-world implementations in sectors such as retail, telecommunications, and manufacturing. Foundational knowledge of cloud computing is assumed to align with the advanced nature of the content covered.
How to automate AWS Cloud using Terraform IaC best practices¿DESCRIPTION AWS Cloud Automation allows organizations to effortlessly organize and handle their cloud resources. Terraform, an open-source provisioning tool, transforms the old manual way of doing things by allowing users to define, deploy, and maintain infrastructure as code, ensuring consistency, scalability, and efficiency. This book explains AWS Cloud Automation using Terraform, which is a simple and clear syntax that lets users define the infrastructure needs. Terraform simplifies setting up and managing infrastructure, reducing errors and fostering team collaboration. It enables version control, letting you monitor changes and implement CI/CD pipelines, effortlessly. The book guides you in creating and managing AWS resources through a simple configuration file, allowing you to define virtual machines, networks, databases, and more. Discover how Terraform makes organizing infrastructure code easy, promoting reusability and simple maintenance with consistent patterns across projects and teams.This book will empower readers of AWS Cloud Automation to embrace a modern, scalable, and efficient approach to managing cloud infrastructure. By combining the power of Terraform with the flexibility of AWS.WHAT YOU WILL LEARN¿ Implement automated workflows with Terraform in CI/CD pipelines, for consistent and reliable deployments.¿ Secure your cloud environment with robust Identity and Access Management (IAM) policies.¿ Build and deploy highly available and scalable applications using EC2, VPC, and ELB.¿ Automate database deployments and backups with RDS and DynamoDB for worry-free data management.¿ Implement serverless architectures with EKS and Fargate for agile and cost-effective development.WHO THIS BOOK IS FORThis book is crafted for both aspiring and seasoned infrastructure enthusiasts, cloud architects, solution architects, SysOps Administrators, and DevOps professionals ready to apply the power of Terraform as their AWS go-to Infrastructure as Code (IaC) tool.
Edge computing has been identified as one of the key technologies for 5G networks and beyond due to two prominent advantages: low network latency and reduced core network load. By empowering cloud capabilities and IT service environments at the network edge, edge computing can well support applications of 5G and beyond, such as augmented/virtual reality (AR/VR), vehicular network (ultra-reliable low-latency communication services)¿Internet of Things (massive machine type communication services), and mobile high-definition video (enhanced mobile broadband services). Therefore, edge computing has attracted the attention of both industry and academia since its emergence.This book highlights the progress of 5G edge computing in both industry and academia according to our long-term efforts, including the current practice of public edge providers, the research process of edge computing from academia, the integration of edge computing with 5G, and the future visions of edge computing in the 6G era. From this book, the readers can benefit from: (1) the first comprehensive measurement study on a leading public edge platform, NEP (next-generation edge platform); 2) a clear and in-depth introduction of the key technologies of 5G edge computing; (3) the latest progress of 5G-integrated edge computing; and (4) pioneering exploration of 6G edge computing based on Tiansuan constellation ¿ an open satellite-terrestrial integrated platform. Both the researchers from academia or practitioners from industry can benefit significantly from this book.
This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, CLOUD 2023, held in Shenzhen, China, during December 17¿18, 2023.The 5 full papers and 3 short papers in this book were carefully reviewed and selected from 13 submissions. The conference facilitates the exploration of emerging research areas and the shaping of the future landscape of cloud computing.
Unlocking the Cloud's Infinite Possibilities¿DESCRIPTION In today's data-driven world, cloud storage has emerged as an indispensable tool for businesses and individuals alike. With its ability to store and manage vast amounts of data seamlessly, cloud storage has revolutionized the way we handle information. However, navigating the complexities of cloud storage can be a daunting task. This is where this book steps in.Commence on a comprehensive journey through cloud computing fundamentals, exploring evolution, service models, and deployment strategies. Uncover diverse cloud storage technologies, including object, block, and file storage, and look into Amazon S3, Azure Blob Storage, and Google Cloud Storage. Learn to configure storage effectively, implement scalable solutions, and seamlessly integrate with applications. Master disaster recovery, data migration, and hybrid cloud architectures for optimal resource utilization. Perfect the art of cost optimization and performance monitoring, maximizing your cloud storage investment.Mastering Cloud Storage is your ultimate guide to achieving operational excellence, improving system reliability, and enhancing your career in cloud engineering and DevOps.WHAT YOU WILL LEARN¿ Master Amazon S3 and Azure Blob Storage.¿ Implement robust data security and encryption.¿ Apply DevOps and DevSecOps in cloud storage.¿ Optimize for high availability and reliability.¿ Navigate industry-specific regulations and compliance.WHO THIS BOOK IS FORWhether you are a seasoned IT professional, a DevOps engineer, a data scientist, system administrators, or a cloud architect, this systematic guide empowers you to unlock the full potential of cloud storage.
In this internet world, keeping information and data safe and secure on computers and other storage devices is a major challenge. Cryptography is a powerful tool for safeguarding sensitive data while it's stored on a hard drive being sent over an insecure network connection. Cryptography is used in various applications of technologically advanced societies, such as the security of ATM cards, electronic commerce and computer passwords. The goals of cryptography are data integrity, confidentiality, authentication and non-repudiation. Cryptography involves both encryption and decryption, maintaining the confidentiality of the keys. Another factor to consider is the strength of the key, which determines how difficult it is to break and retrieve the key. Deoxyribonucleic Acid (DNA) cryptography is a new and innovative branch of information security that can be used in integration with traditional cryptographic approaches to improve security. Cryptography is the science of hiding the meaning of a message by putting it in a secret or code language. It is a technique for preventing unwanted people from accessing data. The encryption technique and key are the two most important components of cryptography. It is used in data communication for sending and receiving messages in a secret form while travelling through the network. Cryptography is the area that uses arithmetic and logical operations to create powerful encryption methods to secure data and communication over the internet. In today's online business and e-commerce world, confidentiality, availability and integrity of stored and transferred data are crucial. Cryptography is used to protect the data from the third party as well as for user authentication. It is the art of utilising an encryption key to encode secret information in an illegible, concealed format. Decryption with the same secret key retrieves the data in its original form at the receiver end. The encrypted data and the ability to decrypt it are only available to the person who has the secret key. The most important components of any cryptography process are plain data, secret key, encryption algorithm, cipher data and decryption algorithm.
DevOps design, architecture and its implementations with best practices¿DESCRIPTION DevOps design patterns encompass a set of best practices aimed at revolutionizing the software development lifecycle. It introduces a collaborative and streamlined approach to bring together different aspects of development, testing, deployment, and operations. At its core, DevOps seeks to break down traditional silos between these functions, fostering a culture of cooperation and continuous communication among teams. This interconnectivity enables faster, higher-quality software delivery by eliminating bottlenecks. DevOps best practices offer significant benefits to DevOps engineers, enhancing their effectiveness and efficiency. Examine best practices for version control and dynamic environments closely, learn how to "build once, deploy many," and master the art of continuous integration and delivery (CI/CD), reducing manual intervention and minimizing errors. Each chapter equips you with actionable insights, guiding you through automated testing, robust monitoring, and effective rollback strategies. You will confidently tap into the power of Infrastructure as Code (IaC) and DevSecOps methodologies, ensuring secure and scalable software delivery.Overall, DevOps best practices enable DevOps engineers to deliver high-quality, scalable, and secure software in a more streamlined and collaborative environment. WHAT YOU WILL LEARN¿ Apply DevOps design patterns to optimize system architecture and performance.¿ Implement DevOps best practices for efficient software development.¿ Establish robust and scalable CI/CD processes with security considerations.¿ Effectively troubleshoot issues and ensure reliable and resilient software.¿ Seamlessly integrate security practices into the entire software development lifecycle, from coding to deployment.WHO THIS BOOK IS FORSoftware Developers, Software Architects, Infrastructure Engineers, Operation Engineers, Cloud Engineers, Quality Assurance (QA) Engineers, and all DevOps professionals across all experience levels to master efficient software delivery through proven design patterns.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.