Vi bøger
Levering: 1 - 2 hverdage

Bøger udgivet af APress

Filter
Filter
Sorter efterSorter Populære
  • af Matthew Moodie
    325,95 kr.

    60-80% of Java developers require only simple Java Web applications. For these advanced, specialized users, the optimal deployment tool for simple Java-based Web applications is the open source Tomcat Web application server, which has graduated from Jakarta to become a topline Apache project, Apache Tomcat. Pro Apache Tomcat 6 fills an important need in the very large, very under-served Tomcat tech market. Unlike beginner manuals, this book wastes no time on Java or JSP introductions, and discusses JSP and Java code minimally. Instead, it gets right to the point and teaches you to use the newest Tomcat, version 6.

  • af Daniel Solis
    340,95 kr.

    C# is the most influential language on the .NET platform. As Microsoft's preferred language it has established a solid user base over recent versions and is attracting converts among developers from older technologies at an ever-increasing rate. With the recent release of .NET 2.0, the rate of migration to C# has never been faster. This book caters to that migrating audience. Illustrated C# 2005 packs the essentials of the C# language into just 350 pages, using an array of visual styles to provide a concise, clearly expressed quick reference to the core of the technology.

  • af Robbie Allen
    392,95 kr.

    Windows Server 2003 Networking Recipes offers a comprehensive, task-based guide to installing, deploying, and configuring the various networking protocols and services supported by Windows Server 2003. Currently, there is little printed information available on performing tasks associated with building and running these services. Instead, administrators are forced to wade through the Microsoft documentation to find what they need. This book makes it easy by presenting task-based information in a multi-solution format. Graphical, command-line, group policy, registry, and scripting solutions are included with each recipe as applicable.

  • af Dave Minter
    315,95 kr.

    This book will take developers through the first steps of using Spring whilst discussing the relevant technologies that Spring can be integrated with, what to be aware of and how working with Spring makes them easier to use. It focuses on the most useful features of Spring, including persistence and transaction management as well as the complete Spring web tools portfolio, and also introduces 3-tier application design and how to test these designs.Ideal for J2EE beginners, this book provides a broad insight into Spring's enterprise Java-based technologies, whilst showing how to use Spring correctly.

  • af Robert Walsh
    326,95 kr.

    *Uniquely and squarely focuses on the needs of a startup ISV*Several leading companies in their market segment are actually micro-ISVs, including Fog Creek (FogBugz) and Sun Belt Software (Counter-Spy). It's possible to be small AND successful, and this book is perfect for those who wish to try *Volume of Micro ISVs is increasing, signifying a deep, broad audience for this book

  • af Robin Dewson
    400,95 kr.

    * The only truly Beginning level book on the market that is tailored to the needs of aspiring developers with little or no experience. Assumes no prior SQL Server knowledge. * Explores the new 2005 features fully but also suitable for SQL Server 2000 users. * The book provides everything an aspiring developer needs to start building SQL Server database applications.

  • af Colin Yates
    361,95 kr.

    * 1st and only book to market on the open source Spring MVC and Web Flows, positioned to become the new "Struts." * Will be the only authoritative solution, by the Spring MVC and Spring Web Flows project leads themselves. * Two markets for this book. 1) Ex-patriots from the Struts world who have developed numerous web applications, but are looking for more and willing to take the initiative to experiment with new solutions; and 2) early adopter web developers into Web Flow, which has created a lot of buzz and will generate interest around this book as well as Spring MVC.

  • af David Powers
    335,95 kr.

    * The book supports the new version of Dreamweaver, a huge potential market! * This book is fairly unique within that market - a book purely focused on PHP web development with Dreamweaver that teaches professional techniques, and doesn't treat readers like idiots (it isn't aimed at the "dummies" audience.) * Dreamweaver has over 3 million users worldwide.

  • af Dan Clark
    358,95 kr.

    * Takes the reader completely through all stages of a programming project, including analysis, modeling, and development using object-oriented programming techniques and VB.NET. * VB.NET students and followers need a comprehensive resource to correct coding procedures. * This is a core trade area (careers begin here!) with large potential sales. There is a growing and strong following for VB.NET and a market for students and procedural programmers moving to OO-programming.

  • af Sayed Hashimi
    355,95 kr.

    * Offers a unique blend of theory and examples. * The first book covering service orientation with smart clients. * Only book brave enough to tackle the challenges surrounding testing agility in smart clients. * Gives practical case studies to re-enforce theory. * Introduces the concept of smart agents.

  • af Damon Armstrong
    412,95 kr.

    * Pro ASP.NET 2.0 Website Programming shows how to provide users and customers with ASP.NET 2.0 websites that are easy-to-use, perform well, and secure. * This book clearly explains how to handle all of the common website tasks effortlessly: including logging in, displaying important customer information, querying data, reporting. and security. * With this book, readers will learn ASP.NET 2.0 and how to apply it to solve real business problems.

  • af Steve Suehring
    326,95 kr.

    * Avoids proof-of-concept examples in favor of teaching readers how to produce well-coded secure CGI applications that will stand up to the demands of being placed into the potentially hostile environment of the Internet. * Takes a holistic approach to web application development and includes instruction on how to use ancillary programs such as Mason and Nagios that the reader will need to be familiar with in order to progress. * The book's comprehensive scope tackles all the areas of Perl web application development the reader is likely to need in creating their first web applications.

  • af Syed Fahad Gilani
    611,95 kr.

    *Provided tools complement the popular Service Oriented architectural design style advocated by Microsoft. *Covers breadth of Remoting, Reflection and Threading in a minimum amount of space. *Acts as a one-volume bible and desk reference for working .NET programmers.

  • af Sean Egan
    327,95 kr.

    *Author is the maintainer of Gaim; and provides excellent insight into the application *Practice building and extending Gaim, while learning GTK toolkit and network protocols *Tutorials are based on OS Gaim project: the #1 Sourceforge project out of 86,116 present on Sourceforge *In one 7 day period (from 8/23/04-8/30/04), it was downloaded nearly 55,000 times. Typing "gaim" into google brings up over 900,000 hits

  • af Matthew MacDonald
    355,95 kr.

    *Includes 15 controls (programs) covering a wide range of situations; provides both a working coded solution to their problem as well as the thinking behind it *Controls can be 'cut and pasted' or used as templates for readers to build their own controls

  • af Ravikanth Kothuri
    458,95 kr.

    * With Oracle 10g, for the first time, much of the Spatial functionality is provided for free (rather than as a priced option) in the database, thus massively increasing the potential audience.* Shows how any Oracle application that has a spatial element (e.g. postcode) can take advantage of Spatial functionality. * Contains case studies of more advanced applications of Spatial in healthcare, telecom ,retail, and distribution . * Oracle Spatial is recognized to be the standard platform for enterprise land management, mapping, telecom, transportation, and utility applications. Every major GIS tool vendor supports Oracle Spatial and all major map data providers deliver their data in Oracle Spatial format. * The book will be based on extensive feedback from training courses, discussion lists, and customers. It will recommend best practice approaches to the most common problems with which developers struggle. * The authors are all experienced and well-respected experts. The Oracle personnel contributing have a decade of experience with Spatial and in helping partners and customers fully leverage its capabilities. The technical reviewers include lead developers of the product. * Rather than simplified code snippets, the book provides real solutions that people can then build upon themselves.

  • af Stein Borge
    464,95 kr.

    * Covers common administration tasks for Exchange 5.5, Exchange 2000, Exchange 2003, Internet Information Server (IIS) 4 and 5 and 6, and Windows NT 4, 2000, XP and Windows 2003. * Extensive examples using Windows Management Instrumentation (WMI), which provides registry, network/system administrative, and security operations. * This book is the analog of the tools that were used in our very successful book, ISBN 1590592123 Automating UNIX and Linux Administration (Apress, 2003) for similar tasks.

  • af Colin Smith
    326,95 kr.

    How do you get the best out of Photoshop?It's a combination of knowing what you want and knowing how to do it properly: a mixture of creativity and acumen. As you learn more, you make fewer mistakes, your workflow becomes faster, and you have more time to explore creative possibilities.This book is dedicated to showing you the tricks of the trade, to sharing the insider's knowledge which will speed up your work, and to improving your understanding of Photoshop as a tool.The book is divided into eight chapters, in the first three we look at ways of improving your efficiency, good selection techniques, and how to use layers effectively. In the next three chapters we look at practical applications of Photoshop for retouching and correction, Web graphics and special effects. The final two chapters look at the practicalities of Photoshop's configuration and hardware.Throughout the book, we cover the new features of Photoshop 7, so if you're not yet up to speed with the latest version, we'll show you the way.You've mastered the basics of Photoshop and you're ready to move on to the next level - this book is jam-packed with the hints, tips, and advice from four Photoshop experts that you need to take you there.To get the most information out of each of the authors that we possibly could, we used a collaborative method of writing. Each of the four authors chose two subject areas to be the main writer on, and once they had finished writing the sections, they were passed on to the other three authors for them to add their own tips and tricks to. All these parts then went out to review, and the reviewers (themselves Photoshop users) added their tips to the tip-tank. All of these tips then came together in editorial, where they were ordered and polished. In this way, we hoped to maximize the amount of insightful and essential information, and to give you the greatest benefit.

  • af Connor McDonald
    390,95 kr.

    The days of Flash as a creative luxury are long gone. After months of downsizing, Flash creativity has been on a huge rationalization program. It is no longer enough to present animation in millions of colors and a hundred transparencies. It is no longer sufficient to provide interactivity and dynamism for their own sake.The purpose of this collection is to show how designers have taken Flash and made it work for its supper. What we discover is a series of creations that place Flash at the hub of cutting edge web content.The end result is a snapshot of Flash as the ideal medium.In these amazing examples, we see the software pushed to its limits to create unbeatable applications-a collapsible family tree, an interactive video learning system, and a drawing tool, capable of running online!Beyond this, we dip into the back-end capabilities to look at how to improve Flash still further. Some staple XML and PHP routines are brought in to add a bit of spice, while Flash's mysterious sharedObject command is hunted down and tamed to create a hybrid Tamagotchi houseplant-perfectly suited to lure surfers back to your website!

  • af Dale Michalk
    466,95 kr.

    * Up to date for the latest release version of .NET * Written by two Microsoft employees who have been using the technology for both internal and external use since it was in alpha stage. * Describes the ASP.NET server control architecture in Visual Studio .NET 2003 covering state management, events, rendering, cross-platform support, control lifecycle, localization and deployment. * Provides background on User Controls as compared with server controls, discussing the benefits and strengths of each. * Discusses the various methods available to create server controls including inheritance, composition, and from scratch. Discusses when to use Control as a base class as compared to WebControl highlighting the tradeoffs. * Demonstrates how to integrate client-side development technologies such as DHTML and JavaScript with server control technology to create powerful interactive controls. * Covers ASP.NET mobile server control development including an in depth discussion of browser capabilities and device adapters when targeting the various mobile devices available. * Covers how to enrich the design-time experience when building custom server controls including custom designers, custom property editors, as well as other design-time enhancements.

  • af Adam Neat
    438,95 kr.

    * Describes the IBM WebSphere versions 4.0 and 5.0 architecture from a nuts and bolts level, giving visibility to the technology and underlying WebSphere platform design * Describes how to proactively manage the performance of an IBM WebSphere v4 or v5 platform * Thorough descriptions of tuning WebSphere with performance and robustness in mind * Teaches the reader how to develop custom IBM WebSphere performance monitoring and management tools

  • af Venkata Ravi Kumar Yenugula
    480,95 kr.

    This book is your one-stop resource on MySQL database installation and server management for administrators. It covers installation, upgrades, monitoring, high availability, disaster recovery, security, and performance and troubleshooting. You will become fluent in MySQL 8.2, the latest version of the highly scalable and robust relational database system.With a hands-on approach, the book offers step-by-step guidance on installing, upgrading, and establishing robust high availability and disaster recovery capabilities for MySQL databases. It also covers high availability with InnoDB and NDB clusters, MySQL routers and enterprise MySQL tools, along with robust security design and performance techniques. Throughout, the authors punctuate concepts with examples taken from their experience with large-scale implementations at companies such as Meta and American Airlines, anchoring this practical guide to MySQL 8.2 administration in the real world.What YouWill LearnUnderstand MySQL architecture and best practices for administration of MySQL serverConfigure high availability, replication, disaster recovery with InnoDB and NDB enginesBack up and restore with MySQL utilities and tools, and configure the database for zero data lossTroubleshoot with steps for real-world critical errors and detailed solutionsWho This Book Is ForTechnical professionals, database administrators, developers, and engineers seeking to optimize MySQL databases for scale, security, and performance

  • af Alex Libby
    162,95 kr.

    Leverage the power of the Shadow DOM API to quickly create encapsulated code that keeps markup and styles separate within websites. Using little more than a text editor or free software, this project-oriented book simplifies the process of creating and manipulating the Shadow DOM API code in the browser for websites or online applications. You'll use a starting toolset to develop future projects, incorporate them into an existing workflow, and allow them to simplify complex components. This makes them more robust and less brittle when used in websites. You'll also see that websites do not have to convert the whole work process immediately; you can incorporate as little or as much as needed of the API, and build on this as your skills develop. We live in an age where speed and simplicity are of the essence. Beginning Shadow DOM API shows you the perfect way to create encapsulated code that can run in multiple frameworks with a minimum of fuss.You You'll LearnImplement the Shadow DOM API in a projectGain an appreciation of pointers using the Shadow DOM APIManage issues and security when using the Shadow DOM APIMake components and code more reusable, while maintaining desired stylingWho This Book Is ForWebsite developers who are already familiar with frameworks that Shadow DOM API, but do not want to have to use the heavy weight of a full-sized framework to add features such as DOM encapsulation to their code.

  • af Shivakumar R Goniwada
    429,95 kr.

    Explore the dynamics of digital identity, a crucial component in today¿s modern technology-driven era. This engaging book offers a deep understanding of how digital identity is evolving rapidly, why it¿s so significant, and offers organizations, regulatory bodies, and academicians the strategies needed to adopt secure decentralized digital identity features effectively. It¿s a must-read for those aiming to grasp the intricacies of digital identity and leverage it for future innovation and security.The book begins by redefining digital identity, examining its evolution and the profound impact it has on both individuals and organizations. It then delves into the development of digital identity strategies, laying the foundation for future digital transformations. Covering a wide range of topics, the book discusses the innovation, challenges, and technological exploration in digital identity. A special focus is given to biometric technologies and the implementation of decentralized digital identities, addressing critical areas such as identity governance, blockchain, AI and advanced biometrics. The book also investigates the implications of digital identity across various industries, including cross border travel, healthcare, social media, finance, metaverse, IoT etc. finally the book provides not only emerging trends but offers a glimpse into the future digital identity. Whether yoüre a tech professional, business leader, student or simply keen on understanding the impact of digital advancements, this book promises to offer insightful perspectives and practical solutions for navigating the complex world of digital identity. It underscores the importance of identity in spearheading digital innovation, making it a key resource for anyone looking to stay ahead in the digital landscape. As you reach its conclusion, yoüll be equipped with a wealth of knowledge and insights that are crucial in today¿s digital era.What You'll LearnDigital identity strategies and their role in shaping the future of digital identityDifferent facets of digital identitySpecifics of biometric technologies and decentralized digital identity Industry specific digital identity and its implementationCrucial aspects of privacy, ethics, and secure in the context of digital identityWho This Book Is ForSoftware professionals, security practitioners, architects, senior managers, executives, and students who are interested in digital identity.

  • af Enterprise Solution Architect
    380,95 kr.

    This book is for enterprise and solution architects, systems integrators, and anyone managing enterprise-scale, multi-cloud or hybrid IT landscapes. The book examines usage of Azure Arc for governance and systems management with security as an overarching theme. It is not an implementation manual but provides high-level guidance on best practices and links to detailed guidance. It offers insight into the types of problems that Azure Arc can solve, and will help you determine whether it is the right choice for your organization.Modern enterprise computing is an astonishing luxury land filled with never-before-seen hosting options on commercial clouds as well as advancements in the areas of private cloud and edge computing. The challenge with this plethora of choices is to manage and coordinate large IT estates which may bridge multiple public clouds and private datacenters. Visibility of operations to achieve security, cost control, and efficiency is often difficult to achieve. Data management is another area which is particularly fraught with complexity and risk.Industry leaders have made serious investments in the design of control plane products to address these gaps with varying approaches and degrees of success. Azure Arc is designed to provide a consolidated view of assets such as databases and Kubernetes installations across major cloud providers, edge locations, and customer-owned datacenters. It facilitates deployment of new infrastructure, patching and upgrades, monitoring, policy, and security controls for assets living on-premises or in competitor clouds as if they were native to Azure. While competitive products exist, at this writing none have the flexibility and reach of Arc to effectively manage very large hybrid estates.Readers will appreciate the author¿s approach of walking through typical enterprise computing scenarios while listing industry- or scenario-specific challenges that are difficult to overcome, and then reinforcing understanding by restating the challenges while explaining how Azure Arc can be utilized to remediate them.What You Will LearnDiscover what Azure Arc is, the types of problems it is intended to solve, and how to map your requirements to its capabilitiesStreamline and secure large Arc-enabled Kubernetes deployments via modern GitOps practicesUse Azure Arc to consolidate management across a broad range of hybrid and multi-cloud ecosystems through policy-driven governanceApply monitoring and automation to defend systems against security threats that are beyond the ability of manual administration to deflectUncover practical guidance that is written in a way that makes basic precepts approachable to non-technical stakeholders and then branches out into areas that will offer advanced readers new insights and consolidate a broad topic into a usable directionWho This BookIs ForEnterprise and solution architects, systems integrators, and anyone else looking to solve enterprise-scale administration problems across a multi-cloud or hybrid architecture

  • af Bruce Hopkins
    406,95 kr.

    Embrace the future of software development! ChatGPT for Java is the perfect starting point for Java developers to learn how to build intelligent applications using ChatGPT and Open AI APIs.This book takes you from the ground up to demonstrate how to use ChatGPT programmatically. You will learn the basics of ChatGPT and OpenAI APIs, including how to authenticate, send prompts, generate responses, test in the Playground, and handle errors. Each chapter includes practical exercises which demonstrate different API functionalities and bring your concepts to life. You will learn how to AI-enable your own applications using models such as GPT-4, GPT-3.5, Whisper, DALL-E, and many more. As a result, developers will understand that generative AI tools will not replace software development jobs! Instead, you will leverage ChatGPT as your Java AI-pair programmer to increase speed and productivity. You will also learn how ChatGPT can provide powerful Natural Language Processing (NLP) capabilities to your Java apps in order to understand various formats of unstructured text. Step-by-step, you will apply the concepts covered to create your own intelligent chatbots that can automatically process messages from either Slack on Discord. With this book, Java developers will be empowered to take their applications to new heights by leveraging the power of AI as this exciting field continues to evolve and transform.What You Will LearnAuthenticate with the ChatGPT and OpenAI APIs and learn how to engineer and send promptsTest your prompts in the ChatGPT PlaygroundHow to use multiple artificial intelligence models Harness the power the temperature, top_p, and other parameters that can ONLY be accessed by developers to create more unique and engaging responses from ChatGPTCreate intelligent bots for Slack or Discord serversIncorporate context into prompts for betterresponses and apply advanced features of the APIs.Explore future directions for ChatGPT and OpenAI Who This Book Is ForBeginning and intermediate Java developers who have a basic understanding of Java programming concepts and are interested in learning how to add intelligence to their applications by using ChatGPT programmatically. No prior experience with ChatGPT or OpenAI APIs is required.

  • af Abhishek Mishra
    413,95 kr.

    Understand and apply the design patterns outlined in this book to design, develop, and deploy scalable AI solutions that meet your organization's needs and drive innovation in the era of intelligent automation.This book begins with an overview of scalable AI systems and the importance of design patterns in creating robust intelligent solutions. It covers fundamental concepts and techniques for achieving scalability in AI systems, including data engineering practices and strategies. The book also addresses scalable algorithms, models, infrastructure, and architecture considerations. Additionally, it discusses deployment, productionization, real-time and streaming data, edge computing, governance, and ethics in scalable AI. Real-world case studies and best practices are presented, along with insights into future trends and emerging technologies.The book focuses on scalable AI and design patterns, providing an understanding of the challenges involved in developing AI systems that can handle large amounts of data, complex algorithms, and real-time processing. By exploring scalability, you will be empowered to design and implement AI solutions that can adapt to changing data requirements.What You Will LearnDevelop scalable AI systems that can handle large volumes of data, complex algorithms, and real-time processingKnow the significance of design patterns in creating robust intelligent solutionsUnderstand scalable algorithms and models to handle extensive data and computing requirements and build scalable AI systemsBe aware of the ethical implications of scalable AI systemsWho This Book Is ForAI practitioners, data scientists, and software engineers with intermediate-level AI knowledge and experience

  • af Morey J Haber
    446,95 kr.

    Today, it¿s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it¿s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities¿whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives.This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization¿s entire Identity Fabric. What You Will LearnUnderstand the concepts behind an identity and how its associated credentials and accounts can be leveraged as an attack vectorImplement an effective identity security strategy to manage identities and accounts based on roles and entitlements, including the most sensitive privileged accountsKnow the role that identity security controls play in the cyber kill chain and how privileges should be managed as a potential weak linkBuild upon industry standards and strategies such as Zero Trust to integrate key identity security technologies into a corporate ecosystemPlan for a successful identity and access security deployment; create an implementation scope and measurable risk reduction; design auditing, discovery, and regulatory reporting; and develop oversight based on real-world strategies to prevent identity attack vectorsWho This Book Is ForManagement and implementers in IT operations, security, and auditing looking to understand and implement an Identity and Access Management (IAM) program and manage privileges in these environments

  • af Puthiyavan Udayakumar
    413,95 kr.

    Microsoft Defender for IoT helps organizations identify and respond to threats aimed at IoT devices, increasingly becoming targets for cyberattacks. This book discusses planning, deploying, and managing your Defender for IoT system. The book is a comprehensive guide to IoT security, addressing the challenges and best practices for securing IoT ecosystems.The book starts with an introduction and overview of IoT in Azure. It then discusses IoT architecture and gives you an overview of Microsoft Defender. You also will learn how to plan and work with Microsoft Defender for IoT, followed by deploying OT Monitoring. You will go through air-gapped OT sensor management and enterprise IoT monitoring. You also will learn how to manage and monitor your Defender for IoT systems with network alerts and data. After reading this book, you will be able to enhance your skills with a broader understanding of IoT and Microsoft Defender for IoT-integrated best practices to design, deploy, and manage a secure enterprise IoT environment using Azure.What You Will LearnUnderstand Microsoft security services for IoTGet started with Microsoft Defender for IoTPlan and design a security operations strategy for the IoT environmentDeploy security operations for the IoT environmentManage and monitor your Defender for IoT SystemWho This Book Is ForCybersecurity architects and IoT engineers

  • af Dario Cabianca
    457,95 kr.

    Written in a simple and developer-focused style, this book gives you the tools and knowledge you need to ace the GCP Professional Cloud Security Engineer certification exam. The approach is two-fold: introducing and implementing all GCP cloud security concepts and controls based on the certification exam objectives, and demonstrating how these concepts can be applied to real-world scenarios.Your study begins with cloud identities in GCP and different identity types (user accounts, service accounts, groups, and domains) and how separation of duties is implemented with access controls and Identity and Access Management (IAM). Emphasis is placed on the unique GCP approach to managing resources, with its clear distinction between resource ownership and resource billing. Following the defense in depth principle, the book shifts focus to network security and introduces different types of constructs that enable micro-segmentation, as they are implemented in a software-defined network. A chapter devoted to data protection is included. You will learn how to leverage the Data Loss Prevention (DLP) application programming interface (API) to prevent access to your workloads¿ sensitive data from unauthorized use. Examples on how to use the DLP API are provided using the Go language, which is becoming widely adopted in the developer community due to its simplicity, and high-performance networking and multi-processing capabilities. Encryption at rest, in use, and in transit is covered with an overview on how GCP implements confidential computing. The book concludes with an examination of the GCP services you need to know to monitor, audit, and ensure compliance with the laws and regulations where your workloads and infrastructure operate.By the end of the book, you will have acquired the knowledge and confidence to pass the GCP Professional Cloud Security Engineer certification exam and to successfully design, architect, and engineer security solutions with the Google Cloud Platform.Bonus Material: IAM deny policiesWhat You Will Learn Understand the five security principles and how to use them to drive the development of modern security architectures in Google Cloud Secure identities with Cloud Identity and Identity & Access Management (IAM) Secure the network with segmentation and private connectivity Protect sensitive data with the Data Loss Prevention (DLP) API and encryption Monitor, log, audit, and troubleshoot security incidents with the Google Cloud Operations Suite Ensure compliance and address regulatory concerns Who This Book Is ForSoftware engineers specializing in DevOps, SecOps, and DataOps, who possess expertise in the Software Development Life Cycle (SDLC) methodologies within Agile teams. It also targets software architects with proficiency in various domains such as security, network, solution, data, infrastructure, cloud, and enterprise architecture.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.