All Books
Practical Cloud Security, 2nd Edition
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure fro
Cloud Native Security Cookbook
With the rise of the cloud, every aspect of IT has been shaken to its core. The fundamentals for building systems are changing, and although many of the principles that underpin security still ring true, their implementation has become unrecognizable. This practical book provides recipes for AWS, Azure, and GCP to help you enhance the security of y
Hybrid Cloud Backup For Dummies
Every modern technology-driven organization understands data is one of its most valuable assets. It's no surprise, then, that the protection of that data has become an increasing concern. This concern is made much more complex, though, because organizations no longer store all their data in a single location. With the advent of modern cloud - virtu
VMware Backup For Dummies, 2nd Edition
Server virtualization is one of the most disruptive innovations of the past twenty years. It is a foundational technology in cloud computing and has been widely deployed by businesses of all sizes in both on-premises data centers and in the public cloud. Today, virtual machines (VMs) host practically any workload from mission-critical enterprise ap
DevOps for Trustworthy Smart IoT Systems
ENACT is a research project funded by the European Commission under its H2020 program. The project consortium consists of twelve industry and research member organisations spread across the whole EU. The overall goal of the ENACT project was to provide a novel set of solutions to enable DevOps in the realm of trustworthy Smart IoT Systems. Smart Io
Security Risk Management for the Internet of Things
In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies for security risk assessment have prominent limitations when it comes to large scale, cyber-physical and interconnected IoT s
Db2 Optimization Techniques for SAP Database Migration to the Cloud
For many years, SAP migrations have been a standard process. An increasing number of customers are changing their database software to IBM Db2 for UNIX, Linux, and Windows or are moving their existing Db2 based infrastructure from on-premises into the cloud. When customers move to the cloud, a heterogeneous system copy is often needed because of a
Mainframe Application Modernization Patterns for Hybrid Cloud
As businesses digitally transform, they can impose significant demands on existing mainframe applications and data requiring the need to modernize to achieve business outcomes. To meet this need for modernization which includes greater agility, efficiency, and innovation, they are choosing a hybrid cloud strategy that brings together the best of IB
Kubernetes Security
Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features - including when to use what - and shows you how to augment those features with container i
Web Application Firewalls
Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session state and application layer activity. In this ebook, cyber security consultant Chad Russell covers the current application threat landscape for modern d