Security Books


A Practical Guide to Cloud Migration

Cloud Google

Why do enterprises feel daunted when undertaking a large-scale cloud transformation? A move to the cloud usually offers substantial rewards. Once companies make this transition, they unlock new business opportunities that fundamentally change the way they work. With this report, members of the Google team will show you how to navigate the cultural

Load Balancing in the Cloud

Nginx AWS Cloud

Use of redundant servers has long been a solution for meeting sudden spikes in demand, machine failures, and outages. Cloud services greatly reduce the cost and hassle of provisioning redundant equipment and load balancers and give you the ability to deal with separate network, application, and client-side loads. But today there are many options to

The Enterprise Path to Service Mesh Architectures, 2nd Edition

Planning to build a microservice-driven cloud native application or looking to modernize existing application services? Consider using a service mesh. A service mesh approach can help you create robust and scalable applications, but it also introduces new challenges. This updated report answers common questions regarding service mesh architectures

Podman in Action

Kubernetes Docker

Podman in Action shows you how to deploy containerized applications on Linux, Windows, and MacOS systems using Podman. Written by Daniel Walsh, who leads the Red Hat Podman team, this book teaches you how to securely manage the entire application lifecycle without human intervention. You'll quickly get to grips with Podman's unique advantages over

97 Things Every SRE Should Know

SRE

Site reliability engineering (SRE) is more relevant than ever. Knowing how to keep systems reliable has become a critical skill. With this practical book, newcomers and old hats alike will explore a broad range of conversations happening in SRE. You'll get actionable advice on several topics, including how to adopt SRE, why SLOs matter, when you ne

Protecting SQL Server Data

SQL

In Protecting SQL Server Data, John Magnabosco demonstrates how sensitive data, stored in SQL Server, can be protected using an efficient and maintainable encryption-based data architecture. He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, views

Cloud Design Patterns

Cloud

Cloud applications have a unique set of characteristics. They run on commodity hardware, provide services to untrusted users, and deal with unpredictable workloads. These factors impose a range of problems that you, as a designer or developer, need to resolve. Your applications must be resilient so that they can recover from failures, secure to pro

Building Modern Web Applications With Spring Boot and Vaadin

Java Spring

This guide is a practical introduction to web application development with Spring Boot and Vaadin. It covers the entire development process, from setup to deployment, following a step-by-step approach. You can replicate each section at your own pace as you follow along. The content is suitable for anyone familiar with Java who wants to build a web

The Path to GitOps

Git

GitOps delivers on the vision promised to a DevOps culture, and while the practice isn't new, organizations are starting to realize how valuable it is to deliver products in a fast, highly automated, and secure way - without compromising the quality of their code. This book outlines the tools, workflows, and structures that teams need to have in pl

Getting GitOps

Git Kubernetes Openshift

Cloud environments such as Kubernetes and OpenShift benefit from processes different from the ones developers traditionally used for standalone applications. Automation becomes a necessity in large environments and fast-changing configurations of hosts. Getting GitOps is a practical guide through the jungle of modern development with Kubernetes, wi