Red Hat and IT security with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditing

Use Red Hat’s security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hy...

Descripción completa

Detalles Bibliográficos
Otros Autores: Chatterjee, Rithik, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: [Place of publication not identified] : Apress [2021]
Edición:1st ed. 2021.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009631411606719
Tabla de Contenidos:
  • Chapter 1: Introduction to IT Security
  • Chapter 2: Red Hat Hybrid Cloud Infrastructure
  • Chapter 3: Security in DevOps and Automation
  • Chapter 4: Hyper-converged Infrastructure
  • Chapter 5: Red Hat Smart Management and Red Hat Insights
  • Chapter 6: Red Hat Security Auditing
  • Chapter 7: Case Studies.