Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Cloud computing 406
- Application software 223
- Development 223
- Windows Azure 196
- Microsoft Azure (Computing platform) 168
- Microsoft .NET Framework 165
- Microsoft software 139
- Examinations 123
- Database management 93
- Management 81
- Security measures 81
- Computer networks 77
- Microsoft and .NET 73
- Artificial intelligence 65
- Certification 61
- Machine learning 61
- Electronic data processing personnel 59
- Computer software 56
- Computer security 53
- SQL server 52
- Computer programs 50
- Web services 47
- Data processing 42
- Information technology 41
- Computer programming 40
- Client/server computing 39
- Operating systems (Computers) 38
- Application program interfaces (Computer software) 34
- Microsoft 32
- Microsoft Office 31
-
601Publicado 2024“…Design and architect new generation cloud-based data warehouses using Azure and AWS. This book provides an in-depth understanding of how to build modern cloud-native data warehouses, as well as their history and evolution. …”
Libro electrónico -
602Publicado 2024Materias:Libro electrónico
-
603
-
604Publicado 2023Libro electrónico
-
605Publicado 2023“…By the end of this book, you will be able to confidently apply and assess security controls for AWS, Azure, and GCP, allowing you to independently and effectively confirm compliance in the cloud. …”
Libro electrónico -
606
-
607Publicado 2022Tabla de Contenidos: “…Table of Contents Preparing for Your Microsoft Exam Describing Security Methodologies Understanding Key Security Concepts Key Microsoft Security and Compliance Principles Defining Identity Principles/Concepts and the Identity Services within Azure AD Describing the Authentication and Access Management Capabilities of Azure AD Describing the Identity Protection and Governance Capabilities of Azure AD Describing Basic Security Services and Management Capabilities in Azure Describing Security Management and Capabilities of Azure Describing Threat Protection with Microsoft 365 Defender Describing the Security Capabilities of Microsoft Sentinel Describing Security Management and the Endpoint Security Capabilities of Microsoft 365 Compliance Management Capabilities in Microsoft Describing Information Protection and Governance Capabilities of Microsoft 365 Describing Insider Risk, eDiscovery, and Audit Capabilities in Microsoft 365 Describing Resource Governance Capabilities in Azure Final Assessment/ Mock Exam…”
Libro electrónico -
608Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Section 1: DevOps and Infrastructure as Code -- Chapter 1: The DevOps Culture and Infrastructure as Code Practices -- Getting started with DevOps -- Implementing CI/CD and continuous deployment -- Continuous integration (CI) -- Continuous delivery (CD) -- Continuous deployment -- Understanding IaC practices -- The benefits of IaC -- IaC languages and tools -- The IaC topology -- The evolution of the DevOps culture -- Summary -- Questions -- Further reading -- Chapter 2: Provisioning Cloud Infrastructure with Terraform -- Technical requirements -- Installing Terraform -- Manual installation -- Installation by script -- Integrating Terraform with Azure Cloud Shell -- Configuring Terraform for Azure -- Creating the Azure SP -- Configuring the Terraform provider -- The Terraform configuration for local development and testing -- Writing a Terraform script to deploy an Azure infrastructure -- Following some Terraform good practices -- Running Terraform for deployment -- Initialization -- Previewing the changes -- Applying the changes -- Understanding the Terraform life cycle with different command-line options -- Using destroy to better rebuild -- Formatting and validating the configuration -- The Terraform life cycle within a CI/CD process -- Protecting the state file with a remote backend -- Summary -- Questions -- Further reading -- Chapter 3: Using Ansible for Configuring IaaS Infrastructure -- Technical requirements -- Installing Ansible -- Installing Ansible with a script -- Integrating Ansible into Azure Cloud Shell -- Ansible artifacts -- Configuring Ansible -- Creating an Ansible inventory -- The inventory file -- Configuring hosts in the inventory -- Testing the inventory -- Executing the first playbook -- Writing a basic playbook…”
Libro electrónico -
609
-
610por Nomani, QamarTabla de Contenidos: “…-- Summary -- Further reading -- Part 2: CSPM Deployment Aspects -- Chapter 5: Deploying the CSPM Tool -- Deployment model overview -- Key considerations for effective deployment -- The SaaS/cloud-based deployment model -- On-premises deployments -- Hybrid deployment -- Leveraging managed service provider (MSP) support -- Different deployment methodologies -- Agent-based deployment -- API-based deployment -- Proxy-based deployment -- Tool deployment best practices -- Summary -- Further reading -- Chapter 6: Onboarding Cloud Accounts -- Key considerations and steps involved -- Account onboarding key considerations -- Steps for successful onboarding -- Best practices for onboarding of cloud accounts -- Account onboarding steps -- Onboarding AWS accounts -- Onboarding Azure accounts -- Onboarding GCP accounts -- Onboarding other clouds -- Onboarding roadblocks and mitigation best practices -- Roadblock #1 - Lack of necessary permissions -- Roadblock #2 - Complex cloud environments -- Roadblock #3 - Resistance to change -- Roadblock #4 - Policy complexity -- Roadblock #5 - Alert fatigue -- Roadblock #6 - Integration complexity -- Roadblock #7 - Monitoring and alerting configuration -- Roadblock #8 - Data privacy and security -- Roadblock #9 - Compliance variability -- Roadblock #10 - Scalability -- Offboarding cloud accounts…”
Publicado 2024
Libro electrónico -
611
-
612Publicado 2022Tabla de Contenidos: “…Further reading -- Chapter 8: How to Choose Your Data Storage in the Cloud -- Technical requirements -- Understanding the different repositories for different purposes -- Relational databases -- NoSQL databases -- Redis -- Azure storage accounts -- Choosing between SQL or NoSQL document-oriented databases -- Azure Cosmos DB - an opportunity to manage a multi-continental database -- Creating an Azure Cosmos DB account -- Creating an Azure Cosmos container -- Accessing Azure Cosmos data -- Defining database consistency -- The Cosmos DB client -- The Cosmos DB Entity Framework Core provider -- Use case - storing data -- Implementing the destinations/packages database with Cosmos DB -- Summary -- Questions -- Further reading -- Chapter 9: Working with Azure Functions -- Technical requirements -- Understanding the Azure Functions app -- Consumption plan -- Premium plan -- App Service plan -- Programming Azure Functions using C# -- Listing Azure Functions templates -- Maintaining Azure Functions -- Azure Durable Functions -- Azure Functions roadmap -- Use case - Implementing Azure Functions to send emails -- First step - Creating Azure queue storage -- Second step - Creating the function to send emails -- Third step - Creating the queue trigger function -- Summary -- Questions -- Further reading -- Chapter 10: Design Patterns and .NET 6 Implementation -- Technical requirements -- Understanding design patterns and their purpose -- Builder pattern -- Factory pattern -- Singleton pattern -- Proxy pattern -- Command pattern -- Publisher/Subscriber pattern -- Dependency Injection pattern -- Understanding the available design patterns in .NET 6 -- Summary -- Questions -- Further reading -- Chapter 11: Understanding the Different Domains in Software Solutions -- Technical requirements -- What are software domains? …”
Libro electrónico -
613Publicado 2024Tabla de Contenidos:Libro electrónico
-
614Publicado 2023Tabla de Contenidos: “…Summary -- Further reading -- Chapter 5: Setting Up Isolated Penetration Testing Lab Environments on Azure -- Technical requirements -- Preparing the necessary components and prerequisites -- Part 1 of 2 - Manually creating a resource group -- Part 2 of 2 - Generating SSH keys to access the attacker VM instance -- Defining the project's structure -- Preparing the isolated network -- Setting up the target resources -- Part 1 of 2 - Preparing the target resources using Terraform -- Part 2 of 2 - Verifying our target VM instance setup -- Manually setting up the attacker VM instance -- Part 1 of 2 - Manually launching and setting up the attacker instance -- Part 2 of 2 - Verifying that our setup is working -- Leveraging Terraform to automatically set up the attacker VM instance -- Part 1 of 3 - Creating the golden image -- Part 2 of 3 - Deleting the manually created resources -- Part 3 of 3 - Preparing the Terraform configuration files -- Simulating penetration testing in the isolated network environment -- Part 1 of 4 - Scanning with Nmap -- Part 2 of 4 - Using the VNC login scanner module of Metasploit -- Part 3 of 4 - Breaking out of the container -- Part 4 of 4 - Locating the flags -- Cleaning up -- Summary -- Further reading -- Chapter 6: Setting Up Isolated Penetration Testing Lab Environments on AWS -- Technical requirements -- Leveraging Terraform to automatically set up the lab environment -- Validating network connectivity and security -- Part 1 of 3 - Authorizing the use of the serial console -- Part 2 of 3 - Manually verifying network connectivity with ping tests -- Part 3 of 3 - Using the Reachability Analyzer to validate network connectivity -- Setting up the attacker VM instance -- Simulating penetration testing in the isolated network environment -- Part 1 of 3 - Obtaining the first flag…”
Libro electrónico -
615
-
616Publicado 2023“…You'll learn how to implement secure virtual networks, virtual machines, and data warehouse resources including data lake services used in big data analytics -- as well as when to use SQL and NoSQL databases and how to build microservices using multi-cloud Kubernetes services across AWS, Microsoft Azure, and Google Cloud. You'll also get step-by-step demonstrations of infrastructure, platform, and software cloud services and optimization recommendations derived from certified industry experts using hands-on tutorials, self-assessment questions, and real-world case studies. …”
Libro electrónico -
617Publicado 2022Tabla de Contenidos: “…-- How does Azure AD MFA work? -- What licenses include Azure AD MFA? …”
Libro electrónico -
618Publicado 2024“…You'll master environment and solution management using Dataverse, Git, the Power Platform CLI, Azure DevOps, and GitHub Copilot. Implementing the shift-left approach in DevSecOps using GitHub Advanced Security features, you’ll create a Power Platform tenant governed by controls, automated tests, and backlog management. …”
Libro electrónico -
619Publicado 2021Tabla de Contenidos:Libro electrónico
-
620