Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 87
- Application software 79
- Cloud computing 67
- Engineering & Applied Sciences 63
- Database management 58
- Java (Computer program language) 58
- Computer Science 48
- Management 47
- Virtual computer systems 45
- Machine learning 37
- Python (Computer program language) 34
- Computer networks 32
- Electronic data processing 28
- Economics 27
- Programming 27
- Computer programming 26
- Computer programs 26
- Artificial intelligence 25
- Web servers 24
- Data processing 23
- Operating systems (Computers) 23
- Examinations 22
- Oracle (Computer file) 22
- Finance 21
- Design 20
- Security measures 20
- Client/server computing 19
- VMware 19
- History 18
- Microsoft .NET Framework 18
-
1001Publicado 2017Tabla de Contenidos: “…-- Moving from Unilateral Control to Mutual Learning -- Summary -- Chapter Four: Facilitating with the Mutual Learning Approach -- The Mutual Learning Approach -- Values of the Mutual Learning Mindset -- Transparency and Curiosity: Creating a Common Pool of Understanding -- Informed Choice and Accountability: For Better Decisions and Commitment -- Compassion -- Assumptions of the Mutual Learning Mindset -- I Have Information -- So Do Others -- Each of Us Sees Things Others Don't -- Differences Are Opportunities for Learning…”
Libro electrónico -
1002Publicado 2023Tabla de Contenidos: “…. -- Setting up a connection pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Accessing multiple servers using the same host and port -- Getting ready -- How to do it... -- There's more... -- Running multiple PgBouncer on the same port to leverage multiple cores -- Getting ready -- How to do it...…”
Libro electrónico -
1003Publicado 2023Tabla de Contenidos: “…Summary -- Questions -- Further reading -- Chapter 9: AOP with PostSharp -- Technical requirements -- AOP -- AOP frameworks -- How AOP works with PostSharp -- Extending the aspect framework -- Project - Cross-cutting concerns reusable library -- Adding a caching concern -- Adding file logging capabilities -- Adding an exception-handling concern -- Adding a security concern -- Adding a validation concern -- Adding a transaction concern -- Adding a resource pool concern -- Adding a configuration settings concern -- Adding an instrumentation concern -- PostSharp and build pipeline considerations -- Dynamic AOP with Castle.DynamicProxy -- Summary -- Questions -- Further reading -- Chapter 10: Using Tools to Improve Code Quality -- Technical requirements -- Code analysis -- Using quick actions -- Using the JetBrains dotTrace profiler -- Using JetBrains ReSharper -- Using Telerik JustDecompile -- Continuous integration with GitHub Actions and CodeQL -- Summary -- Questions -- Further reading -- Chapter 11: Refactoring C# Code -- Technical requirements -- Application-level code smells -- Boolean blindness -- Combinatorial explosion -- Contrived complexity -- Data clump -- Deodorant comments -- Duplicate code -- Lost intent -- The mutation of variables -- The oddball solution -- Shotgun surgery -- Solution sprawl -- Uncontrolled side effects -- Class-level code smells -- Cyclomatic complexity -- Divergent change -- Downcasting -- Excessive literal use -- Feature envy -- Inappropriate intimacy -- Indecent exposure -- The large class (the God object) -- The lazy class (the freeloader and the lazy object) -- The middleman class -- The orphan class of variables and constants -- Primitive obsession -- Refused bequest -- Speculative generality -- Tell, Don't Ask -- Temporary fields -- Method-level smells -- The black sheep method -- Cyclomatic complexity…”
Libro electrónico -
1004Publicado 2014Tabla de Contenidos: “…Deleting desktops from delivery groups -- Restricting access to desktops -- Using Smart Access -- Using Exclusion filters -- Securing the ICA® protocol communications -- Managing power settings for desktops -- Pools and buffers -- Power state timers -- Partial power management -- Importing and exporting user data -- Enabling and disabling the maintenance mode -- Managing the server load -- The server load index -- The concurrent logon tolerance setting -- Managing the hosted applications -- Application desktop delivery groups -- Application sharing -- Publishing applications to multiple desktop groups -- Content redirection -- Creating an application -- Managing and creating application desktop delivery groups -- Managing application sessions -- Modifying the applications -- Managing the Delivery Controller environment -- Controller discovery -- Adding, moving, or removing Delivery Controllers -- Moving a Virtual Delivery Agent (VDA) to another Site -- Active Directory OU-based controller discovery -- Using SSL on controllers -- Changing the default HTTP and HTTPS ports -- Summary -- 5. …”
Libro electrónico -
1005Publicado 2018Tabla de Contenidos: “…-- Characteristics of big data -- Volume -- Velocity -- Variety -- Veracity -- Variability -- Value -- Solution-based approach for data -- Data - the most valuable asset -- Traditional approaches to data storage -- Clustered computing -- High availability -- Resource pooling -- Easy scalability -- Big data - how does it make a difference? …”
Libro electrónico -
1006Publicado 2017Tabla de Contenidos: “…-- Conclusion -- Chapter 20: Accessibility Test Automation in DevOps Environment -- Background - Accessibility (AX) -- AX and DevOps -- AX test automation in DevOps -- Standard AX tools -- Conclusion -- Chapter 21: Performance Tuning of Java Applications -- Performance bottlenecks - key challenges and solutions -- Reusing objects -- Managing pool of objects -- Canonicalizing objects -- Enumerating constants -- Comparison versus identity -- Avoiding excess garbage collection -- Delayed initialization -- Java performance tuning tools…”
Libro electrónico -
1007Publicado 2011Tabla de Contenidos: “…Special Situations -- Using Cd/Rw and Dvd/Rw/R+/R- Devices -- Virtual Guest Tagging Driver -- Virtual Hardware for Non-Disk Scsi Devices -- Virtual Hardware for Raw Disk Map Access to Remote Scsi -- Virtual Hardware for Rdm-Like Access to Local Scsi -- Vm Disk Modes and Snapshots -- Os Installation Peculiarities -- Cloning, Templates, and Deploying Vms -- Vm Solutions -- Private Lab -- Firewalled Private Lab -- Firewalled Lab Bench -- Cluster in a Box -- Cluster Between Esx Hosts -- Cluster Between Virtual and Physical Servers -- Vcenter As a Vm -- Virtual Appliances -- Vmware Tools -- Vmx Changes -- Conclusion -- Chapter 11 Dynamic Resource Load Balancing -- Defining Drlb -- The Basics -- The Advanced Features -- Shares -- Resource Pool Addendum -- Network Resources -- Disk Resources -- Cpu Resources -- Memory Resources -- Vapps -- Monitoring -- Alarms -- Performance Analysis -- Putting It All Together -- Conclusion -- Chapter 12 Disaster Recovery, Business Continuity, And Backup -- Disaster Types -- Recovery Methods -- Best Practices -- Backup and Business Continuity -- Backup -- Business Continuity -- The Tools -- Local Tape Devices -- Vmware Data Recovery -- Third-Party Tools -- Conclusion -- Epilogue: The Future Of The Virtual Environment -- References -- Index…”
Libro electrónico -
1008Publicado 2023Tabla de Contenidos: “…Resilient File System (ReFS) -- NTFS -- Storage in Windows Server 2022 -- Initializing Disks -- Configuring Basic and Dynamic Disks -- Managing Volumes -- Storage Spaces in Windows Server 2022 -- Redundant Array of Independent Disks -- Mount Points -- Microsoft MPIO -- Configuring iSCSI Target -- Internet Storage Name Service -- Implement Thin Provisioning and Trim -- Fibre Channel -- Network-Attached Storage -- Virtual Disk Service -- Understanding Data Center Bridging -- Using PowerShell -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Understanding IP -- Understanding TCP/IP -- Details of the TCP/IP Model -- How TCP/IP Layers Communicate -- Understanding Port Numbers -- Understanding IP Addressing -- The Hierarchical IP Addressing Scheme -- Understanding Network Classes -- Subnetting a Network -- Understanding the Benefits of Subnetting -- Implementing Subnetting -- An Easier Way to Apply Subnetting -- Applying Subnetting the Traditional Way -- Working with Classless Inter-Domain Routing -- Supernetting -- Understanding IPv6 -- IPv6 History and Need -- New and Improved IPv6 Concepts -- IPv6 Addressing Concepts -- IPv6 Integration/Migration -- Summary -- Exam Essentials -- Review Questions -- Chapter 5 Implementing DNS -- Introducing DNS -- Hosts File -- Understanding Servers, Clients, and Resolvers -- Understanding the DNS Process -- Introducing DNS Database Zones -- Understanding Primary Zones -- Understanding Secondary Zones -- Understanding Active Directory Integrated DNS -- Understanding Stub Zones -- GlobalName Zones -- Zone Transfers and Replication -- Advantages of DNS in Windows Server 2022 -- Background Zone Loading -- Support for IPv6 Addresses -- Support for Read-Only Domain Controllers -- DNS Socket Pools -- DNS Cache Locking -- Response Rate Limiting -- Unknown Record Support -- IPv6 Root Hints -- DNS Security Extensions…”
Libro electrónico -
1009Publicado 1998Tabla de Contenidos: “…Flushing pending output -- The Underlying Data Structure -- Asynchronous Notification -- The Driver's Point of View -- Seeking a Device -- The llseek Implementation -- Access Control on a Device File -- Single-Open Devices -- Restricting Access to a Single User at a Time -- Blocking open as an Alternative to EBUSY -- Cloning the Device on open -- Quick Reference -- Time, Delays, and Deferred Work -- Measuring Time Lapses -- Using the jiffies Counter -- Processor-Specific Registers -- Knowing the Current Time -- Delaying Execution -- Long Delays -- Busy waiting -- Yielding the processor -- Timeouts -- Short Delays -- Kernel Timers -- The Timer API -- The Implementation of Kernel Timers -- Tasklets -- Workqueues -- The Shared Queue -- Quick Reference -- Timekeeping -- Delays -- Kernel Timers -- Tasklets -- Workqueues -- Allocating Memory -- The Real Story of kmalloc -- The Flags Argument -- Memory zones -- The Size Argument -- Lookaside Caches -- A scull Based on the Slab Caches: scullc -- Memory Pools -- get_free_page and Friends -- A scull Using Whole Pages: scullp -- The alloc_pages Interface -- vmalloc and Friends -- A scull Using Virtual Addresses: scullv -- Per-CPU Variables -- Obtaining Large Buffers -- Acquiring a Dedicated Buffer at Boot Time -- Quick Reference -- Communicating with Hardware -- I/O Ports and I/O Memory -- I/O Registers and Conventional Memory -- Using I/O Ports -- I/O Port Allocation -- Manipulating I/O ports -- I/O Port Access from User Space -- String Operations -- Pausing I/O -- Platform Dependencies -- An I/O Port Example -- An Overview of the Parallel Port -- A Sample Driver -- Using I/O Memory -- I/O Memory Allocation and Mapping -- Accessing I/O Memory -- Ports as I/O Memory -- Reusing short for I/O Memory -- ISA Memory Below 1 MB -- isa_readb and Friends -- Quick Reference -- Interrupt Handling…”
Tesis -
1010Publicado 2003Tabla de Contenidos: “…Considerations -- Application Developer guidelines -- Workspace -- .Workspace structure -- Utility project -- Project structure -- Source code formatting -- Application Developer preferences -- Checkstyle -- Application logging -- Requirements for a logging framework -- Logging implementation -- Automation opportunities -- Using JNDI -- Obtaining an InitialContext -- Local and global JNDI namespaces -- Caching -- Coding for performance -- General performance tips -- Database connection pooling -- Using System.out -- String concatenation -- JSP and servlet performance tips -- Storing objects in HTTP sessions -- Using HTTP sessions in JSPs -- Servlet multi-threading -- EJB performance tips -- Accessing EJBs from client code -- Transaction isolation levels -- Managing application versions -- Specifying the application name -- Partitioning Web applications in the URI namespace -- Partitioning using virtual hosts -- Partitioning using the Web application context root -- Partitioning EJBs in the JNDI namespace -- Partitioning access to database and other resources -- Security -- Application-managed security -- Container-managed security…”
Libro electrónico -
1011Publicado 2013Tabla de Contenidos: “…Application Dependency and Performance -- Installing Application Dependency and Performance -- How ADP Monitors Middleware Targets -- Cross-Tier Diagnostics -- Analyzing Heap Snapshots -- Viewing Real-Time Data for a JVM -- Managing JVM Pools -- Tracing Active Threads -- Provisioning Middleware Through Cloud Control 12c -- The Middleware Provisioning Page in EM Cloud Control -- Scaling Up/Scaling Out Oracle Middleware -- Scaling Up and Scaling Out a WebLogic Domain -- Java EE Application Deployment and Undeployment -- Provisioning SOA Artifacts and Composites -- Using Oracle Exalogic Elastic Cloud -- Using the Exalogic Elastic Cloud Discovery Wizard -- Using the Exalogic Elastic Cloud Home Page and Dashboard -- Configuration and Change Management -- Tracking Assets -- Summary -- Part III: Notable Management Packs -- Chapter 12: Lifecycle Management Pack -- Discovery -- Introduction to the Provisioning and Patch Automation -- Configuring the Software Library -- Populating the Software Library with Application Software -- The Procedure Library -- Bare Metal Provisioning -- Setting Up the Bare Metal Provisioning Infrastructure -- Bare Metal Provisioning Deployments -- Database Provisioning -- Middleware Provisioning -- Patching -- Creating a Patch Plan -- Validating and Deploying the Patch Plan -- Linux Patching -- Linux RPM Repository Server Prerequisites -- Create Linux RPM Repository from ULN -- Manage Patching Groups -- Apply Patches -- Manage the RPM Repository -- Configuration Management -- Configuration Searches -- The Configuration Browser -- Configuration History -- Configuration Comparisons -- Other Configuration Activities -- Change Management -- Schema Baselines -- Schema Comparison -- Schema Synchronizations -- Schema Change Plans -- Data Comparison -- Compliance Management -- Compliance and Best Practices…”
Libro electrónico -
1012Publicado 2017Tabla de Contenidos: “…File descriptors -- Thread pools and garbage collector -- Managing and monitoring Elasticsearch -- Running in Docker containers -- Special considerations while deploying to a cloud -- Choosing instance type -- Changing default ports -- do not expose ports! …”
Libro electrónico -
1013Publicado 2020Tabla de Contenidos: “…AutoGraph und Tracing -- Regeln für TF Functions -- Übungen -- Kapitel 13: Daten mit TensorFlow laden und vorverarbeiten -- Die Data-API -- Transformationen verketten -- Daten durchmischen -- Daten vorverarbeiten -- Alles zusammenbringen -- Prefetching -- Datasets mit tf.keras verwenden -- Das TFRecord-Format -- Komprimierte TFRecord-Dateien -- Eine kurze Einführung in Protocol Buffer -- TensorFlow-Protobufs -- Examples laden und parsen -- Listen von Listen mit dem SequenceExample-Protobuf verarbeiten -- Die Eingabemerkmale vorverarbeiten -- Kategorische Merkmale mit One-Hot-Vektoren codieren -- Kategorische Merkmale mit Embeddings codieren -- Vorverarbeitungsschichten von Keras -- TF Transform -- Das TensorFlow-Datasets-(TFDS-)Projekt -- Übungen -- Kapitel 14: Deep Computer Vision mit Convolutional Neural Networks -- Der Aufbau des visuellen Cortex -- Convolutional Layers -- Filter -- Stapeln mehrerer Feature Maps -- Implementierung in TensorFlow -- Speicherbedarf -- Pooling Layers -- Implementierung in TensorFlow -- Architekturen von CNNs -- LeNet-5 -- AlexNet -- GoogLeNet -- VGGNet -- ResNet -- Xception -- SENet -- Ein ResNet-34-CNN mit Keras implementieren -- Vortrainierte Modelle aus Keras einsetzen -- Vortrainierte Modelle für das Transfer Learning -- Klassifikation und Lokalisierung -- Objekterkennung -- Fully Convolutional Networks -- You Only Look Once (YOLO) -- Semantische Segmentierung -- Übungen -- Kapitel 15: Verarbeiten von Sequenzen mit RNNs und CNNs -- Rekurrente Neuronen und Schichten -- Gedächtniszellen -- Ein- und Ausgabesequenzen -- RNNs trainieren -- Eine Zeitserie vorhersagen -- Grundlegende Metriken -- Ein einfaches RNN implementieren -- Deep RNNs -- Mehrere Zeitschritte vorhersagen -- Arbeit mit langen Sequenzen -- Gegen instabile Gradienten kämpfen -- Das Problem des Kurzzeitgedächtnisses -- Übungen…”
Libro electrónico -
1014Publicado 2022Tabla de Contenidos: “…. -- Setting up a connection pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Accessing multiple servers using the same host and port -- Getting ready -- How to do it... -- There's more... -- Chapter 5: Tables and Data -- Choosing good names for database objects -- Getting ready -- How to do it... -- There's more... -- Handling objects with quoted names -- Getting ready -- How to do it... -- How it works... -- There's more... -- Enforcing the same name and definition for columns -- Getting ready -- How to do it... -- How it works... -- There's more... -- Identifying and removing duplicates -- Getting ready -- How to do it... -- How it works... -- There's more... -- Preventing duplicate rows -- Getting ready -- How to do it... -- How it works... -- There's more... -- Finding a unique key for a set of data -- Getting ready -- How to do it... -- How it works... -- Generating test data…”
Libro electrónico -
1015Publicado 2023Tabla de Contenidos: “…-- Opening Resolve for the first time -- Cache files -- Stills -- Creating your first project -- Customizing your digital workspace -- Understanding the Resolve pages -- Simplifying the workspace -- Getting your media files in and organized -- Import Media -- Media Pool - changing your views -- A few words about bins -- Reviewing your shots and cutting it all together -- Reviewing your footage -- Editing your footage together -- Adding footage to the Timeline - using Track 1 -- Adding footage to the Timeline - using Track 2 -- Let's publish! …”
Libro electrónico -
1016por Barrett, JoanTabla de Contenidos: “…Scenario 2: Configuration for a large company -- 5.1 Large company configuration -- 5.1.1 Installed WebSphere software -- 5.2 Network configuration -- 5.2.1 Configuring the TCP/IP settings on the iSeries -- 5.2.2 Detailed topology diagram -- 5.3 Data considerations for high availability -- 5.3.1 Creating the independent disk pool Trade -- 5.3.2 Restoring the Trade database -- 5.3.3 Creating a cluster -- 5.3.4 Setting up a CRG -- 5.3.5 Defining a recovery domain for CRG -- 5.3.6 Configuring geographic mirroring -- 5.3.7 Making the geographic mirror available -- 5.3.8 Simulating an XSM switchover -- 5.3.9 Special case: Manual failover -- 5.3.10 Green-screen commands -- 5.4 Firewall configuration -- 5.5 Configuring the HTTP and WebSphere servers -- 5.5.1 Installing the Web server plug-in -- 5.5.2 Creating HTTP Server instances -- 5.5.3 Configuring a cluster of WebSphere servers -- 5.6 Configuring Load Balancer -- 5.6.1 Configuring the Load Balancer: A simple scenario -- 5.6.2 Configuring the Load Balancer: Primary and backup scenario -- 5.6.3 Scripts for high availability -- 5.6.4 Testing the Load Balancer scenario -- 5.7 Configuring an LDAP server -- 5.7.1 Directory server concepts…”
Publicado 2005
Libro electrónico -
1017Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedications -- Contributors -- Table of Contents -- Part 1: Migrating to the Cloud -- Chapter 1: Introduction to Cloud Transformation -- Introduction to the cloud -- The origins of cloud computing -- Key characteristics of cloud computing -- On-demand self-service -- Wide range of network access -- Multi-tenant model and resource pooling -- Rapid elasticity -- PAYG model -- Measured service and reporting -- Understanding the motivators for cloud adoption -- Resilience -- Advanced security -- Carbon footprint reduction -- Improved optimization and efficiency -- Faster innovation and business agility -- Understanding CSPs -- Amazon Web Services (AWS) -- Microsoft Azure -- Google Cloud Platform -- Alibaba Cloud -- Exploring the service models - SaaS, PaaS, and IaaS -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Software as a service (SaaS) -- Exploring the deployment models - public, private, hybrid, multi, and community -- The public cloud -- The private cloud -- The hybrid cloud -- Multi-cloud -- The community cloud -- Comparison between the different cloud deployment models -- Summary -- Further reading -- Chapter 2: Understanding Cloud Migration -- Cloud migration - key concepts and fundamentals -- What is cloud migration? …”
Libro electrónico -
1018Publicado 2023Tabla de Contenidos: “…-- Finding the right recruiter -- Campus recruiting -- Job fairs - in person and virtual -- Open houses -- Direct applications (walk-ins) -- Government employment services -- Diversity Recruiting: Benefiting from a Diverse Workforce -- Handling Helicopter Parents -- Keeping Tabs on Your Progress -- Chapter 7 Narrowing the Pool: Evaluating and Assessing Candidates -- Reviewing the Résumé -- Mastering the basics -- Reading between the lines -- Watching out for red flags -- Considering a candidate's online persona -- Simplifying the Online Job Application Process -- Setting Up a System for Evaluating -- Using some criteria to make decisions -- Evaluating résumés, step-by-step -- Weighing the evaluation criteria -- Assessment: Knowing What Works and Mitigating the Challenges -- Finding the right test for your situation -- Skills assessment tests -- Cognitive ability tests -- Physical ability tests -- Personality/Style assessment -- Integrity tests -- Avoiding the common challenges with pre-employment assessment -- Pre-Screening: Narrowing Your List -- Recognizing where to pre-screen -- Interviewing over the phone -- Pre-screening with video -- Figuring out which method is better -- Chapter 8 Maximizing the Interviewing Process -- Grasping the Basics of Interviewing -- Recognizing What Gets in the Way When Interviewing -- Failing to be prepared and to allot the required time -- Mismanaging your time -- Lacking consistency in the process -- Talking more than listening -- Focusing on one positive attribute of a candidate and ignoring everything else -- Speaking negatively about the business or the role -- Setting the Stage for the Interview -- The Introduction: Warming Up…”
Libro electrónico -
1019Publicado 2023Tabla de Contenidos: “…-- Tips and tricks for running your code on Cloud Run -- Choosing the best serverless option for each use case -- Summary -- Further reading -- Chapter 6: Running Containerized Applications with Google Kubernetes Engine -- Introducing Google Kubernetes Engine -- Deep diving into GKE - key concepts and best practices -- GKE cluster architecture -- Advanced cluster management features -- GKE operation modes -- Cluster types based on availability -- Node pools and node taints for easier management -- Best practices for cost efficiency in GKE -- Storage in GKE -- Networking in GKE -- Security in GKE -- Deploying applications on GKE -- Scaling an app in GKE -- Monitoring GKE applications -- Comparing GKE and Cloud Run - when to use which -- GKE hands-on example -- Summary -- Further reading -- Chapter 7: Managing the Hybrid Cloud with Anthos -- The pitfalls of choosing a cloud provider -- Introducing hybrid cloud computing -- Anthos, the hybrid cloud management platform -- Computing environment -- Simplified management using fleets -- Service Mesh for microservice architectures -- Networking in Anthos -- Centralized configuration management -- Securing containerized workloads -- Binary Authorization for a secure software supply chain -- Consolidated logging and monitoring -- Unified UI -- Making hybrid cloud simple with Cloud Run for Anthos -- Third-party application marketplace -- Anthos usage and pricing options -- Anthos hands-on example -- Running our example on Microsoft Azure -- Cleaning up -- Summary -- Further reading -- Part 3: Extending Your Code - Using Google Cloud Services and Public APIs -- Chapter 8: Making the Best of Google Cloud Networking -- Introducing Google Cloud networking -- Understanding regions and zones -- Choosing the best region and zone -- Connecting to our cloud resources…”
Libro electrónico -
1020Publicado 2024Tabla de Contenidos: “…Dead-letter queues (DLQs) -- Event sourcing -- Command query responsibility segregation (CQRS) -- Securing Lambda functions -- Code integrity -- Secure environment variables -- Runtime protection -- Lambda function versioning and aliases -- Access control -- Networking -- Execution limits -- Monitoring and logging -- Summary -- Questions -- Answers -- Further reading -- Chapter 8: Secure Design Patterns for Multi-tenancy in Shared Environments -- Understanding multi-tenancy concepts and challenges -- Definition and importance of multi-tenancy -- Challenges in multi-tenancy -- Multi-tenancy design patterns -- The silo model -- The pool model -- The bridge model -- Choosing the right design pattern -- Implementing secure data isolation techniques -- Network-level isolation -- Database-level Isolation -- Compute-level Isolation -- Application-level isolation -- Encryption-level isolation -- Managing access control for tenants -- Tenant authentication -- Implementing access control -- Tenant-managed access control -- Summary -- Questions -- Answers -- Further readings -- Chapter 9: Automate-Everything to Build Immutable and Ephemeral Resources -- From manual to programmatic management -- Manual and programmatic management defined -- Risks of manual resource management -- Shift to programmatic management -- Snowflake versus Phoenix systems -- IaC frameworks -- Benefits of adopting IaC -- Automated security testing -- Treating infrastructure as software -- Security testing in IaC pipelines -- Tools for automated security scanning -- Security best practices for IaC -- Apply least privileges -- Handle secrets securely -- Ensure compliance -- The Automate-Everything approach -- Summary -- Questions -- Answers -- Further reading -- Part 3: Monitoring, Automation and Continuous Improvement -- Chapter 10: Advanced Logging, Auditing, and Monitoring in AWS…”
Libro electrónico