Inne

361
Ebook

ServiceNow IT Operations Management. Demystifying IT Operations Management

Ajaykumar Guggilla

ServiceNow ITOM enables infrastructure and processes to be managed in a highly automated manner. It contains various segments that ensure its applications and enterprise infrastructures are optimized for high performance and helps in creating a lean and agile organization through service?level visibility and automation.This book will be a comprehensive guide that will be based on Geneva release and will help you discover how IT activities can be connected to your business needs, rather than just focusing on internal IT process. It will take a service-centric approach to operations management and consolidate all your resource data into a single system IT record. You will learn about discovery, orchestration, MID server and cloud management, helping you take full advantage of ServiceNow IT Operations Management to improve the quality of service & increasing the service availability.By the end of the book, you will be able to achieve improved service availability, immediate visibility of vital business services and much more, all from the convenience of your single screen.

362
Ebook

SharePoint Architect's Planning Guide. Create reusable architecture and governance to support collaboration with SharePoint and Microsoft 365

Patrick Tucker

After opening a toolbox full of tools, it can initially be hard to know which is the right one for the job – which tool works best and when. Showing you how to create an informed and purposeful plan for SharePoint Online in the context of the Microsoft 365 suite of tools is what this book is all about.SharePoint Architect's Planning Guide will help you understand all you can do with SharePoint. Whether the tools are new to you or you’ve used the older versions in the past, your journey will start by learning about the building blocks. This book is not a step-by-step guide; there are tons of online resources to give you that and to help you better keep up with the pace of change. This book is a planning guide, helping you with the context, capabilities, and considerations for implementing SharePoint Online in the most successful way possible. Whether you need to plan a new intranet, migrate files to a modern platform, or take advantage of tools such as Power Platform, Teams, and Planner, this guide will help you get to grips with the technology, ask the right questions to build your plan, and successfully implement it from the technical and user adoption perspectives.By the end of this Microsoft book, you’ll be able to perceive the toolbox as a whole and efficiently prepare a planning and governance document for use in your organization.

363
Ebook
364
Ebook
365
Ebook

Splunk Operational Intelligence Cookbook. Over 80 recipes for transforming your data into business-critical insights using Splunk - Third Edition

Josh Diakun, Paul R. Johnson, Derek Mock

Splunk makes it easy for you to take control of your data, and with Splunk Operational Cookbook, you can be confident that you are taking advantage of the Big Data revolution and driving your business with the cutting edge of operational intelligence and business analytics.With more than 80 recipes that demonstrate all of Splunk’s features, not only will you find quick solutions to common problems, but you’ll also learn a wide range of strategies and uncover new ideas that will make you rethink what operational intelligence means to you and your organization.You’ll discover recipes on data processing, searching and reporting, dashboards, and visualizations to make data shareable, communicable, and most importantly meaningful. You’ll also find step-by-step demonstrations that walk you through building an operational intelligence application containing vital features essential to understanding data and to help you successfully integrate a data-driven way of thinking in your organization.Throughout the book, you’ll dive deeper into Splunk, explore data models and pivots to extend your intelligence capabilities, and perform advanced searching with machine learning to explore your data in even more sophisticated ways. Splunk is changing the business landscape, so make sure you’re taking advantage of it.

366
Ebook

Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition

Mick Knutson, Robert Winch, Peter Mularien

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressured concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to easily secure your Java application with the tried and trusted Spring Security framework, a powerful and highly customizable authentication and access-control framework.The book starts by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It also covers tips on integrating with some of the more popular web frameworks. An example of how Spring Security defends against session fixation, moves into concurrency control, and how you can utilize session management for administrative functions is also included.It concludes with advanced security scenarios for RESTful webservices and microservices, detailing the issues surrounding stateless authentication, and demonstrates a concise, step-by-step approach to solving those issues. And, by the end of the book, readers can rest assured that integrating version 4.2 of Spring Security will be a seamless endeavor from start to finish.

367
Ebook

Spring Security 3.x Cookbook. Secure your Java applications against online threats by learning the powerful mechanisms of Spring Security. Presented as a cookbook full of recipes, this book covers a wide range of vulnerabilities and scenarios

Anjana Mankale

Web applications are exposed to a variety of threats and vulnerabilities at the authentication, authorization, service, and domain object levels. Spring Security can help secure these applications against those threats.Spring Security is a popular application security solution for Java applications. It is widely used to secure standalone web applications, portlets, and increasingly REST applications. It is a powerful and highly customizable authentication and access-control framework. It is the de-facto standard for securing Spring-based applications and it is currently used to secure numerous demanding environments including government agencies, military applications, and central banks.Spring Security 3.x Cookbook is a repository of recipes to help you successfully secure web applications against threats and vulnerabilities at the authentication and session level layers using the Spring Security framework. We will not only explore Spring-based web applications, but also Java-based and Grails-based applications that can use Spring Security as their security framework. Apart from conventional web applications, we will also look at securing portlets, RESTful web service applications, and other non-web applications.This book will also take you through how to integrate Spring Security with other popular web frameworks/technologies such as Vaadin, EJB, and GWT. In addition to testing and debugging the implemented security measures, this book will also delve into finer aspects of Spring Security implementation such as how it deals with concurrency, multitenancy, and customization, and we will even show you how to disable it.This book gives you an overview of Spring Security and its implementation with various frameworks. It starts with container-based authentication before taking you on a tour of the main features of Spring Security. It demonstrates security concepts like BASIC, FORM, and DIGEST authentication and shows you how to integrate the Spring Security framework with various frameworks like JSF, struts2, Vaadin, and more.The book also demonstrates how to utilize container managed security without JAAS. Then, we move on to setting up a struts2 application before showing you how to integrate Spring Security with other frameworks like JSF, Groovy, Wicket, GWT, and Vaadin respectively.This book will serve as a highly practical guide and will give you confidence when it comes to applying security to your applications. It's packed with simple examples which show off each concept of Spring Security and which help you learn how it can be integrated with various frameworks.

368
Ebook

Spring Security. Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures - Fourth Edition

Badr Nasslahsen

With experienced hackers constantly targeting apps, properly securing them becomes challenging when you integrate this factor with legacy code, new technologies, and other frameworks. Written by a Lead Cloud and Security Architect as well as CISSP, this book helps you easily secure your Java apps with Spring Security, a trusted and highly customizable authentication and access control framework.The book shows you how to implement different authentication mechanisms and properly restrict access to your app. You’ll learn to integrate Spring Security with popular web frameworks like Thymeleaf and Microservice and Cloud services like Zookeeper and Eureka, along with architecting solutions that leverage its full power while staying loosely coupled. You’ll also see how Spring Security defends against session fixation, moves into concurrency control, and how you can use session management for administrative functions. This fourth edition aligns with Java 17/21 and Spring Security 6, covering advanced security scenarios for RESTful web services and microservices. This ensures you fully understand the issues surrounding stateless authentication and discover a concise approach to solving those issues.By the end of this book, you’ll be able to integrate Spring Security 6 with GraalVM native images seamlessly, from start to finish.