Видавець: K-i-s-publishing

2489
Завантаження...
AУДІОКНИГА

Industrializing Financial Services with DevOps. Proven 360° DevOps operating model practices for enabling a multi-speed bank

Spyridon Maniotis

In recent years, large financial services institutions have been embracing the concept of DevOps in the core of their digital transformation strategies. This audiobook is inspired by real enterprise DevOps adoptions in the financial services industry and provides a comprehensive proven practice guide on how large corporate organizations can evolve their DevOps operating model.The audiobook starts by outlining the fundamentals comprising a complete DevOps operating model. It continues with a zoom in on those fundamentals, combining adoption frameworks with real-life examples. You’ll cover the three main themes underpinning the audiobook’s approach that include the concepts of 360°, at relevance, and speeds. You’ll explore how a bank’s corporate and technology strategy links to its enterprise DevOps evolution. The audiobook also provides a rich array of proven practices on how to design and create a harmonious 360° DevOps operating model which should be enabled and adopted at relevance in a multi-speed context. It comes packed with real case studies and examples from the financial services industry that you can adopt in your organization and context.By the end of this audiobook, you will have plenty of inspiration that you can take back to your organization and be able to apply the learning from pitfalls and success stories covered in the audiobook.

2490
Завантаження...
EЛЕКТРОННА КНИГА

Industrializing Financial Services with DevOps. Proven 360° DevOps operating model practices for enabling a multi-speed bank

Spyridon Maniotis

In recent years, large financial services institutions have been embracing the concept of DevOps in the core of their digital transformation strategies. This book is inspired by real enterprise DevOps adoptions in the financial services industry and provides a comprehensive proven practice guide on how large corporate organizations can evolve their DevOps operating model.The book starts by outlining the fundamentals comprising a complete DevOps operating model. It continues with a zoom in on those fundamentals, combining adoption frameworks with real-life examples. You’ll cover the three main themes underpinning the book’s approach that include the concepts of 360°, at relevance, and speeds. You’ll explore how a bank’s corporate and technology strategy links to its enterprise DevOps evolution. The book also provides a rich array of proven practices on how to design and create a harmonious 360° DevOps operating model which should be enabled and adopted at relevance in a multi-speed context. It comes packed with real case studies and examples from the financial services industry that you can adopt in your organization and context.By the end of this book, you will have plenty of inspiration that you can take back to your organization and be able to apply the learning from pitfalls and success stories covered in the book.

2491
Завантаження...
EЛЕКТРОННА КНИГА

Infinispan data grid platform definitive guide. Master Infinispan to create scalable and high-performance applications

This practical guide is intended for those who want to learn how to build extremely scalable applications. This book is easy to read and is aimed at Java enterprise developers with a solid knowledge of Java. However, no previous coding experience with Infinispan is required.

2492
Завантаження...
EЛЕКТРОННА КНИГА

Information Security Handbook. Develop a threat model and incident response strategy to build a strong information security framework

Darren Death

Having an information security mechanism is one of the most crucial factors for any organization. Important assets of organization demand a proper risk management and threat model for security, and so information security concepts are gaining a lot of traction. This book starts with the concept of information security and shows you why it’s important.It then moves on to modules such as threat modeling, risk management, and mitigation. It also covers the concepts of incident response systems, information rights management, and more. Moving on, it guides you to build your own information security framework as the best fit for your organization. Toward the end, you’ll discover some best practices that can be implemented to make your security framework strong. By the end of this book, you will be well-versed with all the factors involved in information security, which will help you build a security framework that is a perfect fit your organization’s requirements.

2493
Завантаження...
EЛЕКТРОННА КНИГА

Information Security Handbook. Enhance your proficiency in information security program development - Second Edition

Darren Death

Information Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security.Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You’ll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization’s security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs.By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner.

2494
Завантаження...
EЛЕКТРОННА КНИГА

Information Security Risk Management for ISO 27001/ISO 27002. A Practical Guide to Risk, Assessment, and Control Selection Aligned with ISO Standards

IT Governance Publishing, Alan Calder, Steve G...

This guide navigates through the essential processes of risk management within an ISO 27001/27002 framework. Beginning with foundational principles and methodologies, it systematically details every stage from assessment and analysis to treatment and review. Readers will learn how to apply both qualitative and quantitative techniques to measure impact, likelihood, and risk levels accurately.The book provides clarity on roles, policies, asset classification, and control selection, reinforced by practical tools like gap analysis and risk assessment software. Real-world scenarios and methodologies are contextualized for effective decision-making aligned with international compliance standards.By the end, readers will possess a comprehensive understanding of implementing and sustaining a risk management system that meets ISO 27001/27002 requirements, enabling them to better safeguard information assets and demonstrate regulatory accountability.

2495
Завантаження...
EЛЕКТРОННА КНИГА

Information Theory. A Tutorial Introduction to the Principles and Applications of Information Theory

James V Stone

This book offers a comprehensive journey through the fascinating world of information theory, beginning with the fundamental question: what is information? Early chapters introduce key concepts like entropy, binary representation, and data compression, providing a clear and accessible foundation. Readers explore Shannon's source coding theorem and practical tools like Huffman coding to understand how information is quantified and optimized.Building on these basics, the book delves into advanced topics such as the noisy channel coding theorem, mutual information, and error correction techniques. It examines entropy in continuous systems, channel capacity, and rate-distortion theory, making complex ideas accessible through real-world examples. Connections between information and thermodynamics are also explored, including Maxwell’s Demon, the Landauer Limit, and the second law of thermodynamics.The final chapters tie information theory to biology and artificial intelligence, investigating its role in evolution, the human genome, and brain computation. With practical examples throughout, this book balances theoretical depth with hands-on learning, making it an essential resource for mastering information theory. A basic mathematical foundation will be beneficial but is not required to engage with the material.

2496
Завантаження...
EЛЕКТРОННА КНИГА

Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices

Joseph MacMillan

Information security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats.The book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals. As you make progress, you'll get to grips with design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also help you to discover best practices for designing secure network architectures and controlling and managing third-party identity services. Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security.By the end of this infosec book, you'll have learned how to make your organization less vulnerable to threats and reduce the likelihood and impact of exploitation. As a result, you will be able to make an impactful change in your organization toward a higher level of information security.