Видавець: Packt Publishing

977
Завантаження...
EЛЕКТРОННА КНИГА

Cloud Native Python. Build and deploy resilent applications on the cloud using microservices, AWS, Azure and more

Manish Sethi

Businesses today are evolving so rapidly that having their own infrastructure to support their expansion is not feasible. As a result, they have been resorting to the elasticity of the cloud to provide a platform to build and deploy their highly scalable applications. This book will be the one stop for you to learn all about building cloud-native architectures in Python. It will begin by introducing you to cloud-native architecture and will help break it down for you. Then you’ll learn how to build microservices in Python using REST APIs in an event driven approach and you will build the web layer. Next, you’ll learn about Interacting data services and building Web views with React, after which we will take a detailed look at application security and performance. Then, you’ll also learn how to Dockerize your services. And finally, you’ll learn how to deploy the application on the AWS and Azure platforms. We will end the book by discussing some concepts and techniques around troubleshooting problems that might occur with your applications after you’ve deployed them. This book will teach you how to craft applications that are built as small standard units, using all the proven best practices and avoiding the usual traps. It's a practical book: we're going to build everything using Python 3 and its amazing tooling ecosystem. The book will take you on a journey, the destination of which, is the creation of a complete Python application based on microservices over the cloud platform

978
Завантаження...
EЛЕКТРОННА КНИГА

Cloud Native Software Security Handbook. Unleash the power of cloud native tools for robust security in modern applications

Mihir Shah

For cloud security engineers, it’s crucial to look beyond the limited managed services provided by cloud vendors and make use of the wide array of cloud native tools available to developers and security professionals, which enable the implementation of security solutions at scale. This book covers technologies that secure infrastructure, containers, and runtime environments using vendor-agnostic cloud native tools under the Cloud Native Computing Foundation (CNCF).The book begins with an introduction to the whats and whys of the cloud native environment, providing a primer on the platforms that you’ll explore throughout. You’ll then progress through the book, following the phases of application development. Starting with system design choices, security trade-offs, and secure application coding techniques that every developer should be mindful of, you’ll delve into more advanced topics such as system security architecture and threat modelling practices. The book concludes by explaining the legal and regulatory frameworks governing security practices in the cloud native space and highlights real-world repercussions that companies have faced as a result of immature security practices.By the end of this book, you'll be better equipped to create secure code and system designs.

979
Завантаження...
EЛЕКТРОННА КНИГА

Cloud Native with Kubernetes. Deploy, configure, and run modern cloud native applications on Kubernetes

Alexander Raul

Kubernetes is a modern cloud native container orchestration tool and one of the most popular open source projects worldwide. In addition to the technology being powerful and highly flexible, Kubernetes engineers are in high demand across the industry.This book is a comprehensive guide to deploying, securing, and operating modern cloud native applications on Kubernetes. From the fundamentals to Kubernetes best practices, the book covers essential aspects of configuring applications. You’ll even explore real-world techniques for running clusters in production, tips for setting up observability for cluster resources, and valuable troubleshooting techniques. Finally, you’ll learn how to extend and customize Kubernetes, as well as gaining tips for deploying service meshes, serverless tooling, and more on your cluster.By the end of this Kubernetes book, you’ll be equipped with the tools you need to confidently run and extend modern applications on Kubernetes.

980
Завантаження...
EЛЕКТРОННА КНИГА

Cloud Observability with Azure Monitor. A practical guide to monitoring your Azure infrastructure and applications using industry best practices

José Ángel Fernández, Manuel Lázaro Ramírez

Cloud observability is complex and costly due to the use of hybrid and multi-cloud infrastructure as well as various Azure tools, hampering IT teams’ ability to monitor and analyze issues. The authors distill their years of experience with Microsoft to share the strategic insights and practical skills needed to optimize performance, ensure reliability, and navigate the dynamic landscape of observability on Azure.You’ll get an in-depth understanding of cloud observability and Azure Monitor basics, before getting to grips with the configuration and optimization of data sources and pipelines for effective monitoring. You’ll learn about advanced data analysis techniques using metrics and the Kusto Query Language (KQL) for your logs, design proactive incident response strategies with automated alerts, and visualize reports via dashboards. Using hands-on examples and best practices, you’ll explore the integration of Azure Monitor with Azure Arc and third-party tools, such as Datadog, Elastic Stack, or Dynatrace. You’ll also implement artificial intelligence for IT Operations (AIOps) and secure monitoring for hybrid and multi-cloud environments, aligned with emerging trends.By the end of this book, you’ll be able to develop robust and cost-optimized observability solutions for monitoring your Azure infrastructure and apps using Azure Monitor.

981
Завантаження...
EЛЕКТРОННА КНИГА

Cloud Penetration Testing. Learn how to effectively pentest AWS, Azure, and GCP applications

Kim Crawley

With AWS, Azure, and GCP gaining prominence, understanding their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you’ll explore the intricacies of cloud security testing and gain valuable insights into how pentesters evaluate cloud environments effectively.In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set.By the end of this cloud security book, you’ll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments.

982
Завантаження...
EЛЕКТРОННА КНИГА

Cloud Scale Analytics with Azure Data Services. Build modern data warehouses on Microsoft Azure

Patrik Borosch

Azure Data Lake, the modern data warehouse architecture, and related data services on Azure enable organizations to build their own customized analytical platform to fit any analytical requirements in terms of volume, speed, and quality.This book is your guide to learning all the features and capabilities of Azure data services for storing, processing, and analyzing data (structured, unstructured, and semi-structured) of any size. You will explore key techniques for ingesting and storing data and perform batch, streaming, and interactive analytics. The book also shows you how to overcome various challenges and complexities relating to productivity and scaling. Next, you will be able to develop and run massive data workloads to perform different actions. Using a cloud-based big data-modern data warehouse-analytics setup, you will also be able to build secure, scalable data estates for enterprises. Finally, you will not only learn how to develop a data warehouse but also understand how to create enterprise-grade security and auditing big data programs.By the end of this Azure book, you will have learned how to develop a powerful and efficient analytical platform to meet enterprise needs.

983
Завантаження...
EЛЕКТРОННА КНИГА

Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack

Prashant Priyam

Security issues are still a major concern forall IT organizations. For many enterprises,the move to cloud computing has raisedconcerns for security, but when applicationsare architected with focus on security,cloud platforms can be made just as secureas on-premises platforms. Cloud instancescan be kept secure by employing securityautomation that helps make your data meetyour organization's security policy.This book starts with the basics of whycloud security is important and howautomation can be the most effective wayof controlling cloud security. You willthen delve deeper into the AWS cloudenvironment and its security servicesby dealing with security functions suchas Identity and Access Managementand will also learn how these servicescan be automated. Moving forward,you will come across aspects suchas cloud storage and data security, automatingcloud deployments, and so on. Then,you'll work with OpenStack security modulesand learn how private cloud securityfunctions can be automated for bettertime- and cost-effectiveness. Toward the endof the book, you will gain an understandingof the security compliance requirementsfor your Cloud.By the end of this book, you will havehands-on experience of automating yourcloud security and governance.

984
Завантаження...
EЛЕКТРОННА КНИГА

Cloud Security Handbook. Effectively secure cloud environments using AWS, Azure, and GCP - Second Edition

Eyal Estrin

Securing cloud resources is no easy task—each provider has its unique set of tools, processes, and challenges, demanding specialized expertise. This book cuts through the complexity, delivering practical guidance on embedding security best practices across the core infrastructure components of AWS, Azure, and GCP. It equips information security professionals and cloud engineers with the skills to identify risks and implement robust security controls throughout the design, deployment, and maintenance of public cloud environments.Starting with the shared responsibility model, cloud service models, and deployment models, this book helps you get to grips with fundamental concepts such as compute, storage, networking, identity management, and encryption. You’ll then explore common threats and compliance requirements for cloud environments. As you progress, you'll implement security strategies across deployments ranging from small-scale environments to enterprise-grade production systems, including hybrid and multi-cloud setups.This edition expands on emerging topics like GenAI service security and DevSecOps, with hands-on examples leveraging built-in security features of AWS, Azure, and GCP.By the end of this book, you'll confidently secure any cloud environment with a comprehensive understanding of cloud security principles.