Browse Results

Showing 26,101 through 26,125 of 56,214 results

Implementing Azure Solutions: Deploy And Manage Azure Containers And Build Azure Solutions With Ease, 2nd Edition

by Florian Klaffenbach Jan-Henrik Damaschke Oliver Michalski

A practical guide that enhances your skills in implementing Azure solutions for your organization About This Book • Confidently configure, deploy, and manage cloud services and virtual machines • Implement a highly-secured environment and respond to threats with increased visibility • This comprehensive guide is packed with exciting practical scenarios that enable you to implement Azure solutions with ease Who This Book Is For This book is for IT architects, system and network admins, and DevOps engineers who are aware of Azure solutions and want to implement them for their organization. What You Will Learn • Implement virtual networks, network gateways, Site-to-Site VPN, ExpressRoute, routing, and network devices • Understand the working of different storage accounts in Azure • Plan, deploy, and secure virtual machines • Deploy and manage Azure Containers • Get familiar with some common Azure usage scenarios In Detail Microsoft Azure has numerous effective solutions that shape the future of any business. However, the major challenge that architects and administrators face are implementing these solutions appropriately. Our book focuses on various implementation scenarios that will help overcome the challenge of implementing Azure's solutions in a very efficient manner and will also help you to prepare for Microsoft Architect exam. You will not only learn how to secure a newly deployed Azure Active Directory but also get to know how Azure Active Directory Synchronization could be implemented. To maintain an isolated and secure environment so that you can run your virtual machines and applications, you will implement Azure networking services. Also to manage, access, and secure your confidential data, you will implement storage solutions. Toward the end, you will explore tips and tricks to secure your environment. By the end, you will be able to implement Azure solutions such as networking, storage, and cloud effectively. Style and approach This step-by-step guide focuses on implementing various Azure solutions for your organization. The motive is to provide a comprehensive exposure and ensure they can implement these solutions with ease.

Implementing Azure Solutions: Deploy and manage Azure containers and build Azure solutions with ease, 2nd Edition

by Florian Klaffenbach Jan-Henrik Damaschke Oliver Michalski Markus Klein Sebastian Hoppe

Get up and running with Azure services and learn how to implement them in your organizationKey FeaturesDeploy Azure Services in a controlled and preconfigured environmentDiscover best practices and techniques for implementing Azure SolutionsBuild and deploy an app using Azure App ServicesBook DescriptionMicrosoft Azure offers numerous solutions that can shape the future of any business. However, the major challenge that architects and administrators face lies in implementing these solutions.Implementing Azure Solutions helps you overcome this challenge by enabling you to implement Azure Solutions effectively. The book begins by guiding you in choosing the backend structure for your solutions. You will then work with the Azure toolkit and learn how to use Azure Managed Apps to share your solutions with the Azure service catalog. The book then focuses on various implementation techniques and best practices such as implementing Azure Cloud Services by configuring, deploying, and managing cloud services. As you progress through the chapters, you’ll learn how to work with Azure-managed Kubernetes and Azure Container Services.By the end of the book, you will be able to build robust cloud solutions on Azure.What you will learnCreate and manage a Kubernetes cluster in Azure Kubernetes Service (AKS)Implement site-to-site VPN and ExpressRoute connections in your environmentExplore the best practices in building and deploying app servicesUse Telemetry to monitor your Azure SolutionsDesign an Azure IoT solution and learn how to operate in different scenariosImplement a Hybrid Azure Design using Azure StackWho this book is forIf you’re an IT architect, IT professional, or DevOps engineer who plans to implement Azure Solutions for your organization, this book is for you.

Implementing Cellular IoT Solutions for Digital Transformation: Successfully develop, deploy, and maintain LTE and 5G enterprise IoT systems

by Dennis McCain Cameron Coursey

A pragmatic handbook on IoT technologies and markets that will guide you in implementing cellular IoT solutions as part of an enterprise's digital transformation affecting both operational cost savings and new business models.Purchase of the print or Kindle book includes a free eBook in the PDF format.Key FeaturesUnderstand all the critical aspects of a cellular IoT solution with this practical guideIdentify key enterprise IoT market requirements and IoT business casesDevelop robust end-to-end cellular IoT solutions with the help of best practices and case studiesBook DescriptionEven if you're an IoT technology manager with a sound understanding of wireless local area network technologies like Wi-Fi and Bluetooth, you may face many unique challenges when implementing a wireless wide area network (WWAN) IoT solution with cellular technologies with respect to choosing the optimal IoT device, cellular connectivity, and architecture. To help you overcome such roadblocks, this digital transformation book guides you in implementing a robust, end-to-end cellular IoT solution using best practices for all aspects of managing the IoT solution.Starting with an introduction to the top IoT markets and solutions in the context of an enterprise's digital transformation, this book will show you how this leads to cost savings and new business models. You'll grasp all you need to know about the IoT system components, life cycle, and best practices for implementing an IoT solution. While the book explains all the leading IoT wireless technologies, the focus is on LTE and 5G cellular technologies. With a review of real-world cellular IoT solution case studies and future IoT trends, you'll be ready to work with wireless IoT technologies, devices, and architectures.By the end of this book, you'll be able to identify the best wireless technologies for your IoT use cases and successfully implement cellular IoT solutions addressing key issues in the solution life cycle.What you will learnUnderstand how IoT enables an enterprise's digital transformationDiscover the applications of various IoT wireless technologiesExplore IoT devices, architectures, and real-world use casesDive deep into LTE and 5G cellular technologies and how they enable IoTBuild a privacy and security framework in an IoT solutionSelect the best components for a cellular IoT enterprise solutionOvercome challenges in the IoT solution life cycleExamine new cellular IoT technologies, trends, and business modelsWho this book is forThis book is for IoT technology managers, leaders, C-suite executives, and decision-makers considering or currently developing IoT solutions based on wireless/cellular technologies such as LTE and 5G. You'll be able to make the most of this book if you understand the importance of IoT connectivity in the context of its applications.

Implementing Cisco Networking Solutions

by Harpreet Singh

Learn the art of designing, implementing, and managing Cisco's networking solutions on datacenters, wirelessly, security and mobility to set up an Enterprise network. About This Book • Implement Cisco's networking solutions on datacenters and wirelessly, Cloud, Security, and Mobility • Leverage Cisco IOS to manage network infrastructures. • A practical guide that will show how to troubleshoot common issues on the network. Who This Book Is For This book is targeted at network designers and IT engineers who are involved in designing, configuring, and operating enterprise networks, and are in taking decisions to make the necessary network changes to meet newer business needs such as evaluating new technology choices, enterprise growth, and adding new services on the network. The reader is expected to have a general understanding of the fundamentals of networking, including the OSI stack and IP addressing. What You Will Learn • Understand the network lifecycle approach • Get to know what makes a good network design • Design components and technology choices at various places in the network (PINS) • Work on sample configurations for network devices in the LAN/ WAN/ DC, and the wireless domain • Get familiar with the configurations and best practices for securing the network • Explore best practices for network operations In Detail Most enterprises use Cisco networking equipment to design and implement their networks. However, some networks outperform networks in other enterprises in terms of performance and meeting new business demands, because they were designed with a visionary approach. The book starts by describing the various stages in the network lifecycle and covers the plan, build, and operate phases. It covers topics that will help network engineers capture requirements, choose the right technology, design and implement the network, and finally manage and operate the network. It divides the overall network into its constituents depending upon functionality, and describe the technologies used and the design considerations for each functional area. The areas covered include the campus wired network, wireless access network, WAN choices, datacenter technologies, and security technologies. It also discusses the need to identify business-critical applications on the network, and how to prioritize these applications by deploying QoS on the network. Each topic provides the technology choices, and the scenario, involved in choosing each technology, and provides configuration guidelines for configuring and implementing solutions in enterprise networks. Style and approach A step-by-step practical guide that ensures you implement Cisco solutions such as enterprise networks, cloud, and data centers, on small-to-large organizations.

Implementing Cisco UCS Solutions

by Farhan Ahmed Nadeem Prasenjit Sarkar

A tutorial-based approach which will help you understand the practical methodologies and deploying of Cisco UCS components.If you are a professional such as a system, network, or storage administrator who is responsible for Cisco UCS deployments, this is the perfect book for you. You should have some basic knowledge of the server's architecture, network, and storage technologies. Familiarity with virtualization technologies is also recommended (though not necessary) as the majority of real-world UCS deployments run virtualized loads. Knowledge of Nexus OS is not necessary as the majority of the management tasks are handled in a graphical user interface with very few exceptions using the CLI.

Implementing CISCO UCS Solutions - Second Edition

by Anuj Modi

This book is for system, network, and storage administrators who are responsible for Cisco UCS deployments. You need to have basic knowledge of server architecture, network, and storage technologies.

Implementing Citrix XenServer Quickstarter

by Gohar Ahmed

Implementing Citrix XenServer Quick Starter is a practical, hands-on guide that will help you get started with the Citrix XenServer Virtualization technology with easy-to-follow instructions.Implementing Citrix XenServer Quick Starter is for system administrators who have little to no information on virtualization and specifically Citrix XenServer Virtualization. If you're managing a lot of physical servers and are tired of installing, deploying, updating, and managing physical machines on a daily basis over and over again, then you should probably explore your option of XenServer Virtualization. This book will be your best friend to make you a better systems engineer.

Implementing Cloud Design Patterns for AWS: Solutions and design ideas for solving system design problems, 2nd Edition

by Sean Keery Clive Harber Marcus Young

Create highly efficient design patterns for scalability, redundancy, and high availability in the AWS CloudKey FeaturesBuild highly robust systems using the cloud infrastructureMake web applications resilient against scheduled and accidental downtimeExplore and apply Amazon-provided services in unique ways to solve common design problemsBook DescriptionWhether you're just getting your feet wet in cloud infrastructure or already creating complex systems, this book will guide you through using the patterns to fit your system needs.Starting with patterns that cover basic processes such as source control and infrastructure-as-code, the book goes on to introduce cloud security practices. You'll then cover patterns of availability and scalability and get acquainted with the ephemeral nature of cloud environments. You'll also explore advanced DevOps patterns in operations and maintenance, before focusing on virtualization patterns such as containerization and serverless computing. In the final leg of your journey, this book will delve into data persistence and visualization patterns. You'll get to grips with architectures for processing static and dynamic data, as well as practices for managing streaming data.By the end of this book, you will be able to design applications that are tolerant of underlying hardware failures, resilient against an unexpected influx of data, and easy to manage and replicate.What you will learnImplement scaling policies on schedules, influxes in traffic, and deep health checksMake complete use of highly available and redundant storageDesign content delivery networks to improve user experienceOptimize databases through caching and shardingApply patterns to solve common problemsImplement repeatable processes for deploying systemsWho this book is forIf you’re an architect, solution provider, or DevOps community member looking to implement repeatable patterns for deploying and maintaining services in the Amazon cloud infrastructure, this book is for you.You’ll need prior experience of using AWS understand key concepts covered in the book, as it focuses on the patterns rather than the basics of using AWS.

Implementing Cloud Design Patterns for AWS

by Marcus Young

This book is aimed at architects, solution providers, and those of the DevOps community who are looking to implement repeatable patterns for deploying and maintaining services in the Amazon cloud infrastructure. Prior experience using AWS is required as the book focuses more on the patterns and not on the basics of using AWS.

Implementing Cloud Design Patterns for AWS

by Marcus Young

<P><P>Create highly efficient design patterns for scalability, redundancy, and high availability in the AWS Cloud <P><P>About This Book <P><P>Create highly robust systems using cloud infrastructure <P><P>Make web applications resilient against scheduled and accidental down-time <P><P>Explore and apply Amazon-provided services in unique ways to solve common problems <P><P>Who This Book Is For <P><P>This book is aimed at architects, solution providers, and those of the DevOps community who are looking to implement repeatable patterns for deploying and maintaining services in the Amazon cloud infrastructure. Prior experience using AWS is required as the book focuses more on the patterns and not on the basics of using AWS. <P><P>What You Will Learn <P><P>Create and maintain server backups <P><P>Implement scaling policies on schedules, influxes in traffic, and deep health checks <P><P>Provision servers and data that persist through termination <P><P>Make complete use of high availability storage and redundancy storage <P><P>Design content delivery networks to improve user experience <P><P>Optimize databases through caching and sharding <P><P>Monitor and queue data for processing <P><P>In Detail <P><P>Whether you are just getting your feet wet in cloud infrastructure or already creating complex systems, this book aims at describing patterns that can be used to fit your system needs. <P><P>The initial patterns will cover some basic processes such as maintaining and storing backups as well as handling redundancy. The book will then take you through patterns of high availability. Following this, the book will discuss patterns for processing static and dynamic data and patterns for uploading data. The book will then dive into patterns for databases and data processing. In the final leg of your journey, you will get to grips with advanced patterns on Operations and Networking and also get acquainted with Throw-away Environments.

Implementing Cloud Storage with OpenStack Swift

by Amar Kapadia Kris Rajana Sreedhar Varma

This tutorial-based book has a step-by-step approach for each topic, ensuring it is thoroughly covered and easy to follow. If you are an IT architect or administrator who wants to enter the world of cloud storage using OpenStack Swift, then this book is ideal for you. Whether your job is to build, manage, or use OpenStack Swift, this book is an excellent way to move your career ahead.

Implementing Cryptography Using Python

by Shannon W. Bray

Learn to deploy proven cryptographic tools in your applications and services Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cryptography works to protect users, data, and assets. Implementing Cryptography Using Python will teach you the essentials, so you can apply proven cryptographic tools to secure your applications and systems. Because this book uses Python, an easily accessible language that has become one of the standards for cryptography implementation, you’ll be able to quickly learn how to secure applications and data of all kinds. In this easy-to-read guide, well-known cybersecurity expert Shannon Bray walks you through creating secure communications in public channels using public-key cryptography. You’ll also explore methods of authenticating messages to ensure that they haven’t been tampered with in transit. Finally, you’ll learn how to use digital signatures to let others verify the messages sent through your services. Learn how to implement proven cryptographic tools, using easy-to-understand examples written in Python Discover the history of cryptography and understand its critical importance in today’s digital communication systems Work through real-world examples to understand the pros and cons of various authentication methods Protect your end-users and ensure that your applications and systems are using up-to-date cryptography

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

by Anne Kohnke Ken Sigler Dan Shoemaker

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

Implementing Data Mesh

by Jean-Georges Perrin Eric Broda

As data continues to grow and become more complex, organizations seek innovative solutions to manage their data effectively. Data mesh is one solution that provides a new approach to managing data in complex organizations. This practical guide offers step-by-step guidance on how to implement data mesh in your organization.In this book, Jean-Georges Perrin and Eric Broda focus on the key components of data mesh and provide practical advice supported by code. Data engineers, architects, and analysts will explore a simple and intuitive process for identifying key data mesh components and data products. You'll learn a consistent set of interfaces and access methods that make data products easy to consume.This approach ensures that your data products are easily accessible and the data mesh ecosystem is easy to navigate. This book helps you:Identify, define, and build data products that interoperate within an enterprise data meshBuild a data mesh fabric that binds data products togetherBuild and deploy data products in a data meshEstablish the organizational structure to operate data products, data platforms, and data fabricLearn an innovative architecture that brings data products and data fabric together into the data meshAbout the authors:Jean-Georges "JG" Perrin is a technology leader focusing on building innovative and modern data platforms.Eric Broda is a technology executive, practitioner, and founder of a boutique consulting firm that helps global enterprises realize value from data.

Implementing DevOps on AWS

by Veselin Kantsev

Bring the best out of DevOps and build, deploy, and maintain applications on AWS About This Book • Work through practical examples and gain DevOps best practices to successfully deploy applications on AWS • Successfully provision and operate distributed application systems and your AWS infrastructure using DevOps • Perform Continuous Integration and deployment and fine-tune the way you deliver on AWS Who This Book Is For This book is for system administrators and developers who manage AWS infrastructure and environments and are planning to implement DevOps in their organizations. Those aiming for the AWS Certified DevOps Engineer certification will also find this book useful. Prior experience of operating and managing AWS environments is expected. What You Will Learn • See the difference between Object Oriented Programming and Protocol Oriented Programming • See the difference between reference and value types and when to use each • Find out how we can leverage the tuple to reduce the complexity of our code • Discover what protocols are and how to use them • See how to implement protocol extensions to create a very flexible code base • Learn how to implement several design patterns in a Protocol-Oriented approach • Learn how to solve real-world design issues with protocol-oriented programming In Detail Knowing how to adopt DevOps in your organization is becoming an increasingly important skill for developers, whether you work for a start-up, an SMB, or an enterprise. This book will help you to drastically reduce the amount of time spent on development and increase the reliability of your software deployments on AWS using popular DevOps methods of automation. To start, you will get familiar with the concept of IaC and will learn to design, deploy, and maintain AWS infrastructure. Further on, you'll see how to design and deploy a Continuous Integration platform on AWS using either open source or AWS provided tools/services. Following on from the delivery part of the process, you will learn how to deploy a newly created, tested, and verified artefact to the AWS infrastructure without manual intervention. You will then find out what to consider in order to make the implementation of Configuration Management easier and more effective. Toward the end, you will get to know the tricks and tips to optimize and secure your AWS environment. By the end of the book, you will have mastered the art of applying AWS to DevOps in your organization Style and approach This book is packed full of real-world examples demonstrating use cases that help you deploy DevOps best practices on AWS.

Implementing DevOps with Ansible 2

by Jonathan Mcallister

Leverage the power of Ansible 2 and related tools and scale DevOps processes About This Book • Learn how to use Ansible playbooks along with YAML and JINJA to create efficient DevOps solutions • Use Ansible to provision and automate Docker containers and images • Learn the fundamentals of Continuous Integration and Continuous Delivery and how to leverage Ansible to implement these modern DevOps • Learn the fundamentals of creating custom Ansible modules • Learn the fundamentals of Ansible Galaxy • Follow along step-by-step as we teach you to scale Ansible for your DevOps processes Who This Book Is For If you are a DevOps engineer, administrator, or developer and want to implement the DevOps environment in your organization using Ansible, then this book is for you. What You Will Learn • Get to the grips with the fundamentals of Ansible 2.2 and how you can benefit from leveraging Ansible for DevOps. • Adapt the DevOps process and learn how Ansible and other tools can be used to automate it. • Start automating Continuous Integration and Continuous Delivery tasks using Ansible • Maximize the advantages of tools such as Docker, Jenkins, JIRA, and many more to implement the DevOps culture. • Integrate DevOps tools with Ansible • Extend Ansible using Python and create custom modules that integrate with unique specific technology stacks • Connect and control the states of various third-party applications such as GIT, SVN, Artifactory, Nexus, Jira, Hipchat, Slack, Nginx, and others In Detail Thinking about adapting the DevOps culture for your organization using a very simple, yet powerful automation tool, Ansible 2? Then this book is for you! In this book, you will start with the role of Ansible in the DevOps module, which covers fundamental DevOps practices and how Ansible is leveraged by DevOps organizations to implement consistent and simplified configuration management and deployment. You will then move on to the next module, Ansible with DevOps, where you will understand Ansible fundamentals and how Ansible Playbooks can be used for simple configuration management and deployment tasks. After simpler tasks, you will move on to the third module, Ansible Syntax and Playbook Development, where you will learn advanced configuration management implementations, and use Ansible Vault to secure top-secret information in your organization. In this module, you will also learn about popular DevOps tools and the support that Ansible provides for them (MYSQL, NGINX, APACHE and so on). The last module, Scaling Ansible for the enterprise, is where you will integrate Ansible with CI and CD solutions and provision Docker containers using Ansible. By the end of the book you will have learned to use Ansible to leverage your DevOps tasks. Style and approach A step-by-step guide to automating all DevOps stages with ease using Ansible

Implementing DevOps with Microsoft Azure

by Mitesh Soni

Accelerate and Automate Build, Deploy, and Management of applications to achieve High Availability. About This Book • This guide highlights tools that offer development and deployment environments for application services • Secure and continuously monitor your web application in order to make it highly available • Use Visual Studio Team Services for Continuous Integration and Continuous Development to expedite your application life cycle management process • Use Microsoft Azure App Services (Azure Web Apps / Azure Websites), PaaS offering from Microsoft to deploy web application Who This Book Is For This book is for DevOps engineers, system administrators, and developers (.net) who want to implement DevOps for their organization. You do not need to have any knowledge of VSTS or Azure App Services (Azure Web Apps / Azure Websites). What You Will Learn • Explore the features of PaaS and aPaaS in DevOps • Use Visual Studio Team Services (VSTS) to manage versions of code and integrating VSTS with Eclipse IDE • Understand and configure Continuous Integration in VSTS • Review Unit Test Execution for Automated Testing • Create different environments that can be used to continuous deploy a web application • Configure Roll-based Access to enable secure access for Azure Web Apps • Create and configure the App Service Environment to enhance security • Understand the execution of the end-to-end automation process • Conduct Performance Testing using JMeter • Discover the different monitoring options available in Microsoft Azure Portal In Detail This book will teach you all about the Visual Studio Team Services and Microsoft Azure PaaS offerings that support Continuous Integration, Continuous Delivery, Continuous Deployment, and execution in the cloud with high availability, disaster recovery, and security. You will first be given a tour of all the concepts and tools that Microsoft Azure has to offer and how these can be used in situations to cultivate the DevOps culture. You'll be taught how to use and manage Visual Studio Team Services (VSTS) and about the structure of the sample application used throughout the book. You will become familiar with the nitty gritty of Continuous Integration and Continuous Development with VSTS and Microsoft Azure Apps. You will not only learn how to create App service environments, but also how to compare Azure Web Apps and App Service Environments to deploy web applications in a more secure environment. Once you have completed Continuous Integration and created the Platform for application deployment, you will learn more about the final stepping stone in achieving end-to-end automation using approval-based Continuous Delivery and Deployment. You will then learn about Continuous Monitoring, using the monitoring and notification options provided by Microsoft Azure and Visual Studio Team Services. Style and Approach This book is an easy-to-follow guide filled with examples and real-world applications for gaining an in-depth understanding of Microsoft Azure and Visual Studio. This book will help you leverage Microsoft Azure and Visual Studio using real-world examples.

Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition

by Jason Sachowski

Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with business operations and an already existing information and data security program. Detailing proper collection, preservation, storage, and presentation of digital evidence, the procedures outlined illustrate how digital evidence can be an essential tool in mitigating risk and redusing the impact of both internal and external, digital incidents, disputes, and crimes. By utilizing a digital forensic readiness approach and stances, a company’s preparedness and ability to take action quickly and respond as needed. In addition, this approach enhances the ability to gather evidence, as well as the relevance, reliability, and credibility of any such evidence. New chapters to this edition include Chapter 4 on Code of Ethics and Standards, Chapter 5 on Digital Forensics as a Business, and Chapter 10 on Establishing Legal Admissibility. This book offers best practices to professionals on enhancing their digital forensic program, or how to start and develop one the right way for effective forensic readiness in any corporate or enterprise setting.

Implementing DirectAccess with Windows Server 2016

by Richard M. Hicks

Learn how to design, plan, implement, and support a secure remote access solution using DirectAccess in Windows Server 2016. Remote Access has been included in the Windows operating system for many years. With each new operating system release, new features and capabilities have been included to allow network engineers and security administrators to provide remote access in a secure and cost-effective manner. DirectAccess in Windows Server 2016 provides seamless and transparent, always on remote network connectivity for managed Windows devices. DirectAccess is built on commonly deployed Windows platform technologies and is designed to streamline and simplify the remote access experience for end users. In addition, DirectAccess connectivity is bidirectional, allowing administrators to more effectively manage and secure their field-based assets. Implementing DirectAccess with Windows Server 2016 provides a high-level overview of how DirectAccess works. The vision and evolution of DirectAccess are outlined and business cases and market drivers are explained. DirectAccess is evaluated against traditional VPN and this book describes the Windows platform technologies that underpin this solution. In addition, this book: Explains how the technology works and the specific IT pain points that it addressesIncludes detailed, prescriptive guidance for those tasked with implementing DirectAccess using Windows Server 2016Addresses real-world deployment scenarios for small and large organizationsContains valuable tips, tricks, and implementation best practices for security and performance What you ll learn A high-level understanding of the various remote access technologies included in Windows Server 2016. Common uses cases for remote access, and how best to deploy them in a secure, stable, reliable, and highly available manner. Valuable insight in to design best practices and learn how to implement DirectAccess and VPN with Windows Server 2016 according to deployment best practices. Who This Book Is For IT administrators, network, and security administrators and engineers, systems management professionals, compliance auditors, and IT executive management (CIO, CISO) are the target audience for this title. "

Implementing Domain-Specific Languages with Xtext and Xtend

by Lorenzo Bettini

A step-by-step guide that enables you to quickly implement a DSL with Xtext and Xtend in a test-driven way with the aid of simplified examples.This book is for programmers who want to learn about Xtext and how to use it to implement a DSL (or a programming language) together with Eclipse IDE tooling. It assumes that the user is familiar with Eclipse and its functionality. Existing basic knowledge of a compiler implementation would be useful, though not strictly required, since the book will explain all the stages of the development of a DSL.

Implementing Domain-Specific Languages with Xtext and Xtend - Second Edition

by Lorenzo Bettini

Learn how to implement a DSL with Xtext and Xtend using easy-to-understand examples and best practices About This Book * Leverage the latest features of Xtext and Xtend to develop a domain-specific language. * Integrate Xtext with popular third party IDEs and get the best out of both worlds. * Discover how to test a DSL implementation and how to customize runtime and IDE aspects of the DSL Who This Book Is For This book is targeted at programmers and developers who want to create a domain-specific language with Xtext. They should have a basic familiarity with Eclipse and its functionality. Previous experience with compiler implementation can be helpful but is not necessary since this book will explain all the development stages of a DSL. What You Will Learn * Write Xtext grammar for a DSL; * Use Xtend as an alternative to Java to write cleaner, easier-to-read, and more maintainable code; * Build your Xtext DSLs easily with Maven/Tycho and Gradle; * Write a code generator and an interpreter for a DSL; * Explore the Xtext scoping mechanism for symbol resolution; * Test most aspects of the DSL implementation with JUnit; * Understand best practices in DSL implementations with Xtext and Xtend; * Develop your Xtext DSLs using Continuous Integration mechanisms; * Use an Xtext editor in a web application In Detail Xtext is an open source Eclipse framework for implementing domain-specific languages together with IDE functionalities. It lets you implement languages really quickly; most of all, it covers all aspects of a complete language infrastructure, including the parser, code generator, interpreter, and more. This book will enable you to implement Domain Specific Languages (DSL) efficiently, together with their IDE tooling, with Xtext and Xtend. Opening with brief coverage of Xtext features involved in DSL implementation, including integration in an IDE, the book will then introduce you to Xtend as this language will be used in all the examples throughout the book. You will then explore the typical programming development workflow with Xtext when we modify the grammar of the DSL. Further, the Xtend programming language (a fully-featured Java-like language tightly integrated with Java) will be introduced. We then explain the main concepts of Xtext, such as validation, code generation, and customizations of runtime and UI aspects. You will have learned how to test a DSL implemented in Xtext with JUnit and will progress to advanced concepts such as type checking and scoping. You will then integrate the typical Continuous Integration systems built in to Xtext DSLs and familiarize yourself with Xbase. By the end of the book, you will manually maintain the EMF model for an Xtext DSL and will see how an Xtext DSL can also be used in IntelliJ. Style and approach A step-by step-tutorial with illustrative examples that will let you master using Xtext and implementing DSLs with its custom language, Xtend.

Implementing Effective Code Reviews: How to Build and Maintain Clean Code

by Giuliana Carullo

The ideal code review process differs from organization to organization, but the needs all boil down to the same foundational factors. A software development team cannot properly grow if its code reviews are not consistent, straightforward, and aspire to hit several company goals at once, such as security, performance, longevity, and more. Implementing Effective Code Reviews is the manual your team has been seeking. Author Giuliana Carullo uses her expert background to guide you through the basics of building and maintaining clean code, and she is known for distilling complex concepts into entertaining and easy-to-grasp lessons. Healthy code requires incremental improvements, and knowing how to execute this is essential for conducting effective reviews on your team. While complex and fancy code can be interesting to work with, it will not always achieve business goals or solve urgent problems. Good coding practices are at the heart of a high-performing team, and Carullo instills these core values in a simple, straight-forward way in Implementing Effective Code Reviews. Whether you are a passionate programmer looking to go the extra mile at the office, or an experienced software engineer seeking a guide to how to improve your leadership and code review process, this book covers it all. With each chapter wrapped up in a handy checklist of crucial takeaways, Carullo has created an essential handbook for coders everywhere. There are a lot of myths that dominate the programming landscape, and Implementing Effective Code Reviews grounds the process and gets to the heart of the matter. What You Will LearnUnderstand how to work with your team to implement effective code reviewsMaster good programming practices that will build healthy codeDiscover how you should tackle different complex areas during code review like, security and performance Who This Book Is ForPassionate programmers willing to go the extra mile to be better at their jobs, new programmers looking to strengthen their programming skills, and experienced software engineers looking for a quick guide on how to review code

Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (River Publishers Series in Digital Security and Forensics)

by Anand Handa Rohit Negi S. Venkatesan Sandeep K. Shukla

Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.

Implementing Event-Driven Microservices Architecture in .NET 7: Develop event-based distributed apps that can scale with ever-changing business demands using C# 11 and .NET 7

by Joshua Garverick Omar Dean McIver

Implement modern design patterns that leverage domain-driven data, to achieve resiliency and scalability for data-dependent applicationsKey FeaturesLearn the tenets of event-driven architecture, coupled with reliable design patterns to enhance your knowledge of distributed systems and build a foundation for professional growthUnderstand how to translate business goals and drivers into a domain model that can be used to develop an app that enables those goals and driversIdentify areas to enhance development and ensure operational support through the architectural design processBook DescriptionThis book will guide you through various hands-on practical examples for implementing event-driven microservices architecture using C# 11 and .NET 7. It has been divided into three distinct sections, each focusing on different aspects of this implementation.The first section will cover the new features of .NET 7 that will make developing applications using EDA patterns easier, the sample application that will be used throughout the book, and how the core tenets of domain-driven design (DDD) are implemented in .NET 7.The second section will review the various components of a local environment setup, the containerization of code, testing, deployment, and the observability of microservices using an EDA approach.The third section will guide you through the need for scalability and service resilience within the application, along with implementation details related to elastic and autoscale components. You'll also cover how proper telemetry helps to automatically drive scaling events. In addition, the topic of observability is revisited using examples of service discovery and microservice inventories.By the end of this book, you'll be able to identify and catalog domains, events, and bounded contexts to be used for the design and development of a resilient microservices architecture.What you will learnExplore .NET 7 and how it enables the development of applications using EDAUnderstand messaging protocols and producer/consumer patterns and how to implement them in .NET 7Test and deploy applications written in .NET 7 and designed using EDA principlesAccount for scaling and resiliency in microservicesCollect and learn from telemetry at the platform and application levelGet to grips with the testing and deployment of microservicesWho this book is forThis book will help .NET developers and architects looking to leverage or pivot to microservices while using a domain-driven event model.

Implementing Hybrid Cloud with Azure Arc: Explore the new-generation hybrid cloud and learn how to build Azure Arc-enabled solutions

by Amit Malik Daman Kaur Raja N

Accelerate hybrid cloud innovation using Azure Arc with the help of real-world scenarios and examplesKey FeaturesGet to grips with setting up and working with Azure ArcHarness the power of Azure Arc and its integration with cutting-edge technologies such as Kubernetes and PaaS data servicesManage, govern, and monitor your on-premises servers and applications with AzureBook DescriptionWith all the options available for deploying infrastructure on multi-cloud platforms and on-premises comes the complexity of managing it, which is adeptly handled by Azure Arc. This book will show you how you can manage environments across platforms without having to migrate workloads from on-premises or multi-cloud to Azure every time. Implementing Hybrid Cloud with Azure Arc starts with an introduction to Azure Arc and hybrid cloud computing, covering use cases and various supported topologies. You'll learn to set up Windows and Linux servers as Arc-enabled machines and get to grips with deploying applications on Kubernetes clusters with Azure Arc and GitOps. The book then demonstrates how to onboard an on-premises SQL Server infrastructure as an Arc-enabled SQL Server and deploy and manage a hyperscale PostgreSQL infrastructure on-premises through Azure Arc. Along with deployment, the book also covers security, backup, migration, and data distribution aspects. Finally, it shows you how to deploy and manage Azure's data services on your own private cloud and explore multi-cloud solutions with Azure Arc. By the end of this book, you'll have a firm understanding of Azure Arc and how it interacts with various cutting-edge technologies such as Kubernetes and PaaS data services.What you will learnSet up a fully functioning Azure Arc-managed environmentExplore products and services from Azure that will help you to leverage Azure ArcUnderstand the new vision of working with on-premises infrastructureDeploy Azure's PaaS data services on-premises or on other cloud platformsDiscover and learn about the technologies required to design a hybrid and multi-cloud strategyImplement best practices to govern your IT infrastructure in a scalable modelWho this book is forThis book is for Cloud IT professionals (Azure and/or AWS), system administrators, database administrators (DBAs), and architects looking to gain clarity about how Azure Arc works and how it can help them achieve business value. Anyone with basic Azure knowledge will benefit from this book.

Refine Search

Showing 26,101 through 26,125 of 56,214 results