Browse Results

Showing 27,676 through 27,700 of 61,616 results

Implementing Citrix XenServer Quickstarter

by Gohar Ahmed

Implementing Citrix XenServer Quick Starter is a practical, hands-on guide that will help you get started with the Citrix XenServer Virtualization technology with easy-to-follow instructions.Implementing Citrix XenServer Quick Starter is for system administrators who have little to no information on virtualization and specifically Citrix XenServer Virtualization. If you're managing a lot of physical servers and are tired of installing, deploying, updating, and managing physical machines on a daily basis over and over again, then you should probably explore your option of XenServer Virtualization. This book will be your best friend to make you a better systems engineer.

Implementing Cloud Design Patterns for AWS

by Marcus Young

This book is aimed at architects, solution providers, and those of the DevOps community who are looking to implement repeatable patterns for deploying and maintaining services in the Amazon cloud infrastructure. Prior experience using AWS is required as the book focuses more on the patterns and not on the basics of using AWS.

Implementing Cloud Design Patterns for AWS

by Marcus Young

<P><P>Create highly efficient design patterns for scalability, redundancy, and high availability in the AWS Cloud <P><P>About This Book <P><P>Create highly robust systems using cloud infrastructure <P><P>Make web applications resilient against scheduled and accidental down-time <P><P>Explore and apply Amazon-provided services in unique ways to solve common problems <P><P>Who This Book Is For <P><P>This book is aimed at architects, solution providers, and those of the DevOps community who are looking to implement repeatable patterns for deploying and maintaining services in the Amazon cloud infrastructure. Prior experience using AWS is required as the book focuses more on the patterns and not on the basics of using AWS. <P><P>What You Will Learn <P><P>Create and maintain server backups <P><P>Implement scaling policies on schedules, influxes in traffic, and deep health checks <P><P>Provision servers and data that persist through termination <P><P>Make complete use of high availability storage and redundancy storage <P><P>Design content delivery networks to improve user experience <P><P>Optimize databases through caching and sharding <P><P>Monitor and queue data for processing <P><P>In Detail <P><P>Whether you are just getting your feet wet in cloud infrastructure or already creating complex systems, this book aims at describing patterns that can be used to fit your system needs. <P><P>The initial patterns will cover some basic processes such as maintaining and storing backups as well as handling redundancy. The book will then take you through patterns of high availability. Following this, the book will discuss patterns for processing static and dynamic data and patterns for uploading data. The book will then dive into patterns for databases and data processing. In the final leg of your journey, you will get to grips with advanced patterns on Operations and Networking and also get acquainted with Throw-away Environments.

Implementing Cloud Design Patterns for AWS: Solutions and design ideas for solving system design problems, 2nd Edition

by Marcus Young Clive Harber Sean Keery

Create highly efficient design patterns for scalability, redundancy, and high availability in the AWS CloudKey FeaturesBuild highly robust systems using the cloud infrastructureMake web applications resilient against scheduled and accidental downtimeExplore and apply Amazon-provided services in unique ways to solve common design problemsBook DescriptionWhether you're just getting your feet wet in cloud infrastructure or already creating complex systems, this book will guide you through using the patterns to fit your system needs.Starting with patterns that cover basic processes such as source control and infrastructure-as-code, the book goes on to introduce cloud security practices. You'll then cover patterns of availability and scalability and get acquainted with the ephemeral nature of cloud environments. You'll also explore advanced DevOps patterns in operations and maintenance, before focusing on virtualization patterns such as containerization and serverless computing. In the final leg of your journey, this book will delve into data persistence and visualization patterns. You'll get to grips with architectures for processing static and dynamic data, as well as practices for managing streaming data.By the end of this book, you will be able to design applications that are tolerant of underlying hardware failures, resilient against an unexpected influx of data, and easy to manage and replicate.What you will learnImplement scaling policies on schedules, influxes in traffic, and deep health checksMake complete use of highly available and redundant storageDesign content delivery networks to improve user experienceOptimize databases through caching and shardingApply patterns to solve common problemsImplement repeatable processes for deploying systemsWho this book is forIf you’re an architect, solution provider, or DevOps community member looking to implement repeatable patterns for deploying and maintaining services in the Amazon cloud infrastructure, this book is for you.You’ll need prior experience of using AWS understand key concepts covered in the book, as it focuses on the patterns rather than the basics of using AWS.

Implementing Cloud Storage with OpenStack Swift

by Sreedhar Varma Kris Rajana Amar Kapadia

This tutorial-based book has a step-by-step approach for each topic, ensuring it is thoroughly covered and easy to follow. If you are an IT architect or administrator who wants to enter the world of cloud storage using OpenStack Swift, then this book is ideal for you. Whether your job is to build, manage, or use OpenStack Swift, this book is an excellent way to move your career ahead.

Implementing Cryptography Using Python

by Shannon W. Bray

Learn to deploy proven cryptographic tools in your applications and services Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cryptography works to protect users, data, and assets. Implementing Cryptography Using Python will teach you the essentials, so you can apply proven cryptographic tools to secure your applications and systems. Because this book uses Python, an easily accessible language that has become one of the standards for cryptography implementation, you’ll be able to quickly learn how to secure applications and data of all kinds. In this easy-to-read guide, well-known cybersecurity expert Shannon Bray walks you through creating secure communications in public channels using public-key cryptography. You’ll also explore methods of authenticating messages to ensure that they haven’t been tampered with in transit. Finally, you’ll learn how to use digital signatures to let others verify the messages sent through your services. Learn how to implement proven cryptographic tools, using easy-to-understand examples written in Python Discover the history of cryptography and understand its critical importance in today’s digital communication systems Work through real-world examples to understand the pros and cons of various authentication methods Protect your end-users and ensure that your applications and systems are using up-to-date cryptography

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

by Dan Shoemaker Anne Kohnke Ken Sigler

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

Implementing Data Mesh: Design, Build, and Implement Data Contracts, Data Products, and Data Mesh

by Jean-Georges Perrin Eric Broda

As data continues to grow and become more complex, organizations seek innovative solutions to manage their data effectively. Data mesh is one solution that provides a new approach to managing data in complex organizations. This practical guide offers step-by-step guidance on how to implement data mesh in your organization.In this book, Jean-Georges Perrin and Eric Broda focus on the key components of data mesh and provide practical advice supported by code. Data engineers, architects, and analysts will explore a simple and intuitive process for identifying key data mesh components and data products. You'll learn a consistent set of interfaces and access methods that make data products easy to consume.This approach ensures that your data products are easily accessible and the data mesh ecosystem is easy to navigate. This book helps you:Identify, define, and build data products that interoperate within an enterprise data meshBuild a data mesh fabric that binds data products togetherBuild and deploy data products in a data meshEstablish the organizational structure to operate data products, data platforms, and data fabricLearn an innovative architecture that brings data products and data fabric together into the data meshAbout the authors:Jean-Georges "JG" Perrin is a technology leader focusing on building innovative and modern data platforms.Eric Broda is a technology executive, practitioner, and founder of a boutique consulting firm that helps global enterprises realize value from data.

Implementing DevOps on AWS

by Veselin Kantsev

Bring the best out of DevOps and build, deploy, and maintain applications on AWS About This Book • Work through practical examples and gain DevOps best practices to successfully deploy applications on AWS • Successfully provision and operate distributed application systems and your AWS infrastructure using DevOps • Perform Continuous Integration and deployment and fine-tune the way you deliver on AWS Who This Book Is For This book is for system administrators and developers who manage AWS infrastructure and environments and are planning to implement DevOps in their organizations. Those aiming for the AWS Certified DevOps Engineer certification will also find this book useful. Prior experience of operating and managing AWS environments is expected. What You Will Learn • See the difference between Object Oriented Programming and Protocol Oriented Programming • See the difference between reference and value types and when to use each • Find out how we can leverage the tuple to reduce the complexity of our code • Discover what protocols are and how to use them • See how to implement protocol extensions to create a very flexible code base • Learn how to implement several design patterns in a Protocol-Oriented approach • Learn how to solve real-world design issues with protocol-oriented programming In Detail Knowing how to adopt DevOps in your organization is becoming an increasingly important skill for developers, whether you work for a start-up, an SMB, or an enterprise. This book will help you to drastically reduce the amount of time spent on development and increase the reliability of your software deployments on AWS using popular DevOps methods of automation. To start, you will get familiar with the concept of IaC and will learn to design, deploy, and maintain AWS infrastructure. Further on, you'll see how to design and deploy a Continuous Integration platform on AWS using either open source or AWS provided tools/services. Following on from the delivery part of the process, you will learn how to deploy a newly created, tested, and verified artefact to the AWS infrastructure without manual intervention. You will then find out what to consider in order to make the implementation of Configuration Management easier and more effective. Toward the end, you will get to know the tricks and tips to optimize and secure your AWS environment. By the end of the book, you will have mastered the art of applying AWS to DevOps in your organization Style and approach This book is packed full of real-world examples demonstrating use cases that help you deploy DevOps best practices on AWS.

Implementing DevOps with Ansible 2

by Jonathan Mcallister

Leverage the power of Ansible 2 and related tools and scale DevOps processes About This Book • Learn how to use Ansible playbooks along with YAML and JINJA to create efficient DevOps solutions • Use Ansible to provision and automate Docker containers and images • Learn the fundamentals of Continuous Integration and Continuous Delivery and how to leverage Ansible to implement these modern DevOps • Learn the fundamentals of creating custom Ansible modules • Learn the fundamentals of Ansible Galaxy • Follow along step-by-step as we teach you to scale Ansible for your DevOps processes Who This Book Is For If you are a DevOps engineer, administrator, or developer and want to implement the DevOps environment in your organization using Ansible, then this book is for you. What You Will Learn • Get to the grips with the fundamentals of Ansible 2.2 and how you can benefit from leveraging Ansible for DevOps. • Adapt the DevOps process and learn how Ansible and other tools can be used to automate it. • Start automating Continuous Integration and Continuous Delivery tasks using Ansible • Maximize the advantages of tools such as Docker, Jenkins, JIRA, and many more to implement the DevOps culture. • Integrate DevOps tools with Ansible • Extend Ansible using Python and create custom modules that integrate with unique specific technology stacks • Connect and control the states of various third-party applications such as GIT, SVN, Artifactory, Nexus, Jira, Hipchat, Slack, Nginx, and others In Detail Thinking about adapting the DevOps culture for your organization using a very simple, yet powerful automation tool, Ansible 2? Then this book is for you! In this book, you will start with the role of Ansible in the DevOps module, which covers fundamental DevOps practices and how Ansible is leveraged by DevOps organizations to implement consistent and simplified configuration management and deployment. You will then move on to the next module, Ansible with DevOps, where you will understand Ansible fundamentals and how Ansible Playbooks can be used for simple configuration management and deployment tasks. After simpler tasks, you will move on to the third module, Ansible Syntax and Playbook Development, where you will learn advanced configuration management implementations, and use Ansible Vault to secure top-secret information in your organization. In this module, you will also learn about popular DevOps tools and the support that Ansible provides for them (MYSQL, NGINX, APACHE and so on). The last module, Scaling Ansible for the enterprise, is where you will integrate Ansible with CI and CD solutions and provision Docker containers using Ansible. By the end of the book you will have learned to use Ansible to leverage your DevOps tasks. Style and approach A step-by-step guide to automating all DevOps stages with ease using Ansible

Implementing DevOps with Microsoft Azure

by Mitesh Soni

Accelerate and Automate Build, Deploy, and Management of applications to achieve High Availability. About This Book • This guide highlights tools that offer development and deployment environments for application services • Secure and continuously monitor your web application in order to make it highly available • Use Visual Studio Team Services for Continuous Integration and Continuous Development to expedite your application life cycle management process • Use Microsoft Azure App Services (Azure Web Apps / Azure Websites), PaaS offering from Microsoft to deploy web application Who This Book Is For This book is for DevOps engineers, system administrators, and developers (.net) who want to implement DevOps for their organization. You do not need to have any knowledge of VSTS or Azure App Services (Azure Web Apps / Azure Websites). What You Will Learn • Explore the features of PaaS and aPaaS in DevOps • Use Visual Studio Team Services (VSTS) to manage versions of code and integrating VSTS with Eclipse IDE • Understand and configure Continuous Integration in VSTS • Review Unit Test Execution for Automated Testing • Create different environments that can be used to continuous deploy a web application • Configure Roll-based Access to enable secure access for Azure Web Apps • Create and configure the App Service Environment to enhance security • Understand the execution of the end-to-end automation process • Conduct Performance Testing using JMeter • Discover the different monitoring options available in Microsoft Azure Portal In Detail This book will teach you all about the Visual Studio Team Services and Microsoft Azure PaaS offerings that support Continuous Integration, Continuous Delivery, Continuous Deployment, and execution in the cloud with high availability, disaster recovery, and security. You will first be given a tour of all the concepts and tools that Microsoft Azure has to offer and how these can be used in situations to cultivate the DevOps culture. You'll be taught how to use and manage Visual Studio Team Services (VSTS) and about the structure of the sample application used throughout the book. You will become familiar with the nitty gritty of Continuous Integration and Continuous Development with VSTS and Microsoft Azure Apps. You will not only learn how to create App service environments, but also how to compare Azure Web Apps and App Service Environments to deploy web applications in a more secure environment. Once you have completed Continuous Integration and created the Platform for application deployment, you will learn more about the final stepping stone in achieving end-to-end automation using approval-based Continuous Delivery and Deployment. You will then learn about Continuous Monitoring, using the monitoring and notification options provided by Microsoft Azure and Visual Studio Team Services. Style and Approach This book is an easy-to-follow guide filled with examples and real-world applications for gaining an in-depth understanding of Microsoft Azure and Visual Studio. This book will help you leverage Microsoft Azure and Visual Studio using real-world examples.

Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition

by Jason Sachowski

Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with business operations and an already existing information and data security program. Detailing proper collection, preservation, storage, and presentation of digital evidence, the procedures outlined illustrate how digital evidence can be an essential tool in mitigating risk and redusing the impact of both internal and external, digital incidents, disputes, and crimes. By utilizing a digital forensic readiness approach and stances, a company’s preparedness and ability to take action quickly and respond as needed. In addition, this approach enhances the ability to gather evidence, as well as the relevance, reliability, and credibility of any such evidence. New chapters to this edition include Chapter 4 on Code of Ethics and Standards, Chapter 5 on Digital Forensics as a Business, and Chapter 10 on Establishing Legal Admissibility. This book offers best practices to professionals on enhancing their digital forensic program, or how to start and develop one the right way for effective forensic readiness in any corporate or enterprise setting.

Implementing DirectAccess with Windows Server 2016

by Richard M. Hicks

Learn how to design, plan, implement, and support a secure remote access solution using DirectAccess in Windows Server 2016. Remote Access has been included in the Windows operating system for many years. With each new operating system release, new features and capabilities have been included to allow network engineers and security administrators to provide remote access in a secure and cost-effective manner. DirectAccess in Windows Server 2016 provides seamless and transparent, always on remote network connectivity for managed Windows devices. DirectAccess is built on commonly deployed Windows platform technologies and is designed to streamline and simplify the remote access experience for end users. In addition, DirectAccess connectivity is bidirectional, allowing administrators to more effectively manage and secure their field-based assets. Implementing DirectAccess with Windows Server 2016 provides a high-level overview of how DirectAccess works. The vision and evolution of DirectAccess are outlined and business cases and market drivers are explained. DirectAccess is evaluated against traditional VPN and this book describes the Windows platform technologies that underpin this solution. In addition, this book: Explains how the technology works and the specific IT pain points that it addressesIncludes detailed, prescriptive guidance for those tasked with implementing DirectAccess using Windows Server 2016Addresses real-world deployment scenarios for small and large organizationsContains valuable tips, tricks, and implementation best practices for security and performance What you ll learn A high-level understanding of the various remote access technologies included in Windows Server 2016. Common uses cases for remote access, and how best to deploy them in a secure, stable, reliable, and highly available manner. Valuable insight in to design best practices and learn how to implement DirectAccess and VPN with Windows Server 2016 according to deployment best practices. Who This Book Is For IT administrators, network, and security administrators and engineers, systems management professionals, compliance auditors, and IT executive management (CIO, CISO) are the target audience for this title. "

Implementing Domain-Specific Languages with Xtext and Xtend

by Lorenzo Bettini

A step-by-step guide that enables you to quickly implement a DSL with Xtext and Xtend in a test-driven way with the aid of simplified examples.This book is for programmers who want to learn about Xtext and how to use it to implement a DSL (or a programming language) together with Eclipse IDE tooling. It assumes that the user is familiar with Eclipse and its functionality. Existing basic knowledge of a compiler implementation would be useful, though not strictly required, since the book will explain all the stages of the development of a DSL.

Implementing Domain-Specific Languages with Xtext and Xtend - Second Edition

by Lorenzo Bettini

Learn how to implement a DSL with Xtext and Xtend using easy-to-understand examples and best practices About This Book * Leverage the latest features of Xtext and Xtend to develop a domain-specific language. * Integrate Xtext with popular third party IDEs and get the best out of both worlds. * Discover how to test a DSL implementation and how to customize runtime and IDE aspects of the DSL Who This Book Is For This book is targeted at programmers and developers who want to create a domain-specific language with Xtext. They should have a basic familiarity with Eclipse and its functionality. Previous experience with compiler implementation can be helpful but is not necessary since this book will explain all the development stages of a DSL. What You Will Learn * Write Xtext grammar for a DSL; * Use Xtend as an alternative to Java to write cleaner, easier-to-read, and more maintainable code; * Build your Xtext DSLs easily with Maven/Tycho and Gradle; * Write a code generator and an interpreter for a DSL; * Explore the Xtext scoping mechanism for symbol resolution; * Test most aspects of the DSL implementation with JUnit; * Understand best practices in DSL implementations with Xtext and Xtend; * Develop your Xtext DSLs using Continuous Integration mechanisms; * Use an Xtext editor in a web application In Detail Xtext is an open source Eclipse framework for implementing domain-specific languages together with IDE functionalities. It lets you implement languages really quickly; most of all, it covers all aspects of a complete language infrastructure, including the parser, code generator, interpreter, and more. This book will enable you to implement Domain Specific Languages (DSL) efficiently, together with their IDE tooling, with Xtext and Xtend. Opening with brief coverage of Xtext features involved in DSL implementation, including integration in an IDE, the book will then introduce you to Xtend as this language will be used in all the examples throughout the book. You will then explore the typical programming development workflow with Xtext when we modify the grammar of the DSL. Further, the Xtend programming language (a fully-featured Java-like language tightly integrated with Java) will be introduced. We then explain the main concepts of Xtext, such as validation, code generation, and customizations of runtime and UI aspects. You will have learned how to test a DSL implemented in Xtext with JUnit and will progress to advanced concepts such as type checking and scoping. You will then integrate the typical Continuous Integration systems built in to Xtext DSLs and familiarize yourself with Xbase. By the end of the book, you will manually maintain the EMF model for an Xtext DSL and will see how an Xtext DSL can also be used in IntelliJ. Style and approach A step-by step-tutorial with illustrative examples that will let you master using Xtext and implementing DSLs with its custom language, Xtend.

Implementing Effective Code Reviews: How to Build and Maintain Clean Code

by Giuliana Carullo

The ideal code review process differs from organization to organization, but the needs all boil down to the same foundational factors. A software development team cannot properly grow if its code reviews are not consistent, straightforward, and aspire to hit several company goals at once, such as security, performance, longevity, and more. Implementing Effective Code Reviews is the manual your team has been seeking. Author Giuliana Carullo uses her expert background to guide you through the basics of building and maintaining clean code, and she is known for distilling complex concepts into entertaining and easy-to-grasp lessons. Healthy code requires incremental improvements, and knowing how to execute this is essential for conducting effective reviews on your team. While complex and fancy code can be interesting to work with, it will not always achieve business goals or solve urgent problems. Good coding practices are at the heart of a high-performing team, and Carullo instills these core values in a simple, straight-forward way in Implementing Effective Code Reviews. Whether you are a passionate programmer looking to go the extra mile at the office, or an experienced software engineer seeking a guide to how to improve your leadership and code review process, this book covers it all. With each chapter wrapped up in a handy checklist of crucial takeaways, Carullo has created an essential handbook for coders everywhere. There are a lot of myths that dominate the programming landscape, and Implementing Effective Code Reviews grounds the process and gets to the heart of the matter. What You Will LearnUnderstand how to work with your team to implement effective code reviewsMaster good programming practices that will build healthy codeDiscover how you should tackle different complex areas during code review like, security and performance Who This Book Is ForPassionate programmers willing to go the extra mile to be better at their jobs, new programmers looking to strengthen their programming skills, and experienced software engineers looking for a quick guide on how to review code

Implementing Electronic Document and Record Management Systems

by Azad Adam

The global shift toward delivering services online requires organizations to evolve from using traditional paper files and storage to more modern electronic methods. There has however been very little information on just how to navigate this change-until now. Implementing Electronic Document and Record Management Systems explains how to efficiently

Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (River Publishers Series in Digital Security and Forensics)

by Rohit Negi Sandeep K. Shukla Anand Handa S. Venkatesan

Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.

Implementing Event-Driven Microservices Architecture in .NET 7: Develop event-based distributed apps that can scale with ever-changing business demands using C# 11 and .NET 7

by Joshua Garverick Omar Dean McIver

Implement modern design patterns that leverage domain-driven data, to achieve resiliency and scalability for data-dependent applicationsKey FeaturesLearn the tenets of event-driven architecture, coupled with reliable design patterns to enhance your knowledge of distributed systems and build a foundation for professional growthUnderstand how to translate business goals and drivers into a domain model that can be used to develop an app that enables those goals and driversIdentify areas to enhance development and ensure operational support through the architectural design processBook DescriptionThis book will guide you through various hands-on practical examples for implementing event-driven microservices architecture using C# 11 and .NET 7. It has been divided into three distinct sections, each focusing on different aspects of this implementation.The first section will cover the new features of .NET 7 that will make developing applications using EDA patterns easier, the sample application that will be used throughout the book, and how the core tenets of domain-driven design (DDD) are implemented in .NET 7.The second section will review the various components of a local environment setup, the containerization of code, testing, deployment, and the observability of microservices using an EDA approach.The third section will guide you through the need for scalability and service resilience within the application, along with implementation details related to elastic and autoscale components. You'll also cover how proper telemetry helps to automatically drive scaling events. In addition, the topic of observability is revisited using examples of service discovery and microservice inventories.By the end of this book, you'll be able to identify and catalog domains, events, and bounded contexts to be used for the design and development of a resilient microservices architecture.What you will learnExplore .NET 7 and how it enables the development of applications using EDAUnderstand messaging protocols and producer/consumer patterns and how to implement them in .NET 7Test and deploy applications written in .NET 7 and designed using EDA principlesAccount for scaling and resiliency in microservicesCollect and learn from telemetry at the platform and application levelGet to grips with the testing and deployment of microservicesWho this book is forThis book will help .NET developers and architects looking to leverage or pivot to microservices while using a domain-driven event model.

Implementing Hybrid Cloud with Azure Arc: Explore the new-generation hybrid cloud and learn how to build Azure Arc-enabled solutions

by Amit Malik Daman Kaur Raja N

Accelerate hybrid cloud innovation using Azure Arc with the help of real-world scenarios and examplesKey FeaturesGet to grips with setting up and working with Azure ArcHarness the power of Azure Arc and its integration with cutting-edge technologies such as Kubernetes and PaaS data servicesManage, govern, and monitor your on-premises servers and applications with AzureBook DescriptionWith all the options available for deploying infrastructure on multi-cloud platforms and on-premises comes the complexity of managing it, which is adeptly handled by Azure Arc. This book will show you how you can manage environments across platforms without having to migrate workloads from on-premises or multi-cloud to Azure every time. Implementing Hybrid Cloud with Azure Arc starts with an introduction to Azure Arc and hybrid cloud computing, covering use cases and various supported topologies. You'll learn to set up Windows and Linux servers as Arc-enabled machines and get to grips with deploying applications on Kubernetes clusters with Azure Arc and GitOps. The book then demonstrates how to onboard an on-premises SQL Server infrastructure as an Arc-enabled SQL Server and deploy and manage a hyperscale PostgreSQL infrastructure on-premises through Azure Arc. Along with deployment, the book also covers security, backup, migration, and data distribution aspects. Finally, it shows you how to deploy and manage Azure's data services on your own private cloud and explore multi-cloud solutions with Azure Arc. By the end of this book, you'll have a firm understanding of Azure Arc and how it interacts with various cutting-edge technologies such as Kubernetes and PaaS data services.What you will learnSet up a fully functioning Azure Arc-managed environmentExplore products and services from Azure that will help you to leverage Azure ArcUnderstand the new vision of working with on-premises infrastructureDeploy Azure's PaaS data services on-premises or on other cloud platformsDiscover and learn about the technologies required to design a hybrid and multi-cloud strategyImplement best practices to govern your IT infrastructure in a scalable modelWho this book is forThis book is for Cloud IT professionals (Azure and/or AWS), system administrators, database administrators (DBAs), and architects looking to gain clarity about how Azure Arc works and how it can help them achieve business value. Anyone with basic Azure knowledge will benefit from this book.

Implementing IT Processes

by Lionel Pilorget

Information Technology plays a major role in our society. Due to system integration and process automation, a company has to rely on performant information systems. To achieve this objective, it is important to have relevant IT processes in place on the one hand to ensure current operation and on the other hand to enable the successful introduction of new technologies. Once IT processes are defined and described, interrelations become visible, which allow to gain an appropriate level of maturity.

Implementing Identity Management on AWS: A real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments

by Jon Lehtinen Steve "Hutch" Hutchinson

Understand the IAM toolsets, capabilities, and paradigms of the AWS platform and learn how to apply practical identity use cases to AWS at the administrative and application levelKey FeaturesLearn administrative lifecycle management and authorizationExtend workforce identity to AWS for applications deployed to Amazon Web Services (AWS)Understand how to use native AWS IAM capabilities with apps deployed to AWSBook DescriptionAWS identity management offers a powerful yet complex array of native capabilities and connections to existing enterprise identity systems for administrative and application identity use cases. This book breaks down the complexities involved by adopting a use-case-driven approach that helps identity and cloud engineers understand how to use the right mix of native AWS capabilities and external IAM components to achieve the business and security outcomes they want.You will begin by learning about the IAM toolsets and paradigms within AWS. This will allow you to determine how to best leverage them for administrative control, extending workforce identities to the cloud, and using IAM toolsets and paradigms on an app deployed on AWS. Next, the book demonstrates how to extend your on-premise administrative IAM capabilities to the AWS backplane, as well as how to make your workforce identities available for AWS-deployed applications. In the concluding chapters, you'll learn how to use the native identity services with applications deployed on AWS.By the end of this IAM Amazon Web Services book, you will be able to build enterprise-class solutions for administrative and application identity using AWS IAM tools and external identity systems.What you will learnUnderstand AWS IAM concepts, terminology, and servicesExplore AWS IAM, Amazon Cognito, AWS SSO, and AWS Directory Service to solve customer and workforce identity problemsApply the concepts you learn about to solve business, process, and compliance challenges when expanding into AWSNavigate the AWS CLI to unlock the programmatic administration of AWSExplore how AWS IAM, its policy objects, and notational language can be applied to solve security and access management use casesRelate concepts easily to your own environment through IAM patterns and best practicesWho this book is forIdentity engineers and administrators, cloud administrators, security architects, or anyone who wants to explore and manage IAM solutions in AWS will find this book useful. Basic knowledge of AWS cloud infrastructure and services is required to understand the concepts covered in the book more effectively.

Implementing Information Security in Healthcare: Building a Security Program (HIMSS Book Series)

by Terrell Herzig Tom Walsh

Implementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare security concerns in an era of powerful computer technology, increased mobility, and complex regulations designed to protect personal information. Featuring perspectives from more than two dozen security experts, the book explores the tools and policies healthcare organizations need to build an effective and compliant security program. Topics include information security frameworks, risk analysis, senior management oversight and involvement, regulations, security policy development, access control, network security, encryption, mobile device management, disaster recovery, and more. Information security is a concept that has never been more important to healthcare as it is today. Special features include appendices outlining potential impacts of security objectives, technical security features by regulatory bodies (FISMA, HIPAA, PCI DSS and ISO 27000), common technical security features, and a sample risk rating chart.

Implementing Integrated Business Planning: A Guide Exemplified With Process Context and SAP IBP Use Cases (Management for Professionals)

by Robert Kepczynski Raghav Jandhyala Ganesh Sankaran Alecsandra Dimofte Andrew Boyle

This book provides comprehensive guidance on leveraging SAP IBP technology to connect strategic, tactical and operational planning into one coherent process framework, presenting experience shared by practitioners in workshops, customer presentations, business, and IT transformation projects. It also offers use cases and a wealth of practical tips to ensure that readers understand the challenges and advantages of IBP implementation. The book starts by characterizing disconnected planning and contrasting this with key elements of a transformation project approach. It explains the functional foundations and SAP Hybris, Trade Promotion Planning, Customer Business Planning, ARIBA, and S/4 integration with SAP IBP. It then presents an example of a process for integrating finance in IBP. Annual business planning and monthly strategic product planning are taken as examples of explain Strategic Planning. The core of the book is dedicated to tactical sales and operations planning (S&OP) and its process steps, product demand, supply review, integrated reconciliation and management business review, illustrating all steps with use cases. It also describes unconstrained and constrained-but-optimized supply planning, inventory optimization, and shelf life planning in detail, and explains how to improve responsiveness with order-based allocation planning, sales order confirmation, and big deal / tender management coupled with simultaneous re-planning of supply. The book closes with a chapter on performance measurement, focusing on effectiveness, efficiency, and adherence. Throughout, the book includes use cases to connect process and technology through use.

Implementing MLOps in the Enterprise: A Production-First Approach

by Noah Gift Yaron Haviv

With demand for scaling, real-time access, and other capabilities, businesses need to consider building operational machine learning pipelines. This practical guide helps your company bring data science to life for different real-world MLOps scenarios. Senior data scientists, MLOps engineers, and machine learning engineers will learn how to tackle challenges that prevent many businesses from moving ML models to production.Authors Yaron Haviv and Noah Gift take a production-first approach. Rather than beginning with the ML model, you'll learn how to design a continuous operational pipeline, while making sure that various components and practices can map into it. By automating as many components as possible, and making the process fast and repeatable, your pipeline can scale to match your organization's needs.You'll learn how to provide rapid business value while answering dynamic MLOps requirements. This book will help you:Learn the MLOps process, including its technological and business valueBuild and structure effective MLOps pipelinesEfficiently scale MLOps across your organizationExplore common MLOps use casesBuild MLOps pipelines for hybrid deployments, real-time predictions, and composite AIBuild production applications with LLMs and Generative AI, while reducing risks, increasing the efficiency, and fine tuning modelsLearn how to prepare for and adapt to the future of MLOpsEffectively use pre-trained models like HuggingFace and OpenAI to complement your MLOps strategy

Refine Search

Showing 27,676 through 27,700 of 61,616 results