Use Red Hat’s security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud infrastructure security, and the CI/CD process. Next, you will integrate and automate security into the DevOps cycle, infrastructure, and security as code. You will also learn how to automate with Red Hat Ansible Automation Platform and about hybrid cloud infrastructure.
The later chapters will cover hyper-converged infrastructure and its security, Red Hat Smart Management, predictive analytics with Red Hat Insights, and Red Hat security auditing to ensure best security practices. Lastly, you will see the different types of case studies with real-world examples.
Red Hat and IT Security will help you get a better understanding of IT security concepts from a network and system administration perspective. It will help you to understand how the IT infrastructure landscape can change by implementing specific security best practices and integrating Red Hat products and solutions to counter against modern cybersecurity threats.
What You Will Learn
● Understand IT infrastructure security and its best practices
● Implement hybrid cloud infrastructure
● Realign DevOps process into DevSecOps, emphasizing security
● Implement automation in IT infrastructure services using Red Hat Ansible
● Explore Red Hat Smart Management, predictive analytics, and auditingWho This Book Is For
IT professionals handling network/system administration or the IT infrastructure of an organization. DevOps professionals and cybersecurity analysts would find the book useful.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Rithik Chatterjee graduated as an electronics and telecommunications engineer. As he was interested in the networking domain, he completed his course in IT infrastructure management. Later on, he was accredited as a Red Hat Certified System Administrator and Red Hat Certified Engineer. Working for a startup, his responsibilities included network/system administration, IT security, information security, and DevOps. Having gained a better understanding of the IT landscape, his interest and goals leaned towards cybersecurity leading to his training and certification as an EC-Council Certified Ethical Hacker.
His hobbies include landscape and wildlife photography, blogging, reading, and watching anime. To pursue his hobby of writing he developed his own blogging website (Inspirio Scripts), also encouraging budding authors like him to pen their thoughts.
Use Red Hat s security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud infrastructure security, and the CI/CD process. Next, you will integrate and automate security into the DevOps cycle, infrastructure, and security as code. You will also learn how to automate with Red Hat Ansible Automation Platform andabout hybrid cloud infrastructure.
The later chapters will cover hyper-converged infrastructure and its security, Red Hat Smart Management, predictive analytics with Red Hat Insights, and Red Hat security auditing to ensure best security practices. Lastly, you will see the different types of case studies with real-world examples.
Red Hat and IT Security will help you get a better understanding of IT security concepts from a network and system administration perspective. It will help you to understand how the IT infrastructure landscape can change by implementing specific security best practices and integrating Red Hat products and solutions to counter against modern cybersecurity threats.
You will:
? Understand IT infrastructure security and its best practices
? Implement hybrid cloud infrastructure
? Realign DevOps process into DevSecOps, emphasizing security
? Implement automation in IT infrastructure services using Red Hat Ansible
? Explore Red Hat Smart Management, predictive analytics, and auditing
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Da: Lakeside Books, Benton Harbor, MI, U.S.A.
Condizione: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books! Codice articolo OTF-S-9781484264331
Quantità: Più di 20 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New. Codice articolo 42330744-n
Quantità: Più di 20 disponibili
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New. Codice articolo ABLIING23Mar2716030152553
Quantità: Più di 20 disponibili
Da: California Books, Miami, FL, U.S.A.
Condizione: New. Codice articolo I-9781484264331
Quantità: Più di 20 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition. Codice articolo 42330744
Quantità: Più di 20 disponibili
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. Use Red Hats security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud infrastructure security, and the CI/CD process. Next, you will integrate and automate security into the DevOps cycle, infrastructure, and security as code. You will also learn how to automate with Red Hat Ansible Automation Platform and about hybrid cloud infrastructure. The later chapters will cover hyper-converged infrastructure and its security, Red Hat Smart Management, predictive analytics with Red Hat Insights, and Red Hat security auditing to ensure best security practices. Lastly, you will see the different types of case studies with real-world examples.Red Hat and IT Security will help you get a better understanding of IT security concepts from a network and system administration perspective. It will help you to understand how the IT infrastructure landscape can change by implementing specific security best practices and integrating Red Hat products and solutions to counter against modern cybersecurity threats.What You Will Learn Understand IT infrastructure security and its best practices Implement hybrid cloud infrastructure Realign DevOps process into DevSecOps, emphasizing security Implement automation in IT infrastructure services using Red Hat Ansible Explore Red Hat Smart Management, predictive analytics, and auditingWho This Book Is For IT professionals handling network/system administration or the IT infrastructure of an organization. DevOps professionals and cybersecurity analysts would find the book useful. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Codice articolo 9781484264331
Quantità: 1 disponibili
Da: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
Condizione: New. 2020. Paperback. . . . . . Codice articolo V9781484264331
Quantità: 15 disponibili
Da: Revaluation Books, Exeter, Regno Unito
Paperback. Condizione: Brand New. 233 pages. 9.00x5.75x0.75 inches. In Stock. Codice articolo x-1484264339
Quantità: 2 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: As New. Unread book in perfect condition. Codice articolo 42330744
Quantità: Più di 20 disponibili
Da: Kennys Bookstore, Olney, MD, U.S.A.
Condizione: New. 2020. Paperback. . . . . . Books ship from the US and Ireland. Codice articolo V9781484264331
Quantità: 15 disponibili