Practical Cloud Security, 2nd Edition
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best pract...
Cloud Native Security Cookbook
With the rise of the cloud, every aspect of IT has been shaken to its core. The fundamentals for building systems are changing, and although many of the principles that underpin security still ring tr...
Hybrid Cloud Backup For Dummies
Every modern technology-driven organization understands data is one of its most valuable assets. It's no surprise, then, that the protection of that data has become an increasing concern. This concern...
VMware Backup For Dummies, 2nd Edition
Server virtualization is one of the most disruptive innovations of the past twenty years. It is a foundational technology in cloud computing and has been widely deployed by businesses of all sizes in...
DevOps for Trustworthy Smart IoT Systems
ENACT is a research project funded by the European Commission under its H2020 program. The project consortium consists of twelve industry and research member organisations spread across the whole EU....
Security Risk Management for the Internet of Things
In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art...
Db2 Optimization Techniques for SAP Database Migration to the Cloud
For many years, SAP migrations have been a standard process. An increasing number of customers are changing their database software to IBM Db2 for UNIX, Linux, and Windows or are moving their existing...
Mainframe Application Modernization Patterns for Hybrid Cloud
As businesses digitally transform, they can impose significant demands on existing mainframe applications and data requiring the need to modernize to achieve business outcomes. To meet this need for m...
Kubernetes Security
Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This prac...
Web Application Firewalls
Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session st...
High Performance Privacy Preserving AI
Artificial intelligence (AI) depends on data. In sensitive domains - such as healthcare, security, finance, and many more - there is therefore tension between unleashing the power of AI and maintainin...
Information Theory for Data Science
Information theory deals with mathematical laws that govern the flow, representation and transmission of information, just as the field of physics concerns laws that govern the behavior of the physica...
RF Filter Technology For Dummies, 2nd Edition
The implementation of 5G and wireless applications is accelerating worldwide, along with the drive to deliver high data rates and high data capacity. This creates new challenges for wireless technolog...
Internet of Things For Dummies, 2nd Edition
The Internet of Things (IoT) is creating a new world - a quantifiable and measurable world - in which people can better manage their lives, cities can better manage their infrastructure, and companies...
Machine Learning at Enterprise Scale
Enterprises in traditional and emerging industries alike are increasingly turning to machine learning (ML) to maximize the value of their business data. But many of these teams are likely to experienc...
Creating a Data-Driven Enterprise in Media
The data-driven revolution is finally hitting the media and entertainment industry. For decades, broadcast television and print media relied on traditional delivery channels for solvency and growth, b...
What Is eBPF?
In just the past few years, the extended Berkeley Packet Filter (eBPF) has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing. With this report, Liz...
An Introduction to Cloud Databases
Cloud deployments have not only changed the way companies run mission critical databases; they've also transformed the roles of many people in production. With this practical report, database and syst...
Resilient Web Design
Jeremy Keith begins by noting that the title Resilient Web Design might suggest a handbook for building robust websites, but clarifies that it is not a handbook - it is more like a history book. The t...