IT eBooks
Download, Read, Use
Systematic Cloud Migration
Systematic Cloud Migration

This book is your systematic cloud migration guide. Experiences shared by the author are drawn from real-life migration projects and contain practical advice, as well as step-by-step architecture, design, and technical implementation instructions using sample application code on GitLab. Following the guidance in this book will provide much needed support to your teams, and help you successfully complete the application cloud migration journey. Systematic Cloud Migration consists of four major parts. Part one starts with a fundamental introduction of cloud computing to establish the context for migration, including paradigm changes in five important areas: software application, DevSecOps, operations, infrastructure, and security. And these are the areas that the book follows throughout. Next, it introduces a real-life migration process that your team can follow. Part two presents the migration process for the application code, including architecture diagrams and presented by demo ...
Pipeline as Code
Pipeline as Code

Pipeline as Code is a practical guide to automating your development pipeline in a cloud-native, service-driven world. You'll use the latest infrastructure-as-code tools like Packer and Terraform to develop reliable CI/CD pipelines for numerous cloud-native applications. Follow this book's insightful best practices, and you'll soon be delivering software that's quicker to market, faster to deploy, and with less last-minute production bugs. Treat your CI/CD pipeline like the real application it is. With the Pipeline as Code approach, you create a collection of scripts that replace the tedious web UI wrapped around most CI/CD systems. Code-driven pipelines are easy to use, modify, and maintain, and your entire CI pipeline becomes more efficient because you directly interact with core components like Jenkins, Terraform, and Docker. In Pipeline as Code you'll learn to build reliable CI/CD pipelines for cloud-native applications. With Jenkins as the backbone, you'll programmatically c ...
Building Applications with Azure Resource Manager (ARM)
Building Applications with Azure Resource Manager (ARM)

Learn how to leverage infrastructure as code with Azure Resource Manager (ARM) and the best practices to build, test, debug, and deploy your applications in Microsoft Azure using ARM templates and the new domain-specific language Bicep. As organizations consider moving partially or fully to the cloud, infrastructure as code (IaC) has become a key component to improving time to market for their applications. However, it is critical that enterprise infrastructure professionals use the right resources and strategies to build the infrastructure required to run applications in the cloud. Azure cloud-native components and capabilities automate the build and deployment process, offering a myriad of compelling reasons to leverage IaC to build your applications in Azure. Starting with the evolution of the software-defined approach and building on the basic concepts of infrastructure as code, this book provides you with comprehensive guidance to learn Azure Resource Manager from the ground u ...
MLOps Engineering at Scale
MLOps Engineering at Scale

MLOps Engineering at Scale shows you how to put machine learning into production efficiently by using pre-built services from AWS and other cloud vendors. You'll learn how to rapidly create flexible and scalable machine learning systems without laboring over time-consuming operational tasks or taking on the costly overhead of physical hardware. Following a real-world use case for calculating taxi fares, you will engineer an MLOps pipeline for a PyTorch model using AWS server-less capabilities. A production-ready machine learning system includes efficient data pipelines, integrated monitoring, and means to scale up and down based on demand. Using cloud-based services to implement ML infrastructure reduces development time and lowers hosting costs. Serverless MLOps eliminates the need to build and maintain custom infrastructure, so you can concentrate on your data, models, and algorithms. MLOps Engineering at Scale teaches you how to implement efficient machine learning systems usi ...
Blockchain and Crypt Currency
Blockchain and Crypt Currency

This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to significantly economize the cost of transactions. Creating a ledger on data, a blockchain makes it possible to designate the owner of each piece of data, to trade data pieces, and to market them. This book examines the formation of markets for various types of data from the theory of market quality proposed and developed by M. Yano. Blockchains are expected to give data itself the status of a new production factor. Bringing ownership of data to the hands of data producers, blockchains can reduce the possibility of information leakage, enhance the sharing and use of IoT data, and prevent data monopoly and misuse. The industry will have a bright ...
Data Mesh
Data Mesh

We're at an inflection point in data, where our data management solutions no longer match the complexity of organizations, the proliferation of data sources, and the scope of our aspirations to get value from data with AI and analytics. In this practical book, author Zhamak Dehghani introduces data mesh, a decentralized sociotechnical paradigm drawn from modern distributed architecture that provides a new approach to sourcing, sharing, accessing, and managing analytical data at scale. Dehghani guides practitioners, architects, technical leaders, and decision makers on their journey from traditional big data architecture to a distributed and multidimensional approach to analytical data management. Data mesh treats data as a product, considers domains as a primary concern, applies platform thinking to create self-serve data infrastructure, and introduces a federated computational model of data governance. Get a complete introduction to data mesh principles and its constituents; Des ...
Cloud Native DevOps with Kubernetes
Cloud Native DevOps with Kubernetes

Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts Justin Domingus and John Arundel show you what Kubernetes can do-and what you can do with it. This updated second edition guides you through the growing Kubernetes ecosystem and provides practical solutions to everyday problems with software tools currently in use. You'll walk through an example containerized application running in Kubernetes step-by-step, from the development environment through the continuous deployment pipeline, exploring patterns you can use for your own applications. Make your development teams lean, fast, and effective by adopting Kubernetes and DevOps principles. - Understand containers and Kubernetes-no experience necessary; - Run your own applications on managed cloud Kubernetes services or on-prem environments; - Design your own cloud native services an ...
The Hardware Hacking Handbook
The Hardware Hacking Handbook

Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they're everywhere - in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you'll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you'll use a home testing lab to perform fault-injecti ...
Software Architecture with C# 10 and .NET 6, 3rd Edition
Software Architecture with C# 10 and .NET 6, 3rd Edition

Software architecture is the practice of implementing structures and systems that streamline the software development process and improve the quality of an app. This fully revised and expanded third edition, featuring the latest features of .NET 6 and C# 10, enables you to acquire the key skills, knowledge, and best practices required to become an effective software architect. Software Architecture with C# 10 and .NET 6, Third Edition features new chapters that describe the importance of the software architect, microservices with ASP.NET Core, and analyzing the architectural aspects of the front-end in the applications, including the new approach of .NET MAUI. It also includes a new chapter focused on providing a short introduction to artificial intelligence and machine learning using ML.NET, and updated chapters on Azure Kubernetes Service, EF Core, and Blazor. You will begin by understanding how to transform user requirements into architectural needs and exploring the differenc ...
Istio in Action
Istio in Action

Reduce the operational complexity of your microservices with an Istio-powered service mesh! Istio in Action shows you how to implement this powerful new architecture and move your application-networking concerns to a dedicated infrastructure layer. Non-functional concerns stay separate from your application, so your code is easier to understand, maintain, and adapt regardless of programming language. In this practical guide, you'll go hands-on with the full-featured Istio service mesh to manage microservices communication. Helpful diagrams, example configuration, and examples make it easy to understand how to control routing, secure container applications, and monitor network traffic. Offload complex microservice communication layer challenges to Istio! The industry-standard Istio service mesh radically simplifies security, routing, observability, and other service-to-service communication challenges. With Istio, you use a straightforward declarative configuration style to establish ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025