Zero Trust NetworksPerimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.
Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
Understand how the zero trust model embeds security within the system's operation, rather than layering it on top; Examine the fundamental concepts at play in a zero trust network, including network agents and trust engines; Use exis ...
Advanced Analytics with Spark, 2nd EditionIn the second edition of this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark. The authors bring Spark, statistical methods, and real-world data sets together to teach you how to approach analytics problems by example. Updated for Spark 2.1, this edition acts as an introduction to these techniques and other best practices in Spark programming.
You'll start with an introduction to Spark and its ecosystem, and then dive into patterns that apply common techniques - including classification, clustering, collaborative filtering, and anomaly detection - to fields such as genomics, security, and finance.
If you have an entry-level understanding of machine learning and statistics, and you program in Java, Python, or Scala, you'll find the book's patterns useful for working on your own data applications.
Familiarize yourself with the Spark programming model; Become comfortable within the Spark ec ...
Internet of Things with Raspberry Pi 3This book is designed to introduce you to IoT and Raspberry Pi 3. It will help you create interesting projects, such as setting up a weather station and measuring temperature and humidity using sensors; it will also show you how to send sensor data to cloud for visualization in real-time. Then we shift our focus to leveraging IoT for accomplishing complex tasks, such as facial recognition using the Raspberry Pi camera module, AWS Rekognition, and the AWS S3 service. Furthermore, you will master security aspects by building a security surveillance system to protect your premises from intruders using Raspberry Pi, a camera, motion sensors, and AWS Cloud. We'll also create a real-world project by building a Wi-Fi - controlled robot car with Raspberry Pi using a motor driver circuit, DC motor, and a web application.
This book is a must-have as it provides a practical overview of IoT's existing architectures, communication protocols, and security threats at the software and hardware leve ...
Learn Social EngineeringThis book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates.
Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages they cause. It then sets up the lab environment to use different toolS and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.
By the end of the book, you will be in a position to protect yourself and your systems from social engineering threats and attacks.
All in all, the book covers social engineering from A to Z, along with excerpts from many world wide known security experts. ...
Learn Docker - Fundamentals of Docker 18.xDocker containers have revolutionized the software supply chain in small and big enterprises. Never before has a new technology so rapidly penetrated the top 500 enterprises worldwide. Companies that embrace containers and containerize their traditional mission-critical applications have reported savings of at least 50% in total maintenance cost and a reduction of 90% (or more) of the time required to deploy new versions of those applications. Furthermore they are benefitting from increased security just by using containers as opposed to running applications outside containers.
This book starts from scratch, introducing you to Docker fundamentals and setting up an environment to work with it. Then we delve into concepts such as Docker containers, Docker images, Docker Compose, and so on. We will also cover the concepts of deployment, orchestration, networking, and security. Furthermore, we explain Docker functionalities on public clouds such as AWS.
By the end of this book, you w ...
Learn Amazon Web Services in a Month of LunchesCloud computing has transformed the way we build and deliver software. With the Amazon Web Services cloud platform, you can trade expensive glass room hardware and custom infrastructure for virtual servers and easy-to-configure storage, security, and networking services. Better, because you don't own the hardware, you only pay for the computing power you need! Just learn a few key ideas and techniques and you can have applications up and running in AWS in minutes.
Learn Amazon Web Services in a Month of Lunches gets you started with AWS fast. In just 21 bite-size lessons, you'll learn the concepts and practical techniques you need to deploy and manage applications. You'll learn by doing real-world labs that guide you from the core AWS tool set through setting up security and storage and planning for growth. You'll even deploy a public-facing application that's highly available, scalable, and load balanced. ...
OAuth 2 in ActionThink of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.
OAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides. ...
Exam Ref 70-697 Configuring Windows Devices, 2nd EditionPrepare for Microsoft Exam 70-697 - and help demonstrate your real-world mastery of configuring Windows 10 devices in the enterprise. Designed for experienced IT professionals ready to advance their status, this Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA level.
Focus on the expertise measured by these objectives: Manage identity; Plan desktop and device deployment; Plan and implement a Microsoft 365 Solution; Configure networking; Configure storage; Manage data access and protection; Manage remote access; Manage apps; Manage updates and recovery.
This Microsoft Exam Ref: Organizes its coverage by exam objectives; Features strategic, what-if scenarios to challenge you; Assumes you have experience with Windows desktop administration, maintenance, and troubleshooting; Windows 10 security, and integrated Azure features; as well as a basic understanding of Windows networking, Active Directory, and Microsoft Intune. ...
Jenkins 2: Up and RunningDesign, implement, and execute continuous delivery pipelines with a level of flexibility, control, and ease of maintenance that was not possible with Jenkins before. With this practical book, build administrators, developers, testers, and other professionals will learn how the features in Jenkins 2 let you define pipelines as code, leverage integration with other key technologies, and create automated, reliable pipelines to simplify and accelerate your DevOps environments.
Author Brent Laster shows you how Jenkins 2 is significantly different from the more traditional, web-only versions of this popular open source automation platform. If you're familiar with Jenkins and want to take advantage of the new technologies to transform your legacy pipelines or build new modern, automated continuous delivery environments, this is your book.
Create continuous delivery pipelines as code with the Jenkins domain-specific language; Get practical guidance on how to migrate existing jobs and pi ...
Networking All-in-One For Dummies, 7th EditionWhether you're in charge of a small network or a large network, Networking All-in-One is full of the information you'll need to set up a network and keep it functioning. Fully updated to capture the latest Windows 10 releases through Spring 2018, this is the comprehensive guide to setting up, managing, and securing a successful network.
Inside, nine minibooks cover essential, up-to-date information for networking in systems such as Windows 10 and Linux, as well as best practices for security, mobile and cloud-based networking, and much more.
Serves as a single source for the most-often needed network administration information; Covers the latest trends in networking; Get nine detailed and easy-to-understand networking minibooks in one affordable package.
Networking All-in-One For Dummies is the perfect beginner's guide as well as the professional's ideal reference book. ...