IT eBooks
Download, Read, Use
Practical Data Privacy
Practical Data Privacy

Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differential privacy, federated learning, and encrypted computation. Based on hard-won lessons, this book provides solid advice and best practices for integrating breakthrough privacy-enhancing technologies into production systems. Practical Data Privacy answers important questions such as: What do privacy regulations like GDPR and CCPA mean for my data workflows and data science use cases? What does "anonymized data" really mean? How do I actually anonymize data? How does federated learning and analysis work? Homomorphic encryption sounds great, but is it ready for use? How do I compare and choose the best privacy-preserving technologies and method ...
Data Management at Scale, 2nd Edition
Data Management at Scale, 2nd Edition

As data management continues to evolve rapidly, managing all of your data in a central place, such as a data warehouse, is no longer scalable. Today's world is about quickly turning data into value. This requires a paradigm shift in the way we federate responsibilities, manage data, and make it available to others. With this practical book, you'll learn how to design a next-gen data architecture that takes into account the scale you need for your organization. Executives, architects and engineers, analytics teams, and compliance and governance staff will learn how to build a next-gen data landscape. Author Piethein Strengholt provides blueprints, principles, observations, best practices, and patterns to get you up to speed. Examine data management trends, including regulatory requirements, privacy concerns, and new developments such as data mesh and data fabric; Go deep into building a modern data architecture, including cloud data landing zones, domain-driven design, data produc ...
Microsoft Power Platform Enterprise Architecture, 2nd Edition
Microsoft Power Platform Enterprise Architecture, 2nd Edition

This book is for enterprise architects and decision makers who design solutions for complex business requirements. It teaches you how to use architectural best practices and methodologies to optimize an enterprise-grade solution. You'll gain an understanding of the tools available in the Power Platform suite and how to integrate them seamlessly with various Microsoft 365 and Azure components to create a tailor-made solution. Progressing through the book, you'll discover how to address application lifecycle management, security, extensibility, and data migration. This includes Power BI, which often requires a separate approach to the rest of the Power Platform. This book provides you with practical, essential, and concise information. It follows a complete, end-to-end example in every chapter, with diagrams that illustrate the intricacies of Microsoft cloud structure. It has been created by an experienced enterprise architect who actively creates solutions using Microsoft technology. By ...
Multi-Cloud Strategy for Cloud Architects, 2nd Edition
Multi-Cloud Strategy for Cloud Architects, 2nd Edition

Are you ready to unlock the full potential of your enterprise with the transformative power of multi-cloud adoption? As a cloud architect, you understand the challenges of navigating the vast array of cloud services and moving data and applications to public clouds. But with 'Multi-Cloud Strategy for Cloud Architects, Second Edition', you'll gain the confidence to tackle these complexities head-on. This edition delves into the latest concepts of BaseOps, FinOps, and DevSecOps, including the use of the DevSecOps Maturity Model. You'll learn how to optimize costs and maximize security using the major public clouds - Azure, AWS, and Google Cloud. Examples of solutions by the increasingly popular Oracle Cloud Infrastructure (OCI) and Alibaba Cloud have been added in this edition. Plus, you will discover cutting-edge ideas like AIOps and GreenOps. With practical use cases, including IoT, data mining, Web3, and financial management, this book empowers you with the skills needed to develop, r ...
Pro Kotlin Web Apps from Scratch
Pro Kotlin Web Apps from Scratch

Build production-grade web apps from scratch - without using frameworks - with Kotlin on the Java platform. You'll learn how to use and compose libraries, how to choose between different libraries, and the benefits of explicit and straight-forward code, vs. the implicit magic, conventions, and inversion of control you often see in frameworks. The book teaches the Kotlin language by building production-ready Kotlin code. You'll gain a deep understanding of the idiomatic use of the Kotlin language along with knowledge of how to apply Kotlin in production-grade web apps. The book also bridges the gap between building from scratch and using existing frameworks. For example, you'll learn how to integrate Spring Security-based authentication in web apps written from scratch, so you can leverage existing tooling in your organization without having to take on the entire Spring framework. The first section of the book sets up the base structure of your web app, such as routing, configura ...
Firewalls Don't Stop Dragons, 5th Edition
Firewalls Don't Stop Dragons, 5th Edition

Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people - though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured th ...
← Prev      
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025