Cargando…

Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditing /

Use Red Hats security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hyb...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Chatterjee, Rithik (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [California] : Apress, [2021]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1224142259
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 201124s2021 caua o 001 0 eng d
040 |a YDX  |b eng  |e rda  |e pn  |c YDX  |d UAB  |d ERF  |d OCLCF  |d GW5XE  |d YDXIT  |d EBLCP  |d DCT  |d RDF  |d VT2  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ 
019 |a 1224370326  |a 1225530606  |a 1232857076  |a 1238202851  |a 1240511769 
020 |a 9781484264348  |q (electronic bk.) 
020 |a 1484264347  |q (electronic bk.) 
020 |a 9781484264355  |q (print) 
020 |a 1484264355 
020 |z 1484264339 
020 |z 9781484264331 
024 7 |a 10.1007/978-1-4842-6434-8  |2 doi 
029 1 |a AU@  |b 000068389356 
029 1 |a AU@  |b 000068977270 
035 |a (OCoLC)1224142259  |z (OCoLC)1224370326  |z (OCoLC)1225530606  |z (OCoLC)1232857076  |z (OCoLC)1238202851  |z (OCoLC)1240511769 
037 |b Springer 
050 4 |a QA76.9.A25  |b C43 2021 
072 7 |a UR.  |2 bicssc 
072 7 |a COM053000.  |2 bisacsh 
072 7 |a UR.  |2 thema 
072 7 |a UTN.  |2 thema 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Chatterjee, Rithik,  |e author. 
245 1 0 |a Red Hat and IT security :  |b with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditing /  |c Rithik Chatterjee. 
264 1 |a [California] :  |b Apress,  |c [2021] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
500 |a Includes index. 
505 0 |a Chapter 1: Introduction to IT Security -- Chapter 2: Red Hat Hybrid Cloud Infrastructure -- Chapter 3: Security in DevOps and Automation -- Chapter 4: Hyper-converged Infrastructure -- Chapter 5: Red Hat Smart Management and Red Hat Insights -- Chapter 6: Red Hat Security Auditing -- Chapter 7: Case Studies. 
520 |a Use Red Hats security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud infrastructure security, and the CI/CD process. Next, you will integrate and automate security into the DevOps cycle, infrastructure, and security as code. You will also learn how to automate with Red Hat Ansible Automation Platform andabout hybrid cloud infrastructure. The later chapters will cover hyper-converged infrastructure and its security, Red Hat Smart Management, predictive analytics with Red Hat Insights, and Red Hat security auditing to ensure best security practices. Lastly, you will see the different types of case studies with real-world examples. Red Hat and IT Security will help you get a better understanding of IT security concepts from a network and system administration perspective. It will help you to understand how the IT infrastructure landscape can change by implementing specific security best practices and integrating Red Hat products and solutions to counter against modern cybersecurity threats. You will: Understand IT infrastructure security and its best practices Implement hybrid cloud infrastructure Realign DevOps process into DevSecOps, emphasizing security Implement automation in IT infrastructure services using Red Hat Ansible Explore Red Hat Smart Management, predictive analytics, and auditing. 
588 0 |a Online resource; title from digital title page (viewed on February 11, 2021). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Open source software. 
650 0 |a Computer programming. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Logiciels libres. 
650 6 |a Programmation (Informatique) 
650 7 |a computer programming.  |2 aat 
650 7 |a Computer programming.  |2 fast  |0 (OCoLC)fst00872390 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Open source software.  |2 fast  |0 (OCoLC)fst01046097 
776 0 8 |i Print version:  |a Chatterjee, Rithik.  |t Red Hat and IT security.  |d [California] : Apress, [2021]  |z 9781484264331  |w (OCoLC)1191243035 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484264348/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6403755 
938 |a YBP Library Services  |b YANK  |n 301765001 
994 |a 92  |b IZTAP