packt publishing PDF: 1 to 10 of 100 results fetched - page 1 [an]

Mastering Windows PowerShell Scripting - Second Edition: One-stop guide to automating administrative tasks

https://www.amazon.com/Mastering-Windows-PowerShell-Scriptin...
Master the art of automating and managing your environment using PowerShellKey Features
  • Find quick solutions to automate your environment with ease
  • Work with large amounts of data effortlessly with PowerShell data types and secure them
  • Packed with real-world examples to automate and simplify the management of your Windows environment
Book DescriptionPowerShell scripts offer a handy way to automate various chores. Working with these scripts effectively can be a difficult task.This comprehensive guide starts from scratch and covers advanced-level topics to make you a PowerShell expert. The first module, PowerShell Fundamentals, begins with new features, installing PowerShell on Linux, working with parameters and objects, and also how you can work with .NET classes from within PowerShell.In the next module, you'll see how to efficiently manage large amounts of data and interact with other services using PowerShell. You'll be able to make the most of PowerShell's powerful automation feature, where you will have different methods to parse and manipulate data, regular expressions, and WMI.After automation, you will enter the Extending PowerShell module, which covers topics such as asynchronous processing and, creating modules. The final step is to secure your PowerShell, so you will land in the last module, Securing and Debugging PowerShell, which covers PowerShell execution policies, error handling techniques, and testing.By the end of the book, you will be an expert in using the PowerShell language.What you will learn
  • Optimize code through the use of functions, switches, and looping structures
  • Install PowerShell on your Linux system
  • Utilize variables, hashes, and arrays to store data
  • Work with Objects and Operators to test and manipulate data
  • Parse and manipulate different data types
  • Write .NET classes with ease within the PowerShell
  • Create and implement regular expressions in PowerShell scripts
  • Deploy applications and code with PowerShell's Package management modules
  • Leverage session-based remote management
  • Manage files, folders, and registries through the use of PowerShell
Who This Book Is ForIf you are a system administrator who wants to become an expert in controlling and automating your Windows environment, then this book is for you. It is also for those new to the PowerShell language.Table of Contents
  • Introduction to PowerShell
  • Working with PowerShell
  • Modules and Snap-Ins
  • Working with Objects in PowerShell
  • Operators
  • Variables, Hashtables, and Arrays
  • Branching and looping
  • Working with .NET
  • Data parsing and manipulation
  • Regular Expressions
  • Files, folders and the Registry
  • Windows Management Instrumentation
  • HTML, XML and JSON
  • Working with REST and SOAP web interface
  • Remoting and remote management
  • Testing
  • Error Handling
  • Published by: Packt Publishing | Publication date: 10/27/2017
    Kindle book details: Kindle Edition, 440 pages

    Metasploit for Beginners: Create a threat-free environment with the best-in-class tool

    https://www.amazon.com/Metasploit-Beginners-threat-free-best...
    Key Features
    • Carry out penetration testing in highly-secured environments with Metasploit
    • Learn to bypass different defenses to gain access into different systems.
    • A step-by-step guide that will quickly enhance your penetration testing skills.
    Book DescriptionThis book will begin by introducing you to Metasploit and its functionality. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools and components used by Metasploit.Further on in the book, you will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools. Next, you'll get hands-on experience carrying out client-side attacks. Moving on, you'll learn about web application security scanning and bypassing anti-virus and clearing traces on the target system post compromise. This book will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems with Metasploit.By the end of this book, you'll get the hang of bypassing different defenses, after which you'll learn how hackers use the network to gain access into different systems.What you will learn
    • Get to know the absolute basics of the Metasploit framework so you have a strong foundation for advanced attacks
    • Integrate and use various supporting tools to make Metasploit even more powerful and precise
    • Set up the Metasploit environment along with your own virtual testing lab
    • Use Metasploit for information gathering and enumeration before planning the blueprint for the attack on the target system
    • Get your hands dirty by firing up Metasploit in your own virtual lab and hunt down real vulnerabilities
    • Discover the clever features of the Metasploit framework for launching sophisticated and deceptive client-side attacks that bypass the perimeter security
    • Leverage Metasploit capabilities to perform Web application security scanning
    About the AuthorSagar Rahalkar is a seasoned information security professional having more than 10 years of comprehensive experience in various verticals of IS. His domain expertise is mainly into breach detection, cyber crime investigations, digital forensics, application security, vulnerability assessment and penetration testing, compliance for mandates and regulations, IT GRC, and much more. He holds a master's degree in computer science and several industry-recognized certifications such as Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist-Rational AppScan, Certified Information Security Manager (CISM), and PRINCE2. He has been closely associated with Indian law enforcement agencies for more than 3 years dealing with digital crime investigations and related training and received several awards and appreciations from senior officials of the police and defense organizations in India. Sagar has also been a reviewer and author for various books and online publications.Table of Contents
  • Introduction to Metasploit & Supporting Tools
  • Setting up your environment
  • Metasploit Components and Environment Configuration
  • Information Gathering with Metasploit
  • Vulnerability hunting with Metasploit
  • Client Side attacks with Metasploit
  • Web Application Scanning with Metasploit
  • Anti-Virus Evasion and Anti-Forensics
  • Cyber Attack Management using Armitage
  • Extending Metasploit & Exploit Development
  • Published by: Packt Publishing | Publication date: 07/21/2017
    Kindle book details: Kindle Edition, 190 pages

    Mastering Kubernetes: Large scale container deployment and management

    https://www.amazon.com/Mastering-Kubernetes-container-deploy...
    Key Features
    • This practical guide demystifies Kubernetes and ensures that your clusters are always available, scalable, and up to date
    • Discover new features such as autoscaling, rolling updates, resource quotas, and cluster size
    • Master the skills of designing and deploying large clusters on various cloud platforms
    Book DescriptionKubernetes is an open source system to automate the deployment, scaling, and management of containerized applications. If you are running more than just a few containers or want automated management of your containers, you need Kubernetes.This book mainly focuses on the advanced management of Kubernetes clusters. It covers problems that arise when you start using container orchestration in production. We start by giving you an overview of the guiding principles in Kubernetes design and show you the best practises in the fields of security, high availability, and cluster federation.You will discover how to run complex stateful microservices on Kubernetes including advanced features as horizontal pod autoscaling, rolling updates, resource quotas, and persistent storage back ends. Using real-world use cases, we explain the options for network configuration and provides guidelines on how to set up, operate, and troubleshoot various Kubernetes networking plugins. Finally, we cover custom resource development and utilization in automation and maintenance workflows.By the end of this book, you'll know everything you need to know to go from intermediate to advanced level.What you will learn
    • Architect a robust Kubernetes cluster for long-time operation
    • Discover the advantages of running Kubernetes on GCE, AWS, Azure, and bare metal
    • See the identity model of Kubernetes and options for cluster federation
    • Monitor and troubleshoot Kubernetes clusters and run a highly available Kubernetes
    • Create and configure custom Kubernetes resources and use third-party resources in your automation workflows
    • Discover the art of running complex stateful applications in your container environment
    • Deliver applications as standard packages
    About the AuthorGigi Sayfan is the chief system architect of VRVIU?a stealth virtual reality start-up. Gigi has been developing software professionally for more than 20 years in domains as diverse as instant messaging, morphing, chip fabrication process control, embedded multi-media application for game consoles, brain-inspired machine learning, custom browser development, web services for 3D distributed game platforms, and most recently IoT/sensors.He has written production code every day in many programming languages such as C, C , C#, Python, Java, Delphi, JavaScript, and even Cobol and PowerBuilder for operating systems such as Windows (3.11 through 7), Linux, Mac OSX, Lynx (embedded), and Sony Playstation. His technical expertise includes databases, low-level networking, distributed systems, unorthodox user interfaces, and the general software development lifecycle.Table of Contents
  • Understanding Kubernetes Architecture
  • Creating Kubernetes Clusters
  • Monitoring, Logging, and Troubleshooting
  • High Availability and Reliability
  • Configuring Kubernetes Security, Limits, and Accounts
  • Using Critical Kubernetes Resources
  • Handling Kubernetes Storage
  • Running Stateful Application with Kubernetes
  • Rolling Updates, Scalability and Quotas
  • Advanced Kubernetes Networking
  • Running Kubernetes on Multiple Clouds and Cluster Federation
  • Customizing Kubernetes - API and Plugins
  • Handling the Kubernetes Package Manager
  • The Future of Kubernetes
  • Author: Gigi Sayfan
    Published by: Packt Publishing | Publication date: 05/25/2017
    Kindle book details: Kindle Edition, 426 pages

    Building RESTful Web Services with .NET Core: Developing Distributed Web Services to improve scalability with .NET Core 2.0 and ASP.NET Core 2.0

    https://www.amazon.com/Building-RESTful-Services-NET-Core-eb...
    Building Complete E-commerce/Shopping Cart ApplicationKey Features
    • Follow best practices and explore techniques such as clustering and caching to achieve a reactive, scalable web service
    • Leverage the .NET Framework to quickly implement RESTful endpoints.
    • Learn to implement a client library for a RESTful web service using ASP.NET Core.
    Book DescriptionREST is an architectural style that tackles the challenges of building scalable web services. In today's connected world, APIs have taken a central role on the web. APIs provide the fabric through which systems interact, and REST has become synonymous with APIs. The depth, breadth, and ease of use of ASP.NET Core makes it a breeze for developers to work with for building robust web APIs. This book takes you through the design of RESTful web services and leverages the ASP.NET Core framework to implement these services. This book begins by introducing you to the basics of the philosophy behind REST. You'll go through the steps of designing and implementing an enterprise-grade RESTful web service. This book takes a practical approach, that you can apply to your own circumstances. This book brings forth the power of the latest .NET Core release, working with MVC. Later, you will learn about the use of the framework to explore approaches to tackle resilience, security, and scalability concerns. You will explore the steps to improve the performance of your applications. You'll also learn techniques to deal with security in web APIs and discover how to implement unit and integration test strategies. By the end of the book, you will have a complete understanding of Building a client for RESTful web services, along with some scaling techniques.What you will learn
    • Add basic authentication to your RESTful API
    • Create a Carts Controller and Orders Controller to manage and process Orders
    • Intercept HTTP requests and responses by building your own middleware
    • Test service calls using Postman and Advanced REST Client
    • Secure your data/application using annotations
    Who this book is forThis book is intended for those who want to learn to build RESTful web services with the latest .NET Core Framework. To make best use of the code samples included in the book, you should have a basic knowledge of C# and .NET Core. Table of Contents
  • Getting Started
  • Build Initial Framework – Layout Foundation of Application
  • User registration and Administration
  • Item catalogue Cart and Checkout
  • Integrating external components and handling
  • Testing RESTful Web Services
  • Continuous Integration and Continuous Deployment
  • Securing RESTful Web Services
  • Scaling RESTful Services (Performance of Web Services)
  • Building a Web Client (Consuming Web Services)
  • Introduction to microservices
  • Published by: Packt Publishing | Publication date: 05/31/2018
    Kindle book details: Kindle Edition, 334 pages

    Python Machine Learning: Machine Learning and Deep Learning with Python, scikit-learn, and TensorFlow, 2nd Edition

    https://www.amazon.com/Python-Machine-Learning-scikit-learn-...
    Key Features
    • Second edition of the bestselling book on Machine Learning
    • A practical approach to key frameworks in data science, machine learning, and deep learning
    • Use the most powerful Python libraries to implement machine learning and deep learning
    • Get to know the best practices to improve and optimize your machine learning systems and algorithms
    Book DescriptionMachine learning is eating the software world, and now deep learning is extending machine learning. Understand and work at the cutting edge of machine learning, neural networks, and deep learning with this second edition of Sebastian Raschka's bestselling book, Python Machine Learning. Thoroughly updated using the latest Python open source libraries, this book offers the practical knowledge and techniques you need to create and contribute to machine learning, deep learning, and modern data analysis.Fully extended and modernized, Python Machine Learning Second Edition now includes the popular TensorFlow deep learning library. The scikit-learn code has also been fully updated to include recent improvements and additions to this versatile machine learning library.Sebastian Raschka and Vahid Mirjalili's unique insight and expertise introduce you to machine learning and deep learning algorithms from scratch, and show you how to apply them to practical industry challenges using realistic and interesting examples. By the end of the book, you'll be ready to meet the new data analysis opportunities in today's world.If you've read the first edition of this book, you'll be delighted to find a new balance of classical ideas and modern insights into machine learning. Every chapter has been critically updated, and there are new chapters on key technologies. You'll be able to learn and work with TensorFlow more deeply than ever before, and get essential coverage of the Keras neural network library, along with the most recent updates to scikit-learn.What you will learn
    • Understand the key frameworks in data science, machine learning, and deep learning
    • Harness the power of the latest Python open source libraries in machine learning
    • Explore machine learning techniques using challenging real-world data
    • Master deep neural network implementation using the TensorFlow library
    • Learn the mechanics of classification algorithms to implement the best tool for the job
    • Predict continuous target outcomes using regression analysis
    • Uncover hidden patterns and structures in data with clustering
    • Delve deeper into textual and social media data using sentiment analysis
    Table of Contents
  • Giving Computers the Ability to Learn from Data
  • Training Simple Machine Learning Algorithms for Classification
  • A Tour of Machine Learning Classifiers Using Scikit-Learn
  • Building Good Training Sets - Data Preprocessing
  • Compressing Data via Dimensionality Reduction
  • Learning Best Practices for Model Evaluation and Hyperparameter Tuning
  • Combining Different Models for Ensemble Learning
  • Applying Machine Learning to Sentiment Analysis
  • Embedding a Machine Learning Model into a Web Application
  • Predicting Continuous Target Variables with Regression Analysis
  • Working with Unlabeled Data - Clustering Analysis
  • Implementing a Multilayer Artificial Neural Network from Scratch
  • Parallelizing Neural Network Training with TensorFlow
  • Going Deeper - The Mechanics of TensorFlow
  • Classifying Images with Deep Convolutional Neural Networks
  • Modeling Sequential Data using Recurrent Neural Networks
  • Published by: Packt Publishing | Publication date: 09/20/2017
    Kindle book details: Kindle Edition, 622 pages

    Mastering Swift 4 - Fourth Edition: An in-depth and comprehensive guide to modern programming techniques with Swift

    https://www.amazon.com/Mastering-Swift-depth-comprehensive-p...
    Dive into the latest release of the Swift programming language with this advanced development book for building highly performant applications.About This Book
    • Harness the latest and most advanced features of Swift 4 to develop quality iOS and macOS applications
    • Comprehensive coverage of all the advanced features of Swift and guidance on advanced design techniques
    • Dive deep into protocol extensions, learn new error handling model, and use featured Swift design patterns to write more efficient code
    • Get to grips with advanced design techniques to write smarter, cleaner Swift code
    Who This Book Is ForThis book is for developers who want to delve into the newest version of Swift. If you are a developer who learns best by looking at and working with code, then this book is for you. A basic understanding of Apple's tools is beneficial but not mandatory.What You Will Learn
    • Delve into the core components of Swift 4.0, including operators, collections, control flows, and functions
    • Create and use classes, structures, and enumerations
    • Understand protocol-oriented design and see how it can help you write better code
    • Develop a practical understanding of subscripts and extensions
    • Add concurrency to your applications using Grand Central Dispatch and Operation Queues
    • Implement generics and closures to write very flexible and reusable code
    • Make use of Swift s error handling and availability features to write safer code
    In DetailSwift is the definitive language for Apple development today. It's a vital part of any iOS and macOS developer's skillset, helping them to build the most impressive and popular apps on the App Store the sort of apps that are essential to iPhone and iPad users every day. With version 4.0, the Swift team has added new features to improve the development experience, making it easier to get the results you want and customers expect.Inside, you'll find the key features of Swift 4.0 and quickly learn how to use the newest updates to your development advantage. From Objective-C interoperability and ARC to closures and concurrency, this advanced Swift guide will develop your expertise and help you become fluent in this vital programming language.We'll give you an in-depth knowledge of some of the most sophisticated elements of Swift development, including protocol extensions, error-handling, design patterns, and concurrency. We'll guide you on how to use and apply them in your own projects. You'll see how to leverage the power of protocol-oriented programming to write flexible and easier-to-manage code.Table of Contents
  • Taking the First Steps with Swift
  • Learning about Variables, Constants, Strings & Operators
  • Using Swift Collections & the Tuple Type
  • Control Flow & Functions
  • Classes & Structures
  • Using Protocols & Protocol Extensions
  • Protocol-Oriented Design
  • Writing Safer Code with Availability & Error Handling
  • Custom Subscripting
  • Using Optional Types
  • Working with Generics
  • Working with Closures
  • Using Mix & Match
  • Concurrency & Parallelism in Swift
  • Swift Formatting & Style Guide
  • Swift Core Libraries
  • Adopting Design Patterns in Swift
  • Author: Jon Hoffman
    Published by: Packt Publishing | Publication date: 09/27/2017
    Kindle book details: Kindle Edition, 392 pages

    Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

    https://www.amazon.com/Cybersecurity-Defense-Strategies-Infr...
    Enhance your organization’s secure posture by improving your attack and defense strategiesKey Features
    • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
    • Learn to unique techniques to gather exploitation intelligence, identify risk and demonstrate impact with Red Team and Blue Team strategies.
    • A practical guide that will give you hands-on experience to mitigate risks and prevent attackers from infiltrating your system.
    Book DescriptionThe book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system.In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis. By the end of this book, you will be well-versed with Red Team and Blue Team techniques and will have learned the techniques used nowadays to attack and defend systems.What you will learn
    • Learn the importance of having a solid foundation for your security posture
    • Understand the attack strategy using cyber security kill chain
    • Learn how to enhance your defense strategy by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence
    • Learn how to perform an incident investigation
    • Get an in-depth understanding of the recovery process
    • Understand continuous security monitoring and how to implement a vulnerability management strategy
    • Learn how to perform log analysis to identify suspicious activities
    Who this book is forThis book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial. Table of Contents
  • Security Posture
  • Incident Response Process
  • Understanding the Cybersecurity Kill Chain
  • Reconnaissance
  • Compromising the System
  • Chasing a User's Identity
  • Lateral Movement
  • Privilege Escalation
  • Security Policy
  • Network Segmentation
  • Active Sensors
  • Threat Intelligence
  • Investigating an Incident
  • Recovery Process
  • Vulnerability Management
  • Log Analysis
  • Published by: Packt Publishing | Publication date: 01/30/2018
    Kindle book details: Kindle Edition, 384 pages

    Mastering Xamarin.Forms - Second Edition:

    https://www.amazon.com/Mastering-Xamarin-Forms-Second-Ed-Sni...
    Key Features
    • Packed with real-world scenarios and solutions to help you build professional grade mobile apps with Xamarin.Forms
    • Build an effective mobile app architecture with the Xamarin.Forms toolkit
    • Maximize the overall quality of your Xamarin.Forms apps
    Discover how to extend and build upon the components of the Xamarin.Forms toolkit to develop effective, robust mobile app architecture. Starting with an app built with the basics of the Xamarin.Forms toolkit, we'll go step by step through several advanced topics to create a solution architecture rich with the benefits of good design patterns and best practices.We'll start by introducing a core separation between the app's user interface and the app's business logic by applying the MVVM pattern and data-binding. Then we will focus on building out a layer of plugin-like services that handle platform-specific utilities such as navigation and geo-location, as well as how to loosely use these services in the app with inversion of control and dependency injection. Next we'll connect the app to a live web-based API and set up offline synchronization. Then, we'll dive into testing the app logic through unit tests. Finally, we will setup Visual Studio App Center to automate building, testing, distributing and monitoring the app.What you will learn
    • Find out how, when, and why you should use architecture patterns and get best practices with Xamarin.Forms
    • Implement the Model-View-ViewModel (MVVM) pattern and data-binding in Xamarin.Forms mobile apps
    • Extend the Xamarin.Forms navigation API with a custom ViewModel-centric navigation service
    • Leverage the inversion of control and dependency injection patterns in Xamarin.Forms mobile apps
    • Work with online and offline data in Xamarin.Forms mobile apps
    • Test business logic in Xamarin.Forms mobile apps
    • Use platform-specific APIs to build rich custom user interfaces in Xamarin.Forms mobile apps
    • Explore how to improve mobile app quality using Visual Studio App Center
    Author: Ed Snider
    Published by: Packt Publishing | Publication date: 03/27/2018
    Kindle book details: Kindle Edition, 192 pages

    Microservice Patterns and Best Practices: Explore patterns like CQRS and event sourcing to create scalable, maintainable, and testable microservices

    https://www.amazon.com/Microservice-Patterns-Best-Practices-...
    Explore the concepts and tools you need to discover the world of microservices with various design patternsKey Features
    • Get to grips with the microservice architecture and build enterprise-ready microservice applications
    • Learn design patterns and the best practices while building a microservice application
    • Obtain hands-on techniques and tools to create high-performing microservices resilient to possible fails
    Book DescriptionMicroservices are a hot trend in the development world right now. Many enterprises have adopted this approach to achieve agility and the continuous delivery of applications to gain a competitive advantage. This book will take you through different design patterns at different stages of the microservice application development along with their best practices.Microservice Patterns and Best Practices starts with the learning of microservices key concepts and showing how to make the right choices while designing microservices. You will then move onto internal microservices application patterns, such as caching strategy, asynchronism, CQRS and event sourcing, circuit breaker, and bulkheads. As you progress, you'll learn the design patterns of microservices.The book will guide you on where to use the perfect design pattern at the application development stage and how to break monolithic application into microservices. You will also be taken through the best practices and patterns involved while testing, securing, and deploying your microservice application. At the end of the book, you will easily be able to create interoperable microservices, which are testable and prepared for optimum performance.What you will learn
    • How to break monolithic application into microservices
    • Implement caching strategies, CQRS and event sourcing, and circuit breaker patterns
    • Incorporate different microservice design patterns, such as shared data, aggregator, proxy, and chained
    • Utilize consolidate testing patterns such as integration, signature, and monkey tests
    • Secure microservices with JWT, API gateway, and single sign on
    • Deploy microservices with continuous integration or delivery, Blue-Green deployment
    Who this book is forThis book is for architects and senior developers who would like implement microservice design patterns in their enterprise application development. The book assumes some prior programming knowledge. Table of Contents
  • Understanding the Microservice Concepts
  • The Microservice Tools
  • Internal Patterns
  • Microservice Ecosystem
  • Shared Data Microservice Design Pattern
  • Aggregator Microservice Design Pattern
  • Proxy Microservice Design Pattern
  • Chained Microservice Design Pattern
  • Branch Microservice Design Pattern
  • Asynchronous Messaging Microservice
  • Microservices Working Together
  • Testing Microservices
  • Monitoring Security and Deployment
  • Published by: Packt Publishing | Publication date: 01/31/2018
    Kindle book details: Kindle Edition, 366 pages

    Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam

    https://www.amazon.com/Architecting-Microsoft-Azure-Solution...
    Get certified as an Azure architect by acing the 70-535 Architecting Microsoft Solutions (70-535) exam using this comprehensive guide with full coverage of the exam objectivesKey Features
    • Learn to successfully design and architect powerful solutions on the Azure Cloud platform
    • Enhance your skills with mock tests and practice questions
    • A detailed certification guide that will help you ace the 70-535 exam with confidence
    Book DescriptionArchitecting Microsoft Azure Solutions: Exam Guide 70-535 will get Azure architects and developers up-to-date with the latest updates on Azure from an architecture and design perspective. The book includes all the topics that are still relevant from the previous 70-534 exam, and is updated with latest topics covered, including Artificial Intelligence, IoT, and architecture styles.This exam guide is divided into six parts, where the first part will give you a good understanding of how to design a compute infrastructure. It also dives into designing networking and data implementations. You will learn about designing solutions for Platform Service and operations. Next, you will be able to secure your resources and data, as well as design a mechanism for governance and policies. You will also understand the objective of designing solutions for Platform Services, by covering Artificial Intelligence, IoT, media services, and messaging solution concepts. Finally, you will cover the designing for operations objective. This objective covers application and platform monitoring, as well as designing alerting strategies and operations automation strategies. By the end of the book, you’ll have met all of the exam objectives, and will have all the information you need to ace the 70-535 exam. You will also have become an expert in designing solutions on Microsoft Azure.What you will learn
    • Use Azure Virtual Machines to design effective VM deployments
    • Implement architecture styles, like serverless computing and microservices
    • Secure your data using different security features and design effective security strategies
    • Design Azure storage solutions using various storage features
    • Create identity management solutions for your applications and resources
    • Architect state-of-the-art solutions using Artificial Intelligence, IoT, and Azure Media Services
    • Use different automation solutions that are incorporated in the Azure platform
    Who this book is forThis book is for architects and experienced developers, who are gearing up for the 70-535 exam. Technical architects interested in learning more about designing Cloud solutions will also find this book useful. Table of Contents
  • Working with Azure Virtual Machines
  • Configuring Compute-Intensive Applications
  • Designing Web Applications
  • Implementing Serverless and Microservices
  • Robust Networking Implementations
  • Connecting Hybrid Applications
  • Using Storage Solutions
  • Scalable Data Implementations
  • Securing Your Resources
  • Securing Your Data
  • Governance and Policies
  • Artificial Intelligence, IoT, and Media Services
  • Implementing Messaging Solutions
  • Application Monitoring and Alerting Strategies
  • Exploring Operations Automation Strategies
  • Appendix A – Assessments
  • Appendix B – Mock Test Questions
  • Appendix C – Mock Test Answers
  • Author: Sjoukje Zaal
    Published by: Packt Publishing | Publication date: 04/27/2018
    Kindle book details: Kindle Edition, 418 pages
    [1] 2345Next
    PDFfetch