Join us on a literary world trip!
Add this book to bookshelf
Grey
Write a new comment Default profile 50px
Grey
Subscribe to read the full book or read the first pages for free!
All characters reduced
Multi-Cloud Handbook for Developers - Learn how to design and manage cloud-native applications in AWS Azure GCP and more - cover

Multi-Cloud Handbook for Developers - Learn how to design and manage cloud-native applications in AWS Azure GCP and more

Subash Natarajan, Jeveen Jacob

Publisher: Packt Publishing

  • 0
  • 0
  • 0

Summary

Unleash the power of cloud computing with Multi-Cloud Handbook for Developers, your guide to mastering the nuances of cloud-native and multi-cloud, covering practical strategies for design, development, and management. Explore the essential concepts, challenges, and methodologies critical for navigating the complex landscape of modern cloud computing.
Using core architectural and design principles (such as microservices and 12-factor architecture) and advanced strategies (such as distributed application design patterns, domain-driven design (DDD), and API-first strategies), you’ll learn how to build portable and efficient apps across various cloud platforms. You’ll understand how to leverage Infrastructure as Code (IaC), continuous integration and deployment (CI/CD), GitOps, and DevOps practices, along with containerization and orchestration techniques using Docker and Kubernetes. You’ll also get to grips with data, security, compliance, and cloud cost management strategies in multi-cloud environments.
With real-world case studies, best practices, and insights into future trends, this book will equip you with the skills to develop, manage, troubleshoot, and innovate cloud-native applications across diverse cloud platforms, positioning you at the forefront of the cloud computing revolution.
Available since: 02/29/2024.
Print length: 292 pages.

Other books that might interest you

  • Burners and Black Markets - How to Be Invisible on Android Blackberry & Iphone - cover

    Burners and Black Markets - How...

    Lance Henderson

    • 0
    • 0
    • 0
    Tired of being spied on? Encrypt yourself & explore a deep web of exotic goods, banned items & secret files... anonymously and free. If you want to live the life of a superhacker, spy or CIA agent, be James Bond or Ethan Hunt for a time and look good doing it...this is your book. Invisibility. Cybersecurity. Opsec. Assassins. Youll learn it in hours, not years. It's all here. See the hidden wiki and hundreds of deep web sites the govt doesn't want you to see, all for free. And the best burner phones & laptops money can buy. Exotic weapons. Tor darknets. Dark Freenets. Dark Linux. How to be anonymous, anywhere. Buyer & Vendor Opsec for Black Markets should you need an 'exotic' item. Secrets that master Tor users don't know that keep you hidden from the NSA, the FBI, or just plain old IRS bullies. Secrets only superhackers at the NSA know but now are yours for the taking. Sound good? Don't wait too long. Get it today because tomorrow may be too late!
    Show book
  • How Cyber Security Can Protect Your Business - A guide for all stakeholders - cover

    How Cyber Security Can Protect...

    Christopher Wright

    • 0
    • 0
    • 0
    Summary
    
    - Explains in easy-to-understand terms what executives and senior managers need to know and do about the ever-changing cyber threat landscape.
    - Gives strategic, business-focused guidance and advice relevant to C-suite executives.
    - Provides an effective and efficient framework for managing cyber governance, risk and compliance.
    - Explains what is required to implement an effective cyber security strategy.Description
    With high-profile cyber attacks, data breaches and fines for GDPR (General Data Protection Regulation) non-compliance hitting the headlines daily, businesses must protect themselves and their reputations, while reassuring stakeholders they take cyber security seriously.
    Cyber attacks are becoming more sophisticated and prevalent, and the cost of data breaches is soaring. In addition, new regulations and reporting requirements make cyber security a critical business issue.
    Board members and senior management must understand the threat landscape and the strategies they can employ to establish, implement and maintain effective cyber resilience throughout their organisation.
    How Cyber Security Can Protect your Business – A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology. It explains what is meant by governance, risk and compliance, how it applies to cyber security and what is required to implement an effective cyber security strategy.
    The pocket guide:
    
    - Gives readers a greater understanding of cyber governance, risk and compliance;
    - Explains what executives, senior managers and their advisors need to know and do about the ever-changing cyber threat landscape;
    - Provides context as to why stakeholders need to be aware of and in control of their organisation's cyber risk management and cyber incident response;
    - Gives guidance on building an appropriate and efficient governance framework that enables organisations to demonstrate their cyber approach in a non-technical, strategic, business-focused way;
    - Details an overview process to enable risk assessment, assess existing defence mitigations and provide a framework for developing suitable controls; and
    - Includes a checklist to help readers focus on their higher-priority cyber areas.Suitable for all managers and executives, this pocket guide will be of interest to non-cyber specialists, including non-executive directors, who may be required to review cyber arrangements. For cyber specialists, it provides an approach for explaining cyber issues in non-jargonistic, business-based language.
    Kick-start your journey to becoming cyber secure – buy this pocket guide today!
    Show book
  • The Arabian Art of Taming and Training Wild and Vicious Horses - cover

    The Arabian Art of Taming and...

    P. R. Kincaid

    • 0
    • 0
    • 0
    Back in the day before automobiles, a good horse trainer and veterinarian was the equivalent of “Mr Goodwrench”. A badly behaving or unhealthy equine was equivalent to breaking down on the highway or running out of gas on a lonely stretch of highway somewhere in Utah. My sources tell me that most of the training methods are ok, but stay away from the medical tips unless you are prepared to become the poster boy or girl for the local SPCA. Listen with tongue in cheek, and check with a professional before attempting any of these techniques on a real animal.Mike Vendetti, narrator
    Show book
  • The Secret History of al Qaeda - cover

    The Secret History of al Qaeda

    Abdel Bari Atwan

    • 0
    • 0
    • 0
    Over the last ten years, journalist and al-Qa'ida expert Abdel Bari Atwan has cultivated uniquely well-placed sources and amassed a wealth of information about al-Qa'ida's origins, masterminds and plans for the future. Atwan reveals how al-Qa'ida's radical departure from the classic terrorist/guerrilla blueprint has enabled it to outpace less adaptable efforts to neutralize it. The fanaticism of its fighters, and their willingness to kill and be killed, are matched by the leadership's opportunistic recruitment strategies and sophisticated understanding of psychology, media, and new technology - including the use of the internet for training, support, and communications. Atwan shows that far from committing acts of violence randomly and indiscriminately, al-Qa'ida attacks targets according to a decisive design underwritten by unwavering patience. He also argues that events in Iraq and Saudi Arabia are watershed moments in the group's evolution that are making it more dangerous by the day, as it refines and appropriates the concept of jihad and makes the suicide bomber a permanent feature of a global holy war. While Osama bin Laden and Ayman al-Zawahiri remain al-Qa'ida's figureheads, Atwan identifies a new kind of leader made possible by its horizontal chain of command, epitomized by the brutal Abu Mus'ab al-Zarqawi in Iraq and the bombers of London, Madrid, Amman, Bali, and elsewhere. Scholarly, analytical, objective, it is also intensely readable, being by far the best book on the subject.' -- Tony Benn 'This is a must-read book for anyone interested in understanding our increasingly scary world.' -- Gavin Esler 'What shines out ... is a profound desire to investigate and reveal the truth. Intelligent and informative.' -- Jason Burke, Guardian 'Deeply researched, well reported and full of interesting and surprising analyses. It demands to be read.' -- Peter Bergen, author of Holy War, Inc
    Show book
  • Treatise on Light - cover

    Treatise on Light

    Christiaan Huygens

    • 0
    • 0
    • 0
    Treatise on Light was published in 1690 and is probably the largest scientific volume on light published before Newton's Opticks. The book explains how light travels (i.e., that it has a certain velocity), and what happens when it hits a surface (refraction and reflection). A large portion of the book is devoted to the double refraction occurring in Iceland chrystal, and all drawn conclusions are proved geometrically. Christiaan Huygens (1629 - 1695) was a prominent physicist and astronomer. His main discoveries are the centrifugal force, collision laws for bodies and the argument that light consists of waves. He was a contemporary of Galilei and Descartes, and a member of the French Royal Society since 1663. (Summary by Availle)
    Show book
  • How To Do Virtualization - Your Step By Step Guide To Virtualization - cover

    How To Do Virtualization - Your...

    HowExpert

    • 0
    • 0
    • 0
    If you want to learn how to do virtualization, then get this step-by-step guide. 
    In this step-by-step guide, you will discover: 
    - How virtualization works. 
    - How virtualization benefits you. 
    - Different types of virtualization 
    - How to build virtual machines 
    - How to virtualize desktop environment 
    - Step-by-step actions steps to virtualize a server 
    - Microsoft Virtual PC tips 
    - Citrix XenServer tips 
    - How to build a virtual application 
    - How to install a sequencer 
    - how to sequence a package 
    - And much more. 
    HowExpert publishes quick 'how to' guides on all topics from A to Z by everyday experts.
    Show book