Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditing / Rithik Chatterjee.
2021
QA76.9.A25 C43 2021
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditing / Rithik Chatterjee.
Author
Chatterjee, Rithik, author.
ISBN
9781484264348 (electronic bk.)
1484264347 (electronic bk.)
9781484264355 (print)
1484264355
1484264339
9781484264331
1484264347 (electronic bk.)
9781484264355 (print)
1484264355
1484264339
9781484264331
Published
[California] : Apress, [2021]
Language
English
Description
1 online resource
Item Number
10.1007/978-1-4842-6434-8 doi
Call Number
QA76.9.A25 C43 2021
Dewey Decimal Classification
005.8
Summary
Use Red Hats security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud infrastructure security, and the CI/CD process. Next, you will integrate and automate security into the DevOps cycle, infrastructure, and security as code. You will also learn how to automate with Red Hat Ansible Automation Platform andabout hybrid cloud infrastructure. The later chapters will cover hyper-converged infrastructure and its security, Red Hat Smart Management, predictive analytics with Red Hat Insights, and Red Hat security auditing to ensure best security practices. Lastly, you will see the different types of case studies with real-world examples. Red Hat and IT Security will help you get a better understanding of IT security concepts from a network and system administration perspective. It will help you to understand how the IT infrastructure landscape can change by implementing specific security best practices and integrating Red Hat products and solutions to counter against modern cybersecurity threats. You will: Understand IT infrastructure security and its best practices Implement hybrid cloud infrastructure Realign DevOps process into DevSecOps, emphasizing security Implement automation in IT infrastructure services using Red Hat Ansible Explore Red Hat Smart Management, predictive analytics, and auditing.
Note
Includes index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file
PDF
Source of Description
Online resource; title from digital title page (viewed on February 11, 2021).
Available in Other Form
Red Hat and IT security.
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Chapter 1: Introduction to IT Security
Chapter 2: Red Hat Hybrid Cloud Infrastructure
Chapter 3: Security in DevOps and Automation
Chapter 4: Hyper-converged Infrastructure
Chapter 5: Red Hat Smart Management and Red Hat Insights
Chapter 6: Red Hat Security Auditing
Chapter 7: Case Studies.
Chapter 2: Red Hat Hybrid Cloud Infrastructure
Chapter 3: Security in DevOps and Automation
Chapter 4: Hyper-converged Infrastructure
Chapter 5: Red Hat Smart Management and Red Hat Insights
Chapter 6: Red Hat Security Auditing
Chapter 7: Case Studies.