LEADER 03233oam 2200457 450 001 9910483375603321 005 20230714071017.0 010 $a9781484264348$b(electronic book) 010 $a1-4842-6434-7 024 7 $a10.1007/978-1-4842-6434-8 035 $a(CKB)4100000011586102 035 $a(DE-He213)978-1-4842-6434-8 035 $a(MiAaPQ)EBC6403755 035 $a(CaSebORM)9781484264348 035 $a(PPN)252511034 035 $a(EXLCZ)994100000011586102 100 $a20210505d2021 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRed Hat and IT security $ewith Red Hat Ansible, Red Hat Openshift, and Red Hat security auditing /$fRithik Chatterjee 205 $a1st ed. 2021. 210 1$a[Place of publication not identified] :$cApress,$d[2021] 210 4$d©2021 215 $a1 online resource (XIX, 233 p. 23 illus.) 311 $a1-4842-6433-9 327 $aChapter 1: Introduction to IT Security -- Chapter 2: Red Hat Hybrid Cloud Infrastructure -- Chapter 3: Security in DevOps and Automation -- Chapter 4: Hyper-converged Infrastructure -- Chapter 5: Red Hat Smart Management and Red Hat Insights -- Chapter 6: Red Hat Security Auditing -- Chapter 7: Case Studies. 330 $aUse Red Hat?s security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud infrastructure security, and the CI/CD process. Next, you will integrate and automate security into the DevOps cycle, infrastructure, and security as code. You will also learn how to automate with Red Hat Ansible Automation Platform andabout hybrid cloud infrastructure. The later chapters will cover hyper-converged infrastructure and its security, Red Hat Smart Management, predictive analytics with Red Hat Insights, and Red Hat security auditing to ensure best security practices. Lastly, you will see the different types of case studies with real-world examples. Red Hat and IT Security will help you get a better understanding of IT security concepts from a network and system administration perspective. It will help you to understand how the IT infrastructure landscape can change by implementing specific security best practices and integrating Red Hat products and solutions to counter against modern cybersecurity threats. You will: ? Understand IT infrastructure security and its best practices ? Implement hybrid cloud infrastructure ? Realign DevOps process into DevSecOps, emphasizing security ? Implement automation in IT infrastructure services using Red Hat Ansible ? Explore Red Hat Smart Management, predictive analytics, and auditing. 606 $aComputer security 615 0$aComputer security. 676 $a005.8 700 $aChatterjee$b Rithik$01226868 801 0$bCaPaEBR 801 1$bCaPaEBR 801 2$bUtOrBLW 906 $aBOOK 912 $a9910483375603321 996 $aRed Hat and IT security$92848732 997 $aUNINA