• Complain

Rithik Chatterjee - With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing

Here you can read online Rithik Chatterjee - With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. publisher: Apress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Rithik Chatterjee With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing
  • Book:
    With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Rithik Chatterjee: author's other books


Who wrote With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing? Find out the surname, the name of the author of the book and a list of all author's works by series.

With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Red Hat and IT Security Rithik Chatterjee Red Hat and IT - photo 1
Book cover of Red Hat and IT Security
Rithik Chatterjee
Red Hat and IT Security
With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing
1st ed.
Logo of the publisher Rithik Chatterjee Pune Maharashtra India Any - photo 2
Logo of the publisher
Rithik Chatterjee
Pune, Maharashtra, India

Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub via the books product page, located at www.apress.com/978-1-4842-6433-1 . For more detailed information, please visit http://www.apress.com/source-code .

ISBN 978-1-4842-6433-1 e-ISBN 978-1-4842-6434-8
https://doi.org/10.1007/978-1-4842-6434-8
Rithik Chatterjee 2021
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Distributed to the book trade worldwide by Springer Science+Business Media New York, 1 New York Plaza, Suite 4600, New York, NY 10004-1562, USA. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail orders-ny@springer-sbm.com, or visit www.springeronline.com. Apress Media, LLC is a California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc (SSBM Finance Inc). SSBM Finance Inc is a Delaware corporation.

This book is dedicated to my parents: Rita and Ashish; thank you for always supporting and encouraging me to pursue my ambitions.

Introduction

This book is intended for IT professionals in the domains of network and system administration, IT infrastructure, cybersecurity, DevOps, CISO, and similar profiles.

Security is, more often than not, a neglected aspect in the IT industry. Organizations fail to realize the significance of a secure infrastructure environment and tend to invest only in the bare essentials. Traditional infrastructure sure gets the job done but in the current day and age, it is not enough to tackle evolving cyber threats. Numerous organizations have had to pay the price for their carefree attitude toward security administration.

This book intends to cover the basic, intermediate, and a few advanced concepts related to infrastructure security and how to enhance this security using certain Red Hat solutions. Traditional infrastructure sure gets the job done, but in these times, it is not enough to tackle evolving cyber threats. Readers can consider this as an informative guide on developing and implementing secure controls and configurations in various environments, including physical data centers, virtualization, and cloud environments.

Red Hat and IT Security has been written with the sole intention of providing information to readers that are usually not highlighted enough even with the rise in modern technologies. Most of the books available are domain specific like Red Hat / Linux, IT infrastructure, Cybersecurity, or DevOps. However, this book transcends the barriers and amalgamates all these fields to provide a distinct yet comprehensible insight into the overall world of Red Hat and IT Security, hence the name.

Acknowledgments

I would like to thank my uncles: Tapas and Subarna for being my secondary guardians, and to my close friends for being a part of my journey.

I extend my gratitude toward Nishant for dragging me into this domain, Prajakta maam for being a wonderful teacher, and Priyanshu for assisting me with the graphics.

This book would not have been possible without Divya who provided me with the opportunity, and Matthew and Himanshu who imparted their valuable insights into this project; thank you.

A special thanks to Shraddha, Pratiksha, and Kiran for your incredible support and being my sounding boards.

Table of Contents
About the Author
Rithik Chatterjee
graduated as an electronics and telecommunications engineer As he was - photo 3
graduated as an electronics and telecommunications engineer. As he was interested in the networking domain, he completed his course in IT infrastructure management and later became accredited as a Red Hat Certified System Administrator and Red Hat Certified Engineer. Working for a startup, his responsibilities included network/system administration, IT security, information security, and DevOps. Having gained a better understanding of the IT landscape, his interest and goals started to lean toward cybersecurity, leading him to his training and certification as an EC-Council Certified Ethical Hacker.

His hobbies include landscape and wildlife photography, blogging, reading, and watching anime. To pursue his hobby of writing, he developed his own blogging website (Inspirio Scripts), also encouraging budding authors like him to pen their thoughts.

About the Technical Reviewer
Himanshu Tank
has a B Tech in computer Science He is an open source enthusiast and a Red - photo 4

has a B. Tech in computer Science. He is an open source enthusiast and a Red Hat Certified Architect in Infrastructures (RHCA)-Level 1 certified professional. He is extremely knowledgeable about core products by Red Hat such as Ansible, OpenShift, OpenStack, CEPH Storage, Linux TroubleShooting and Diagnostics, Server Security, and Hardening.

Rithik Chatterjee 2021
R. Chatterjee Red Hat and IT Security https://doi.org/10.1007/978-1-4842-6434-8_1
1. Introduction to IT Security
Rithik Chatterjee
(1)
Pune, Maharashtra, India

To build or maintain any secure and sturdy IT (Information Technology) infrastructure, you need to be familiar with and have a working understanding of the basics pertaining to computer networking, system administration, and primary security aspects. This chapter will cover the essential concepts deemed necessary for you to gain a better understanding of security in RHEL (Red Hat Enterprise Linux) and information contained in the following chapters. As almost all administrators are acquainted with the core basics of networking and system administration, this chapter will focus more on the intermediate topics that you will probably want to learn about and might occasionally search for on the internet.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing»

Look at similar books to With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing»

Discussion, reviews of the book With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.