Take a look at our Disaster & Recovery books. Shulph carries a great selection of Disaster & Recovery books, and we are always adding more.
Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments Key Features Understand how to identify and manage business drivers during transitions Explore Microsoft Identity and Access Management as a Service (IDaaS) solution Over 40 playbooks to support your learning process with practical guidelines Book Description Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You'll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies. What you will learn Apply technical descriptions to your business needs and deployments Manage cloud-only, simple, and complex hybrid environments Apply correct and efficient monitoring and identity protection strategies Design and deploy custom Identity and access management solutions Build a complete identity and access management life cycle Understand authentication and application publishing mechanisms Use and understand the most crucial identity synchronization scenarios Implement a suitable information protection strategy Who this book is for This book is a perfect companion for developers, cyber security specialists, system and security engineers, IT consultants/architects, and system administrators who are looking for perfectly up–to-date hybrid and cloud-only scenarios. You should have some understanding of security solutions, Active Directory, access privileges/rights, and authentication methods. Programming knowledge is not required but can be helpful for using PowerShell or working with APIs to customize your solutions.
Improve and reimagine your organization's security stance, desktop standards, and server administration with centralized management via Group Policy. Key Features Explore advanced filtering techniques for Group Policy Objects Interact with Group Policy through GPMC and PowerShell Practical guide covering the daily and advanced administration of group policy Book Description This book begins with a discussion of the core material any administrator needs to know in order to start working with Group Policy. Moving on, we will also walk through the process of building a lab environment to start testing Group Policy today. Next we will explore the Group Policy Management Console (GPMC) and start using the powerful features available for us within that interface. Once you are well versed with using GPMC, you will learn to perform and manage the traditional core tasks inside Group Policy. Included in the book are many examples and walk-throughs of the different filtering options available for the application of Group Policy settings, as this is the real power that Group Policy holds within your network. You will also learn how you can use Group Policy to secure your Active Directory environment, and also understand how Group Policy preferences are different than policies, with the help of real-world examples. Finally we will spend some time on maintenance and troubleshooting common Group Policy-related issues so that you, as a directory administrator, will understand the diagnosing process for policy settings. By the end of the book, you will be able to jump right in and use Group Policy to its full potential. What you will learn Become familiar with the Group Policy Management Console Create, link, and filter new policies Secure your users and devices using Group Policy Maintain and troubleshoot Group Policy Administer Group Policy via PowerShell Control your Active Directory environment efficiently with Group Policy settings Who this book is for If you are an IT professional who works with Windows Servers or are interested in an Active Directory environment then this book is for you. General knowledge of Microsoft Windows, how Windows Server fits into an enterprise's infrastructure and also some existing knowledge of an Active Directory domain environment is expected.
Become a certified Azure Architect and learn to design effective solutions that span compute, security, networking, and development Key Features Learn to successfully design and architect powerful and cost-effective solutions on Microsoft Azure Prepare to gain AZ-300 certification with the help of mock tests and practice questions Enhance your computing, networking, storage, and security skills to design modern cloud-based solutions Book Description From designing solutions on Azure to configuring and managing virtual networks, AZ-300 certification can help you achieve all this and more. Whether you want to get certified or gain hands-on experience in administering, developing, and architecting Azure solutions, this study guide will help you get started. The book features not only the different exam objectives, but also guides you through configuring, managing, securing, and architecting Azure resources. Divided into five modules, this book will systematically take you through the different concepts and features as you advance through the sections. The first module demonstrates how to deploy and configure infrastructure. You will cover techniques related to implementing workloads and security, before learning how to create and deploy apps in the next module. To build on your knowledge, the final two modules will get you up to speed with implementing authentication, data security, and application and platform monitoring, along with covering Azure storage, alerting, and automation strategies. Finally, you'll work through exam-based mock tests with answers to boost your confidence in passing the exam. By the end of this book, you'll have learned the concepts and techniques you need to know in order to prepare for the AZ-300 exam, along with the skills to design effective solutions on Microsoft Azure. What you will learn Manage Azure subscriptions and resources Understand how to migrate servers to Azure Configure and manage virtual networks Monitor and troubleshoot virtual network connectivity Manage Azure Active Directory (Azure AD) Connect and implement multi-factor authentication Implement and manage hybrid identities Develop solutions that use Cosmos DB and the Azure SQL Database Get to grips with implementing secure data solutions Who this book is for This book is for solution architects and experienced developers who advise stakeholders and translate business requirements into secure, scalable, and reliable solutions. Technical architects interested in learning more about designing cloud solutions will also find this book useful. Some experience and knowledge of various aspects of IT operations, including networking, security, business continuity, disaster recovery, budgeting, and governance are required to grasp the concepts covered in the book effectively.
Over 60 recipes to achieve a robust and advanced backup and recovery solution leveraging SCDPM Key Features Adapt to the modern data center design challenges and improve storage efficiency Effective recipes to help you create your own robust architectural designs Solve data protection and recovery problems in your organization Book Description System Center Data Protection Manager (SCDPM) is a robust enterprise backup and recovery system that contributes to your BCDR strategy by facilitating the backup and recovery of enterprise data. With an increase in data recovery and protection problems faced in organizations, it has become important to keep data safe and recoverable. This book contains recipes that will help you upgrade to SCDPM and it covers the advanced features and functionality of SCDPM. This book starts by helping you install SCDPM and then moves on to post-installation and management tasks. You will come across a lot of useful recipes that will help you recover your VMware and Hyper-V VMs. It will also walk you through tips for monitoring SCDPM in different scenarios. Next, the book will also offer insights into protecting windows workloads followed by best practices on SCDPM. You will also learn to back up your Azure Stack Infrastructure using Azure Backup. You will also learn about recovering data from backup and implementing disaster recovery. Finally, the book will show you how to configure the protection groups to enable online protection and troubleshoot Microsoft Azure Backup Agent. What you will learn Install and prepare SQL Server for the SCDPM database Reduce backup storage with SCDPM and data deduplication Learn about the prerequisites for supported Hyper-V Server protection Integrate SCDPM with other System Center products to build optimal services Protect and restore the SCDPM database Protect your data center by integrating SCDPM with Azure Backup Manually create online recovery points and recover production data from Azure Protect and learn about the requirements to recover Azure Stack with SCDPM Who this book is for If you are an SCDPM administrator, this book will help you verify your knowledge and provide you with everything you need to know about the new release of System Center Data Protection Manager.
This hands-on survival manual will give you the tools to confidently prepare for and respond to a system outage. Key Features Proven methods for keeping your website running A survival guide for incident response Written by an ex-Google SRE expert Book Description Real-World SRE is the go-to survival guide for the software developer in the middle of catastrophic website failure. Site Reliability Engineering (SRE) has emerged on the frontline as businesses strive to maximize uptime. This book is a step-by-step framework to follow when your website is down and the countdown is on to fix it. Nat Welch has battle-hardened experience in reliability engineering at some of the biggest outage-sensitive companies on the internet. Arm yourself with his tried-and-tested methods for monitoring modern web services, setting up alerts, and evaluating your incident response. Real-World SRE goes beyond just reacting to disaster—uncover the tools and strategies needed to safely test and release software, plan for long-term growth, and foresee future bottlenecks. Real-World SRE gives you the capability to set up your own robust plan of action to see you through a company-wide website crisis. The final chapter of Real-World SRE is dedicated to acing SRE interviews, either in getting a first job or a valued promotion. What you will learn Monitor for approaching catastrophic failure Alert your team to an outage emergency Dissect your incident response strategies Test automation tools and build your own software Predict bottlenecks and fight for user experience Eliminate the competition in an SRE interview Who this book is for Real-World SRE is aimed at software developers facing a website crisis, or who want to improve the reliability of their company's software. Newcomers to Site Reliability Engineering looking to succeed at interview will also find this invaluable.
The book fills a void by bringing together literature in an under-represented but disaster-prone region – Southeast Asia. It discusses the cultural considerations of those providing mental health and psychosocial support in the region. It highlights the role of education in reducing disaster vulnerability. It presents ways in which workplace organization have sought to enhance employee and organizational resilience in the face of disasters. It discusses how the disaster planning process, including prevention, mitigation, and preparedness efforts, can be integrated with mental health efforts. It features how mental health interventions including psychological first aid, resilience interventions, mindfulness, and art therapy have been carried out. It also discusses the issues of those caring for survivors and describes MHPSS interventions for disaster responders themselves. The book also addresses post-traumatic growth as an outcomes of disaster exposure, concluding by summarizing the challenges and prospects for promoting resistance, resilience, and recovery in SEA.