Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.
Please read the tutorial at this link: https://ebookbell.com/faq
We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.
For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.
EbookBell Team
4.0
96 reviewsCloud Migration is More Than Infrastructure Migration and Crucial to Business Economy
Key Features
● Factors for a successful transition from on-premises to cloud infrastructure, as experienced by various businesses.
● Several strategies to build secure, immutable infrastructure using Infrastructure as Code (IaC).
● Important aspects of pipeline security, multi-tier application migration, disaster recovery, and much more.
Description
When migrating to the cloud, how can you minimize the time and effort spent on technical fixes? Creating a fault-tolerant, secure, automated, and scalable cloud on-demand infrastructure is a costly and time-consuming organizational operation. This book teaches you how to migrate infrastructure to the cloud utilizing programmable infrastructure. This book explains various ways to implement immutable infrastructure for scalable and secure infrastructure.
To begin with, the book educates you on how to spot problems in today's infrastructure. The book explores how to use programmable infrastructure to provide immutability at each tier level of a multitier application. It also explains how to use the Unified Modeling Language (UML) to create high-level design architecture artifacts since it is the most straightforward tool for depicting the layout of a sophisticated program. Finally, the book discusses a detailed CI/CD workflow for 3-tier custom-developed application infrastructure.
The reader will complete reading this book with a firm grasp of the fundamentals necessary to execute DevSecOps across a whole infrastructure. The book explains how to put into practice the cutting-edge cloud methodology of infrastructure provisioning using CI/CD pipelines in detail. In addition, the book gives a complete understanding of how to set up immutable multitier infrastructure utilizing programmable infrastructure/infrastructure as Code.
What you will learn
● Dos and Don'ts while implementing immutable infrastructure.
● Locating security flaws and incorrect