Best Network Disaster & Recovery Administration Books
Disaster recovery solutions are vital for organizations that want to maximize uptime and protect themselves from threats, including cyber-criminals and natural disasters. Disaster recovery software becomes more crucial as the amount of data an enterprise creates and stores continues to grow at an ever-increasing rate. This makes the role of a disaster recovery manager essential in today’s technological landscape.
1. The Unicorn Project
Author: by Gene Kim
Published at: IT Revolution Press (November 26, 2019)
The overwhelming majority of a software system’s lifespan is spent in use, not in design or implementation. So, why does conventional wisdom insist that software engineers focus primarily on the design and development of large scale computing systems? In this collection of essays and articles, key members of Google’s Site Reliability Team explain how and why their commitment to the entire lifecycle has enabled the company to successfully build, deploy, monitor, and maintain some of the largest software systems in the world.
You’ll learn the principles and practices that enable Google engineers to make systems more scalable, reliable, and efficientlessons directly applicable to your organization. This book is divided into four sections:IntroductionLearn what site reliability engineering is and why it differs from conventional IT industry practicesPrinciplesExamine the patterns, behaviors, and areas of concern that influence the work of a site reliability engineer (SRE)PracticesUnderstand the theory and practice of an SRE’s day to day work: building and operating large distributed computing systemsManagementExplore Google’s best practices for training, communication, and meetings that your organization can use
3. CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition
Author: by Peter H. Gregory
Published at: McGraw-Hill Education; 4th edition (November 14, 2019)
Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This up-to-date self-study system delivers complete coverage of every topic on the 2019 version of the CISA examThe latest edition of this trusted resource offers complete,up-to-date coverage of all the material included on the latest release of the Certified Information Systems Auditor exam.
Written by an IT security and audit expert, CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition covers all five exam domains developed by ISACA. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations.
Designed to help you pass the CISA exam with ease, this comprehensive guide also serves as an essential on-the-job reference for new and established IS auditors. COVERS ALL EXAM TOPICS, INCLUDING: IT governance and management Information systems audit process IT service delivery and infrastructure Information asset protectionOnline content includes: 300 practice exam questions Test engine that provides full-length practice exams and customizable quizzes by exam topic
4. Designing Distributed Systems: Patterns and Paradigms for Scalable, Reliable Services
Author: by Brendan Burns
Published at: O'Reilly Media; 1st edition (March 20, 2018)
Without established design patterns to guide them, developers have had to build distributed systems from scratch, and most of these systems are very unique indeed. Today, the increasing use of containers has paved the way for core distributed system patterns and reusable containerized components.
This practical guide presents a collection of repeatable, generic patterns to help make the development of reliable distributed systems far more approachable and efficient. Author Brendan BurnsDirector of Engineering at Microsoft Azuredemonstrates how you can adapt existing software design patterns for designing and building reliable distributed applications.
Systems engineers and application developers will learn how these long-established patterns provide a common language and framework for dramatically increasing the quality of your system. Understand how patterns and reusable components enable the rapid development of reliable distributed systemsUse the side-car, adapter, and ambassador patterns to split your application into a group of containers on a single machineExplore loosely coupled multi-node distributed patterns for replication, scaling, and communication between the componentsLearn distributed system patterns for large-scale batch data processing covering work-queues, event-based processing, and coordinated workflows
5. Implementing Service Level Objectives: A Practical Guide to SLIs, SLOs, and Error Budgets
Author: by Alex Hidalgo
Published at: O'Reilly Media; 1st edition (September 22, 2020)
Although service-level objectives (SLOs) continue to grow in importance, there’s a distinct lack of information about how to implement them. Practical advice that does exist usually assumes that your team already has the infrastructure, tooling, and culture in place. In this book, recognized SLO expert Alex Hidalgo explains how to build an SLO culture from the ground up.
Ideal as a primer and daily reference for anyone creating both the culture and tooling necessary for SLO-based approaches to reliability, this guide provides detailed analysis of advanced SLO and service-level indicator (SLI) techniques. Armed with mathematical models and statistical knowledge to help you get the most out of an SLO-based approach, you’ll learn how to build systems capable of measuring meaningful SLIs with buy-in across all departments of your organization.
Define SLIs that meaningfully measure the reliability of a service from a user’s perspectiveChoose appropriate SLO targets, including how to perform statistical and probabilistic analysisUse error budgets to help your team have better discussions and make better data-driven decisionsBuild supportive tooling and resources required for an SLO-based approachUse SLO data to present meaningful reports to leadership and your users
6. Infrastructure as Code: Dynamic Systems for the Cloud Age
Author: by Kief Morris
Published at: O'Reilly Media; 2nd edition (January 5, 2021)
Six years ago, Infrastructure as Code was a new concept. Today, as even banks and other conservative organizations plan moves to the cloud, development teams for companies worldwide are attempting to build large infrastructure codebases. With this practical book, Kief Morris of ThoughtWorks shows you how to effectively use principles, practices, and patterns pioneered by DevOps teams to manage cloud-age infrastructure.
Ideal for system administrators, infrastructure engineers, software developers, team leads, and architects, this updated edition demonstrates how you can exploit cloud and automation technology to make changes easily, safely, quickly, and responsibly. You’ll learn how to define everything as code and apply software design and engineering practices to build your system from small, loosely coupled pieces.
This book covers:Foundations: Use Infrastructure as Code to drive continuous change and raise the bar of operational quality, using tools and technologies to build cloud-based platformsWorking with infrastructure stacks: Learn how to define, provision, test, and continuously deliver changes to infrastructure resourcesWorking with servers and other platforms: Use patterns to design provisioning and configuration of servers and clustersWorking with large systems and teams: Learn workflows, governance, and architectural patterns to create and manage infrastructure elements
7. Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide: Begin a successful career in networking with 200-301 CCNA certification
Author: by Glen D. Singh
Published at: Packt Publishing (November 13, 2020)
Prepare to take the Cisco Certified Network Associate (200-301 CCNA) exam and get to grips with the essentials of networking, security, and automationKey FeaturesSecure your future in network engineering with this intensive boot camp-style certification guideGain knowledge of the latest trends in Cisco networking and security and boost your career prospectsDesign and implement a wide range of networking technologies and services using Cisco solutionsBook DescriptionIn the dynamic technology landscape, staying on top of the latest technology trends is a must, especially if you want to build a career in network administration.
Achieving CCNA 200-301 certification will validate your knowledge of networking concepts, and this book will help you to do just that. This exam guide focuses on the fundamentals to help you gain a high-level understanding of networking, security, IP connectivity, IP services, programmability, and automation.
Starting with the functions of various networking components, you’ll discover how they are used to build and improve an enterprise network. You’ll then delve into configuring networking devices using a command-line interface (CLI) to provide network access, services, security, connectivity, and management.
8. Seeking SRE: Conversations About Running Production Systems at Scale
Author: by David N. Blank-Edelman
Published at: O'Reilly Media; 1st edition (October 2, 2018)
Organizationsbig and smallhave started to realize just how crucial system and application reliability is to their business. At the same time, they’ve also learned just how difficult it is to maintain that reliability while iterating at the speed demanded by the marketplace.
Site Reliability Engineering (SRE) is a proven approach to this challenge. SRE is a large and rich topic to discuss. Google led the way with Site Reliability Engineering, the wildly successful O’Reilly book that described Google’s creation of the discipline and the implementation that has allowed them to operate at a planetary scale.
Inspired by that earlier work, this book explores a very different part of the SRE space. The more than two dozen chapters in Seeking SRE bring you into some of the important conversations going on in the SRE world right now.
Listen as engineers and other leaders in the field discuss different ways of implementing SRE and SRE principles in a wide variety of settings; how SRE relates to other approaches like DevOps; the specialities on the cutting edge that will soon be common place in SRE; best practices and technologies that make practicing SRE easier; and finally hear what people have to say about the important, but rarely discussed human side of SRE.David N.
9. The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Author: by Richard Bejtlich
Published at: No Starch Press; 1st edition (July 15, 2013)
Network security is not simply about building impenetrable wallsdetermined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.
In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networksno prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.
You’ll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networksDeploy stand-alone or distributed NSM installationsUse command line and graphical packet analysis tools, and NSM consolesInterpret network evidence from server-side and client-side intrusionsIntegrate threat intelligence into NSM software to identify sophisticated adversariesThere’s no foolproof way to keep attackers out of your network.
10. CompTIA A+ Certification All-in-One Exam Guide, Ninth Edition (Exams 220-901 & 220-902)
Author: by Mike Meyers
Published at: McGraw-Hill Education; 9th edition (January 4, 2016)
Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This bestselling on-the-job reference and test preparation guide has been fully revised for the new 2015 CompTIA A+ exam objectives for exams 901 & 902Written by the leading authority on CompTIA A+ certification and training, this self-study book and CD has been thoroughly updated to cover 100% of the exam objectives on the 2015 CompTIA A+ exams.
New topics include managing and maintaining cellular devices, including tablets; configuring operating systems, including Windows 8, Android, and iOS; and enhanced, mobile-centered security and troubleshooting procedures. The All-in-One Exam Guide enables you to take the test with complete confidence. It also serves as a practical reference for IT support and technical personnel.
Electronic content includes: Practice exams download for both exam 901 and 902 with hundreds of accurate practice exam questionsMore than an hour of online video training featuring Mike MeyersOnline performance-based simulations that prepare you for the performance-based exam questionsA link to Mike’s favorite PC toolsA PDF copy of the bookKey Features:Written with the in the trenches voice and clarity Mike Meyers is known forFeatures pre-assessment tests, exam tips, and Try This!
11. Defensive Security Handbook: Best Practices for Securing Infrastructure
Author: by Lee Brotherston
Published at: O'Reilly Media; 1st edition (May 2, 2017)
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.
Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.
Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring
12. Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy
Author: by Jordan Krause
Published at: Packt Publishing (November 30, 2018)
Reimagine your organization’s security stance, desktop standards, and server administration with centralized management via Group PolicyKey FeaturesWork through advanced filtering techniques for Group Policy ObjectsConfigure Windows Group Policy with GPMC and PowerShellExplore everyday functions and advanced administration tasks in Group PolicyBook DescriptionWindows Group Policy is a powerful yet underutilized centralized management tool in corporate networks, and this Group Policy book will help you make better use of its impressive features.
Mastering Windows Group Policy starts by taking you through the core material that an administrator needs to know in order to start working with Group Policy. You’ll understand the process of building a lab environment for testing Group Policy. As you advance, you’ll explore the Group Policy Management Console (GPMC) and use the powerful features that its interface offers.
Once you are well versed with using GPMC, you’ll be able to perform and manage traditional core administration tasks. By working through examples of different filtering options available for the application of Group Policy settings, you’ll discover the power that Group Policy holds within your network.
13. AWS for System Administrators: Build, automate, and manage your infrastructure on the most popular cloud platform – AWS
Author: by Prashant Lakhera
Published at: Packt Publishing (February 12, 2021)
Take your AWS SysOps skills to the next level by learning infrastructure automation techniques using CloudFormation, Terraform, and Boto3Key FeaturesExplore AWS automation using CloudFormation, Terraform, and Boto3Leverage AWS to make your infrastructure flexible and highly availableDiscover various AWS features for building a secure and reliable environment to host your applicationBook DescriptionAmazon Web Services (AWS) is one of the most popular and efficient cloud platforms for administering and deploying your applications to make them resilient and robust.
AWS for System Administrators will help you to learn several advanced cloud administration concepts for deploying, managing, and operating highly available systems on AWS. Starting with the fundamentals of identity and access management (IAM) for securing your environment, this book will gradually take you through AWS networking and monitoring tools.
As you make your way through the chapters, you’ll get to grips with VPC, EC2, load balancer, Auto Scaling, RDS database, and data management. The book will also show you how to initiate AWS automated backups and store and keep track of log files.
14. CISA Certified Information Systems Auditor Bundle
Author: by Peter H. Gregory
Published at: McGraw-Hill Education; 1st edition (May 14, 2020)
At this critical point in your Business Continuity Management studies and research, you need one definitive, comprehensive professional textbook that will take you to the next step. In his 4th edition of Business Continuity Management: Global Best Practices, Andrew Hiles gives you a wealth of real-world analysis and advice based on international standards and grounded in best practices – a textbook for today, a reference for your entire career.
With so much to learn in this changing profession, you don’t want to risk missing out on something you’ll need later. Does one of these describe you? Preparing for a Business Continuity Management career, needing step-by-step guidelines,Working in BCM, looking to deepen knowledge and stay current – and create, update, or test a Business Continuity Plan.
Managing in BCM, finance, facilities, emergency preparedness or other field, seeking to know as much as much as possible to make the decisions to keep the company going in the face of a business interruption. Hiles has designed the book for readers on three distinct levels: Initiate, Foundation, and Practitioner.
AWS Penetration Testing: Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap
Author: by Jonathan Helmus
Published at: Packt Publishing (December 4, 2020)
Get to grips with security assessment, vulnerability exploitation, workload security, and encryption with this guide to ethical hacking and learn to secure your AWS environmentKey FeaturesPerform cybersecurity events such as red or blue team activities and functional testingGain an overview and understanding of AWS penetration testing and securityMake the most of your AWS cloud infrastructure by learning about AWS fundamentals and exploring pentesting best practicesBook DescriptionCloud security has always been treated as the highest priority by AWS while designing a robust cloud infrastructure.
AWS has now extended its support to allow users and security experts to perform penetration tests on its environment. This has not only revealed a number of loopholes and brought vulnerable points in their existing system to the fore, but has also opened up opportunities for organizations to build a secure cloud environment.
This book teaches you how to perform penetration tests in a controlled AWS environment. You’ll begin by performing security assessments of major AWS resources such as Amazon EC2 instances, Amazon S3, Amazon API Gateway, and AWS Lambda. Throughout the course of this book, you’ll also learn about specific tests such as exploiting applications, testing permissions flaws, and discovering weak policies.