Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Cloud infrastructure is the backbone of modern enterprises, and Azure is at the forefront of delivering secure, scalable, and resilient cloud solutions. However, building enterprise-grade Azure infrastructure goes beyond provisioning virtual machines and storage it requires a deep understanding of architecture best practices, security frameworks, automation, and cost optimization. This book provides a technical deep dive into designing, automating, and securing Azure environments, making it an essential guide for cloud architects, DevOps engineers, and enterprise IT professionals.
Through real-world insights, hands-on coding examples, and best practices, readers will learn to automate infrastructure with Terraform and Bicep, secure workloads with Zero Trust principles, design highly available multi-region architectures, and optimize costs with Azure Monitor. The book also covers networking, disaster recovery, Kubernetes (AKS), CI/CD pipelines, and compliance frameworks, ensuring a comprehensive approach to Azure infrastructure management. Packed with real-world case studies from industries like finance, healthcare, and SaaS, this guide bridges the gap between theory and practical implementation, empowering professionals to build, secure, and optimize Azure environments at an enterprise scale.
You Will:
Seamlessly integrate Azure Kubernetes Service (AKS), container registries, and CI/CD pipelines with Azure DevOps for streamlined deployment
This book is for : Cloud architects, DevOps engineers, and enterprise IT professionals.
Roshan Gavandi is a seasoned Azure Solutions Architect and Enterprise Cloud Strategist with over 14 years of experience in designing, deploying, and securing large-scale cloud infrastructure. Specializing in Azure infrastructure, DevOps, and security, he has led enterprise cloud transformations for global financial institutions, Fortune 500 companies, and tech startups, ensuring scalability, reliability, and cost optimization. With deep expertise in Infrastructure as Code (IaC), Kubernetes (AKS), Azure DevOps, and hybrid cloud architectures, he has helped organizations modernize legacy systems, implement Zero Trust security models, and optimize cloud performance. His knowledge spans Azure networking, high-availability designs, disaster recovery, and governance frameworks. An active thought leader, conference speaker, and mentor, he has contributed to open-source projects, published technical articles on cloud computing, and authored books on Azure best practices. His passion for automation, security-first architectures, and hands-on learning drives his commitment to empowering DevOps engineers, cloud architects, and IT professionals with the knowledge to build enterprise-ready Azure solutions. When not architecting cloud environments, he enjoys mentoring aspiring engineers, writing about emerging cloud trends, and exploring innovations in distributed systems.
Chapter 1: Azure Infrastructure.- Chapter 2: Infrastructure as Code (IaC) in Azure.- Chapter 3: Azure Networking & Security.- Chapter 4: High Availability & Disaster Recovery.- Chapter 5: Azure Kubernetes Service (AKS) for Enterprise Workloads.- Chapter 6: Observability, Cost Optimization & Compliance.- Chapter 7: Real-World Case Studies & Future Trends.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.