Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
"Identity Management on GCP" is a detailed step-by-step guide that helps readers through Identity Management within the Google Cloud Platform (GCP). Even though it is a comprehensive guide to GCP IAM, it provides precise definitions of the main concepts, practical recommendations, and best practices for identity management in cloud environments.
The topics described in the book, with the help of clear explanations and examples, include connecting on-premise identity systems to GCP, managing admin and workforce identities, and securing applications running on GCP. It also considers issues of integrating IAM with the business environment and compliance, providing the readers with information on implementing IAM solutions that are effective and can be scaled easily.
At the end of the book, the readers will have effectively gained knowledge on GCP IAM and can implement improved security measures and manage and optimize identity processes in their cloud environments effectively. Cloud security specialists, identity engineers, and IT administrators are the primary target audience of this book.
You Will:
This book is for: Cloud Security Specialists, Identity Engineers and Compliance Engineers, Site Reliability Engineers, Cloud Architects, Cloud Ops Engineers
Advait Patel is a skilled Senior Site Reliability Engineer based in Chicago, with a passion for leveraging technology to drive impactful solutions. With extensive experience in Cloud Computing, Cloud Security, and Cybersecurity, he currently works at Broadcom, where he plays a key role in managing, building, and securing multi-million dollar revenue-generating products. Advait is also an advocate for professional growth and is eager to share his expertise with the next generation of tech talent through community involvement and mentorship. In his free time, he enjoys connecting with like-minded professionals and exploring innovative developments in the tech industry.
Saai Krishnan Udayakumar is a seasoned software engineer and cybersecurity practitioner based in Seattle, with over a decade of experience building secure, scalable identity and access management systems. At a Fortune 500 enterprise, he leads critical initiatives in access governance, compliance automation, and platform security-safeguarding large-scale, high-impact infrastructure. Saai actively contributes to the broader tech community through his involvement in professional societies, technical peer reviews, and global speaking engagements. Passionate about bridging security, engineering, and operations, he enjoys mentoring emerging talent and exploring advancements in identity and cloud security.
Hariharan Ragothaman is a seasoned Senior Software Engineer with over a decade of experience architecting scalable systems across embedded platforms, cloud-native environments, and AI-powered infrastructure. At Advanced Micro Devices (AMD), he leads mission-critical initiatives in data center validation and server-side systems. Previously, he contributed to DevSecOps transformations at athenahealth and played a key role in launching flagship consumer audio products at Bose Corporation. He holds an M.S. in Electrical and Computer Engineering from Northeastern University and a B.E. from Anna University. Hariharan thrives at the intersection of embedded software, distributed systems, robotics, and DevSecOps-solving high-impact technical challenges through principled system design and execution.
Chapter 1: Introduction to Identity and Access Management on Google Cloud Platform.- Chapter 2: Managing Roles, Policies and Permissions.- Chapter 3: Advanced IAM Features.- Chapter 4: Service Accounts and Workload Identity.- Chapter 5: Securing APIs and Workloads.- Chapter 6: Automating IAM Policies.- Chapter 7: Auditing and Monitoring IAM Policies.- Chapter 8 : Managing Multi-Cloud and Hybrid IAM.- Chapter 9:Securing Sensitive Data with IAM.- Chapter 10: AI-Driven Identity and Access Management.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.