ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب AWS certified solutions architect associate exam guide (Exam SAA-C01)

دانلود کتاب راهنمای آزمون دانشیار معمار راه حل های دارای گواهی AWS (Exam SAA-C01)

AWS certified solutions architect associate exam guide (Exam SAA-C01)

مشخصات کتاب

AWS certified solutions architect associate exam guide (Exam SAA-C01)

ویرایش: 2 
نویسندگان:   
سری: All in one 
ISBN (شابک) : 9781260470185, 1260470180 
ناشر: McGraw-Hill Education 
سال نشر: 2021 
تعداد صفحات: 449 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 71 مگابایت 

قیمت کتاب (تومان) : 54,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 4


در صورت تبدیل فایل کتاب AWS certified solutions architect associate exam guide (Exam SAA-C01) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب راهنمای آزمون دانشیار معمار راه حل های دارای گواهی AWS (Exam SAA-C01) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Cover
About the Author
Title Page
Copyright Page
Dedication
Contents at a Glance
Contents
Acknowledgments
Introduction
Chapter 1 Overview of Cloud Computing and Amazon Web Services
	Advantages of Running Cloud Computing on AWS
		Three Models of Cloud Computing
		Three Cloud Computing Deployment Models
	History of AWS
	AWS Global Infrastructure
	AWS Security and Compliance
	AWS Products and Services
		Compute
		Networking
		Security and Compliance
		Storage and Content Delivery
		Database
		Analytics
		Application Services
		Developer Tools
		Management Tools
		Messaging
		Migration
		Artificial Intelligence
		Internet of Things
		Mobile Services
	Chapter Review
		Questions
		Answers
Chapter 2 Storage on AWS
	Amazon Simple Storage Service (S3)
	Advantages of Amazon S3
	Usage of Amazon S3 in Real Life
	Amazon S3 Basic Concepts
	Amazon S3 Data Consistency Model
	Amazon S3 Performance Considerations
	Reverse the Key Name String
	Adding a Hex Hash Prefix to a Key Name
	Encryption in Amazon S3
	Amazon S3 Access Control
		Access Policies
		Bucket Policies
		Access Control List
		S3 Security Best Practices
	Amazon S3 Storage Class
		Versioning of Objects in Amazon S3
		Amazon S3 Object Lifecycle Management
		Amazon S3 Replication
	Static Web Site Hosting in Amazon S3
	Amazon S3 Glacier
		Amazon S3 Glacier Key Terminology
		Accessing Amazon S3 Glacier
		Uploading Files to AmazonS3 Glacier
		Retrieving Files from Amazon S3 Glacier
	Amazon Elastic Block Store
		Features of Amazon EBS
		AWS Block Storage Offerings
	Amazon Elastic File System
		Using Amazon Elastic File System
		Performance Mode of Amazon EFS
	On-Premise Storage Integration with AWS
		AWS Storage Gateway
		AWS Snowball and AWS Snowball Edge
		AWS Snowmobile
	Chapter Review
		Lab 2-1: Creating, Moving, and Deleting Objects in Amazon S3
		Lab 2-2: Using Version Control in Amazon S3
		Lab 2-3: Using the Bucket Policy Generator for Amazon S3
		Questions
		Answers
Chapter 3 Virtual Private Cloud
	Amazon VPC Components and Terminology
		Amazon VPC
		Subnet
		Route Table
		Internet Gateway
		Network Address Translation
		Egress-Only Internet Gateway
		Elastic Network Interface
		Enhanced Networking (Linux Only)
		Elastic IP Address
		Network Security
		Amazon VPC Peering
		Amazon VPC Endpoint
		Transit Gateway
		DNS and VPC
		DHCP Option Sets
		Connecting to a VPC
		VPC Flow Logs
	Default VPC
	Labs on VPC
		Lab 3-1: Using the VPC Wizard
		Lab 3-2: Creating a VPC with Public and Private Subnets
		Lab 3-3: Exploring All the Options in a Virtual Private Cloud
	Chapter Review
		Questions
		Answers
Chapter 4 Introduction to Amazon Elastic Compute Cloud
	Benefits of Amazon EC2
	Amazon EC2 Instance Types and Features
		General Purpose (T3, T3a, T2, M6g, M5, M5a, M5n, M4, and A1)
		Compute Optimized (C6g, C5, C5a, C5n, and C4)
		Memory Optimized (R6g, R5, R5a, R5n, R4, X1e, X1, High Memory, and Z1d)
		Storage Optimized (I3, I3en, D2, and H1)
		Accelerated Computing (P3, P2, Inf1, G4, G3, and F1)
		Processor Features
		Network Features
		Storage Features
	Steps for Using Amazon EC2
	Pricing for Amazon EC2
		On-Demand Instance
		Reserved Instance
		Spot Instance
	Shared Tenancy, Dedicated Hosts, and Dedicated Instances
		Shared Tenancy
		Dedicated Host
		Dedicated Instance
	Instances and AMIs
		Instance Root Volume
		Obtaining an AMI
	Virtualization in AMI
		HVM AMI
		PV AMI
	Instance Life Cycle
		Launch
		Start and Stop
		Reboot
		Termination
		Retirement
	Connecting to an Instance
	Security Group
	Amazon Elastic Container Service
		Lab 4-1: Using EC2
		Creating a New Key Pair
		Launching a Web Server Instance
		Browsing the Web Server
		Lab 4-2: Creating an EBS Instance and Attaching It to an EC2 Instance
		Lab 4-3: Creating an Elastic File System (EFS) and Mounting Across Two EC2 Instances in Different AZs
	Chapter Review
		Questions
		Answers
Chapter 5 Identity and Access Management and Security on AWS
	Authentication
	Authorization
	Auditing
	Types of Security Credentials
		Temporary Security Credentials
	Users
	Groups
	Roles
	IAM Hierarchy of Privileges
	IAM Best Practices
		Use the IAM User
		Create a Strong Password Policy
		Rotate Security Credentials Regularly
		Enable MFA
		Manage Permissions with Groups
		Grant the Least Privileges
		Use IAM Roles
		Use IAM Roles for Amazon EC2 Instances
		Use IAM Policy Conditions for Extra Security
		Enable AWS CloudTrail
	AWS Compliance Program
	Shared Responsibility Model
		AWS Responsibility
		Customer’s Responsibility
	AWS Security Products and Services
		Resource Access Manager
		AWS Secrets Manager
		Amazon GuardDuty
		Amazon Inspector
		Amazon Macie
		AWS Certificate Manager
		AWS Web Application Firewall
		AWS Shield
		AWS CloudHSM
		AWS KMS
		Lab 5-1: Creating IAM Users, Groups, and Roles
		Managing IAM User Permissions and Credentials
	IAM Roles for Amazon EC2
	Chapter Review
		Questions
		Answers
Chapter 6 Auto Scaling
	Benefits of Auto Scaling
	Scaling Plan
		Identify Scalable Resources
		Specify Scaling Strategy
	Using EC2 Auto Scaling
		Launch Configuration
		Auto Scaling Groups
		Termination Policy
	Elastic Load Balancing
		How ELB Works
		Types of Load Balancers
	Load Balancer Key Concepts and Terminology
		Health Check
		Using Multiple AZs
		Lab 6-1: Set Up Auto Scaling
	Chapter Review
		Questions
		Answers
Chapter 7 Deploying and Monitoring Applications on AWS
	AWS Lambda
		Is AWS Lambda Really Serverless?
		Understanding AWS Lambda
	Amazon API Gateway
		API Types Supported by API Gateway
		Benefits of Amazon API Gateway
	Amazon Kinesis
		Real-Time Application Scenarios
		Differences Between Batch and Stream Processing
	Amazon Kinesis Data Steams
		Benefits of Amazon Kinesis Data Streams
	Amazon Kinesis Data Firehose
		Benefits of Amazon Kinesis Data Firehose
	Amazon Kinesis Data Analytics
		Benefits of Amazon Kinesis Data Analytics
		Use Cases for Amazon Kinesis Data Analytics
	Amazon Kinesis Video Streams
	Reference Architectures Using Serverless Services
		Real-Time File Processing
		Real-Time Stream Processing
		Extract, Transformation, and Load (ETL) Processing
		IoT Back Ends
	Amazon CloudFront
		Amazon CloudFront Key Concepts
		Geo Restriction
		Error Handling
	Amazon Route 53
	AWS Web Application Firewall
	Amazon Shield
		Benefits of AWS Shield
	Amazon Simple Queue Service
	Amazon Simple Notification Service
	AWS Step Functions and Amazon Simple Workflow (SWF)
	AWS Elastic Beanstalk
	AWS OpsWorks
	Amazon Cognito
	Amazon Elastic MapReduce
	AWS CloudFormation
	Monitoring in AWS
	Amazon CloudWatch
		Metrics Collection and Tracking
		Capture Real-Time Changes Using Amazon CloudWatch Events
		Monitoring and Storing Logs
		Set Alarms
		View Graphs and Statistics
	AWS CloudTrail
	AWS Config
	Amazon VPC Flow Logs
	AWS Trusted Advisor
	AWS Organizations
	Chapter Review
		Questions
		Answers
Chapter 8 Databases on AWS
	Understanding Relational Databases
	Understanding the Amazon Relational Database Service
		Scenario 1: Hosting the Database in Your Data Center On-Premises
		Scenario 2: Hosting the Database on Amazon EC2 Servers
		Scenario 3: Hosting the Database Using Amazon RDS
	Hosting a Database in Amazon EC2 vs. Amazon RDS
	High Availability on Amazon RDS
		Simplest Architecture: Single-AZ Deployment
		High Availability: Multiple AZs
	Scaling on Amazon RDS
		Changing the Instance Type
		Read Replica
	Security on Amazon RDS
		Amazon VPC and Amazon RDS
	Backups, Restores, and Snapshots
	Monitoring
	Amazon Aurora
	Amazon Redshift
		Benefits of Amazon Redshift
		Amazon Redshift Architecture
		Sizing Amazon Redshift Clusters
		Networking for Amazon Redshift
		Encryption
		Security
		Backup and Restore
		Data Loading in Amazon Redshift
		Data Distribution in Amazon Redshift
	Amazon DynamoDB
		Benefits of Amazon DynamoDB
		Amazon DynamoDB Terminology
		Secondary Index
		Consistency Model
		Global Table
		Amazon DynamoDB Streams
		Amazon DynamoDB Accelerator
		Encryption and Security
	Amazon ElastiCache
	Amazon Neptune
		Benefits of Amazon Neptune
		Amazon Neptune Use Cases
	Amazon DocumentDB
		Benefits of Amazon DocumentDB
		Amazon DocumentDB Use Cases
		Lab 8-1: RDS: Creating an Amazon Aurora Database
		Lab 8-2: Taking a Snapshot of a Database
		Lab 8-3: Creating an Amazon Redshift Cluster
		Lab 8-4: Creating an Amazon DynamoDB Table
	Chapter Review
		Questions
		Answers
Chapter 9 AWS Well-Architected Framework and Best Practices
	Operational Excellence
		Prepare
		Operate
		Evolve
	Security
		Have a Strong Identity Foundation
		Enable Traceability
		Implement Security at All Layers
		Secure the Data
		Automate for Security
		Plan for Security Events
		Best Practices
	Performance
		Performance Efficiency
	Reliability
		Best Practices
	Cost Optimization Pillar
		Finding Cost-Effective Resources
		Matching Supply with Demand
		Being Aware of Expenditures
		Optimizing Over Time
	AWS Best Practices
		Design for Failures
		Build Security in Every Layer
		Leverage Multiple Storage Options
		Implement Elasticity
		Think Parallel
		Loosely Couple Your Architecture
		There Are No Constraints in the AWS Cloud
	Chapter Review
		Questions
		Answers
Appendix A Objective Map
	Exam SAA-C02
Appendix B Additional Resources
	Whitepapers
	AWS re:Invent Videos
Appendix C About the Online Content
	System Requirements
	Your Total Seminars Training Hub Account
		Privacy Notice
	Single User License Terms and Conditions
	TotalTester Online
	Technical Support
Acronyms and Glossary
	Acronyms
	Glossary
Index




نظرات کاربران