Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Azure Data and AI Architect Handbook
  • Table Of Contents Toc
  • Feedback & Rating feedback
Azure Data and AI Architect Handbook

Azure Data and AI Architect Handbook

By : Olivier Mertens, Breght Van Baelen
4.5 (13)
close
close
Azure Data and AI Architect Handbook

Azure Data and AI Architect Handbook

4.5 (13)
By: Olivier Mertens, Breght Van Baelen

Overview of this book

With data’s growing importance in businesses, the need for cloud data and AI architects has never been higher. The Azure Data and AI Architect Handbook is designed to assist any data professional or academic looking to advance their cloud data platform designing skills. This book will help you understand all the individual components of an end-to-end data architecture and how to piece them together into a scalable and robust solution. You’ll begin by getting to grips with core data architecture design concepts and Azure Data & AI services, before exploring cloud landing zones and best practices for building up an enterprise-scale data platform from scratch. Next, you’ll take a deep dive into various data domains such as data engineering, business intelligence, data science, and data governance. As you advance, you’ll cover topics ranging from learning different methods of ingesting data into the cloud to designing the right data warehousing solution, managing large-scale data transformations, extracting valuable insights, and learning how to leverage cloud computing to drive advanced analytical workloads. Finally, you’ll discover how to add data governance, compliance, and security to solutions. By the end of this book, you’ll have gained the expertise needed to become a well-rounded Azure Data & AI architect.
Table of Contents (18 chapters)
close
close
1
Part 1: Introduction to Azure Data Architect
4
Part 2: Data Engineering on Azure
8
Part 3: Data Warehousing and Analytics
13
Part 4: Data Security, Governance, and Compliance

Authentication

Having the correct permissions set up for every identity is a crucial step to take to secure the entire environment. However, if legitimate identities get compromised, all the efforts were in vain. Therefore, it is necessary that we verify that whoever logs in to a certain identity is who they claim to be. This is typically performed using well-protected credentials, such as a password or key.

With the number and scale of cyber-attacks increasing, we need to take extra steps to achieve an acceptable level of data security. Here are a few options:

  • Strong password policies
  • Encryption of user passwords
  • Multi-factor authentication
  • Firewall rules

The strength of a password can be increased by adding numbers or special characters, as they increase the complexity of the password and make it more resistant to certain types of attacks – mostly, dictionary attacks and brute force attacks. However, the exact impact of adding numbers or special...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY