Название: Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks, 2nd Edition Автор: Aditya K. Sood Издательство: Mercury Learning and Information Год: 2023 Страниц: 660 Язык: английский Формат: epub (true) Размер: 25.5 MB
The second edition of the book has been updated with the latest research and developments in the field of cloud security. The content has been refined and streamlined to make it more accessible and engaging for readers. The book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combat threats, attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hands-on assessment techniques based on real-world studies, and concluding with recommendations including best practices.
Who should read this book: This book is intended for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. I assume that you understand the basics of cloud infrastructure, and that you are familiar with DevOps practices in which applications are developed and deployed with security, reliability, and agility baked in.
What you will learn: You will learn practical strategies for assessing the security and privacy of your cloud infrastructure and applications. This is not an introduction to cloud security; rather this is a hands-on guide for security practitioners with real-world case studies. By the end of this book, you will know how to:
- systematically assess the security posture of your cloud environments. - determine where your environments are most vulnerable to threats. - deploy robust security and privacy controls in the cloud. - enhance your cloud security at scale.
This book is authored to serve the purpose on how to make your cloud infrastructure secure to combat threats and attacks and prevent data breaches.
Preface About the Author Chapter 1: Cloud Architecture and Security Fundamentals Chapter 2: IAM for Authentication and Authorization: Security Assessment Chapter 3: Cloud Infrastructure: Network Security Assessment Chapter 4: Database and Storage Services: Security Assessment Chapter 5: Design and Analysis of Cryptography Controls: Security Assessment Chapter 6: Cloud Applications: Secure Code Review Chapter 7: Cloud Monitoring and Logging: Security Assessment Chapter 8: Privacy in the Cloud Chapter 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments Chapter 10: Malicious Code in the Cloud Chapter 11: Threat Intelligence and Malware Protection in the Cloud Appendix A: List of Serverless Computing Services Appendix B: List of Serverless Frameworks Appendix C: List of SaaS, PaaS, IaaS, and FaaS Providers Appendix D: List of Containerized Services and Open Source Software Appendix E: List of Critical RDP Vulnerabilities Appendix F: List of Network Tools and Scripts Appendix G: List of Databases Default TCP/UDP Ports Appendix H: List of Database Assessment Tools, Commands, and Scripts Appendix I: List of CouchDb API Commands and Resources Appendix J: List of CQLSH Cassandra Database SQL Queries Appendix K: List of Elasticsearch Queries Appendix L: AWS Services CLI Commands Appendix M: List of Vault and Secret Managers Appendix N: List of TLS Security Vulnerabilities for Assessment Appendix O: List of Cloud Logging and Monitoring Services Appendix P: Enterprise Threat Intelligence Platforms Index
Скачать Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks, 2nd Edition
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.