AWS All-in-one Security Guide Adrin Mukherjee
- Autor:
- Adrin Mukherjee
- Wydawnictwo:
- BPB Publications
- Ocena:
- Stron:
- 296
- Dostępne formaty:
-
ePubMobi
Zostało Ci
na świąteczne zamówienie
opcje wysyłki »
Opis
książki
:
AWS All-in-one Security Guide
Learn to build robust security controls for the infrastructure, data, and applications in the AWS Cloud.
Key Features
Takes a comprehensive layered security approach that covers major use-cases.
Covers key AWS security features leveraging the CLI and Management Console.
Step-by-step instructions for all topics with graphical illustrations.
Relevant code samples written in JavaScript (for Node.js runtime). Description
If you're looking for a comprehensive guide to Amazon Web Services (AWS) security, this book is for you. With the help of this book, cloud professionals and the security team will learn how to protect their cloud infrastructure components and applications from external and internal threats.
The book uses a comprehensive layered security approach to look into the relevant AWS services in each layer and discusses how to use them. It begins with an overview of the cloud's shared responsibility model and how to effectively use the AWS Identity and Access Management (IAM) service to configure identities and access controls for various services and components. The subsequent chapter covers AWS infrastructure security, data security, and AWS application layer security. Finally, the concluding chapters introduce the various logging, monitoring, and auditing services available in AWS, and the book ends with a chapter on AWS security best practices.
By the end, as readers, you will gain the knowledge and skills necessary to make informed decisions and put in place security controls to create AWS application ecosystems that are highly secure. What you will learn
Learn to create a layered security architecture and employ defense in depth.
Master AWS IAM and protect APIs.
Use AWS WAF, AWS Secrets Manager, and AWS Systems Manager Parameter Store.
Learn to secure data in Amazon S3, EBS, DynamoDB, and RDS using AWS Key Management Service.
Secure Amazon VPC, filter IPs, use Amazon Inspector, use ECR image scans, etc.
Protect cloud infrastructure from DDoS attacks and use AWS Shield. Who this book is for
The book is intended for cloud architects and security professionals interested in delving deeper into the AWS cloud's security ecosystem and determining the optimal way to leverage AWS security features. Working knowledge of AWS and its core services is necessary. Table of Contents
1. Introduction to Security in AWS
2. Identity And Access Management
3. Infrastructure Security
4. Data Security
5. Application Security
6. Logging, Monitoring, And Auditing
7. Security Best Practices
Takes a comprehensive layered security approach that covers major use-cases.
Covers key AWS security features leveraging the CLI and Management Console.
Step-by-step instructions for all topics with graphical illustrations.
Relevant code samples written in JavaScript (for Node.js runtime). Description
If you're looking for a comprehensive guide to Amazon Web Services (AWS) security, this book is for you. With the help of this book, cloud professionals and the security team will learn how to protect their cloud infrastructure components and applications from external and internal threats.
The book uses a comprehensive layered security approach to look into the relevant AWS services in each layer and discusses how to use them. It begins with an overview of the cloud's shared responsibility model and how to effectively use the AWS Identity and Access Management (IAM) service to configure identities and access controls for various services and components. The subsequent chapter covers AWS infrastructure security, data security, and AWS application layer security. Finally, the concluding chapters introduce the various logging, monitoring, and auditing services available in AWS, and the book ends with a chapter on AWS security best practices.
By the end, as readers, you will gain the knowledge and skills necessary to make informed decisions and put in place security controls to create AWS application ecosystems that are highly secure. What you will learn
Learn to create a layered security architecture and employ defense in depth.
Master AWS IAM and protect APIs.
Use AWS WAF, AWS Secrets Manager, and AWS Systems Manager Parameter Store.
Learn to secure data in Amazon S3, EBS, DynamoDB, and RDS using AWS Key Management Service.
Secure Amazon VPC, filter IPs, use Amazon Inspector, use ECR image scans, etc.
Protect cloud infrastructure from DDoS attacks and use AWS Shield. Who this book is for
The book is intended for cloud architects and security professionals interested in delving deeper into the AWS cloud's security ecosystem and determining the optimal way to leverage AWS security features. Working knowledge of AWS and its core services is necessary. Table of Contents
1. Introduction to Security in AWS
2. Identity And Access Management
3. Infrastructure Security
4. Data Security
5. Application Security
6. Logging, Monitoring, And Auditing
7. Security Best Practices
Dzięki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep@ebookpoint.pl
Proszę wybrać ocenę!
Proszę wpisać opinię!
Książka drukowana
Oceny i opinie klientów: AWS All-in-one Security Guide Adrin Mukherjee (0) Weryfikacja opinii następuje na podstawie historii zamowień na koncie Użytkownika umiejszczającego opinię.