Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
48,85 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
Kategorien:
Beschreibung
If you're looking for a comprehensive guide to Amazon Web Services (AWS) security, this book is for you. With the help of this book, cloud professionals and the security team will learn how to protect their cloud infrastructure components and applications from external and internal threats.
The book uses a comprehensive layered security approach to look into the relevant AWS services in each layer and discusses how to use them. It begins with an overview of the cloud's shared responsibility model and how to effectively use the AWS Identity and Access Management (IAM) service to configure identities and access controls for various services and components. The subsequent chapter covers AWS infrastructure security, data security, and AWS application layer security. Finally, the concluding chapters introduce the various logging, monitoring, and auditing services available in AWS, and the book ends with a chapter on AWS security best practices.
By the end, as readers, you will gain the knowledge and skills necessary to make informed decisions and put in place security controls to create AWS application ecosystems that are highly secure.
TABLE OF CONTENTS
1. Introduction to Security in AWS
2. Identity And Access Management
3. Infrastructure Security
4. Data Security
5. Application Security
6. Logging, Monitoring, And Auditing
7. Security Best Practices
The book uses a comprehensive layered security approach to look into the relevant AWS services in each layer and discusses how to use them. It begins with an overview of the cloud's shared responsibility model and how to effectively use the AWS Identity and Access Management (IAM) service to configure identities and access controls for various services and components. The subsequent chapter covers AWS infrastructure security, data security, and AWS application layer security. Finally, the concluding chapters introduce the various logging, monitoring, and auditing services available in AWS, and the book ends with a chapter on AWS security best practices.
By the end, as readers, you will gain the knowledge and skills necessary to make informed decisions and put in place security controls to create AWS application ecosystems that are highly secure.
TABLE OF CONTENTS
1. Introduction to Security in AWS
2. Identity And Access Management
3. Infrastructure Security
4. Data Security
5. Application Security
6. Logging, Monitoring, And Auditing
7. Security Best Practices
If you're looking for a comprehensive guide to Amazon Web Services (AWS) security, this book is for you. With the help of this book, cloud professionals and the security team will learn how to protect their cloud infrastructure components and applications from external and internal threats.
The book uses a comprehensive layered security approach to look into the relevant AWS services in each layer and discusses how to use them. It begins with an overview of the cloud's shared responsibility model and how to effectively use the AWS Identity and Access Management (IAM) service to configure identities and access controls for various services and components. The subsequent chapter covers AWS infrastructure security, data security, and AWS application layer security. Finally, the concluding chapters introduce the various logging, monitoring, and auditing services available in AWS, and the book ends with a chapter on AWS security best practices.
By the end, as readers, you will gain the knowledge and skills necessary to make informed decisions and put in place security controls to create AWS application ecosystems that are highly secure.
TABLE OF CONTENTS
1. Introduction to Security in AWS
2. Identity And Access Management
3. Infrastructure Security
4. Data Security
5. Application Security
6. Logging, Monitoring, And Auditing
7. Security Best Practices
The book uses a comprehensive layered security approach to look into the relevant AWS services in each layer and discusses how to use them. It begins with an overview of the cloud's shared responsibility model and how to effectively use the AWS Identity and Access Management (IAM) service to configure identities and access controls for various services and components. The subsequent chapter covers AWS infrastructure security, data security, and AWS application layer security. Finally, the concluding chapters introduce the various logging, monitoring, and auditing services available in AWS, and the book ends with a chapter on AWS security best practices.
By the end, as readers, you will gain the knowledge and skills necessary to make informed decisions and put in place security controls to create AWS application ecosystems that are highly secure.
TABLE OF CONTENTS
1. Introduction to Security in AWS
2. Identity And Access Management
3. Infrastructure Security
4. Data Security
5. Application Security
6. Logging, Monitoring, And Auditing
7. Security Best Practices
Details
Erscheinungsjahr: | 2021 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9789355510327 |
ISBN-10: | 9355510322 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: | Mukherjee, Adrin |
Hersteller: | BPB Publications |
Maße: | 235 x 191 x 16 mm |
Von/Mit: | Adrin Mukherjee |
Erscheinungsdatum: | 29.12.2021 |
Gewicht: | 0,557 kg |
Details
Erscheinungsjahr: | 2021 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9789355510327 |
ISBN-10: | 9355510322 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: | Mukherjee, Adrin |
Hersteller: | BPB Publications |
Maße: | 235 x 191 x 16 mm |
Von/Mit: | Adrin Mukherjee |
Erscheinungsdatum: | 29.12.2021 |
Gewicht: | 0,557 kg |
Warnhinweis