Inicio > > Seguridad informática > Mastering AWS Security - Second Edition
Mastering AWS Security - Second Edition

Mastering AWS Security - Second Edition

Laurent Mathieu

72,08 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2024
Materia
Seguridad informática
ISBN:
9781805125440
72,08 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Explore the depths of AWS security and learn how to design, implement, and maintain a secure cloud environment using state-of-the-art AWS technologyKey Features:- Expand your knowledge with new concepts and technologies tailored for various use cases in this second edition- Design and deploy secure AWS environments based on modern architectural principles- Elevate your AWS security expertise with advanced techniques for automation and continuous improvement- Purchase of the print or Kindle book includes a free PDF eBook Book Description:If you’re trying to navigate the complex world of AWS security and fortify your organizational cloud environment, then this book is for you.Written by an accomplished cybersecurity and AWS cloud consultant, Mastering AWS Security will help you understand and master the complexities of AWS security. This book offers an in-depth and practical exploration of AWS security concepts, features, and services, focusing on how they apply to modern cloud-based application environments. As you progress, you’ll gain a thorough introduction to the art of security automation and DevSecOps. You’ll learn how to automate security tasks, integrate security into your development process, and maintain a high level of security as your applications evolve and scale. Emphasizing continuous monitoring and improvement, this book will teach you how to set up monitoring systems, interpret security data, and make informed decisions to enhance your security over time. Through real-world case studies, you’ll learn how to tackle the challenges and find solutions for securing AWS environments.By the end of this book, you’ll confidently secure your AWS environments, and stay up to date with the latest security trends and updates in the AWS ecosystem.What You Will Learn:- Discover AWS IAM, access control models, and the principle of least privilege- Get to grips with VPC network security strategies and tools to protect and isolate your critical assets- Leverage and orchestrate AWS security services tailored to your environment- Implement encryption and data protection best practices in key AWS services- Explore best practices to secure microservices and serverless architectures on AWS- Implement security strategies for multi-tenant architectures- Master the art of security automation and DevSecOps tooling Who this book is for:This comprehensive guide is for cloud architects, engineers, DevOps professionals, and AWS enthusiasts. Cybersecurity professionals who want to learn AWS security to protect their applications, data, and infrastructure from threats, ensure compliance with regulations, and build trust with customers, will also find this book useful.Table of Contents- Introduction to AWS Security Concepts and the Shared Responsibility Model- Infrastructure Security: Keeping your VPC secure- Identity and Access Management - Securing Users, Roles and Policies- Data Protection - Encryption, Key Management, and Data Storage Best Practices- Introduction to AWS Security Services- Designing Secure Microservices Architectures in AWS- Implementing Security for Serverless Deployments- Secure Design Patterns for Multi-Tenancy in Shared Environments- Automate Everything to Build Immutable and Ephemeral Resources- Advanced Logging, Auditing and Monitoring with AWS- Security Compliance with AWS Config, AWS Security Hub, and Automated Remediation- DevSecOps - Integrating Security into CI/CD Pipelines- Keeping Up with Evolving AWS Security Best Practices and Threat Landscape- Closing Note

Artículos relacionados

  • Information Security and Ethics
    Quigley
    ...
  • Cybersecurity Fundamentals Explained
    Brian Mackay
    The issue of Cybersecurity is of paramount importance in the digital age. With near-continuous revelations about incidents and breaches in the media, organizations and individuals are faced with the challenge of finding the balance between risk, innovation, and cost. At the same time, the field of cybersecurity is undergoing dramatic changes, demanding that organizations embrac...
    Disponible

    22,44 €

  • Improving Security, Privacy, and Trust in Cloud Computing
    Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud’s scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of chall...
  • Enhancing Performance, Efficiency, and Security Through Complex Systems Control
    Academic scholars and professionals in engineering strive to enhance the performance, efficiency, and security of complex systems, but accessing comprehensive resources for these challenges can be daunting. Enhancing Performance, Efficiency, and Security Through Complex Systems Control offers an ideal solution. Edited by esteemed academics Idriss Chana, Aziz Bouazi, and Hussain...
    Disponible

    294,76 €

  • Enhancing Performance, Efficiency, and Security Through Complex Systems Control
    Academic scholars and professionals in engineering strive to enhance the performance, efficiency, and security of complex systems, but accessing comprehensive resources for these challenges can be daunting. Enhancing Performance, Efficiency, and Security Through Complex Systems Control offers an ideal solution. Edited by esteemed academics Idriss Chana, Aziz Bouazi, and Hussain...
  • Emerging Technologies and Security in Cloud Computing
    In today’s digital age, the exponential growth of cloud computing services has brought significant opportunities for businesses and individuals alike. However, this surge in cloud adoption has also ushered in a host of critical concerns, with the paramount issues being data privacy and security. The goal of protecting sensitive information from cyber threats and ensuring confid...