Mastering AWS Security

Mastering AWS Security

Mastering AWS Security

Albert Anthony

62,93 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2017
Materia
Seguridad de redes
ISBN:
9781788293723
62,93 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

In depth informative guide to implement and use AWS security services effectively.Key Features:Learn to secure your network, infrastructure, data and applications in AWS cloudLog, monitor and audit your AWS resources for continuous security and continuous compliance in AWS cloudUse AWS managed security services to automate security. Focus on increasing your business rather than being diverged onto security risks and issues with AWS security.Delve deep into various aspects such as the security model, compliance, access management and much more to build and maintain a secure environment.Book Description:Mastering AWS Security starts with a deep dive into the fundamentals of the shared security responsibility model. This book tells you how you can enable continuous security, continuous auditing, and continuous compliance by automating your security in AWS with the tools, services, and features it provides.Moving on, you will learn about access control in AWS for all resources. You will also learn about the security of your network, servers, data and applications in the AWS cloud using native AWS security services.By the end of this book, you will understand the complete AWS Security landscape, covering all aspects of end - to -end software and hardware security along with logging, auditing, and compliance of your entire IT environment in the AWS cloud.Lastly, the book will wrap up with AWS best practices for security.What You Will Learn:Learn about AWS Identity Management and Access controlGain knowledge to create and secure your private network in AWSUnderstand and secure your infrastructure in AWSUnderstand monitoring, logging and auditing in AWSEnsure Data Security in AWSLearn to secure your applications in AWSExplore AWS Security best practicesWho this book is for:This book is for all IT professionals, system administrators and security analysts, solution architects and Chief Information Security Officers who are responsible for securing workloads in AWS for their organizations. It is helpful for all Solutions Architects who want to design and implement secure architecture on AWS by the following security by design principle. This book is helpful for personnel in Auditors and Project Management role to understand how they can audit AWS workloads and how they can manage security in AWS respectively.If you are learning AWS or championing AWS adoption in your organization, you should read this book to build security in all your workloads. You will benefit from knowing about security footprint of all major AWS services for multiple domains, use cases, and scenarios.

Artículos relacionados

  • Security Engineering for Cloud Computing
    Applying software engineering to Cloud computing is a primary aspect to obtain a systematic approach to the development, operation and maintenance of software. As a result, there is a need to examine and propose security solutions for cloud computing in order to improve the quality and security of all services, applications, and tools based on cloud computing. Security Engineer...
  • Theory and Practice of Cryptography Solutions for Secure Information Systems
    Elci
    Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Syste...
  • Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
    Rawat
    While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile a...
  • Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing
    Innovations in cloud and service-oriented architectures continue to attract attention by offering interesting opportunities for research in scientific communities. Although advancements such as computational power, storage, networking, and infrastructure have aided in making major progress in the implementation and realization of cloud-based systems, there are still significant...
  • Security Breaches and Threat Prevention in the Internet of Things
    As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategie...
  • Multidisciplinary Perspectives in Cryptology and Information Security
    Al Maliky
    With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applicat...

Otros libros del autor

  • AWS
    Albert Anthony
    ...
    Disponible

    59,95 €