Cargando…

Cloud Security Automation : Get to grips with automating your cloud security on AWS and OpenStack.

In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to c...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Priyam, Prashant
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1030820693
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 180407s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d NLE  |d MERUC  |d OCLCQ  |d IDB  |d OCLCF  |d OCLCO  |d VT2  |d OCLCQ  |d OCLCO  |d TEFOD  |d OCLCQ  |d LVT  |d C6I  |d N$T  |d UKAHL  |d OCLCQ  |d K6U  |d OCLCO  |d UKMGB  |d OCLCO  |d OCLCQ  |d PSYSI  |d OCLCQ  |d OCLCO  |d OCLCL 
015 |a GBC200343  |2 bnb 
016 7 |a 018835904  |2 Uk 
019 |a 1032131747 
020 |a 9781788622196  |q (electronic bk.) 
020 |a 1788622197  |q (electronic bk.) 
020 |a 1788627865 
020 |a 9781788627863 
024 3 |a 9781788627863 
029 1 |a CHNEW  |b 001002243 
029 1 |a CHVBK  |b 515200484 
029 1 |a AU@  |b 000066968537 
029 1 |a UKMGB  |b 018835904 
035 |a (OCoLC)1030820693  |z (OCoLC)1032131747 
037 |a 9781788622196  |b Packt Publishing 
037 |a 298CE0D9-7E62-437C-B066-8CD0B3CB79F9  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.585  |b .P759 2018eb 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.6782  |2 23 
049 |a UAMI 
100 1 |a Priyam, Prashant. 
245 1 0 |a Cloud Security Automation :  |b Get to grips with automating your cloud security on AWS and OpenStack. 
260 |a Birmingham :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (326 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Cloud Security; Types of cloud; Public cloud; Private cloud; Hybrid cloud; Software as a Service; Platform as a Service; Infrastructure as a Service; Cloud security; Confidentiality; Integrity; Availability; Authentication; Authorization; Auditing; Shared responsibility model; Shared responsibility model for infrastructure ; Shared responsibility model for container service; Shared responsibility model for abstract services; Key concern areas of cloud security. 
505 8 |a Infrastructure levelUser access level ; Storage and data level ; Application access level; Network level; Logging and monitoring level; Summary; Chapter 2: Understanding the World of Cloud Automation; What is DevOps?; Why do we need automation?; Infrastructure as Code; Configuration management; Automate deployment -- AWS OpsWorks; Quick recap; Summary; Chapter 3: Identity and Access Management in the Cloud; IAM features; How does AWS work in IAM?; Anatomy of IAM users, groups, roles, and policies ; IAM users; IAM groups; IAM roles; IAM policies; Access right delegation using IAM. 
505 8 |a Temporary credentialsCross-account access; Identity federation; IAM best practices; Other security options in AWS; AWS Certificate Manager; WAF and Shield; Cloud hardware security module; Cognito; Amazon Macie; AWS Inspector; AWS GuardDuty; Quick recap; Summary; Chapter 4: Cloud Network Security; Virtual private cloud; NACL; Security group; VPN connection; Direct Connect; DNS security; CDN-level security; Logging and monitoring; CloudTrail; CloudWatch; Quick recap; Summary; Chapter 5: Cloud Storage and Data Security; EBS; Fault tolerance at EBS; RAID 0; RAID 1; Encryption in EBS; S3. 
505 8 |a Security in S3AWS Glacier ; Security in AWS Glacier; EFS ; Security in EFS; Storage gateway; Security in the storage gateway; AWS Snowball; Security in Snowball; A quick recap; Summary; Chapter 6: Cloud Platform Security; RDS; Security in RDS; Using security groups; Using IAM; Using SSL to encrypt database connections; Security best practices for AWS RDS ; Back up and restore database; Monitoring of RDS; AWS Redshift ; Security in Redshift; AWS DynamoDB; Security in DynamoDB; ElastiCache ; Securing ElastiCache; VPC-level security; Authentication and access control. 
505 8 |a Authenticating with Redis authenticationData encryption; Data-in-transit encryption; Data-at-rest encryption; AWS ECS; Securing ECS; SQS; Securing SQS; Let's have a recap; Summary; Chapter 7: Private Cloud Security; Securing hypervisor; Securing KVM; Securing XenServer; Securing ESXi; Securing compute ; IAM; Authentication; Authentication methods -- internal and external; Authorization; Policy, tokens, and domains; Federated identity; Horizon -- OpenStack dashboard service; Cinder -- OpenStack block storage; Glance -- OpenStack image storage; Manila -- OpenStack shared file storage. 
500 |a Neutron - OpenStack network. 
520 |a In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to cloud governance. This book supplies best ... 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Cloud computing  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networking & communications.  |2 bicssc 
650 7 |a Network security.  |2 bicssc 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Computers  |x Networking  |x Security.  |2 bisacsh 
650 7 |a Computers  |x System Administration  |x General.  |2 bisacsh 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
758 |i has work:  |a Cloud security automation (Text)  |1 https://id.oclc.org/worldcat/entity/E39PD3XgR6MJV9D8xX4vdHWRrq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Priyam, Prashant.  |t Cloud Security Automation : Get to grips with automating your cloud security on AWS and OpenStack.  |d Birmingham : Packt Publishing, ©2018 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5332125  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH34195135 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5332125 
938 |a EBSCOhost  |b EBSC  |n 1775072 
994 |a 92  |b IZTAP