|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBSCO_on1029497365 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
180324s2018 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d MERUC
|d YDX
|d OCLCQ
|d IDB
|d OCLCF
|d OCLCO
|d TEFOD
|d OCLCQ
|d LVT
|d N$T
|d OCLCQ
|d OCLCO
|d NZAUC
|d OCLCQ
|
019 |
|
|
|a 1029322020
|a 1029444938
|a 1029471053
|
020 |
|
|
|a 9781789137637
|q (electronic bk.)
|
020 |
|
|
|a 1789137632
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000067026671
|
035 |
|
|
|a (OCoLC)1029497365
|z (OCoLC)1029322020
|z (OCoLC)1029444938
|z (OCoLC)1029471053
|
037 |
|
|
|a 59A8A4D1-602A-41CB-9A66-0D60F67835BE
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.88813
|b .A584 2018eb
|
072 |
|
7 |
|a COM
|x 000000
|2 bisacsh
|
082 |
0 |
4 |
|a 006.76
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Anthony, Albert.
|
245 |
1 |
0 |
|a AWS :
|b Learn to secure your data, servers, and applications with AWS.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing,
|c 2018.
|
300 |
|
|
|a 1 online resource (119 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Copyright; Credits; Table of Contents; Preface; Chapter 1: AWS Virtual Private Cloud; Introduction; VPC Components; Subnets; Elastic Network Interfaces (ENI); Route Tables; Internet Gateway; Elastic IP Addresses; VPC Endpoints; Network Address Translation (NAT); VPC Peering; VPC Features and Benefits; Multiple Connectivity Options; Secure; Simple; VPC Use Cases; Hosting a Public Facing Website; Hosting Multi-Tier Web Application; Creating Branch Office and Business Unit Networks; Hosting Web Applications in the AWS Cloud That Are Connected with Your Data Center.
|
505 |
8 |
|
|a Extending Corporate Network in AWS CloudDisaster Recovery; VPC Security; Security Groups; Network Access Control List; VPC Flow Logs; VPC Access Control; Creating VPC; VPC Connectivity Options; Connecting User Network to AWS VPC; Connecting AWS VPC with Other AWS VPC; Connecting Internal User with AWS VPC; VPC Limits; VPC Best Practices; Plan Your VPC before You Create It; Choose the Highest CIDR Block; Unique IP Address Range; Leave the Default VPC Alone; Design for Region Expansion; Tier Your Subnets; Follow the Least Privilege Principle; Keep Most Resources in the Private Subnet.
|
505 |
8 |
|
|a Creating VPCs for Different Use CasesFavor Security Groups over NACLs; IAM Your VPC; Using VPC Peering; Using Elastic IP Instead of Public IP; Tagging in VPC; Monitoring a VPC; Summary; Assessments; Chapter 2: Data Security in AWS; Introduction; Encryption and Decryption Fundamentals; Envelope Encryption; Securing Data at Rest; Amazon S3; Permissions; Versioning; Replication; Server-Side Encryption; Client-Side Encryption; Amazon EBS; Replication; Backup; Encryption; Amazon RDS; Amazon Glacier; Amazon DynamoDB; Amazon EMR; Securing Data in Transit; Amazon S3; Amazon RDS; Amazon DynamoDB.
|
505 |
8 |
|
|a Amazon EMRAWS KMS; KMS Benefits; Fully Managed; Centralized Key Management; Integration with AWS Services; Secure and Compliant; KMS Components; Customer Master Key (CMK); Data Keys; Key Policies; Auditing CMK Usage; Key Management Infrastructure (KMI); AWS CloudHSM; CloudHSM Features; Generate and Use Encryption Keys Using HSMs; Pay as You Go Model; Easy to Manage; AWS CloudHSM Use Cases; Offload SSL/TLS Processing for Web Servers; Protect Private Keys for an Issuing Certificate Authority; Enable Transparent Data Encryption for Oracle Databases; Amazon Macie.
|
505 |
8 |
|
|a Data Discovery and ClassificationData Security; Summary; Assessments; Chapter 3: Securing Servers in AWS; EC2 Security Best Practices; EC2 Security; IAM Roles for EC2 Instances; Managing OS-Level Access to Amazon EC2 Instances; Protecting Your Instance from Malware; Secure Your Infrastructure; Intrusion Detection and Prevention Systems; Elastic Load Balancing Security; Building Threat Protection Layers; Testing Security; Amazon Inspector; Amazon Inspector Features and Benefits; Amazon Inspector Components; AWS Shield; AWS Shield Benefits; AWS Shield Features; Summary; Assessments.
|
500 |
|
|
|a Chapter 4: Securing Applications in AWS.
|
520 |
|
|
|a With organizations moving their workloads, applications, and infrastructure to the cloud at an unprecedented pace, security of all these resources has been a paradigm shift for all those who are responsible for security; experts, novices, and apprentices alike.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Web services.
|
650 |
|
0 |
|a Computer software
|x Development.
|
650 |
|
6 |
|a Services Web.
|
650 |
|
7 |
|a COMPUTERS
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer software
|x Development.
|2 fast
|0 (OCoLC)fst00872537
|
650 |
|
7 |
|a Web services.
|2 fast
|0 (OCoLC)fst01173242
|
776 |
0 |
8 |
|i Print version:
|a Anthony, Albert.
|t AWS: Security Best Practices on AWS.
|d Birmingham : Packt Publishing, ©2018
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1733803
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5322207
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1733803
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15224606
|
994 |
|
|
|a 92
|b IZTAP
|