Cargando…

AWS : Learn to secure your data, servers, and applications with AWS.

With organizations moving their workloads, applications, and infrastructure to the cloud at an unprecedented pace, security of all these resources has been a paradigm shift for all those who are responsible for security; experts, novices, and apprentices alike.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Anthony, Albert
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBSCO_on1029497365
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|---|||||
008 180324s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d MERUC  |d YDX  |d OCLCQ  |d IDB  |d OCLCF  |d OCLCO  |d TEFOD  |d OCLCQ  |d LVT  |d N$T  |d OCLCQ  |d OCLCO  |d NZAUC  |d OCLCQ 
019 |a 1029322020  |a 1029444938  |a 1029471053 
020 |a 9781789137637  |q (electronic bk.) 
020 |a 1789137632  |q (electronic bk.) 
029 1 |a AU@  |b 000067026671 
035 |a (OCoLC)1029497365  |z (OCoLC)1029322020  |z (OCoLC)1029444938  |z (OCoLC)1029471053 
037 |a 59A8A4D1-602A-41CB-9A66-0D60F67835BE  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.88813  |b .A584 2018eb 
072 7 |a COM  |x 000000  |2 bisacsh 
082 0 4 |a 006.76  |2 23 
049 |a UAMI 
100 1 |a Anthony, Albert. 
245 1 0 |a AWS :  |b Learn to secure your data, servers, and applications with AWS. 
260 |a Birmingham :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (119 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Copyright; Credits; Table of Contents; Preface; Chapter 1: AWS Virtual Private Cloud; Introduction; VPC Components; Subnets; Elastic Network Interfaces (ENI); Route Tables; Internet Gateway; Elastic IP Addresses; VPC Endpoints; Network Address Translation (NAT); VPC Peering; VPC Features and Benefits; Multiple Connectivity Options; Secure; Simple; VPC Use Cases; Hosting a Public Facing Website; Hosting Multi-Tier Web Application; Creating Branch Office and Business Unit Networks; Hosting Web Applications in the AWS Cloud That Are Connected with Your Data Center. 
505 8 |a Extending Corporate Network in AWS CloudDisaster Recovery; VPC Security; Security Groups; Network Access Control List; VPC Flow Logs; VPC Access Control; Creating VPC; VPC Connectivity Options; Connecting User Network to AWS VPC; Connecting AWS VPC with Other AWS VPC; Connecting Internal User with AWS VPC; VPC Limits; VPC Best Practices; Plan Your VPC before You Create It; Choose the Highest CIDR Block; Unique IP Address Range; Leave the Default VPC Alone; Design for Region Expansion; Tier Your Subnets; Follow the Least Privilege Principle; Keep Most Resources in the Private Subnet. 
505 8 |a Creating VPCs for Different Use CasesFavor Security Groups over NACLs; IAM Your VPC; Using VPC Peering; Using Elastic IP Instead of Public IP; Tagging in VPC; Monitoring a VPC; Summary; Assessments; Chapter 2: Data Security in AWS; Introduction; Encryption and Decryption Fundamentals; Envelope Encryption; Securing Data at Rest; Amazon S3; Permissions; Versioning; Replication; Server-Side Encryption; Client-Side Encryption; Amazon EBS; Replication; Backup; Encryption; Amazon RDS; Amazon Glacier; Amazon DynamoDB; Amazon EMR; Securing Data in Transit; Amazon S3; Amazon RDS; Amazon DynamoDB. 
505 8 |a Amazon EMRAWS KMS; KMS Benefits; Fully Managed; Centralized Key Management; Integration with AWS Services; Secure and Compliant; KMS Components; Customer Master Key (CMK); Data Keys; Key Policies; Auditing CMK Usage; Key Management Infrastructure (KMI); AWS CloudHSM; CloudHSM Features; Generate and Use Encryption Keys Using HSMs; Pay as You Go Model; Easy to Manage; AWS CloudHSM Use Cases; Offload SSL/TLS Processing for Web Servers; Protect Private Keys for an Issuing Certificate Authority; Enable Transparent Data Encryption for Oracle Databases; Amazon Macie. 
505 8 |a Data Discovery and ClassificationData Security; Summary; Assessments; Chapter 3: Securing Servers in AWS; EC2 Security Best Practices; EC2 Security; IAM Roles for EC2 Instances; Managing OS-Level Access to Amazon EC2 Instances; Protecting Your Instance from Malware; Secure Your Infrastructure; Intrusion Detection and Prevention Systems; Elastic Load Balancing Security; Building Threat Protection Layers; Testing Security; Amazon Inspector; Amazon Inspector Features and Benefits; Amazon Inspector Components; AWS Shield; AWS Shield Benefits; AWS Shield Features; Summary; Assessments. 
500 |a Chapter 4: Securing Applications in AWS. 
520 |a With organizations moving their workloads, applications, and infrastructure to the cloud at an unprecedented pace, security of all these resources has been a paradigm shift for all those who are responsible for security; experts, novices, and apprentices alike. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Web services. 
650 0 |a Computer software  |x Development. 
650 6 |a Services Web. 
650 7 |a COMPUTERS  |x General.  |2 bisacsh 
650 7 |a Computer software  |x Development.  |2 fast  |0 (OCoLC)fst00872537 
650 7 |a Web services.  |2 fast  |0 (OCoLC)fst01173242 
776 0 8 |i Print version:  |a Anthony, Albert.  |t AWS: Security Best Practices on AWS.  |d Birmingham : Packt Publishing, ©2018 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1733803  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5322207 
938 |a EBSCOhost  |b EBSC  |n 1733803 
938 |a YBP Library Services  |b YANK  |n 15224606 
994 |a 92  |b IZTAP