|
|
|
|
LEADER |
00000cam a2200000M 4500 |
001 |
OR_on1142789487 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
200304s2020 xx o 000 0 eng d |
040 |
|
|
|a YDX
|b eng
|c YDX
|d OCLCQ
|d EBLCP
|d UKAHL
|d UKMGB
|d OCLCF
|d N$T
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBC037745
|2 bnb
|
016 |
7 |
|
|a 019739412
|2 Uk
|
019 |
|
|
|a 1145581881
|
020 |
|
|
|a 1838827420
|q (electronic bk.)
|
020 |
|
|
|a 9781838827427
|q (electronic bk.)
|
020 |
|
|
|z 9781838826253
|q (pbk.)
|
029 |
1 |
|
|a UKMGB
|b 019739412
|
035 |
|
|
|a (OCoLC)1142789487
|z (OCoLC)1145581881
|
037 |
|
|
|a 9781838827427
|b Packt Publishing
|
050 |
|
4 |
|a QA76.585
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a HEARTIN KANIKATHOTTU.
|
245 |
1 |
0 |
|a AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND COMPLIANCE WITH AWS
|
260 |
|
|
|a [Place of publication not identified]
|b PACKT Publishing,
|c 2020.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright and Credits -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Chapter 1: Managing AWS Accounts with IAM and Organizations -- Technical requirements -- Configuring IAM for a new account -- Getting ready -- How to do it ... -- Creating a billing alarm -- How it works ... -- There's more ... -- See also -- Creating IAM policies -- Getting ready -- How to do it ... -- Creating policies with the IAM visual editor -- Creating policies using the AWS CLI -- How it works ... -- There's more ... -- See also
|
505 |
8 |
|
|a Creating a master account for AWS Organizations -- Getting ready -- How to do it ... -- How it works ... -- There's more ... -- See also -- Creating a new account under an AWS Organization -- Getting ready -- How to do it ... -- Creating an account and OU from the CLI -- Creating and moving an account from the console -- How it works ... -- There's more ... -- See also -- Switching roles with AWS Organizations -- Getting ready -- How to do it ... -- Switching as an administrator -- Granting permission for a non-admin user to switch roles
|
505 |
8 |
|
|a Granting permission for a non-admin user to switch roles using the CLI -- How it works ... -- Switching roles between any two accounts -- There's more ... -- See also -- Chapter 2: Securing Data on S3 with Policies and Techniques -- Technical requirements -- Creating S3 access control lists -- Getting ready -- How to do it ... -- Granting READ ACLs for a bucket to everyone from the console -- Granting READ for AWS users using predefined groups from the CLI -- Granting public READ for an object with canned ACLs from the CLI -- How it works ... -- There's more ...
|
505 |
8 |
|
|a Comparing ACLs, bucket policies, and IAM policies -- See also -- Creating an S3 bucket policy -- Getting ready -- How to do it ... -- Bucket public access with a bucket policy from the console -- Bucket list access with a bucket policy from the CLI -- How it works ... -- There's more ... -- See also -- S3 cross-account access from the CLI -- Getting ready -- How to do it ... -- Uploading to a bucket in another account -- Uploading to a bucket in another account with a bucket policy -- How it works ... -- There's more ... -- See also -- S3 pre-signed URLs with an expiry time using the CLI and Python
|
505 |
8 |
|
|a Getting ready -- How to do it ... -- Generating a pre-signed URL from the CLI -- Generating a pre-signed URL using the Python SDK -- How it works ... -- There's more ... -- See also -- Encrypting data on S3 -- Getting ready -- How to do it ... -- Server-side encryption with S3-managed keys (SSE-S3) -- Server-side encryption with KMS-managed keys (SSE-KMS) -- Server-side encryption with customer-managed keys (SSE-C) -- How it works ... -- There's more ... -- See also -- Protecting data with versioning -- Getting ready -- How to do it ... -- How it works ... -- There's more ... -- See also
|
520 |
|
|
|a AWS Security Cookbook lists all the practical solutions to the common problems faced by individuals or organizations in securing their instances. Here readers will learn to troubleshoot security concerns and understand additional patterns and services for securing AWS infrastructure.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Amazon Web Services.
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Web services.
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Services Web.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Web services.
|2 fast
|0 (OCoLC)fst01173242
|
776 |
0 |
8 |
|i Print version:
|a Kanikathottu, Heartin.
|t AWS Security Cookbook : Practical Solutions for Managing Security Policies, Monitoring, Auditing, and Compliance with AWS.
|d Birmingham : Packt Publishing, Limited, ©2020
|z 9781838826253
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781838826253/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301130229
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0044924870
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6125406
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2382013
|
994 |
|
|
|a 92
|b IZTAP
|