Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud /
Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these fundamentals in all aspects of serverless computing: improving the code, securing the application, and protecting the infrastructur...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[Berkeley, CA] :
Apress,
[2020]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Chapter 1: Introduction to Cloud Computing Security
- Chapter 2: Performing a Risk Assessment
- Chapter 3: Securing the Code
- Chapter 4: Securing Interfaces
- Chapter 5: Configuring the Application Stack
- Chapter 6: Restricting Permissions
- Part IV: Monitoring and Alerting
- Chapter 7: Account Management
- Chapter 8: Secrets Management
- Chapter 9: Authentication and Authorization
- Chapter 10: Monitoring Security Events
- Chapter 10: Protecting Sensitive Data
- Chapter 11: Monitoring, Auditing, and Alerting
- Chapter 12: Additional Considerations
- Chapter 13: Finalizing the Risk Assessment.
- Appendix A: List of Acronyms
- Appendix B: Set Up Instructions
- Appendix C: Exercises Review.