logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Aws Allinone Security Guide Design Build Monitor And Manage A Fortified Application Ecosystem On Aws Adrin Mukherjee

  • SKU: BELL-37348500
Aws Allinone Security Guide Design Build Monitor And Manage A Fortified Application Ecosystem On Aws Adrin Mukherjee
$ 31.00 $ 45.00 (-31%)

0.0

0 reviews

Aws Allinone Security Guide Design Build Monitor And Manage A Fortified Application Ecosystem On Aws Adrin Mukherjee instant download after payment.

Publisher: BPB Publications
File Extension: EPUB
File size: 5.04 MB
Pages: 296
Author: Adrin Mukherjee
ISBN: 9789355510327, 9355510322
Language: English
Year: 2022

Product desciption

Aws Allinone Security Guide Design Build Monitor And Manage A Fortified Application Ecosystem On Aws Adrin Mukherjee by Adrin Mukherjee 9789355510327, 9355510322 instant download after payment.

Learn to build robust security controls for the infrastructure, data, and applications in the AWS Cloud.


Key Features

● Takes a comprehensive layered security approach that covers major use-cases.

● Covers key AWS security features leveraging the CLI and Management Console.

● Step-by-step instructions for all topics with graphical illustrations.

● Relevant code samples written in JavaScript (for Node.js runtime).


Description

If you're looking for a comprehensive guide to Amazon Web Services (AWS) security, this book is for you. With the help of this book, cloud professionals and the security team will learn how to protect their cloud infrastructure components and applications from external and internal threats.


The book uses a comprehensive layered security approach to look into the relevant AWS services in each layer and discusses how to use them. It begins with an overview of the cloud's shared responsibility model and how to effectively use the AWS Identity and Access Management (IAM) service to configure identities and access controls for various services and components. The subsequent chapter covers AWS infrastructure security, data security, and AWS application layer security. Finally, the concluding chapters introduce the various logging, monitoring, and auditing services available in AWS, and the book ends with a chapter on AWS security best practices.


By the end, as readers, you will gain the knowledge and skills necessary to make informed decisions and put in place security controls to create AWS application ecosystems that are highly secure.


What you will learn

● Learn to create a layered security architecture and employ defense in depth.

● Master AWS IAM and protect APIs.

● Use AWS WAF, AWS Secrets Manager, and AWS Systems Manager Parameter Store.

● Learn to secure data in Amazon S3, EBS, DynamoDB, and RDS using AWS Key Management Service.

● Secure Amazon VPC, filter IPs, use Amazon Inspector, use ECR image scans, etc.

● Protect cloud infrastructure from DDoS attacks and use AWS Shield.


Who this book is for

The book is intended for cloud architects and security professionals interested in delving deeper into the AWS cloud's security ecosystem and determining the optimal way to leverage AWS security features. Working knowledge of AWS and its core services is necessary.


Table of Contents

1. Introduction to Security in AWS

2. Identity And Access Management

3. Infrastructure Security

4. Data Security

5. Application Security

6. Logging, Monitoring, And Auditing

7. Security Best Practices

Related Products