• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Beginning AWS Security » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2952079]
• Literatura piękna
 [1850969]

  więcej...
• Turystyka
 [71058]
• Informatyka
 [151066]
• Komiksy
 [35579]
• Encyklopedie
 [23181]
• Dziecięca
 [620496]
• Hobby
 [139036]
• AudioBooki
 [1646]
• Literatura faktu
 [228729]
• Muzyka CD
 [379]
• Słowniki
 [2932]
• Inne
 [445708]
• Kalendarze
 [1409]
• Podręczniki
 [164793]
• Poradniki
 [480107]
• Religia
 [510956]
• Czasopisma
 [511]
• Sport
 [61267]
• Sztuka
 [243299]
• CD, DVD, Video
 [3411]
• Technologie
 [219640]
• Zdrowie
 [100984]
• Książkowe Klimaty
 [124]
• Zabawki
 [2281]
• Puzzle, gry
 [3363]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [8020]
Kategorie szczegółowe BISAC

Beginning AWS Security

ISBN-13: 9781484296806 / Angielski / Miękka / 2023

Tasha Penwell
Beginning AWS Security Tasha Penwell 9781484296806 Apress - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Beginning AWS Security

ISBN-13: 9781484296806 / Angielski / Miękka / 2023

Tasha Penwell
cena 133,12
(netto: 126,78 VAT:  5%)

Najniższa cena z 30 dni: 127,20
Termin realizacji zamówienia:
ok. 22 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!

Improve cloud security within your organization by leveraging AWS’s Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework.  This book will show you to use these tools to make the best decisions for securing your cloud environment.  You’ll start by understanding why security is important in the cloud and then review the relevant services offered to meet an organization’s needs. You’ll then move on to the finer points of building a secure architecture and take a deep look into the differences of responsibility of managed services and those that allow customers more control. With multiple AWS services available, organizations must weigh the tradeoffs between those that provide granular control (IaaS), a managed service (PaaS), delivering applications remotely over the internet instead of locally on machines (SaaS). This book will help you to identify the appropriate resources and show you how to implement them to meet an organization’s business, technical, and security perspective in the Cloud Adoption Framework. Finally, you'll see how organizations can launch a secure and optimized cloud architecture and use monitoring tools to be proactive in security measures.    With Beginning AWS Security, you'll understand frameworks, models, and the services needed to build a secure architecture.  You will:
  • Review the similarities and differences between cloud and traditional computing.
  • See how security changes when using on-site, hybrid, and cloud models
  • Develop an understanding that security is not “one and done” 
  • Reinforce the need for updates and monitoring as a continued part of AWS security
Who This Book Is For

Cloud computing architects, security professionals, security engineers, and software professionals interested in Cloud security.

Kategorie:
Informatyka
Kategorie BISAC:
Computers > Security - General
Computers > Distributed Systems - Cloud Computing
Wydawca:
Apress
Język:
Angielski
ISBN-13:
9781484296806
Rok wydania:
2023
Waga:
0.24 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

Chapter 1:  Why Do I Care About Security?  Isn’t that AWS’s problem?

Chapter Goal:  Identify why security is important in the cloud.
No of pages: 40 -50 pages
Sub -Topics
1. Introduce some real life security breaches and outcomes that have happened in the cloud.
2. Describe how AWS provides resources to build a cloud architecture but it’s important to understand the tradeoffs of each service.
3. Introduce the Shared Responsibility Model (covered more in Chapter 2)
4. Introduce the Well-Architected Framework (will be used as reference throughout the book)
5. Describe the similarities and differences between cloud and traditional computing.

Chapter 2:  Who is Responsible Again?
Chapter Goal: Develop an understanding of the Shared Responsibility Model and the tradeoffs of responsibilities based on services used.
No of pages: 40 -50
Sub - Topics
1.   Detailed overview of the Shared Responsibility Model
2.   Elaborate what is meant by “tradeoffs” and why understanding this is important.
3. Review of AWS’s security precautions 
4. Align how the Well-Architected Framework supports the Shared Responsibility Model
5. Describe the purpose and responsibilities for Identity and access management

Chapter 3: How Do I Build a Secure Architecture?
Chapter Goal: Dive deeper into the differences of responsibility of managed services and those that allow customers more control.  Identify tradeoffs on specific categories.
No of pages : 40 - 50
Sub - Topics:  
1. Identify and understand services, responsibilities, and tradeoffs for computing services.
2. Identify and understand services, responsibilities, and tradeoffs for storage services.
3.  Identify and understand services, responsibilities and tradeoffs for networking services.
4.  Identify and understand services, responsibilities and tradeoffs for database services.
6. Identify and understand services to protect data at rest and in transit.
7. Identify and understand services to monitor access and notifications.

Chapter 4:  Security is Not Built in a Day
Chapter Goal: Develop an understanding that security is not “one and done” and that updates and monitoring is a continued part of AWS security.
No of pages: 40 - 50
Sub - Topics: 
1. Identify and describe what it means to be proactive and reactive in security.
2. Identify and implement monitoring services into architecture 
3. Identify and understand the costs of the monitoring services
4. Identify how to make updates and patches to software - and who is responsible for what.

Chapter 5:  Is This the End?
Chapter Goal: Reinforce the need for lifelong learning.  Just as security is not a “one and done”, learning should be continuous as well.  
No of pages: 10 - 20
Sub - Topics: 
1. Identify resources available to continue learning from AWS (AWS Educate, AWS Academy, AWS Skillbuilder)
2. Identify resources available to continue learning from the publisher
3. A final review of the Shared Responsibility Model.
4. A final review of the Well-Architected Framework


Tasha Penwell is an AWS Educator, AWS Authorized Instructor, solutions architect, and community builder with a focus on security. In her career, she served as the computer science program manager for a community college in Ohio. Tasha has trained professionals on AWS, web development and data analytics. She is the founder and educator of Bytes and Bits, an organization that provides computer science education in Ohio and West Virginia. She is an active presenter and hosts computer science workshops on subjects like cloud computing at high schools around the country. 

Improve cloud security within your organization by leveraging AWS’s Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework.  This book will show you to use these tools to make the best decisions for securing your cloud environment. 

 

You’ll start by understanding why security is important in the cloud and then review the relevant services offered to meet an organization’s needs. You’ll then move on to the finer points of building a secure architecture and take a deep look into the differences of responsibility of managed services and those that allow customers more control.

 

With multiple AWS services available, organizations must weigh the tradeoffs between those that provide granular control (IaaS), a managed service (PaaS), delivering applications remotely over the internet instead of locally on machines (SaaS). This book will help you to identify the appropriate resources and show you how to implement them to meet an organization’s business, technical, and security perspective in the Cloud Adoption Framework. Finally, you'll see how organizations can launch a secure and optimized cloud architecture and use monitoring tools to be proactive in security measures.  

With Beginning AWS Security, you'll understand frameworks, models, and the services needed to build a secure architecture. 

You will:

  • Review the similarities and differences between cloud and traditional computing.
  • See how security changes when using on-site, hybrid, and cloud models
  • Develop an understanding that security is not “one and done” 
  • Reinforce the need for updates and monitoring as a continued part of AWS security



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia