語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Beginning AWS security = build secure, effective, and efficient AWS architecture /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Beginning AWS security/ by Tasha Penwell.
其他題名:
build secure, effective, and efficient AWS architecture /
作者:
Penwell, Tasha.
出版者:
Berkeley, CA :Apress : : 2023.,
面頁冊數:
x, 142 p. :ill., digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Data and Information Security. -
電子資源:
https://doi.org/10.1007/978-1-4842-9681-3
ISBN:
9781484296813
Beginning AWS security = build secure, effective, and efficient AWS architecture /
Penwell, Tasha.
Beginning AWS security
build secure, effective, and efficient AWS architecture /[electronic resource] :by Tasha Penwell. - Berkeley, CA :Apress :2023. - x, 142 p. :ill., digital ;24 cm.
Chapter 1: Why Do I Care About Security? Isn't That AWS's Problem -- Chapter 2: Who is Responsible Again -- Chapter 3: How Do I Build a Secure Architecture -- Chapter 4: Security is Not Built in a Day -- Chapter 5: Is This the End.
Improve cloud security within your organization by leveraging AWS's Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework. This book will show you to use these tools to make the best decisions for securing your cloud environment. You'll start by understanding why security is important in the cloud and then review the relevant services offered to meet an organization's needs. You'll then move on to the finer points of building a secure architecture and take a deep look into the differences of responsibility of managed services and those that allow customers more control. With multiple AWS services available, organizations must weigh the tradeoffs between those that provide granular control (IaaS), a managed service (PaaS), delivering applications remotely over the internet instead of locally on machines (SaaS) This book will help you to identify the appropriate resources and show you how to implement them to meet an organization's business, technical, and security perspective in the Cloud Adoption Framework. Finally, you'll see how organizations can launch a secure and optimized cloud architecture and use monitoring tools to be proactive in security measures. With Beginning AWS Security, you'll understand frameworks, models, and the services needed to build a secure architecture. You will: Review the similarities and differences between cloud and traditional computing. See how security changes when using on-site, hybrid, and cloud models Develop an understanding that security is not "one and done" Reinforce the need for updates and monitoring as a continued part of AWS security.
ISBN: 9781484296813
Standard No.: 10.1007/978-1-4842-9681-3doiSubjects--Corporate Names:
1142271
Amazon Web Services (Firm)
Subjects--Topical Terms:
1365785
Data and Information Security.
LC Class. No.: QA76.585
Dewey Class. No.: 005.8
Beginning AWS security = build secure, effective, and efficient AWS architecture /
LDR
:02884nam a2200325 a 4500
001
1116467
003
DE-He213
005
20230830151747.0
006
m d
007
cr nn 008maaau
008
240123s2023 cau s 0 eng d
020
$a
9781484296813
$q
(electronic bk.)
020
$a
9781484296806
$q
(paper)
024
7
$a
10.1007/978-1-4842-9681-3
$2
doi
035
$a
978-1-4842-9681-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.585
072
7
$a
UTC
$2
bicssc
072
7
$a
COM000000
$2
bisacsh
072
7
$a
UTC
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.585
$b
.P419 2023
100
1
$a
Penwell, Tasha.
$3
1429771
245
1 0
$a
Beginning AWS security
$h
[electronic resource] :
$b
build secure, effective, and efficient AWS architecture /
$c
by Tasha Penwell.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2023.
300
$a
x, 142 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Why Do I Care About Security? Isn't That AWS's Problem -- Chapter 2: Who is Responsible Again -- Chapter 3: How Do I Build a Secure Architecture -- Chapter 4: Security is Not Built in a Day -- Chapter 5: Is This the End.
520
$a
Improve cloud security within your organization by leveraging AWS's Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework. This book will show you to use these tools to make the best decisions for securing your cloud environment. You'll start by understanding why security is important in the cloud and then review the relevant services offered to meet an organization's needs. You'll then move on to the finer points of building a secure architecture and take a deep look into the differences of responsibility of managed services and those that allow customers more control. With multiple AWS services available, organizations must weigh the tradeoffs between those that provide granular control (IaaS), a managed service (PaaS), delivering applications remotely over the internet instead of locally on machines (SaaS) This book will help you to identify the appropriate resources and show you how to implement them to meet an organization's business, technical, and security perspective in the Cloud Adoption Framework. Finally, you'll see how organizations can launch a secure and optimized cloud architecture and use monitoring tools to be proactive in security measures. With Beginning AWS Security, you'll understand frameworks, models, and the services needed to build a secure architecture. You will: Review the similarities and differences between cloud and traditional computing. See how security changes when using on-site, hybrid, and cloud models Develop an understanding that security is not "one and done" Reinforce the need for updates and monitoring as a continued part of AWS security.
610
2 0
$a
Amazon Web Services (Firm)
$3
1142271
650
2 4
$a
Data and Information Security.
$3
1365785
650
1 4
$a
Cloud Computing.
$3
995022
650
0
$a
Service-oriented architecture (Computer science)
$3
720704
650
0
$a
Cloud computing
$x
Security measures.
$3
775821
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-9681-3
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入