Empirical Cloud Security
eBook - ePub

Empirical Cloud Security

Practical Intelligence to Evaluate Risks and Attacks

  1. 500 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Empirical Cloud Security

Practical Intelligence to Evaluate Risks and Attacks

About this book

The second edition of the book has been updated with the latest research and developments in the field of cloud security. The content has been refined and streamlined to make it more accessible and engaging for readers. The book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combatthreats, attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hands-on assessment techniques based on real-world studies, and concluding with recommendations including best practices. FEATURES:

  • Updated with the latest research and developments in the field of cloud security
  • Includes practical strategies for assessing the security and privacy of your cloud infrastructure and applications
  • Covers topics such as cloud architecture and security fundamentals, database and storage security, data privacy, security and risk assessments, controls related to continuous monitoring, and more
  • Presents new case studies revealing how threat actors abuse and exploit cloud environments to spread malware and includes preventative measures

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Empirical Cloud Security by Aditya K. Sood in PDF and/or ePUB format, as well as other popular books in Computer Science & Cloud Computing. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Cover
  2. Halftitle
  3. Title
  4. Copyright
  5. Dedication
  6. Contents
  7. Preface
  8. About the Author
  9. Chapter 1: Cloud Architecture and Security Fundamentals
  10. Chapter 2: IAM for Authentication and Authorization: Security Assessment
  11. Chapter 3: Cloud Infrastructure: Network Security Assessment
  12. Chapter 4: Database and Storage Services: Security Assessment
  13. Chapter 5: Design and Analysis of Cryptography Controls: Security Assessment
  14. Chapter 6: Cloud Applications: Secure Code Review
  15. Chapter 7: Cloud Monitoring and Logging: Security Assessment
  16. Chapter 8: Privacy in the Cloud
  17. Chapter 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments
  18. Chapter 10: Malicious Code in the Cloud
  19. Chapter 11: Threat Intelligence and Malware Protection in the Cloud
  20. Appendix A: List of Serverless Computing Services
  21. Appendix B: List of Serverless Frameworks
  22. Appendix C: List of SaaS, PaaS, IaaS, and FaaS Providers
  23. Appendix D: List of Containerized Services and Open Source Software
  24. Appendix E: List of Critical RDP Vulnerabilities
  25. Appendix F: List of Network Tools and Scripts
  26. Appendix G: List of Databases Default TCP/UDP Ports
  27. Appendix H: List of Database Assessment Tools, Commands, and Scripts
  28. Appendix I: List of CouchDb API Commands and Resources
  29. Appendix J: List of CQLSH Cassandra Database SQL Queries
  30. Appendix K: List of Elasticsearch Queries
  31. Appendix L: AWS Services CLI Commands
  32. Appendix M: List of Vault and Secret Managers
  33. Appendix N: List of TLS Security Vulnerabilities for Assessment
  34. Appendix O: List of Cloud Logging and Monitoring Services
  35. Appendix P: Enterprise Threat Intelligence Platforms
  36. Index