Empirical Cloud Security
eBook - ePub

Empirical Cloud Security

Practical Intelligence to Evaluate Risks and Attacks

Aditya K. Sood

  1. 500 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Empirical Cloud Security

Practical Intelligence to Evaluate Risks and Attacks

Aditya K. Sood

Book details
Table of contents
Citations

About This Book

The book discusses the security and privacy issues detected during penetration testing, security assessments, configuration reviews, malware analysis, and independent research of the cloud infrastructure and Software-as-a-Service (SaaS) applications. The book highlights hands-on technical approaches on how to detect the security issues based on the intelligence gathered from the real world case studies and also discusses the recommendations to fix the security issues effectively. This book is not about general theoretical discussion rather emphasis is laid on the cloud security concepts and how to assess and fix them practically.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Empirical Cloud Security an online PDF/ePUB?
Yes, you can access Empirical Cloud Security by Aditya K. Sood in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

Table of contents

  1. Cover
  2. Halftitle
  3. Title
  4. Copyright
  5. Dedication
  6. Contents
  7. Preface
  8. About the Author
  9. Chapter 1: Cloud Architecture and Security Fundamentals
  10. Chapter 2: IAM for Authentication and Authorization: Security Assessment
  11. Chapter 3: Cloud Infrastructure: Network Security Assessment
  12. Chapter 4: Database and Storage Services: Security Assessment
  13. Chapter 5: Design and Analysis of Cryptography Controls: Security Assessment
  14. Chapter 6: Cloud Applications: Secure Code Review
  15. Chapter 7: Cloud Monitoring and Logging: Security Assessment
  16. Chapter 8: Privacy in the Cloud
  17. Chapter 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments
  18. Chapter 10: Malicious Code in the Cloud
  19. Chapter 11: Threat Intelligence and Malware Protection in the Cloud
  20. Appendix A: List of Serverless Computing Services
  21. Appendix B: List of Serverless Frameworks
  22. Appendix C: List of SaaS, PaaS, IaaS, and FaaS Providers
  23. Appendix D: List of Containerized Services and Open Source Software
  24. Appendix E: List of Critical RDP Vulnerabilities
  25. Appendix F: List of Network Tools and Scripts
  26. Appendix G: List of Databases Default TCP/UDP Ports
  27. Appendix H: List of Database Assessment Tools, Commands, and Scripts
  28. Appendix I: List of CouchDb API Commands and Resources
  29. Appendix J: List of CQLSH Cassandra Database SQL Queries
  30. Appendix K: List of Elasticsearch Queries
  31. Appendix L: AWS Services CLI Commands
  32. Appendix M: List of Vault and Secret Managers
  33. Appendix N: List of TLS Security Vulnerabilities for Assessment
  34. Appendix O: List of Cloud Logging and Monitoring Services
  35. Appendix P: Enterprise Threat Intelligence Platforms
  36. Index