Loading…

Beginning AWS security build secure, effective, and efficient AWS architecture /

Improve cloud security within your organization by leveraging AWSs Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework. This book will show you to use these tools to make the best decisions for securing your cloud environment. Youll start by understanding why se...

Full description

Saved in:
Bibliographic Details
Main Author: Penwell, Tasha (Author)
Corporate Author: SpringerLink (Online service)
Format: eBook
Language:English
Published: [New York] : Apress, [2023]
Physical Description:
1 online resource (90 pages) : illustrations (black and white, and color)
Subjects:
Online Access:SpringerLink - Click here for access

MARC

LEADER 00000cam a22000007i 4500
001 on1397339026
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 230915s2023 nyu o 001 0 eng d
019 |a 1395947239  |a 1396064292  |a 1396910353 
020 |a 1484296818  |q electronic book 
020 |a 9781484296813  |q (electronic bk.) 
020 |z 9781484296806 
020 |z 148429680X 
024 7 |a 10.1007/978-1-4842-9681-3  |2 doi 
035 |a (OCoLC)1397339026  |z (OCoLC)1395947239  |z (OCoLC)1396064292  |z (OCoLC)1396910353 
037 |a 9781484296813  |b O'Reilly Media 
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d EBLCP  |d YDX  |d QGK  |d ORMDA  |d OCLCO  |d YDX  |d UKAHL  |d N$T  |d OCLCF 
049 |a COM6 
050 4 |a QA76.585  |b .P46 2023 
072 7 |a UTC  |2 bicssc 
072 7 |a COM000000  |2 bisacsh 
072 7 |a UTC  |2 thema 
082 0 4 |a 005.8  |2 23/eng/20230915 
100 1 |a Penwell, Tasha,  |e author. 
245 1 0 |a Beginning AWS security :  |b build secure, effective, and efficient AWS architecture /  |c Tasha Penwell. 
264 1 |a [New York] :  |b Apress,  |c [2023] 
300 |a 1 online resource (90 pages) :  |b illustrations (black and white, and color) 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
505 0 |a Chapter 1: Why Do I Care About Security? Isnt That AWSs Problem -- Chapter 2: Who is Responsible Again -- Chapter 3: How Do I Build a Secure Architecture -- Chapter 4: Security is Not Built in a Day -- Chapter 5: Is This the End. 
520 |a Improve cloud security within your organization by leveraging AWSs Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework. This book will show you to use these tools to make the best decisions for securing your cloud environment. Youll start by understanding why security is important in the cloud and then review the relevant services offered to meet an organizations needs. Youll then move on to the finer points of building a secure architecture and take a deep look into the differences of responsibility of managed services and those that allow customers more control. With multiple AWS services available, organizations must weigh the tradeoffs between those that provide granular control (IaaS), a managed service (PaaS), delivering applications remotely over the internet instead of locally on machines (SaaS). This book will help you to identify the appropriate resources and show you how to implement them to meet an organizations business, technical, and security perspective in the Cloud Adoption Framework. Finally, you'll see how organizations can launch a secure and optimized cloud architecture and use monitoring tools to be proactive in security measures. With Beginning AWS Security, you'll understand frameworks, models, and the services needed to build a secure architecture. You will: Review the similarities and differences between cloud and traditional computing. See how security changes when using on-site, hybrid, and cloud models Develop an understanding that security is not one and done Reinforce the need for updates and monitoring as a continued part of AWS security. 
500 |a Includes index. 
588 |a Description based on online resource; title from digital title page (viewed on October 06, 2023). 
610 2 0 |a Amazon Web Services (Firm)  |0 https://id.loc.gov/authorities/names/no2015140713. 
610 2 7 |a Amazon Web Services (Firm)  |2 fast  |0 (OCoLC)fst01974501. 
650 0 |a Cloud computing  |0 https://id.loc.gov/authorities/subjects/sh2008004883  |x Security measures.  |0 https://id.loc.gov/authorities/subjects/sh99005297. 
650 0 |a Service-oriented architecture (Computer science)  |0 https://id.loc.gov/authorities/subjects/sh2008008368. 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 6 |a Architecture orientée service (Informatique) 
650 7 |a Cloud computing  |x Security measures.  |2 fast  |0 (OCoLC)fst02061555. 
650 7 |a Service-oriented architecture (Computer science)  |2 fast  |0 (OCoLC)fst01746814. 
710 2 |a SpringerLink (Online service)  |0 https://id.loc.gov/authorities/names/no2005046756. 
776 0 8 |i Print version:  |a PENWELL, TASHA.  |t BEGINNING AWS SECURITY.  |d [Place of publication not identified] : APRESS, 2023  |z 148429680X  |w (OCoLC)1384412568. 
907 |a .b67093012  |b multi  |c -  |d 231002  |e 240701 
998 |a (2)cue  |a cu  |b 240404  |c m  |d z   |e -  |f eng  |g nyu  |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.04 
948 |a MARCIVE Overnight, in 2023.11 
933 |a Marcive found issue: "100 1   |a Penwell, Tasha,  |e author." 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.04 
995 |a Loaded with m2btab.elec in 2024.04 
995 |a Loaded with m2btab.ltiac in 2023.11 
995 |a Loaded with m2btab.elec in 2023.10 
995 |a Loaded with m2btab.auth in 2023.11 
995 |a Loaded with m2btab.auth in 2024.06 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240404  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i151630975  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-1-4842-9681-3  |3 SpringerLink  |z Click here for access