Kapitel Öffentlich zugänglich

Preface

  • Aditya K. Sood
Weitere Titel anzeigen von Mercury Learning and Information
Empirical Cloud Security
Ein Kapitel aus dem Buch Empirical Cloud Security
© 2023 Walter de Gruyter GmbH, Berlin/Boston

© 2023 Walter de Gruyter GmbH, Berlin/Boston

Kapitel in diesem Buch

  1. Frontmatter i
  2. Contents vii
  3. Preface xxi
  4. About the Author xxvii
  5. Chapter 1: Cloud Architecture and Security Fundamentals 1
  6. Chapter 2: IAM for Authentication and Authorization: Security Assessment 29
  7. Chapter 3: Cloud Infrastructure: Network Security Assessment 79
  8. Chapter 4: Database and Storage Services: Security Assessment 145
  9. Chapter 5: Design and Analysis of Cryptography Controls: Security Assessment 181
  10. Chapter 6: Cloud Applications: Secure Code Review 219
  11. Chapter 7: Cloud Monitoring and Logging: Security Assessment 269
  12. Chapter 8: Privacy in the Cloud 299
  13. Chapter 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments 319
  14. Chapter 10: Malicious Code in the Cloud 355
  15. Chapter 11: Threat Intelligence and Malware Protection in the Cloud 385
  16. Appendix A: List of Serverless Computing Services 419
  17. Appendix B: List of Serverless Frameworks 421
  18. Appendix C: List of Saas, Paas, Iaas, and Faas Providers 423
  19. Appendix D: List of Containerized Services and Open Source Software 425
  20. Appendix E: List of Critical RDP Vulnerabilities 427
  21. Appendix F: List of Network Tools and Scripts 429
  22. Appendix G: List of Databases Default TCP/UDP Ports 431
  23. Appendix H: List of Database Assessment Tools, Commands, and Scripts 433
  24. Appendix I: List of CouchDB API Commands and Resources 435
  25. Appendix J: List of CQLSH Cassandra Database SQL Queries 437
  26. Appendix K: List of Elasticsearch Queries 439
  27. Appendix L: AWS Services CLI Commands 441
  28. Appendix M: List of Vault and Secret Managers 443
  29. Appendix N: List of TLS Security Vulnerabilities for Assessment 445
  30. Appendix O: List of Cloud Logging and Monitoring Services 447
  31. Appendix P: Enterprise Threat Intelligence Platforms 449
  32. Index 453
Heruntergeladen am 2.10.2025 von https://www.degruyterbrill.com/document/doi/10.1515/9781501517990-001/html
Button zum nach oben scrollen