Електронні книги
2673
Eлектронна книга

AWS: Security Best Practices on AWS. Learn to secure your data, servers, and applications with AWS

Albert Anthony

With organizations moving their workloads, applications, and infrastructure to the cloud at an unprecedented pace, security of all these resources has been a paradigm shift for all those who are responsible for security; experts, novices, and apprentices alike.This book focuses on using native AWS security features and managed AWS services to help you achieve continuous security. Starting with an introduction to Virtual Private Cloud (VPC) to secure your AWS VPC, you will quickly explore various components that make up VPC such as subnets, security groups, various gateways, and many more.You will also learn to protect data in the AWS platform for various AWS services by encrypting and decrypting data in AWS. You will also learn to secure web and mobile applications in AWS cloud.This book is ideal for all IT professionals, system administrators, security analysts, solution architects, and chief information security officers who are responsible for securing workloads in AWS for their organizations.This book is embedded with useful assessments that will help you revise the concepts you have learned in this book. This book is repurposed for this specific learning experience from material from Packt's Mastering AWS Security, written by Albert Anthony.

2674
Eлектронна книга

AWS Security Cookbook. Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS

Heartin Kanikathottu

As a security consultant, securing your infrastructure by implementing policies and following best practices is critical. This cookbook discusses practical solutions to the most common problems related to safeguarding infrastructure, covering services and features within AWS that can help you implement security models such as the CIA triad (confidentiality, integrity, and availability), and the AAA triad (authentication, authorization, and availability), along with non-repudiation.The book begins with IAM and S3 policies and later gets you up to speed with data security, application security, monitoring, and compliance. This includes everything from using firewalls and load balancers to secure endpoints, to leveraging Cognito for managing users and authentication. Over the course of this book, you'll learn to use AWS security services such as Config for monitoring, as well as maintain compliance with GuardDuty, Macie, and Inspector. Finally, the book covers cloud security best practices and demonstrates how you can integrate additional security services such as Glacier Vault Lock and Security Hub to further strengthen your infrastructure.By the end of this book, you'll be well versed in the techniques required for securing AWS deployments, along with having the knowledge to prepare for the AWS Certified Security – Specialty certification.

2675
Eлектронна книга

AWS Security Cookbook. Practical solutions for securing AWS cloud infrastructure with essential services and best practices - Second Edition

Heartin Kanikathottu

As a security consultant, implementing policies and best practices to secure your infrastructure is critical. This cookbook discusses practical solutions for safeguarding infrastructure, covering services and features within AWS that help implement security models, such as the CIA triad (confidentiality, integrity, and availability) and the AAA triad (authentication, authorization, and accounting), as well as non-repudiation.This updated second edition starts with the fundamentals of AWS accounts and organizations. The book then guides you through identity and access management, data protection, network security, and encryption. You’ll explore critical topics such as securing EC2 instances, managing keys with KMS and CloudHSM, and implementing endpoint security. Additionally, you’ll learn to monitor your environment using CloudWatch, CloudTrail, and AWS Config, while maintaining compliance with services such as GuardDuty, Macie, and Inspector. Each chapter presents practical recipes for real-world scenarios, allowing you to apply security concepts.By the end of this book, you’ll be well versed in techniques required for securing AWS deployments and be prepared to gain the AWS Certified Security – Specialty certification.

2676
Eлектронна книга

AWS SysOps Cookbook. Practical recipes to build, automate, and manage your AWS-based cloud environments - Second Edition

Eric Z. Beard, Rowan Udell, Lucas Chan

AWS is an on-demand remote computing service providing cloud infrastructure over the internet with storage, bandwidth, and customized support for APIs. This updated second edition will help you implement these services and efficiently administer your AWS environment.You will start with the AWS fundamentals and then understand how to manage multiple accounts before setting up consolidated billing. The book will assist you in setting up reliable and fast hosting for static websites, sharing data between running instances and backing up data for compliance. By understanding how to use compute service, you will also discover how to achieve quick and consistent instance provisioning. You’ll then learn to provision storage volumes and autoscale an app server. Next, you’ll explore serverless development with AWS Lambda, and gain insights into using networking and database services such as Amazon Neptune. The later chapters will focus on management tools like AWS CloudFormation, and how to secure your cloud resources and estimate costs for your infrastructure. Finally, you’ll use the AWS well-architected framework to conduct a technology baseline review self-assessment and identify critical areas for improvement in the management and operation of your cloud-based workloads.By the end of this book, you’ll have the skills to effectively administer your AWS environment.

2677
Eлектронна книга

AWS Tools for PowerShell 6. Administrate, maintain, and automate your infrastructure with ease

Ramesh Waghmare

AWS Tools for PowerShell 6 shows you exactly how to automate all the aspects of AWS. You can take advantage of the amazing power of the cloud, yet add powerful scripts and mechanisms to perform common tasks faster than ever before.This book expands on the Amazon documentation with real-world, useful examples and production-ready scripts to automate all the aspects of your new cloud platform. It will cover topics such as managing Windows with PowerShell, setting up security services, administering database services, and deploying and managing networking. You will also explore advanced topics such as PowerShell authoring techniques, and configuring and managing storage and content delivery.By the end of this book, you will be able to use Amazon Web Services to automate and manage Windows servers. You will also have gained a good understanding of automating the AWS infrastructure using simple coding.

2678
Eлектронна книга

Axure RP 6 Prototyping Essentials. Creating highly compelling, interactive prototypes with Axure that will impress and excite decision makers with this book and

Ezra Schwartz

Wireframes, interactive prototypes, and UX specifications are among the fundamental deliverables of every UX project. They are also the most labor and time intensive to produce due to constant changes in business requirements. Given these circumstances, Axure is quickly taking over as the preferred tool for prototyping. However, prototyping in Axure is strikingly different from the conventional method of producing static wireframes and to rapidly develop interactive prototypes in Axure, you'll need to have a good understanding of the tool and its features.Whether you are an individual practitioner or a member of a UX team, a consultant, or an employee, this book will teach you how to use Axure, one of the leading UX tools. You will learn to use Axure for producing top-quality deliverables and tackling the demands of rapid iterative UX projects of any complexity and size, and for any platform and device.Axure RP 6 Prototyping Essentials takes a very pragmatic approach to showing you how to use Axure and produce impressive deliverables while saving labor and time. You may not be in a position to change how projects are scheduled, budgeted, and managed, but you can be more creative and productive by mastering one of the leading UX tools in the market.After an initial introduction to Axure's user interface, terminology, and features, this book walks you through a medium-size UX project: a digital library that sells books, newspapers, and movies. Although some aspects of the prototyping process are simplified for the sake of clarity and efficiency, the demo project is an opportunity to discuss in context and in sequence topics such as addressing business and technical requirements, handling use cases and flow diagrams, low and high fidelity wireframe construction, interactivity, writing annotations, generating detailed UX specifications, and traceability.For the most part, Axure 6 RP Prototyping Essentials can be read in sequence or used as a reference guide.

2679
Eлектронна книга

Ayesha. The Return of She

H. Rider Haggard

This is a story about the beautiful and immortal Ayesha. The expedition is sent to an unexplored part of Africa, where the group finds Ayesha, who claims the expeditions leader is the reincarnation of her long-dead beloved. Ayesha became ageless and absolutely beautiful over 2 thousand years ago, plunging into a magical fire. Her only desire is to reunite with her beloved man. She makes the expedition leader to immerse himself as well.

2680
Eлектронна книга

Azbest w budynkach

Andrzej Obmiński

Praca składa się z trzech części, w których omówiono miejsca występowania wyrobów zawierających azbest w obiektach budowlanych, ocenę zagrożeń, jakie one powodują w przypadku eksploatacji i usuwania oraz praktyczne zalecenia dotyczące usuwania wyrobów zewnętrznych. Autor postawił następujące tezy w swej pracy: • Wyroby i budynki z azbestem powinny być charakteryzowane przez wielkość mierzalnego zanieczyszczenia powietrza w postaci pyłów respirabilnych azbestu, uwalnianych do wnętrza budynku. • Wyroby zwierające azbest użyte w budownictwie ogólnym są bardziej rozpowszechnione i zróżnicowane niż wynika to z raportów gromadzonych w bazie azbestowej, w której uwzględniono głównie wyroby najbardziej typowe, łatwo rozpoznawalne, znajdujące się na zewnątrz budynków (w elewacji i pokryciach dachowych). • Ocena wyrobów z azbestem, przedstawiana w formularzach „Oceny stanu i możliwości bezpiecznego użytkowania wyrobów zawierających azbest” (w skrócie „Ocena”), przygotowywana bez wiedzy eksperckiej, jest mało przydatna do realnego kwalifikowania zagrożenia użytkowników (punktacje „Oceny” i stopień pilności działań naprawczych często nie odzwierciedlają realnego zagrożenia). Wpływa to na zbyt pochopne decyzje o usunięciu wyrobów, które nierzadko prowadzone są w sposób pobieżny, bez należytego przygotowania budynku i wykonawców. • W odniesieniu do wyrobów widocznych kwalifikacje „Oceny” są uznaniowe, ich poprawność zależna jest od kompetencji wykonującego oględziny i przygotowującego formularz. W odniesieniu do wyrobów zasłoniętych, niedostępnych do oględzin, takich jak płyty azbestowo-cementowe wewnątrz ścian warstwowych, nie są one wiarygodne i wymagałyby weryfikacji przez wykonanie odkrywek lub/i badań powietrza do stwierdzenia wykluczenia obecności pyłu azbestu w powietrzu wewnętrznym. • Wyniki „Oceny” mogą znacząco odbiegać od stwierdzanego w badaniach stężenia pyłów azbestu w powietrzu, stanowiącego realne zagrożenie zdrowotne dla użytkowników obiektów. Istnieje więc potrzeba weryfikacji „Oceny” i wdrażania do stosowania wynikających z nich zaleceń – o ile są one poprawnie przygotowane i potwierdzone wynikami badań powietrza. • Zachodzi potrzeba prawidłowej oceny zagrożenia i dopasowania do niego planów eliminacji azbestu oraz zasad kontroli specjalistycznych prac usuwania azbestu z budynków.