Bis zu 50 % günstiger als neu 3 Jahre rebuy Garantie Professionelles Refurbishment
ElektronikMedien
Tipps & News
AppleAlle anzeigen
TabletsAlle anzeigen
HandyAlle anzeigen
Fairphone
AppleAlle anzeigen
iPhone Air Generation
GoogleAlle anzeigen
Pixel Fold
HonorAlle anzeigen
HuaweiAlle anzeigen
Honor SerieY-Serie
NothingAlle anzeigen
OnePlusAlle anzeigen
OnePlus 11 GenerationOnePlus 12 Generation
SamsungAlle anzeigen
Galaxy XcoverWeitere Modelle
SonyAlle anzeigen
Weitere Modelle
XiaomiAlle anzeigen
Weitere Modelle
Tablets & eBook ReaderAlle anzeigen
Google
AppleAlle anzeigen
HuaweiAlle anzeigen
MatePad Pro Serie
MicrosoftAlle anzeigen
XiaomiAlle anzeigen
Kameras & ZubehörAlle anzeigen
ObjektiveAlle anzeigen
System & SpiegelreflexAlle anzeigen
WearablesAlle anzeigen
Fitness TrackerAlle anzeigen
SmartwatchesAlle anzeigen
Xiaomi
Konsolen & ZubehörAlle anzeigen
Lenovo Legion GoMSI Claw
NintendoAlle anzeigen
Nintendo Switch Lite
PlayStationAlle anzeigen
XboxAlle anzeigen
Audio & HiFiAlle anzeigen
KopfhörerAlle anzeigen
FairphoneGoogle
LautsprecherAlle anzeigen
Beats by Dr. DreGoogleYamahatonies
iPodAlle anzeigen

Handgeprüfte Gebrauchtware

Bis zu 50 % günstiger als neu

Der Umwelt zuliebe

Cybersecurity with AWS

Syed Rehan (Broschiert, Englisch)

Keine Bewertungen vorhanden
Optischer Zustand
Beschreibung
Learn the most important topics in securing AWS environments through a strategic combination of fundamental principles, real-case studies, and hands-on practice to battle new generations of cyber-attacks. The book offers a definitive guide to AWS cybersecurity, ranging from identity and access management, Zero Trust architecture, and cloud threat intelligence through advanced detection methods, forensics, and incident response strategies. We start with a deep dive into AWS security fundamentals, such as the shared responsibility model, security pillars, reference architecture, and compliance frameworks like NIST, ISO/IEC 27001, PCI DSS, GDPR, and HIPAA. We then demystify cloud security by explaining threat modeling, risk analysis, network security, secure configurations, and automated security monitoring with AWS-native services such as AWS Security Hub, GuardDuty, WAF, and IAM. In addition to the fundamentals, this book explores attacker tactics, techniques, and procedures (TTPs)—taking a deep dive into cyber adversary activity, such as reconnaissance, lateral movement, persistence, privilege escalation, and exfiltration methods in AWS environments. You will discover how cyber attackers take advantage of poorly configured IAM roles, AWS exposed credentials, cloud reconnaissance methods, and AI-powered phishing campaigns—and learn how to successfully fight back. Next few chapters offer prescriptive security advice for new technologies such as serverless computing, containerized workloads, hybrid and multi-cloud security, IoT security issues, and cryptocurrency threats. We cover Zero Trust frameworks, presenting real-world implementations founded on NIST SP 800-207, Forrester ZTX, and CSA Zero Trust Architecture principles. The book finishes with a forward-looking discussion of AI-powered threats such as deepfake attacks, AI-powered malware, and next-generation adversarial attacks and defense countermeasures founded on AI-powered detection and automation. Furthermore, detailed incident response and forensic techniques provide readers with the know-how to examine AWS security incidents, create playbooks, and employ proactive defense. You Will: Examine and remediate cloud security threats using comprehensive risk analysis, proactive monitoring, and AWS-native security tools Get hands-on implementation of Zero Trust architectures, identity-based security, and least privilege principles in AWS Find out how to detect and respond to sophisticated cyberattacks, including credential theft, cloud-aware malware, and AI-powered phishing campaigns Learn to Mitigate ransomware threats in AWS, including prevention, detection, response, and disaster recovery techniques Explore how to secure multi-cloud and hybrid deployments, IoT, serverless apps, and containerized workloads Understand practical approaches to automating cloud security, monitoring compliance, and creating efficient detection pipelines Who This Book Is For The book caters to beginner-to-intermediate cybersecurity professionals, AWS users, solution architects, developers, and cloud security enthusiasts seeking a comprehensive understanding of AWS security.
58,84 €
Broschiert | Neu

oder

Auf Lager Versandbereit in 1-2 Werktagen
zzgl.

Du kannst wie immer einen Kaufalarm setzen, wenn du auf das gebrauchte Buch warten möchtest.

Auf Lager Versandbereit in 1-2 Werktagen
zzgl.

Handgeprüfte Gebrauchtware

Bis zu 50 % günstiger als neu

Der Umwelt zuliebe

Technische Daten


Erscheinungsdatum
14.08.2025
Sprache
Englisch
EAN
9798868815539
Herausgeber
APRESS
Sonderedition
Nein
Autor
Syed Rehan
Seitenanzahl
294
Einbandart
Broschiert
Buch Untertitel
Fortifying Digital Frontiers
Schlagwörter
AWS Security, Cybersecurity, Cloud Security, Shared Responsibility Model, Compliance Frameworks, Ransomware Defense, AI and Automation, Serverless Applications, Containerized Applications, Compliance Standards
Thema-Inhalt
UTN - Netzwerksicherheit UTC - Cloud Computing
Höhe
254 mm
Breite
17.8 cm

Hersteller: Apress, Europaplatz 3, Heidelberg, Deutschland, 69115, ProductSafety@springernature.com, Springer Nature Customer Service Center GmbH

Warnhinweise und Sicherheitsinformationen

Informationen nach EU Data Act

-.-
Leider noch keine Bewertungen
Leider noch keine Bewertungen
Schreib die erste Bewertung für dieses Produkt!
Wenn du eine Bewertung für dieses Produkt schreibst, hilfst du allen Kund:innen, die noch überlegen, ob sie das Produkt kaufen wollen. Vielen Dank, dass du mitmachst!