×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Hands-On AWS Penetration Testing with Kali Linux. Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation Karl Gilbert, Benjamin Caudill

(ebook) (audiobook) (audiobook) Książka w języku angielskim
Hands-On AWS Penetration Testing with Kali Linux. Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation Karl Gilbert, Benjamin Caudill - okladka książki

Hands-On AWS Penetration Testing with Kali Linux. Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation Karl Gilbert, Benjamin Caudill - okladka książki

Hands-On AWS Penetration Testing with Kali Linux. Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation Karl Gilbert, Benjamin Caudill - audiobook MP3

Hands-On AWS Penetration Testing with Kali Linux. Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation Karl Gilbert, Benjamin Caudill - audiobook CD

Autorzy:
Karl Gilbert, Benjamin Caudill
Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
508
Dostępne formaty:
     PDF
     ePub
     Mobi
The cloud is taking over the IT industry. Any organization housing a large amount of data or a large infrastructure has started moving cloud-ward — and AWS rules the roost when it comes to cloud service providers, with its closest competitor having less than half of its market share. This highlights the importance of security on the cloud, especially on AWS. While a lot has been said (and written) about how cloud environments can be secured, performing external security assessments in the form of pentests on AWS is still seen as a dark art.
This book aims to help pentesters as well as seasoned system administrators with a hands-on approach to pentesting the various cloud services provided by Amazon through AWS using Kali Linux. To make things easier for novice pentesters, the book focuses on building a practice lab and refining penetration testing with Kali Linux on the cloud. This is helpful not only for beginners but also for pentesters who want to set up a pentesting environment in their private cloud, using Kali Linux to perform a white-box assessment of their own cloud resources. Besides this, the book covers a large variety of AWS services that are often overlooked during a pentest — from serverless infrastructure to automated deployment pipelines.
By the end of this book, you will be able to identify possible vulnerable areas efficiently and secure your AWS cloud environment.

Wybrane bestsellery

O autorach książki

Karl Gilbert is a security researcher who has contributed to the security of some widely used open-source software. His primary interests relate to vulnerability research, 0-days, cloud security, secure DevOps, and CI/CD.
Benjamin Caudill is a security researcher and founder of pentesting firm Rhino Security Labs. Built on 10+ years of offensive security experience, Benjamin directed the company with research and development as its foundation, into a key resource for high-needs clients. Benjamin has also been a major contributor to AWS security research. With co-researcher Spencer Gietzen, the two have developed Pacu (the AWS exploitation framework) and identified dozens of new attack vectors in cloud architecture. Both GCP and Azure research are expected throughout 2019. As a regular contributor to the security industry, Benjamin been featured on CNN, Wired, Washington Post, and other major media outlets.

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
125,10 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.