×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Cloud Penetration Testing. Learn how to effectively pentest AWS, Azure, and GCP applications

(ebook) (audiobook) (audiobook) Książka w języku 1
Autor:
Kim Crawley
Cloud Penetration Testing. Learn how to effectively pentest AWS, Azure, and GCP applications Kim Crawley - okladka książki

Cloud Penetration Testing. Learn how to effectively pentest AWS, Azure, and GCP applications Kim Crawley - okladka książki

Cloud Penetration Testing. Learn how to effectively pentest AWS, Azure, and GCP applications Kim Crawley - audiobook MP3

Cloud Penetration Testing. Learn how to effectively pentest AWS, Azure, and GCP applications Kim Crawley - audiobook CD

Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
298
Dostępne formaty:
     PDF
     ePub

Ebook (107,10 zł najniższa cena z 30 dni)

119,00 zł (-10%)
107,10 zł

Dodaj do koszyka lub Kup na prezent Kup 1-kliknięciem

(107,10 zł najniższa cena z 30 dni)

Przenieś na półkę

Do przechowalni

With AWS, Azure, and GCP gaining prominence, understanding their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you’ll explore the intricacies of cloud security testing and gain valuable insights into how pentesters evaluate cloud environments effectively.
In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set.
By the end of this cloud security book, you’ll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments.

Wybrane bestsellery

O autorze książki

Kim Crawley is a thought leader in cybersecurity, from pentesting to defensive security, and from policy to cyber threat research. For nearly a decade, she has contributed her research and writing to the official corporate blogs of AT&T Cybersecurity, BlackBerry, Venafi, Sophos, CloudDefense, and many others. She has been an internal employee of both Hack The Box and IOActive, a leading cybersecurity research firm.
With the hacker mindset, she hacked her way into various information security subject matters. She co-authored one of the most popular guides to pentester careers on Amazon, The Pentester Blueprint, with Philip Wylie for Wiley Tech. She wrote an introductory guide to cybersecurity for business, 8 Steps to Better Security, which was also published by Wiley Tech. She also wrote Hacker Culture: A to Z for O’Reilly Media.
To demonstrate her knowledge of cybersecurity operations, she passed her CISSP exam in 2023. In her spare time, she loves playing Japanese RPGs and engaging in social justice advocacy. She’s always open to new writing, research, and security practitioner opportunities.

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
107,10 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint