Have a personal or library account? Click
here
to login
Paradigm
reference-global.com
Content
Services
Paradigm
Partners
Contact
Books
Empirical Cloud Security
Chapter 6: Cloud Applications: Secure Code Review
Chapter 6: Cloud Applications: Secure Code Review
Chapter in the book
Empirical Cloud Security
Publisher:
Mercury Learning and Information
By:
Aditya K. Sood
Paid access
|
Jul 2023
Book details
Table of contents
Table of contents
Frontmatter
Contents
Preface
About the Author
Chapter 1: Cloud Architecture and Security Fundamentals
Chapter 2: IAM for Authentication and Authorization: Security Assessment
Chapter 3: Cloud Infrastructure: Network Security Assessment
Chapter 4: Database and Storage Services: Security Assessment
Chapter 5: Design and Analysis of Cryptography Controls: Security Assessment
Chapter 6: Cloud Applications: Secure Code Review
Chapter 7: Cloud Monitoring and Logging: Security Assessment
Chapter 8: Privacy in the Cloud
Chapter 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments
Chapter 10: Malicious Code in the Cloud
Chapter 11: Threat Intelligence and Malware Protection in the Cloud
Appendix A: List of Serverless Computing Services
Appendix B: List of Serverless Frameworks
Appendix C: List of Saas, Paas, Iaas, and Faas Providers
Appendix D: List of Containerized Services and Open Source Software
Appendix E: List of Critical RDP Vulnerabilities
Appendix F: List of Network Tools and Scripts
Appendix G: List of Databases Default TCP/UDP Ports
Appendix H: List of Database Assessment Tools, Commands, and Scripts
Appendix I: List of CouchDB API Commands and Resources
Appendix J: List of CQLSH Cassandra Database SQL Queries
Appendix K: List of Elasticsearch Queries
Appendix L: AWS Services CLI Commands
Appendix M: List of Vault and Secret Managers
Appendix N: List of TLS Security Vulnerabilities for Assessment
Appendix O: List of Cloud Logging and Monitoring Services
Appendix P: Enterprise Threat Intelligence Platforms
Index
32 chapters available
PDF preview is not available for this content.
PDF ISBN:
978-1-5015-1799-0
|
E-Pub ISBN:
978-1-5015-1802-7
|
Paperback ISBN:
978-1-5015-2139-3
|
DOI:
10.1515/9781501517990
Publisher:
Mercury Learning and Information
Copyright owner:
© 2023 Walter de Gruyter GmbH, Berlin/Boston
Publication date:
2023
Language:
English
Pages:
475
Related subjects:
Computer sciences
,
IT-security and cryptology
,
Computer fraud and hacking
,
Cloud computing
,
Network security
Previous chapter
Empirical Cloud Security
Next chapter