Have a personal or library account? Click
here
to login
Paradigm
reference-global.com
Content
Services
Paradigm
Partners
Contact
Books
Empirical Cloud Security
CHAPTER 10 MALICIOUS CODE IN THE CLOUD
CHAPTER 10 MALICIOUS CODE IN THE CLOUD
Chapter in the book
Empirical Cloud Security
Publisher:
Mercury Learning and Information
By:
Aditya K. Sood
Paid access
|
Apr 2021
Book details
Table of contents
Table of contents
Frontmatter
CONTENTS
PREFACE
ACKNOWLEDGMENTS
ABOUT THE AUTHOR
CHAPTER 1 CLOUD ARCHITECTURE AND SECURITY FUNDAMENTALS
CHAPTER 2 IAM FOR AUTHENTICATION AND AUTHORIZATION: SECURITY ASSESSMENT
CHAPTER 3 CLOUD INFRASTRUCTURE: NETWORK SECURITY ASSESSMENT
CHAPTER 4 DATABASE AND STORAGE SERVICES: SECURITY ASSESSMENT
CHAPTER 5 DESIGN AND ANALYSIS OF CRYPTOGRAPHY CONTROLS: SECURITY ASSESSMENT
CHAPTER 6 CLOUD APPLICATIONS: SECURE CODE REVIEW
CHAPTER 7 CLOUD MONITORING AND LOGGING: SECURITY ASSESSMENT
CHAPTER 8 PRIVACY IN THE CLOUD
CHAPTER 9 CLOUD SECURITY AND PRIVACY: FLAWS, ATTACKS, AND IMPACT ASSESSMENTS
CHAPTER 10 MALICIOUS CODE IN THE CLOUD
CHAPTER 11 THREAT INTELLIGENCE AND MALWARE PROTECTION IN THE CLOUD
CONCLUSION
APPENDIX A LIST OF SERVERLESS COMPUTING SERVICE
APPENDIX B LIST OF SERVERLESS FRAMEWORKS
APPENDIX C LIST OF SAAS, PAAS, IAAS, AND FAAS PROVIDERS
APPENDIX D LIST OF CONTAINERIZED SERVICES AND OPEN SOURCE SOFTWARE
APPENDIX E LIST OF CRITICAL RDP VULNERABILITIES
APPENDIX F LIST OF NETWORK TOOLS AND SCRIPTS
APPENDIX G LIST OF DATABASES DEFAULT TCP/UDP PORTS
APPENDIX H LIST OF DATABASE ASSESSMENT TOOLS, COMMANDS, AND SCRIPTS
APPENDIX I LIST OF COUCHDB API COMMANDS AND RESOURCES
APPENDIX J LIST OF CQLSH CASSANDRA DATABASE SQL QUERIES
APPENDIX K LIST OF ELASTICSEARCH QUERIES
APPENDIX L AWS SERVICES CLI COMMANDS
APPENDIX M LIST OF VAULT AND SECRET MANAGERS
APPENDIX N LIST OF TLS SECURITY VULNERABILITIES FOR ASSESSMENT
APPENDIX O LIST OF CLOUD LOGGING AND MONITORING SERVICES
INDEX
33 chapters available
PDF preview is not available for this content.
PDF ISBN:
978-1-68392-684-9
|
E-Pub ISBN:
978-1-68392-683-2
|
DOI:
10.1515/9781683926849
Publisher:
Mercury Learning and Information
Copyright owner:
© 2021 Walter de Gruyter GmbH, Berlin/Boston
Publication date:
2021
Language:
English
Pages:
444
Related subjects:
Computer sciences
,
Computer sciences, other
Previous chapter
Empirical Cloud Security
Next chapter