Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Front Matter 1. Introduction to Cloud Computing Security 2. Performing a Risk Assessment 3. Securing the Code 4. Securing Interfaces 5. Configuring the Application Stack 6. Restricting Permissions 7. Account Management 8. Secrets Management 9. Authentication and Authorization 10. Protecting Sensitive Data 11. Monitoring, Auditing, and Alerting 12. Additional Considerations 13. Finalizing the Risk Assessment Back Matter
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion