Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Society & social sciences 164
- Cloud computing 121
- Educación pedagogía 93
- Amazon Web Services (Firm) 86
- Descripción y viajes 72
- Historia 71
- Development 60
- Web services 58
- Humanities 51
- Application software 47
- Historia / General 43
- Computer networks 36
- Ciencias Políticas / General 33
- Derecho comunitario 31
- Examinations 31
- Certification 29
- Usos y costumbres 29
- Electronic data processing personnel 28
- Història 28
- Computer security 27
- Economics, finance, business & management 27
- Comunidad Económica Europea 25
- Governance 25
- Security measures 24
- Competencia económica 23
- Computer software 22
- Business & Economics 20
- Management 20
- Engineering & Applied Sciences 18
- Amazon.com (Firm) 17
-
2521
-
2522
-
2523
-
2524
-
2525
-
2526
-
2527Publicado 2017Tabla de Contenidos:Libro electrónico
-
2528
-
2529
-
2530Publicado 2021Tabla de Contenidos: “…Parallel Pipelines -- Overview -- Serial Processing -- Looping Over Numbers -- Looping Over Lines -- Looping Over Files -- Parallel Processing -- Introducing GNU Parallel -- Specifying Input -- Controlling the Number of Concurrent Jobs -- Logging and Output -- Creating Parallel Tools -- Distributed Processing -- Get List of Running AWS EC2 Instances -- Running Commands on Remote Machines -- Distributing Local Data Among Remote Machines -- Processing Files on Remote Machines -- Summary…”
Libro electrónico -
2531Publicado 2018Tabla de Contenidos: “…Doing queries in Python -- Populating tables in Python -- Doing backups -- Scaling computation in the cloud -- EC2 -- AMI -- Storage (S3) -- SageMaker -- Summary -- References -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 7 -- Chapter 9 -- Other Books You May Enjoy -- Index…”
Libro electrónico -
2532Publicado 2023Tabla de Contenidos: “…AWS PaaS features -- AWS security controls and tools -- Security controls -- Security tools -- Summary -- Further reading -- Chapter 5: Pentesting AWS Features through Serverless Applications and Tools -- Technical requirements -- How to get an AWS network -- Using AWS PowerShell and the AWS CLI -- Bash commands -- PowerShell commands -- Exploring AWS-native security tools -- AWS Security Hub -- Amazon Inspector -- Installing and preparing AWS pentesting tools -- Prowler -- Pacu -- Cred Scanner -- CloudFrunt -- Redboto -- Exploiting AWS applications -- Prowler -- Pacu -- Summary -- Further reading -- Chapter 6: Pentesting Containerized Applications in AWS -- Technical requirements -- How containerization works -- How Docker works in AWS -- Installing a Docker cluster in AWS with Amazon ECS -- Deploying Docker with Docker Desktop -- How Kubernetes works in AWS -- Docker and Kubernetes pentesting techniques in AWS -- Installation in Docker -- Installation in Kubernetes -- Summary -- Further reading -- Part 3: Pentesting Microsoft Azure -- Chapter 7: Security Features in Azure -- Introduction to Azure -- Frequently used Azure SaaS applications -- Azure Maps -- Azure Digital Twins -- Azure Monitor -- Microsoft Cost Management -- Azure Advisor -- Network Watcher -- Azure IaaS applications -- Azure Virtual Machines -- Azure Kubernetes Service -- Azure Container Instances -- Azure Dedicated Host -- Azure PaaS applications -- Azure SQL Database -- Web Apps -- Mobile Apps -- Azure Logic Apps -- Azure Functions -- Azure security controls and tools -- Security controls -- Security tools -- Summary -- Further reading -- Chapter 8: Pentesting Azure Features through Serverless Applications and Tools -- Technical requirements -- Setting up an Azure instance -- Setting up an Azure account -- Using Azure Cloud Shell and PowerShell -- Azure native security tools…”
Libro electrónico -
2533
-
2534
-
2535
-
2536
-
2537
-
2538
-
2539
-
2540