Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
San Francisco
No Starch Press
2018
|
Schlagwörter: | |
Zusammenfassung: | "A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies large and small. You'll learn how to: -Find security issues related to multi-factor authentication and management certificates -Make sense of Azure's services by using PowerShell commands to find IP addresses, administrative users, and firewall rules -Discover security configuration errors that could lead to exploits against Azure storage and keys -Uncover weaknesses in virtual machine settings that enable you to and acquire passwords, binaries, code, and settings files -Penetrate networks by enumerating firewall rules -Investigate specialized services like Azure Key Vault and Azure Websites -Know when you might be caught by viewing logs and security events Packed with real-world examples from the author's experience as a corporate penetration tester, sample scripts from pen-tests and "Defenders Tips" that explain how companies can reduce risk, Pentesting Azure provides a clear overview of how to effectively perform security tests so that you can provide the most accurate assessments possible"... ""A guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies"...Provided by publisher"... |
Umfang: | XXIV, 190 Seiten Illustrationen 24 cm |
ISBN: | 9781593278632 1593278632 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045416439 | ||
003 | DE-604 | ||
005 | 20190531 | ||
007 | t| | ||
008 | 190121s2018 xxua||| |||| 00||| eng d | ||
010 | |a 017051237 | ||
020 | |a 9781593278632 |9 978-1-59327-863-2 | ||
020 | |a 1593278632 |9 1-59327-863-2 | ||
035 | |a (OCoLC)1061263542 | ||
035 | |a (DE-599)BVBBV045416439 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-11 | ||
050 | 0 | |a QA76.585 | |
082 | 0 | |a 305.8 |2 23 | |
084 | |a ST 510 |0 (DE-625)143676: |2 rvk | ||
100 | 1 | |a Burrough, Matt |e Verfasser |4 aut | |
245 | 1 | 0 | |a Pentesting Azure applications |b the definitive guide to testing and securing deployments |c by Matt Burrough |
264 | 1 | |a San Francisco |b No Starch Press |c 2018 | |
300 | |a XXIV, 190 Seiten |b Illustrationen |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | |a "A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies large and small. You'll learn how to: -Find security issues related to multi-factor authentication and management certificates -Make sense of Azure's services by using PowerShell commands to find IP addresses, administrative users, and firewall rules -Discover security configuration errors that could lead to exploits against Azure storage and keys -Uncover weaknesses in virtual machine settings that enable you to and acquire passwords, binaries, code, and settings files -Penetrate networks by enumerating firewall rules -Investigate specialized services like Azure Key Vault and Azure Websites -Know when you might be caught by viewing logs and security events Packed with real-world examples from the author's experience as a corporate penetration tester, sample scripts from pen-tests and "Defenders Tips" that explain how companies can reduce risk, Pentesting Azure provides a clear overview of how to effectively perform security tests so that you can provide the most accurate assessments possible"... | ||
520 | |a ""A guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies"...Provided by publisher"... | ||
630 | 0 | 4 | |a Windows Azure |x Security measures |
650 | 4 | |a COMPUTERS / Security / General / bisacsh | |
650 | 4 | |a COMPUTERS / Internet / Security / bisacsh | |
650 | 4 | |a Cloud computing |x Security measures | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a COMPUTERS / Security / General | |
650 | 4 | |a COMPUTERS / Internet / Security | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-59327-864-9 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030802401 |
Datensatz im Suchindex
_version_ | 1818984917826011136 |
---|---|
any_adam_object | |
author | Burrough, Matt |
author_facet | Burrough, Matt |
author_role | aut |
author_sort | Burrough, Matt |
author_variant | m b mb |
building | Verbundindex |
bvnumber | BV045416439 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 |
callnumber-search | QA76.585 |
callnumber-sort | QA 276.585 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 510 |
ctrlnum | (OCoLC)1061263542 (DE-599)BVBBV045416439 |
dewey-full | 305.8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 305 - Groups of people |
dewey-raw | 305.8 |
dewey-search | 305.8 |
dewey-sort | 3305.8 |
dewey-tens | 300 - Social sciences |
discipline | Informatik Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02979nam a2200445 c 4500</leader><controlfield tag="001">BV045416439</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190531 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">190121s2018 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">017051237</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781593278632</subfield><subfield code="9">978-1-59327-863-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1593278632</subfield><subfield code="9">1-59327-863-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1061263542</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045416439</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.585</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">305.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 510</subfield><subfield code="0">(DE-625)143676:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Burrough, Matt</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Pentesting Azure applications</subfield><subfield code="b">the definitive guide to testing and securing deployments</subfield><subfield code="c">by Matt Burrough</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 190 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies large and small. You'll learn how to: -Find security issues related to multi-factor authentication and management certificates -Make sense of Azure's services by using PowerShell commands to find IP addresses, administrative users, and firewall rules -Discover security configuration errors that could lead to exploits against Azure storage and keys -Uncover weaknesses in virtual machine settings that enable you to and acquire passwords, binaries, code, and settings files -Penetrate networks by enumerating firewall rules -Investigate specialized services like Azure Key Vault and Azure Websites -Know when you might be caught by viewing logs and security events Packed with real-world examples from the author's experience as a corporate penetration tester, sample scripts from pen-tests and "Defenders Tips" that explain how companies can reduce risk, Pentesting Azure provides a clear overview of how to effectively perform security tests so that you can provide the most accurate assessments possible"...</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">""A guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies"...Provided by publisher"...</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Windows Azure</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General / bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Internet / Security / bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Internet / Security</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-59327-864-9</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030802401</subfield></datafield></record></collection> |
id | DE-604.BV045416439 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:26:38Z |
institution | BVB |
isbn | 9781593278632 1593278632 |
language | English |
lccn | 017051237 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030802401 |
oclc_num | 1061263542 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | XXIV, 190 Seiten Illustrationen 24 cm |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | No Starch Press |
record_format | marc |
spelling | Burrough, Matt Verfasser aut Pentesting Azure applications the definitive guide to testing and securing deployments by Matt Burrough San Francisco No Starch Press 2018 XXIV, 190 Seiten Illustrationen 24 cm txt rdacontent n rdamedia nc rdacarrier "A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies large and small. You'll learn how to: -Find security issues related to multi-factor authentication and management certificates -Make sense of Azure's services by using PowerShell commands to find IP addresses, administrative users, and firewall rules -Discover security configuration errors that could lead to exploits against Azure storage and keys -Uncover weaknesses in virtual machine settings that enable you to and acquire passwords, binaries, code, and settings files -Penetrate networks by enumerating firewall rules -Investigate specialized services like Azure Key Vault and Azure Websites -Know when you might be caught by viewing logs and security events Packed with real-world examples from the author's experience as a corporate penetration tester, sample scripts from pen-tests and "Defenders Tips" that explain how companies can reduce risk, Pentesting Azure provides a clear overview of how to effectively perform security tests so that you can provide the most accurate assessments possible"... ""A guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies"...Provided by publisher"... Windows Azure Security measures COMPUTERS / Security / General / bisacsh COMPUTERS / Internet / Security / bisacsh Cloud computing Security measures Penetration testing (Computer security) COMPUTERS / Security / General COMPUTERS / Internet / Security Erscheint auch als Online-Ausgabe 978-1-59327-864-9 |
spellingShingle | Burrough, Matt Pentesting Azure applications the definitive guide to testing and securing deployments Windows Azure Security measures COMPUTERS / Security / General / bisacsh COMPUTERS / Internet / Security / bisacsh Cloud computing Security measures Penetration testing (Computer security) COMPUTERS / Security / General COMPUTERS / Internet / Security |
title | Pentesting Azure applications the definitive guide to testing and securing deployments |
title_auth | Pentesting Azure applications the definitive guide to testing and securing deployments |
title_exact_search | Pentesting Azure applications the definitive guide to testing and securing deployments |
title_full | Pentesting Azure applications the definitive guide to testing and securing deployments by Matt Burrough |
title_fullStr | Pentesting Azure applications the definitive guide to testing and securing deployments by Matt Burrough |
title_full_unstemmed | Pentesting Azure applications the definitive guide to testing and securing deployments by Matt Burrough |
title_short | Pentesting Azure applications |
title_sort | pentesting azure applications the definitive guide to testing and securing deployments |
title_sub | the definitive guide to testing and securing deployments |
topic | Windows Azure Security measures COMPUTERS / Security / General / bisacsh COMPUTERS / Internet / Security / bisacsh Cloud computing Security measures Penetration testing (Computer security) COMPUTERS / Security / General COMPUTERS / Internet / Security |
topic_facet | Windows Azure Security measures COMPUTERS / Security / General / bisacsh COMPUTERS / Internet / Security / bisacsh Cloud computing Security measures Penetration testing (Computer security) COMPUTERS / Security / General COMPUTERS / Internet / Security |
work_keys_str_mv | AT burroughmatt pentestingazureapplicationsthedefinitiveguidetotestingandsecuringdeployments |