책 이미지
책 정보
· 분류 : 외국도서 > 컴퓨터 > 하드웨어 > 네트워크 하드웨어
· ISBN : 9781484260999
· 쪽수 : 347쪽
목차
Introduction
Part I: The Need for Security
Chapter 1: Determining Scope
Understanding the Application
Scoping
Chapter 2: Performing a Risk Assessment
Understanding the Threat Landscape
Threat Modeling
Preparing the Risk Assessment
Part II: Securing the Application
Chapter 3: Securing the Code
Assessing Dependencies
Using Static Code Analysis Tools
Writing Unit Tests
Chapter 4: Securing the Interfaces
Identifying the Interfaces
Determining the Interface Inputs
Reducing the Attack Surface
Chapter 5: Securing the Code Repository
Using a Code Repository
Limiting Saved Content
Part III: Securing the Infrastructure
Chapter 5: Restricting Permissions
Understanding Permissions
Identifying the Services
Updating the Permissions
Chapter 6: Account Management
Understanding Account Access
Restricting Account Access
Implementing Multi-Factor Authentication
Using Secrets
Part IV: Monitoring and Alerting
Chapter 7: Monitoring Logs
Understanding Logging Methods
Reviewing Logs
Chapter 8: Monitoring Metrics
Understanding Metrics
Reviewing Metrics
Chapter 9: Monitoring Billing
Understanding BillingReviewing Billing
Chapter 10: Monitoring Security Events
Understanding Security Events
Reviewing Security Event
Chapter 10: Alerting
Understanding Alerting
Implementing Alerting
Chapter 11: Auditing
Understanding Auditing
Implementing Auditing
Part V: Security Assessment and Report
Chapter 12: Finalizing the Risk Assessment
Scoring the Identified Risks
Defining the Mitigation Steps
Assessing the Business Impact
Determining the Overall Security Risk Level