Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OpenStack Cloud Security

Buy
OpenStack Cloud Security, 9781782170983 (1782170987), Packt Publishing, 2015

Build a secure OpenStack cloud to withstand all common attacks

About This Book

  • Design, implement, and deliver a safe and sound OpenStack cluster using best practices
  • Create a production-ready environment and protect your data on the cloud
  • A step-by-step tutorial packed with real-world solutions that helps you learn easily and quickly

Who This Book Is For

If you are an OpenStack administrator or developer, or wish to build solutions to protect your OpenStack environment, then this book is for you. Experience of Linux administration and familiarity with different OpenStack components is assumed.

What You Will Learn

  • Secure your servers, data center, and network to improve your environment for the cloud
  • Gain insights into ISP intercept and social engineering
  • Explore automated attacks with the help of mass phishing, brute force, and automated exploitation tools
  • Secure your OpenStack installation from a networking perspective at both low and high levels
  • Get to know how to secure your OpenStack to use only encrypted communications for APIs
  • Configure secure communications on the OpenStack API
  • Harden OpenStack Keystone and Horizon for a more secure environment
  • Protect the Swift replication mechanism through network hardening

In Detail

OpenStack is a system that controls large pools of computing, storage, and networking resources, allowing its users to provision resources through a user-friendly interface. OpenStack helps developers with features such as rolling upgrades, federated identity, and software reliability.

You will begin with basic security policies, such as MAC, MLS, and MCS, and explore the structure of OpenStack and virtual networks with Neutron. Next, you will configure secure communications on the OpenStack API with HTTP connections. You will also learn how to set OpenStack Keystone and OpenStack Horizon and gain a deeper understanding of the similarities/differences between OpenStack Cinder and OpenStack Swift.

By the end of this book, you will be able to tweak your hypervisor to make it safer and a smart choice based on your needs.

(HTML tags aren't allowed.)

Better Game Characters by Design: A Psychological Approach (The Morgan Kaufmann Series in Interactive 3D Technology)
Better Game Characters by Design: A Psychological Approach (The Morgan Kaufmann Series in Interactive 3D Technology)
Games are poised for a major evolution, driven by growth in technical sophistication and audience reach. Characters that create powerful social and emotional connections with players throughout the game-play itself (not just in cut scenes) will be essential to next-generation games. However, the principles of sophisticated character design and...
Unifying Theories of Programming: Third International Symposium
Unifying Theories of Programming: Third International Symposium

This book constitutes the refereed proceedings of the Third International Symposium on Unifying Theories of Programming, UTP 2010, held in Shanghai, China, in November 2010, in conjunction with the 12th International Conference on Formal Engineering Methods, ICFEM 2010. The 12 revised full papers presented together with 3 invited talks were...

Psychoacoustics: Facts and Models (Springer Series in Information Sciences)
Psychoacoustics: Facts and Models (Springer Series in Information Sciences)

Psychoacoustics offers a unique, comprehensive summary of information describing the processing of sound by the human hearing system. The third edition includes an additional chapter on audio-visual interactions and applications, plus more on applications throughout.

...

Expert Oracle Exadata
Expert Oracle Exadata

Expert Oracle Exadata, 2nd Edition opens up the internals of Oracle's Exadata platform so that you can fully benefit from the most performant and scalable database hardware appliance capable of running Oracle Database. This edition is fully-updated to cover Exadata 5-2 and Oracle Database 12c. If you're new to Exadata,...

Visual Basic and COM+ Programming by Example
Visual Basic and COM+ Programming by Example
A hands-on resource combining Visual Basic programming with COM+ programming. In addition to learning Visual Basic, readers learn how to administer COM+ components and provide security. They also learn how COM+ can be used to solve problems of Enterprise Application Integration.

(InformIT) A guide to learning program Visual Basic and COM+...

Python Cookbook, 2nd Edition
Python Cookbook, 2nd Edition

Like its predecessor, the new edition offers a collection of solutions to problems that Python programmers face everyday. Updated for Python 2.4, it now includes over 200 recipes that range from simple tasks, such as working with dictionaries and list comprehensions, to complex tasks, such as monitoring a network and building...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy