官术网_书友最值得收藏!

Chapter 2. Security and Access Management

In the previous chapter, we accomplished a lot of things. To begin with, we got a better understanding of what cloud computing actually is all about and how you as an end user can benefit by leveraging it. Later on in the chapter, you had a brief overview of AWS, its architecture, and its core service offerings and also learned how to sign up for it.

In this chapter, you are going to learn a bit more about how to secure and provide users access to your AWS infrastructure and services. The chapter will first talk about security in general, and how AWS provides some of the best security there is. Later on, we will look at an AWS core service called as Identity and Access Management (IAM) and find out how to create, manage, and administer users using it.

主站蜘蛛池模板: 凤冈县| 景谷| 开原市| 临夏县| 临潭县| 邹城市| 睢宁县| 丰原市| 江达县| 无棣县| 嵊州市| 岢岚县| 司法| 商南县| 资兴市| 天气| 华坪县| 大连市| 林芝县| 龙江县| 凤翔县| 儋州市| 玉门市| 吉林省| 安仁县| 淮滨县| 万宁市| 铜梁县| 南岸区| 桑日县| 凭祥市| 东城区| 镇宁| 邮箱| 陕西省| 弥渡县| 桃园县| 宁城县| 开原市| 望谟县| 宁乡县|