官术网_书友最值得收藏!

Chapter 2. Security and Access Management

In the previous chapter, we accomplished a lot of things. To begin with, we got a better understanding of what cloud computing actually is all about and how you as an end user can benefit by leveraging it. Later on in the chapter, you had a brief overview of AWS, its architecture, and its core service offerings and also learned how to sign up for it.

In this chapter, you are going to learn a bit more about how to secure and provide users access to your AWS infrastructure and services. The chapter will first talk about security in general, and how AWS provides some of the best security there is. Later on, we will look at an AWS core service called as Identity and Access Management (IAM) and find out how to create, manage, and administer users using it.

主站蜘蛛池模板: 饶阳县| 朝阳区| 游戏| 淳化县| 信阳市| 淮阳县| 蕲春县| 桐乡市| 乌鲁木齐市| 浠水县| 龙胜| 佛山市| 天镇县| 德惠市| 都匀市| 莆田市| 鸡西市| 潼关县| 双峰县| 天水市| 安图县| 石楼县| 白银市| 务川| 潜江市| 波密县| 荥阳市| 西贡区| 麦盖提县| 渭源县| 罗山县| 突泉县| 涟源市| 岳普湖县| 内江市| 伊吾县| 阳谷县| 库车县| 康保县| 屯留县| 乐亭县|