Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Item Type
      Item Type
      Clear All
      Item Type
  • Is Full-Text Available
      Is Full-Text Available
      Clear All
      Is Full-Text Available
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Subject
    • Publisher
    • Source
    • Donor
    • Place of Publication
    • Contributors
    • Location
1 result(s) for "Burrough, Matt, author"
Sort by:
Pentesting Azure applications: the definitive guide to testing and securing deployments
\"A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies large and small. You'll learn how to: -Find security issues related to multi-factor authentication and management certificates -Make sense of Azure's services by using PowerShell commands to find IP addresses, administrative users, and firewall rules -Discover security configuration errors that could lead to exploits against Azure storage and keys -Uncover weaknesses in virtual machine settings that enable you to and acquire passwords, binaries, code, and settings files -Penetrate networks by enumerating firewall rules -Investigate specialized services like Azure Key Vault and Azure Websites -Know when you might be caught by viewing logs and security events Packed with real-world examples from the author's experience as a corporate penetration tester, sample scripts from pen-tests and \"Defenders Tips\" that explain how companies can reduce risk, Pentesting Azure provides a clear overview of how to effectively perform security tests so that you can provide the most accurate assessments possible\"-- Provided by publisher.