Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Implementing Cloud Design Patterns for AWS

You're reading from   Implementing Cloud Design Patterns for AWS Solutions and design ideas for solving system design problems

Arrow left icon
Product type Paperback
Published in Apr 2019
Publisher Packt
ISBN-13 9781789136203
Length 274 pages
Edition 2nd Edition
Tools
Arrow right icon
Authors (4):
Arrow left icon
Clive Harber Clive Harber
Author Profile Icon Clive Harber
Clive Harber
Sean Keery Sean Keery
Author Profile Icon Sean Keery
Sean Keery
Rick Farmer Rick Farmer
Author Profile Icon Rick Farmer
Rick Farmer
Marcus Young Marcus Young
Author Profile Icon Marcus Young
Marcus Young
Arrow right icon
View More author details
Toc

Table of Contents (18) Chapters Close

Preface 1. Section 1: The Basics FREE CHAPTER
2. Introduction to Amazon Web Services 3. Core Services - Building Blocks for Your Product 4. Availability Patterns - Understanding Your Needs 5. Security - Ensuring the Integrity of Your Systems 6. Section 2: DevOps Patterns
7. Continuous Deployment - Introducing New Features with Minimal Risk 8. Ephemeral Environments - Sandboxes for Experiments 9. Operation and Maintenance - Keeping Things Running at Peak Performance 10. Application Virtualization - Using Cloud Native Patterns for Your Workloads 11. Antipatterns - Avoiding Counterproductive Solutions 12. Section 3: Persistence Patterns
13. Databases - Identifying Which Type Fits Your Needs 14. Data Processing - Handling Your Data Transformation 15. Observability - Understanding How Your Products Are Behaving 16. Anti-Patterns - Bypassing Inferior Options 17. Other Books You May Enjoy

Summary

Security vulnerabilities are a fact of life in the cloud world. We have examined a number of practices and patterns for ensuring the integrity and confidentiality of your services. Our discussion focused on defending your assets while they are at rest or on the wire. By reducing exposure to intrusion by establishing our perimeter, we can move on to delivering new features while lessening risk.

The next chapter mainly covers some of the practices that you can use to provide a continuous deployment pipeline.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image