Torrent details for "Lat J. Learning Serverless Security. Hacking and Securing Server…" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
None
Total Size:
9.4 MB
Info Hash:
A6499FECCA7A41D64E1BD59ECD3498971B6B4505
Added By:
Added:
March 1, 2026, 11:53 a.m.
Stats:
|
(Last updated: March 1, 2026, 11:54 a.m.)
| File | Size |
|---|---|
| Lat J. Learning Serverless Security. Hacking and Securing Serverless Cloud..2026.pdf | 9.4 MB |
Name
DL
Uploader
Size
S/L
Added
-
568.9 MB
[38
/
16]
2026-04-30
| Uploaded by zbyszek3k | Size 568.9 MB | Health [ 38 /16 ] | Added 2026-04-30 |
-
906.8 MB
[224
/
77]
2025-11-05
| Uploaded by Yurievij | Size 906.8 MB | Health [ 224 /77 ] | Added 2025-11-05 |
-
466.4 MB
[3
/
11]
2026-04-25
| Uploaded by zbyszek3k | Size 466.4 MB | Health [ 3 /11 ] | Added 2026-04-25 |
NOTE
SOURCE: Lat J. Learning Serverless Security. Hacking and Securing Serverless Cloud..2026
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
Textbook in PDF format Serverless computing now serves as a strategic backbone of modern cloud architectures, helping teams move faster and operate at scale. However, many still struggle to understand the security model of serverless computing. As more organizations migrate critical systems and sensitive data to the cloud using serverless architectures, this gap in serverless security knowledge increasingly exposes them to serious security incidents and data breaches. This practical guide covers offensive and defensive security techniques to audit and secure serverless applications running on AWS, Azure, and Google Cloud. You'll explore how to attack and defend vulnerable serverless applications using step-by-step instructions. By the end of this book, you'll understand how to prevent various serverless application attacks and privilege escalation techniques. Author Joshua Arvin Lat, chief technology officer at NuWorks Interactive Labs and an AWS AI Hero, shows you how to: Identify and address vulnerabilities within modern serverless applications Dive deeper into serverless security risks and threats Explore privilege escalation techniques in vulnerable-by-design serverless lab environments Configure authentication and identity services properly on AWS, Azure, and Google Cloud Implement security strategies and best practices to prevent serverless application attacks Audit serverless function code using security tools and strategies Who Should Read This Book: This book is for security engineers, cloud engineers, developers, security architects, and penetration testers responsible for managing, auditing, and securing their cloud infrastructure. This book is targeted toward professionals with experience using cloud services who are planning to dive deeper into cloud and serverless security. You are expected to have a good understanding of the concepts of cloud computing and security. Basic knowledge of serverless computing and the fundamental services of AWS, Google Cloud, and Azure will help. Knowledge or experience using security tools is optional
×


