File tree Expand file tree Collapse file tree 1 file changed +0
-4
lines changed
content/pages/04-web-development Expand file tree Collapse file tree 1 file changed +0
-4
lines changed Original file line number Diff line number Diff line change @@ -153,10 +153,6 @@ resources can also give you a good overview of how HTTPS works.
153153 important technique to use to keep your database passwords and other
154154 secrets more secure if the hashed strings are leaked.
155155
156- * [ An in-depth analysis of SSH attacks on Amazon EC2] ( http://getprismatic.com/story/1409447605839 )
157- shows how important it is to secure your web servers, especially when they are
158- hosted in IP address ranges that are commonly scanned by malicious actors.
159-
160156* [ Cloud Security Auditing: Challenges and Emerging Approaches] ( http://www.infoq.com/articles/cloud-security-auditing-challenges-and-emerging-approaches )
161157 is a high-level overview of some of security auditing problems that come
162158 with cloud deployments.
You can’t perform that action at this time.
0 commit comments