Cloud Security Scanner is a service with App Engine that scans the web applications for security vulnerabilities. It detects cross-site scripting, flash injection, mixed content, and usage of unsecured JS libraries, by crawling through the starting URL of the App Engine. In this chapter, we'll see how to set up a security scan for a sample vulnerable application and review its results. After the scan is created, it is queued for execution. Depending on the size of the application, the time required for the scan ranges from a few minutes to a few hours.
-
Book Overview & Buying
-
Table Of Contents
Google Cloud Platform Cookbook
By :
Google Cloud Platform Cookbook
By:
Overview of this book
Google Cloud Platform is a cloud computing platform that offers products and services to host applications using state-of-the art infrastructure and technology. You can build and host applications and websites, store data, and analyze data on Google's scalable infrastructure. This book follows a recipe-based approach, giving you hands-on experience to make the most of Google Cloud services.
This book starts with practical recipes that explain how to utilize Google Cloud's common services. Then, you'll see how to make full use of Google Cloud components such as networking, security, management, and developer tools. Next, we'll deep dive into implementing core Google Cloud services into your organization, with practical recipes on App Engine, Compute Engine, Cloud Functions, virtual networks, and Cloud Storage. Later, we'll provide recipes on implementing authentication and security, Cloud APIs, command-line management, deployment management, and the Cloud SDK. Finally, we'll cover administration and troubleshooting tasks on applications with Compute services and we'll show how to monitor your organization's efficiency with best practices.
By the end of this book, you'll have an overall understanding and hands-on implementation of Google Cloud services in your organization with ease.
Table of Contents (9 chapters)
Preface
Compute
Storage and Databases
Networking
Security
Machine Learning and Big Data
Management Tools
Best Practices
Other Books You May Enjoy