File tree 1 file changed +0
-4
lines changed
content/pages/04-web-development
1 file changed +0
-4
lines changed Original file line number Diff line number Diff line change @@ -153,10 +153,6 @@ resources can also give you a good overview of how HTTPS works.
153
153
important technique to use to keep your database passwords and other
154
154
secrets more secure if the hashed strings are leaked.
155
155
156
- * [ An in-depth analysis of SSH attacks on Amazon EC2] ( http://getprismatic.com/story/1409447605839 )
157
- shows how important it is to secure your web servers, especially when they are
158
- hosted in IP address ranges that are commonly scanned by malicious actors.
159
-
160
156
* [ Cloud Security Auditing: Challenges and Emerging Approaches] ( http://www.infoq.com/articles/cloud-security-auditing-challenges-and-emerging-approaches )
161
157
is a high-level overview of some of security auditing problems that come
162
158
with cloud deployments.
You can’t perform that action at this time.
0 commit comments