Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Edge Computing with Amazon Web Services
  • Table Of Contents Toc
  • Feedback & Rating feedback
Edge Computing with Amazon Web Services

Edge Computing with Amazon Web Services

By : Sean Howard
5 (10)
close
close
Edge Computing with Amazon Web Services

Edge Computing with Amazon Web Services

5 (10)
By: Sean Howard

Overview of this book

The surge in connected edge devices has driven organizations to capitalize on the opportunities presented by the massive amounts of data generated by these devices. However, adapting to this landscape demands significant changes in application architectures. This book serves as your guide to edge computing fundamentals, shedding light on the constraints and risks inherent in selecting solutions within this domain. You’ll explore an extensive suite of edge computing services from AWS, gaining insights into when and how to use AWS Outposts, AWS Wavelength, AWS Local Zones, AWS Snow Family, and AWS IoT Greengrass. With detailed use cases, technical requirements, and architectural patterns, you’ll master the practical implementation of these services and see how they work in real life through step-by-step examples, using the AWS CLI and AWS Management Console. To conclude, you’ll delve into essential security and operational considerations to maximize the value delivered by AWS services. By the end of this book, you'll be ready to design powerful edge computing architectures and handle complex edge computing use cases across multiple AWS services.
Table of Contents (21 chapters)
close
close
Free Chapter
1
Part 1: Compute, Network, and Security Services at the Edge
5
Part 2: Introducing AWS Edge Computing Services
10
Part 3: Building Distributed Edge Architectures with AWS Edge Computing Services
15
Part 4: Implementing Edge Computing Solutions via Hands-On Examples and More

Securing networks at the near edge

Securing edge computing resources is crucial to protect sensitive data and ensure the integrity and availability of services. Unlike resources in the cloud, you cannot assume mitigations such as the AWS Nitro platform are in place to prevent, for example, a poison ARP/MAC spoofing attack across an Ethernet segment.

Identity and Access Management (IAM)

Implement robust IAM policies and practices to control access to edge computing resources. Ensure that only authorized individuals or systems have appropriate privileges to interact with the resources. Use strong authentication mechanisms such as Multi-Factor Authentication (MFA) and enforce the principle of least privilege to limit access rights to what is necessary.

Encryption

Implement end-to-end encryption for data transmission and storage in edge computing environments. Use industry-standard encryption algorithms and protocols to secure data in transit and at rest. Encryption helps protect...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY