Get Free Shipping on orders over $79
Learning Serverless Security : Hacking and Securing Serverless Cloud Applications on AWS, Azure, and Google Cloud - Joshua Arvin Lat

Learning Serverless Security

Hacking and Securing Serverless Cloud Applications on AWS, Azure, and Google Cloud

By: Joshua Arvin Lat

eText | 17 February 2026 | Edition Number 1

At a Glance

eText


$75.89

or 4 interest-free payments of $18.97 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Serverless computing now serves as a strategic backbone of modern cloud architectures, helping teams move faster and operate at scale. However, many still struggle to understand the security model of serverless computing. As more organizations migrate critical systems and sensitive data to the cloud using serverless architectures, this gap in serverless security knowledge increasingly exposes them to serious security incidents and data breaches.

This practical guide covers offensive and defensive security techniques to audit and secure serverless applications running on AWS, Azure, and Google Cloud. You'll explore how to attack and defend vulnerable serverless applications using step-by-step instructions. By the end of this book, you'll understand how to prevent various serverless application attacks and privilege escalation techniques.

Author Joshua Arvin Lat, chief technology officer at NuWorks Interactive Labs and an AWS AI Hero, shows you how to:

  • Identify and address vulnerabilities within modern serverless applications
  • Dive deeper into serverless security risks and threats
  • Explore privilege escalation techniques in vulnerable-by-design serverless lab environments
  • Configure authentication and identity services properly on AWS, Azure, and Google Cloud
  • Implement security strategies and best practices to prevent serverless application attacks
  • Audit serverless function code using security tools and strategies
on
Desktop
Tablet
Mobile

More in Data Encryption

Cryptography for Everyone - Matthew D. Green

eBOOK

RRP $67.77

$54.99

19%
OFF