Serverless computing demands a different mindset but secure serverless apps are at least as secure as their server-based counterparts. According to new research, the top two security concerns of companies implementing or using serverless platforms include compliance and how to handle data security. Below, you’ll find a curated list of awesome serverless security resources such as ebooks, articles, whitepapers, blogs and research papers.
Computers and Internet
How to Succeed in Medium / Como Arrasar no Medium
This is an ebook written in Portugese for the Brazilian community at Medium, on how to start, develop and grow your own blog without spending money on any web hosting and any web related maintenance.
Structure and Interpretation of Computer Programs, Second Edition
This edition emphasizes several new themes. The most important of these is the central role played by different approaches to dealing with time in computational models: objects with state, concurrent programming, functional programming, lazy evaluation, and nondeterministic programming.
Text Algorithms
Since the research on text algorithms continues, it is not possible to have a book that completely covers the area. Looking at the table of contents of this book, its fifteen chapters cover nicely many of the major developments in the field. Crochemore and Rytter have succeeded in producing a textbook that is as thorough as it is timely.
Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations
Written by two of the leading researchers in the area, this engaging and accessible book is unique in covering the diverse foundations of multiagent systems, including logic. Its extensive treatment of the interplay between computer science and game theory will define how the subject should be taught.
Foundations of Databases
The database management system is typically accompanied by a large and evergrowing body of application software that accesses and modifies the stored information. The primary focus in this book is to present part of the theory underlying the design and use of these systems.
Mining of Massive Datasets
Mining of Massive Datasets focuses on data mining of very large amounts of data, that is, data so large it does not fit in main memory. This book also takes an algorithmic point of view: data mining is about applying algorithms to data, rather than using data to ‘train’ a machine-learning engine of some sort.
From Algorithms to Z-Scores: Probabilistic and Statistical Modeling in Computer Science
Why is this book different from all other books on mathematical probability and statistics? The key aspect is the book’s consistently applied approach, especially important for engineering students.
Building Blocks for Theoretical Computer Science
This book teaches two different sorts of things, woven together. It teaches you how to read and write mathematical proofs. It provides a survey of basic mathematical objects, notation, and techniques which will be useful in later computer science courses. These include propositional and predicate logic, sets, functions, relations, modular arithmetic, counting, graphs, and trees.