Further reading
To learn more about the topics that were covered in this chapter, take a look at the following resources:
- [1] Hunting secrets in public S3 buckets: https://medium.com/@hareleilon/hunting-after-secrets-accidentally-uploaded-to-public-s3-buckets-7e5bbbb80097
- [2] Apple’s mobile device management: https://support.apple.com/guide/deployment/intro-to-mdm-profiles-depc0aadd3fe/web
- [3] Google – Operation Aurora: https://www.youtube.com/watch?v=przDcQe6n5o
- [4] Google’s official blog on Aurora: https://googleblog.blogspot.com/2010/01/new-approach-to-china.html
- [5] BeyondCorp initiative: https://www.beyondcorp.com/
- [6] Code owners policy in Chromium: https://groups.google.com/a/chromium.org/g/chromium-dev/c/aGC8BTTFK64