With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects
Practical cloud security : a guide for secure design and deployment
β Scribed by Dotson, Chris, author
- Publisher
- Sebastopol, CA : O'Reilly Media
- Year
- 2019
- Tongue
- English
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
1 online resource (1 volume) :
π SIMILAR VOLUMES
Intro; Copyright; Table of Contents; Preface; Conventions Used in This Book; O'Reilly Online Learning Platform; How to Contact Us; Acknowledgments; Chapter 1. Principles and Concepts; Least Privilege; Defense in Depth; Threat Actors, Diagrams, and Trust Boundaries; Cloud Delivery Models; The Cloud S
<span>With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises proje
<i>Cloud Storage Security: A Practical Guide</i>introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also pr
<i>Cloud Storage Security: A Practical Guide</i> introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also p