Softwarez.Info - Software's World!
Practical Cloud Security: A Guide for Secure Design and Deployment, 2nd Edition (PDF) - Printable Version

+- Softwarez.Info - Software's World! (https://softwarez.info)
+-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone)
+--- Forum: E-Books (https://softwarez.info/Forum-E-Books)
+--- Thread: Practical Cloud Security: A Guide for Secure Design and Deployment, 2nd Edition (PDF) (/Thread-Practical-Cloud-Security-A-Guide-for-Secure-Design-and-Deployment-2nd-Edition-PDF)



Practical Cloud Security: A Guide for Secure Design and Deployment, 2nd Edition (PDF) - BaDshaH - 10-31-2023

[Image: 6524cefe8497b345061663a6e0347e7a.jpg]
Practical Cloud Security: A Guide for Secure Design and Deployment, 2nd Edition (PDF)

English | November 14, 2023 | ISBN: 1098148177 | True PDF | 228 pages | 4.9 MB
Author: Chris Dotson

With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up.

Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. IBM Distinguished Engineer Chris Dotson shows you how to establish data asset management, identity and access management (IAM), vulnerability management, network security, and incident response in your cloud environment.

Learn the latest threats and challenges in the cloud security space
Manage cloud providers that store or process data or deliver administrative control
Learn how standard principles and concepts-such as least privilege and defense in depth-apply in the cloud
Understand the critical role played by IAM in the cloud
Use best tactics for detecting, responding, and recovering from the most common security incidents
Manage various types of vulnerabilities, especially those common in multicloud or hybrid cloud architectures
Examine privileged access management in cloud environments

[To see links please register or login]