Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

by Aditya K. Sood PhD
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

by Aditya K. Sood PhD

Paperback(2nd ed.)

$59.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
    Usually ships within 6 days
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

The book discusses the security and privacy issues detected during penetration testing, security assessments, configuration reviews, malware analysis, and independent research of the cloud infrastructure and Software-as-a-Service (SaaS) applications. The book highlights hands-on technical approaches on how to detect the security issues based on the intelligence gathered from the real world case studies and also discusses the recommendations to fix the security issues effectively. This book is not about general theoretical discussion rather emphasis is laid on the cloud security concepts and how to assess and fix them practically.


Product Details

ISBN-13: 9781501521393
Publisher: Mercury Learning and Information
Publication date: 06/30/2023
Edition description: 2nd ed.
Pages: 462
Product dimensions: 7.00(w) x 9.00(h) x (d)

About the Author

Sood Aditya K. :

Aditya K. Sood (PhD) is a cybersecurity practitioner with more than 13 years of experience working with cross-functional teams, management, and customers to create the best-of-breed information security experience. His articles have appeared in magazines and journals, including IEEE, Elsevier, ISACA, Virus Bulletin, and USENIX, and he is the author of Targeted Cyber Attacks (Syngress). He has presented his research at industry leading security conferences such as BlackHat, DEFCON, Virus Bulletin, and others.

Table of Contents

1: Cloud Architecture and Security Fundamentals
2: IAM for Authentication and Authorization
3: Cloud Infrastructure
4: Database and Storage Services
5: Design and Analysis of Cryptography Controls
6: Cloud Applications
7: Cloud Monitoring and Logging
8: Privacy in the Cloud
9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments
10: Malicious Code in the Cloud
11: Threat Intelligence and Malware Protection in the Cloud
Conclusion
Appendices
Index
From the B&N Reads Blog

Customer Reviews