Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
No detailed description available for "Empirical Cloud Security".
1139151874
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
No detailed description available for "Empirical Cloud Security".
62.99 In Stock
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

by Aditya K. Sood
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

by Aditya K. Sood

eBook

$62.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

No detailed description available for "Empirical Cloud Security".

Product Details

ISBN-13: 9781501518027
Publisher: De Gruyter
Publication date: 06/22/2023
Sold by: Barnes & Noble
Format: eBook
Pages: 500
File size: 21 MB
Note: This product may take a few minutes to download.
Age Range: 18 Years

About the Author

Sood Aditya K. :

Aditya K. Sood (PhD) is a cybersecurity practitioner with more than 13 years of experience working with cross-functional teams, management, and customers to create the best-of-breed information security experience. His articles have appeared in magazines and journals, including IEEE, Elsevier, ISACA, Virus Bulletin, and USENIX, and he is the author of Targeted Cyber Attacks (Syngress). He has presented his research at industry leading security conferences such as BlackHat, DEFCON, Virus Bulletin, and others.

Table of Contents

1: Cloud Architecture and Security Fundamentals
2: IAM for Authentication and Authorization
3: Cloud Infrastructure
4: Database and Storage Services
5: Design and Analysis of Cryptography Controls
6: Cloud Applications
7: Cloud Monitoring and Logging
8: Privacy in the Cloud
9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments
10: Malicious Code in the Cloud
11: Threat Intelligence and Malware Protection in the Cloud
Conclusion
Appendices
Index
From the B&N Reads Blog

Customer Reviews