000 05120cam a2200541 i 4500
001 on1308484255
003 OCoLC
005 20241121073012.0
006 m d
007 cr cnu---unuuu
008 220318s2022 enk o 000 0 eng d
040 _aUKMGB
_beng
_erda
_epn
_cUKMGB
_dOCLCO
_dORMDA
_dOCLCF
_dN$T
_dYDX
_dUKAHL
_dOCLCQ
_dIEEEE
_dOCLCO
_dOCLCQ
015 _aGBC251371
_2bnb
016 7 _a020528318
_2Uk
020 _a9781800565722
_qelectronic book
020 _a1800565720
_qelectronic book
020 _z9781800569195
_qpaperback
035 _a3198558
_b(N$T)
035 _a(OCoLC)1308484255
037 _a9781800565722
_bPackt Publishing Pvt. Ltd
037 _a9781800569195
_bO'Reilly Media
037 _a10162972
_bIEEE
050 4 _aQA76.585
_b.E88 2022
082 0 4 _a004.6782
_223
049 _aMAIN
100 1 _aEstrin, Eyal,
_eauthor.
_919271
245 1 0 _aCloud security handbook :
_bfind out how to effectively secure cloud environments using AWS, Azure, and GCP /
_cEyal Estrin.
264 1 _aBirmingham :
_bPackt Publishing,
_c2022.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
520 _aA comprehensive reference guide to securing the basic building blocks of cloud services, with actual examples for leveraging Azure, AWS, and GCP built-in services and capabilities Key Features Discover practical techniques for implementing cloud security Learn how to secure your data and core cloud infrastructure to suit your business needs Implement encryption, detect cloud threats and misconfiguration, and achieve compliance in the cloud Book Description Securing resources in the cloud is challenging, given that each provider has different mechanisms and processes. Cloud Security Handbook helps you to understand how to embed security best practices in each of the infrastructure building blocks that exist in public clouds. This book will enable information security and cloud engineers to recognize the risks involved in public cloud and find out how to implement security controls as they design, build, and maintain environments in the cloud. You'll begin by learning about the shared responsibility model, cloud service models, and cloud deployment models, before getting to grips with the fundamentals of compute, storage, networking, identity management, encryption, and more. Next, you'll explore common threats and discover how to stay in compliance in cloud environments. As you make progress, you'll implement security in small-scale cloud environments through to production-ready large-scale environments, including hybrid clouds and multi-cloud environments. This book not only focuses on cloud services in general, but it also provides actual examples for using AWS, Azure, and GCP built-in services and capabilities. By the end of this cloud security book, you'll have gained a solid understanding of how to implement security in cloud environments effectively. What you will learn Secure compute, storage, and networking services in the cloud Get to grips with identity management in the cloud Audit and monitor cloud services from a security point of view Identify common threats and implement encryption solutions in cloud services Maintain security and compliance in the cloud Implement security in hybrid and multi-cloud environments Design and maintain security in a large-scale cloud environment Who this book is for This book is for IT or information security personnel taking their first steps in the public cloud or migrating existing environments to the cloud. Cloud engineers, cloud architects, or cloud security professionals maintaining production environments in the cloud will also benefit from this book. Prior experience of deploying virtual machines, using storage services, and networking will help you to get the most out of this book.
505 0 _aTable of Contents Introduction to Cloud Security Securing Compute Services Securing Storage Services Securing Network Services Effective Strategies to Implement IAM Solutions Monitoring and Auditing of Your Cloud Environments Applying Encryption in Cloud Services Understanding Common Security Threats to Cloud Computing Handling Compliance and Regulation Engaging with Cloud Providers Managing Hybrid Clouds Managing Multi-Cloud Environments Security in Large-Scale Environments.
590 _aAdded to collection customer.56279.3
650 0 _aCloud computing
_xSecurity measures.
_915977
650 0 _aComputer security.
_91473
650 2 _aComputer Security
_91473
650 6 _aInfonuagique
_xS�ecurit�e
_xMesures.
_915978
650 6 _aS�ecurit�e informatique.
_913061
650 7 _aComputer security
_2fast
_91473
776 0 8 _iPrint version:
_z9781800569195
856 4 0 _3EBSCOhost
_uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3198558
938 _aYBP Library Services
_bYANK
_n302792762
938 _aAskews and Holts Library Services
_bASKH
_nAH39825086
938 _aEBSCOhost
_bEBSC
_n3198558
994 _a92
_bN$T
999 _c8214
_d8214