(Ilmumisaeg: 06-May-2025, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394289554)
Make your next Amazon Web Services deployment secure and private Dive into the world of cloud security with Securing the AWS Cloud: A Guide for Learning to Secure AWS Infrastructure by Brandon Carroll, a comprehensive guide crafte...Loe edasi...
This book is about the latest developments in AI, Blockchain, ML/DL in cloud security, strategies for assessing the privacy of cloud infrastructure and secure them against data breaches. The chapters are designed with a granular framework, startin...Loe edasi...
A complete guide to securing the core components of cloud services, with practical, real-world examples using the built-in security features of Azure, AWS, and GCP Key Features Discover hands-on techniques for implementing robu...Loe edasi...
With the growth of cloud native applications, developers increasingly rely on APIs to make everything work. But security often lags behind, making APIs an attractive target for bad actors looking to access valuable business data. OAuth is a popula...Loe edasi...
This book addresses security of FPGA-accelerated cloud computing environments. It presents a comprehensive review of the state-of-the-art in security threats as well as defenses. The book further presents design principles to help in the evaluation...Loe edasi...
Prepare for Microsoft Exam AZ-500 and demonstrate your real-world knowledge of Microsoft Azure security, including the skills needed to implement security controls, maintain an organization’s security posture, and identify and rem...Loe edasi...
Examine the complexities of detecting ransomware and the potential rocky road to recover after it has infected a system environment. This book addresses the topic of Disaster and Ransomware Recovery in the VMware Cloud.You’ll start by exami...Loe edasi...
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, while following cloud security best practices Key Features Explore useful recipes for implementing robust clou...Loe edasi...
The integration of fog computing with the resource-limited Internet of Things (IoT) network formulates the concept of the fog-enabled IoT system. Due to a large number of IoT devices, the IoT is a main source of Big Data. A large volume of sensing...Loe edasi...
This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects.The text provides readers with an overview of cloud computing, beginning with historical perspectives...Loe edasi...
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice....Loe edasi...
Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradig...Loe edasi...
This book is a comprehensive work that comprises latest development and technologies, challenges, and best practices in the industry. It covers the fundamentals of cloud computing, including deployment models, service models, and the benefits of c...Loe edasi...
Gain holistic insights and practical expertise in embedding security within the DevOps pipeline, specifically tailored for Azure cloud environments Key Features Learn how to integrate security into Azure DevOps workflows for cl...Loe edasi...
Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Nabil El Ioini
Sari: Synthesis Lectures on Information Security, Privacy, and Trust
(Ilmumisaeg: 18-Jul-2024, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031597237)
This book, authored by some of the pioneers in the security certification domain, provides a foundational knowledge base for designing and deploying effective security certification schemes for cloud-edge distributed systems. It gives readers uniq...Loe edasi...
In todays cloud native world, where we automate as much as possible, everything is code. With this practical guide, youll learn how policy as code (PaC) provides the means to manage the policies that guide our responses as well as the systems we...Loe edasi...
Enhance your security expertise in Microsoft virtual desktops by exploring the latest security controls and use cases to safeguard your Windows 365 and Azure Virtual Desktop infrastructure Key Features Understand the importance...Loe edasi...
I was impressed by how well-structured the book is, offering clear and expert guidance that makes complex concepts easy to understand. The comprehensive coverage of topics and practical examples will ensure that you are well-prepared for the exam. ...Loe edasi...
Written in a simple and developer-focused style, this book gives you the tools and knowledge you need to ace the GCP Professional Cloud Security Engineer certification exam. The approach is two-fold: introducing and implementing all GCP cloud secu...Loe edasi...