In the name of Allah the Merciful

Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

Second Edition, Aditya K. Sood, 150152139X, 150151802X, 978-1501521393, 9781501521393, 978-1501518027, 9781501518027, B0C7CYKDBY

10 $

English | 2023 | EPUB, Converted PDF

number
type
  • {{value}}
wait a little

The second edition of the book has been updated with the latest  research and developments in the field of cloud security. The content  has been refined and streamlined to make it more accessible and engaging  for readers. The book is designed for security and risk assessment  professionals, DevOps engineers, penetration testers, cloud security  engineers, and cloud software developers who are interested in learning  practical approaches to cloud security. It covers practical strategies  for assessing the security and privacy of your cloud infrastructure and  applications and shows how to make your cloud infrastructure secure to  combat threats, attacks, and prevent data breaches. The chapters are  designed with a granular framework, starting with the security concepts,  followed by hands-on assessment techniques based on real-world studies,  and concluding with recommendations including best practices.

Features
+Updated with the latest research and developments in the field of cloud security
+Includes practical strategies for assessing the security and privacy of your cloud infrastructure and applications
+Covers  topics such as cloud architecture and security fundamentals, database  and storage security, data privacy, security and risk assessments,  controls related to continuous monitoring, and more
+Presents new  case studies revealing how threat actors abuse and exploit cloud  environments to spread malware and includes preventative measures

1: Cloud Architecture and Security Fundamentals. 2: IAM for  Authentication and Authorization. 3: Cloud Infrastructure. 4: Database  and Storage Services. 5: Design and Analysis of Cryptography Controls.  6: Cloud Applications. 7: Cloud Monitoring and Logging. 8: Privacy in  the Cloud. 9: Cloud Security and Privacy: Flaws, Attacks, and Impact  Assessments. 10: Malicious Code in the Cloud. 11. Threat Intelligence  and Malware Protection in the Cloud. Appendices. Index.