| 000 | 03152nam a2200433 i 4500 | ||
|---|---|---|---|
| 001 | 991022157314007026 | ||
| 003 | UkOxU | ||
| 005 | 20250930101743.0 | ||
| 006 | m o d | | ||
| 007 | cr#cnu|||||||| | ||
| 008 | 220208s2022 nju o 000 0 eng d | ||
| 020 | _a9781119790464 | ||
| 020 | _a9781119790488 | ||
| 020 | _a1119790484 | ||
| 020 | _a9781119790471 | ||
| 020 | _a1119790476 | ||
| 040 | _c- | ||
| 050 | 4 |
_aQA76.585 _b.M477 2022 |
|
| 082 | 0 |
_a004.6782 _223 |
|
| 100 | 1 |
_aCoombs, Ted, _eauthor. |
|
| 245 | 1 | 0 |
_aCloud security for dummies / _cTed Coombs. |
| 264 | 1 |
_aHoboken, New Jersey : _bJohn Wiley & Sons, _c[2022] |
|
| 264 | 4 | _c©2022 | |
| 300 | _a1 online resource (387 pages) | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 490 | 1 | _aFor dummies | |
| 500 | _aIncludes index. | ||
| 505 | 0 | _aClouds aren’t bulletproof -- Getting down to business -- Storing data in the Cloud -- Developing secure software -- Restricting access -- Managing Cloud resources -- The role of AIOps in Cloud security -- Implementing zero trust -- Dealing with hybrid Cloud environments -- Data loss and disaster recovery -- Using Cloud security services -- When things go wrong -- Security frameworks -- Security consortiums -- Ten steps to better Cloud security -- Cloud security solutions. | |
| 520 | _aEmbrace the cloud and kick hackers to the curb with this accessible guide on cloud security Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. This book offers step-by-step demonstrations of how to: Establish effective security protocols for your cloud application, network, and infrastructure Manage and use the security tools provided by different cloud vendors Deliver security audits that reveal hidden flaws in your security setup and ensure compliance with regulatory frameworks As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard this critical component of modern IT architecture with the straightforward strategies and hands-on techniques discussed in this book. | ||
| 588 | _aDescription based on print version record. | ||
| 650 | 0 |
_aCloud computing _xSecurity measures. |
|
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 | _aComputer security. | |
| 776 | 0 | 8 |
_iPrint version: _aCoombs, Ted _tCloud Security for Dummies _dNewark : John Wiley & Sons, Incorporated,c2022 _z9781119790464 |
| 830 | 0 | _a--For dummies. | |
| 942 |
_2ddc _cBOOKS |
||
| 999 |
_c1363 _d1363 |
||