The book discusses the security and privacy issues detected during penetration testing, security assessments, configuration reviews, malware analysis, and independent research of the cloud infrastructure and Software-as-a-Service (SaaS) applications. The book highlights hands-on technical approaches on how to detect the security issues based on the intelligence gathered from the real world case studies and also discusses the recommendations to fix the security issues effectively. This book is not about general theoretical discussion rather emphasis is laid on the cloud security concepts and how to assess and fix them practically. …mehr
The book discusses the security and privacy issues detected during penetration testing, security assessments, configuration reviews, malware analysis, and independent research of the cloud infrastructure and Software-as-a-Service (SaaS) applications. The book highlights hands-on technical approaches on how to detect the security issues based on the intelligence gathered from the real world case studies and also discusses the recommendations to fix the security issues effectively. This book is not about general theoretical discussion rather emphasis is laid on the cloud security concepts and how to assess and fix them practically.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Aditya K Sood (Ph.D.) is a cyber security advisor, practitioner, researcher and consultant. With an experience of more than 12 years, he provides strategic leadership in the field of information security covering products and infrastructure. He is well experienced in propelling the businesses by making security a salable business trait.
Inhaltsangabe
1: Cloud Architecture and Security Fundamentals 2: IAM for Authentication and Authorization 3: Cloud Infrastructure 4: Database and Storage Services 5: Design and Analysis of Cryptography Controls 6: Cloud Applications 7: Cloud Monitoring and Logging 8: Privacy in the Cloud 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments 10: Malicious Code in the Cloud 11: Threat Intelligence and Malware Protection in the Cloud Conclusion Appendices Index
1: Cloud Architecture and Security Fundamentals 2: IAM for Authentication and Authorization 3: Cloud Infrastructure 4: Database and Storage Services 5: Design and Analysis of Cryptography Controls 6: Cloud Applications 7: Cloud Monitoring and Logging 8: Privacy in the Cloud 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments 10: Malicious Code in the Cloud 11: Threat Intelligence and Malware Protection in the Cloud Conclusion Appendices Index
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826