Cloud security

Ted Coombs

Book - 2022

Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. This book off...ers step-by-step demonstrations of how to: * Establish effective security protocols for your cloud application, network, and infrastructure * Manage and use the security tools provided by different cloud vendors * Deliver security audits that reveal hidden flaws in your security setup and ensure compliance with regulatory frameworks. As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard this critical component of modern IT architecture with the straightforward strategies and hands-on techniques discussed in this book.

Saved in:

2nd Floor Show me where

004.6782/Coombs
0 / 1 copies available
Location Call Number   Status
2nd Floor 004.6782/Coombs Due Jan 14, 2025
Subjects
Published
Hoboken, NJ : John Wiley & Sons, Inc [2022]
Language
English
Main Author
Ted Coombs (author)
Physical Description
xvi, 357 pages : illustrations ; 24 cm
Bibliography
Includes index.
ISBN
9781119790464
  • Part 1. Getting started with cloud security. Clouds aren't bulletproof ; Getting down to business ; Storing data in the cloud ; Developing secure software ; Restricting access
  • Part 2. Acceptance. Managing cloud resources ; The role of AIOps in cloud security ; Implementing zero trust ; Dealing with hybrid cloud environments ; Data loss and disaster recovery
  • Part 3. Business as usual. Using cloud security services ; When things go wrong ; Security frameworks ; Security consortiums
  • Part 4. The part of tens. Ten steps to better cloud security ; Cloud security solutions.