Practical Cloud Security. A Guide for Secure Design and Deployment
Par :Formats :
- Réservation en ligne avec paiement en magasin :
- Indisponible pour réserver et payer en magasin
- Nombre de pages180
- PrésentationBroché
- FormatGrand Format
- Poids0.358 kg
- Dimensions17,7 cm × 23,1 cm × 1,5 cm
- ISBN978-1-4920-3751-4
- EAN9781492037514
- Date de parution22/03/2019
- ÉditeurO'Reilly
Résumé
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud.
Chris Dotson-an IBM senior technical staff member-shows you how to establish data asset management, identity and access management, vulnerability management, network security, and incident response in your cloud environment. - Learn how standard principles and concepts, such as least privilege and defense in depth, apply in the cloud. - Compare cloud-based and on-premises data asset management and protection.
- Manage cloud providers that store or process data or deliver administrative control. - Understand the critical role played by identity and asset management (IAM) in the cloud. - Manage various types of vulnerabilities. - Use tactics to detect, respond to, and recover from security incidents.
Chris Dotson-an IBM senior technical staff member-shows you how to establish data asset management, identity and access management, vulnerability management, network security, and incident response in your cloud environment. - Learn how standard principles and concepts, such as least privilege and defense in depth, apply in the cloud. - Compare cloud-based and on-premises data asset management and protection.
- Manage cloud providers that store or process data or deliver administrative control. - Understand the critical role played by identity and asset management (IAM) in the cloud. - Manage various types of vulnerabilities. - Use tactics to detect, respond to, and recover from security incidents.
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud.
Chris Dotson-an IBM senior technical staff member-shows you how to establish data asset management, identity and access management, vulnerability management, network security, and incident response in your cloud environment. - Learn how standard principles and concepts, such as least privilege and defense in depth, apply in the cloud. - Compare cloud-based and on-premises data asset management and protection.
- Manage cloud providers that store or process data or deliver administrative control. - Understand the critical role played by identity and asset management (IAM) in the cloud. - Manage various types of vulnerabilities. - Use tactics to detect, respond to, and recover from security incidents.
Chris Dotson-an IBM senior technical staff member-shows you how to establish data asset management, identity and access management, vulnerability management, network security, and incident response in your cloud environment. - Learn how standard principles and concepts, such as least privilege and defense in depth, apply in the cloud. - Compare cloud-based and on-premises data asset management and protection.
- Manage cloud providers that store or process data or deliver administrative control. - Understand the critical role played by identity and asset management (IAM) in the cloud. - Manage various types of vulnerabilities. - Use tactics to detect, respond to, and recover from security incidents.