Practical cloud security : a guide for secure design and deployment /

With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises...

Full description

Saved in:
Bibliographic Details
Main Author: Dotson, Chris (Author)
Format: Electronic eBook
Language:English
Published: Sebastopol, CA : O'Reilly Media, Inc., 2023.
Edition:Second edition.
Subjects:
Online Access:CONNECT

MARC

LEADER 00000nam a22000007i 4500
001 in00006414332
006 m o d
007 cr cnu|||unuuu
008 231010s2023 caua ob 001 0 eng d
005 20231012140527.7
035 |a 1WRLDSHRon1402181798 
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA 
020 |z 9781098148171 
035 |a (OCoLC)1402181798 
037 |a 9781098148164  |b O'Reilly Media 
050 4 |a QA76.585 
082 0 4 |a 004.67/82  |2 23/eng/20231010 
049 |a TXMM 
100 1 |a Dotson, Chris,  |e author. 
245 1 0 |a Practical cloud security :  |b a guide for secure design and deployment /  |c Chris Dotson. 
250 |a Second edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media, Inc.,  |c 2023. 
300 |a 1 online resource (228 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. IBM Distinguished Engineer Chris Dotson shows you how to establish data asset management, identity and access management (IAM), vulnerability management, network security, and incident response in your cloud environment. 
500 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access)  |5 TMurS 
650 0 |a Cloud computing  |x Security measures. 
650 0 |a Cloud computing  |x Industrial applications. 
730 0 |a WORLDSHARE SUB RECORDS 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781098148164/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s ceecf1a7-f858-42b4-8e63-30ea6a294b50  |i e64d0672-72cb-4e96-a90b-5a33b27f7c6f  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e QA76.585   |h Library of Congress classification