Empirical Cloud Security Edition 2
Practical Intelligence to Evaluate Risks and Attacks
- Publisher
Mercury Learning and Information - Published
30th June 2023 - ISBN 9781501521393
- Language English
- Pages 462 pp.
- Size 7" x 9"
Library E-Books
We are signed up with aggregators who resell networkable e-book editions of our titles to academic libraries. These editions, priced at par with simultaneous hardcover editions of our titles, are not available direct from Stylus.
These aggregators offer a variety of plans to libraries, such as simultaneous access by multiple library patrons, and access to portions of titles at a fraction of list price under what is commonly referred to as a "patron-driven demand" model.
- Publisher
Mercury Learning and Information - Published
8th June 2023 - ISBN 9781501517990
- Language English
- Pages 462 pp.
- Size 7" x 9"
E-books are now distributed via VitalSource
VitalSource offer a more seamless way to access the ebook, and add some great new features including text-to-voice. You own your ebook for life, it is simply hosted on the vendor website, working much like Kindle and Nook. Click here to see more detailed information on this process.
- Publisher
Mercury Learning and Information - Published
8th June 2023 - ISBN 9781501518027
- Language English
- Pages 462 pp.
- Size 7" x 9"
The second edition of the book has been updated with the latest research and developments in the field of cloud security. The content has been refined and streamlined to make it more accessible and engaging for readers. The book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combat
threats, attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hands-on assessment techniques based on real-world studies, and concluding with recommendations including best practices.
FEATURES:
- Updated with the latest research and developments in the field of cloud security
- Includes practical strategies for assessing the security and privacy of your cloud infrastructure and applications
- Covers topics such as cloud architecture and security fundamentals, database and storage security, data privacy, security and risk assessments, controls related to continuous monitoring, and more
- Presents new case studies revealing how threat actors abuse and exploit cloud environments to spread malware and includes preventative measures
Aditya K. Sood, PhD
Aditya K. Sood (PhD) is a cybersecurity practitioner with more than 15 years of experience working with cross-functional teams, management, and customers to create the best-of-breed information security experience. His articles have appeared in magazines and journals, including IEEE, Elsevier, ISACA, Virus Bulletin, and USENIX, and he is the author of Targeted Cyber Attacks (Syngress). He has presented his research at industry leading security conferences such as BlackHat, DEFCON, Virus Bulletin, and others.