Practical Cloud Security Handbook (notice n° 1556186)
[ vue normale ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 03439cam a2200277zu 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | FRCYB88971650 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251020124039.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 251020s2025 fr | o|||||0|0|||eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9789365891478 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | FRCYB88971650 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | FR-PaCSA |
| Language of cataloging | en |
| Transcribing agency | |
| Description conventions | rda |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Kumar, Shiv |
| 245 01 - TITLE STATEMENT | |
| Title | Practical Cloud Security Handbook |
| Remainder of title | Secure cloud deployments with AWS, Azure, GCP, and IBM Cloud (English Edition) |
| Statement of responsibility, etc. | ['Kumar, Shiv'] |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
| Name of producer, publisher, distributor, manufacturer | BPB Publications |
| Date of production, publication, distribution, manufacture, or copyright notice | 2025 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | p. |
| 336 ## - CONTENT TYPE | |
| Content type code | txt |
| Source | rdacontent |
| 337 ## - MEDIA TYPE | |
| Media type code | c |
| Source | rdamdedia |
| 338 ## - CARRIER TYPE | |
| Carrier type code | c |
| Source | rdacarrier |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | DescriptionAs organizations rapidly migrate to cloud environments, robust cloud security is no longer optional—it is paramount. The Practical Cloud Security Handbook is your essential guide to navigating this complex landscape, empowering you to secure digital assets effectively and confidently in the era of distributed systems and cloud-native architectures.This handbook systematically guides you from cloud security fundamentals, including the shared responsibility model, through various cloud-native architectural patterns and top cloud workloads like IAM, VPC, and containerization. You will gain a deep understanding of core security concepts, such as encryption and protocols, and then explore the practical, multi-cloud configurations for securing storage, network services, and identity access management across AWS, Azure, IBM, and GCP. The book progresses to vital operational security aspects like monitoring, encryption application, and robust testing. It further explores modern approaches like security as code, offering best practices for both cloud-native and non-cloud-native implementations, integrates DevSecOps principles, and concludes with crucial compliance and regulatory considerations.Upon completing this handbook, you will possess a comprehensive, hands-on understanding of cloud security, enabling you to design, implement, and maintain secure cloud environments and confidently address today's complex cybersecurity challenges.What you will learn? Secure workloads across AWS, Azure, GCP, and IBM.? Implement Zero Trust security architectures.? Use infrastructure as code for secure deployments.? Set up DevSecOps pipelines with Jenkins and GitHub.? Explore IAM, encryption, and network security controls.? Detect and respond to security breaches effectively.? Apply DevSecOps, Zero Trust, and compliance best practices.Who this book is forThis book is designed for cloud engineers, DevOps professionals, security analysts, and IT architects. It assumes a foundational understanding of cloud computing concepts and basic IT security principles for aspiring cloud security professionals.Table of Contents1. Introduction to Cloud Security2. Cloud-native Architectures3. Understanding Top Workloads in the Cloud4. Concepts of Security5. Securing Storage Services6. Securing Network Services7. Identity and Access Management8. Monitoring, Applying Encryption, and Preparation/Testing9. Security as Code10. Best Practices for Cloud-native Implementations11. Best Practices for Non-cloud-native Implementations12. DevSecOps13. Compliance and Regulatory Considerations |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | |
| 700 0# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Kumar, Shiv |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Access method | Cyberlibris |
| Uniform Resource Identifier | <a href="https://international.scholarvox.com/netsen/book/88971650">https://international.scholarvox.com/netsen/book/88971650</a> |
| Electronic format type | text/html |
| Host name | |
Pas d'exemplaire disponible.




Réseaux sociaux