Empirical cloud security / Aditya Sood.
Material type:
- text
- unmediated
- volume
- 9781501521393
- 9781501521515
- QA 76. A 25 .S 663 2023
Item type | Current library | Collection | Call number | Status | Barcode | |
---|---|---|---|---|---|---|
![]() |
KWUST-Main Library General Stacks | Non-fiction | QA 76. A 25 .S 663 2023 (Browse shelf(Opens below)) | Available | 2025-0563 |
Browsing KWUST-Main Library shelves, Shelving location: General Stacks, Collection: Non-fiction Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA 76 .A25 M57 2018 Windows security monitoring scenarios and patterns | QA 76 .A25 M57 2018 Windows security monitoring scenarios and patterns | QA 76 .A25 M57 2018 Windows security monitoring scenarios and patterns | QA 76. A 25 .S 663 2023 Empirical cloud security / | QA 76 .D35 .S834 2020 Codeless Data Structures and Algorithms Leran DSA without writing a single line of code | QA 76 .D35 .S834 2020 Codeless Data Structures and Algorithms Leran DSA without writing a single line of code | QA 76 .D35 .S834 2020 Codeless Data Structures and Algorithms Leran DSA without writing a single line of code |
"This updated edition is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combat threats, attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hand-on assessment techniques based on real-world studies, and concluding with recommendations including best practices"-- Provided by publisher.
There are no comments on this title.