000 | 01726cam a22003255i 4500 | ||
---|---|---|---|
001 | 23026948 | ||
003 | KWUST | ||
005 | 20250327100222.0 | ||
008 | 230320s2023 mau 000 0 eng | ||
010 | _a 2023934889 | ||
020 |
_a9781501521393 _q(print) |
||
020 |
_a9781501521515 _q(paperback) |
||
020 |
_z9781501518027 _q(ebook) |
||
040 |
_aDLC _beng _erda _cDLC |
||
042 | _apcc | ||
050 |
_aQA 76. A 25 _b.S 663 2023 |
||
100 | 1 |
_aSood, Aditya, _eauthor. |
|
245 | 1 | 0 |
_aEmpirical cloud security / _cAditya Sood. |
250 | _asecond edition. | ||
263 | _a2306 | ||
264 | 1 |
_aDuxbury : _bMercury Learning and Information, _c2023. |
|
300 |
_apages cm _bIll(not colored, includes index) _c23cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
520 |
_a"This updated edition is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combat threats, attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hand-on assessment techniques based on real-world studies, and concluding with recommendations including best practices"-- _cProvided by publisher. |
||
906 |
_a0 _bibc _corignew _d2 _eepcn _f20 _gy-gencatlg |
||
942 |
_2lcc _cBK _e2e _hQA 76. A 25 _i. S 663 2023 |
||
999 |
_c2938 _d2938 |