Syndetics cover image
Image from Syndetics

Cloud security for dummies / Ted Coombs.

By: Material type: TextTextSeries: --For dummiesPublisher: Hoboken, NJ : For Dummies, [2022]Copyright date: ©2022Description: xvi, 357 pages : illustrations ; 24 cmContent type:
  • text
  • still image
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781119790464
  • 1119790468
Other title:
  • Cloud security
Subject(s): Genre/Form:
Contents:
part 1. Getting started with cloud security: Clouds aren't bulletproof ; Getting down to business ; Storing data in the cloud ; Developing secure software ; Restricting access -- part 2. Acceptance: Managing cloud resources ; The role of AIOps in cloud security ; Implementing zero trust ; Dealing with hybrid cloud environments ; Data loss and disaster recovery -- part 3. Business as usual: Using cloud security services ; When things go wrong ; Security frameworks ; Security consortiums -- part 4. The part of tens: Ten steps to better cloud security ; Cloud security solutions.
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode Item holds
Adult Book Adult Book Main Library NonFiction 004.6782 C775 Available 33111010816052
Adult Book Adult Book Northport Library NonFiction 004.6782 C775 Available 33111009431426
Total holds: 0

Enhanced descriptions from Syndetics:

Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security

Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data.

Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world.

This book offers step-by-step demonstrations of how to:

Establish effective security protocols for your cloud application, network, and infrastructure Manage and use the security tools provided by different cloud vendors Deliver security audits that reveal hidden flaws in your security setup and ensure compliance with regulatory frameworks

As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard this critical component of modern IT architecture with the straightforward strategies and hands-on techniques discussed in this book.

Includes index.

part 1. Getting started with cloud security: Clouds aren't bulletproof ; Getting down to business ; Storing data in the cloud ; Developing secure software ; Restricting access -- part 2. Acceptance: Managing cloud resources ; The role of AIOps in cloud security ; Implementing zero trust ; Dealing with hybrid cloud environments ; Data loss and disaster recovery -- part 3. Business as usual: Using cloud security services ; When things go wrong ; Security frameworks ; Security consortiums -- part 4. The part of tens: Ten steps to better cloud security ; Cloud security solutions.

Powered by Koha