<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Practical Cloud Security: A Guide For Secure Design And Deployment</title>
  </titleInfo>
  <name type="personal">
    <namePart>Chris Dotson</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <name type="personal">
    <namePart>DOTSON (Chris)</namePart>
  </name>
  <typeOfResource>text</typeOfResource>
  <originInfo>
    <place>
      <placeTerm type="text">Mumbai</placeTerm>
    </place>
    <publisher>Shroff Publishers and Distributors Pvt Ltd</publisher>
    <dateIssued>2021</dateIssued>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <language>
    <languageTerm authority="iso639-2b" type="code">Eng</languageTerm>
  </language>
  <language>
    <languageTerm authority="iso639-2b" type="code">lis</languageTerm>
  </language>
  <language>
    <languageTerm authority="iso639-2b" type="code">h</languageTerm>
  </language>
  <physicalDescription>
    <form authority="marcform">print</form>
    <extent>xii,181 p. PB 23x17.5 cm.</extent>
  </physicalDescription>
  <abstract>All Indian Reprints of O'Reilly are printed in Grayscale
Practical Cloud Security: A Guide for Secure Design and Deployment
Home/Books/Practical Cloud Security: A Guide for Secure Design and Deployment
Description
Features
Table of Contents
All Indian Reprints of O'Reilly are printed in Grayscale
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up.
Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. Chris Dotson—an IBM senior technical staff member—shows you how to establish data asset management, identity and access management, vulnerability management, network security, and incident response in your cloud environment.
Learn how standard principles and concepts, such as least privilege and defense in depth, apply in the cloud
Compare cloud-based and on-premises data asset management and protection
Manage cloud providers that store or process data or deliver administrative control
Understand the critical role played by identity and asset management (IAM) in the cloud
Set up a continuous process for managing potential vulnerabilities
Learn how network controls in the cloud provide a vital layer of protection
Use tactics to detect, respond to, and recover from security incidents</abstract>
  <subject>
    <topic>Computer networks--Access control</topic>
  </subject>
  <subject>
    <topic>Computer networks--Security measures</topic>
  </subject>
  <subject>
    <topic>Cloud computing</topic>
  </subject>
  <classification authority="ddc" edition="23">004.6782 DOTP</classification>
  <identifier type="isbn">9789352138159</identifier>
  <recordInfo>
    <recordContentSource authority="marcorg"/>
    <recordCreationDate encoding="marc">221230</recordCreationDate>
    <recordChangeDate encoding="iso8601">20230102113812.0</recordChangeDate>
  </recordInfo>
</mods>
