Cloud attack vectors = building effe...
Haber, Morey J.

Linked to FindBook      Google Book      Amazon      博客來     
  • Cloud attack vectors = building effective cyber-defense strategies to protect cloud resources /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Cloud attack vectors/ by Morey J. Haber, Brian Chappell, Christopher Hills.
    Reminder of title: building effective cyber-defense strategies to protect cloud resources /
    Author: Haber, Morey J.
    other author: Chappell, Brian.
    Published: Berkeley, CA :Apress : : 2022.,
    Description: xxxi, 473 p. :ill., digital ;24 cm.
    [NT 15003449]: Chapter 1. Introduction -- Chapter 2. Cloud Computing -- Chapter 3. Cloud Service Proviers -- Chapter 4. Cloud Definitions -- Chapter 5. Asset Manager -- Chapter 6. Attack Vectors -- Chapter 7. Mitigation Strategies -- Chapter 8. Regulatory Compliance -- Chapter 9. Architectures -- Chapter 10. Swarm Intelligence -- Chapter 11. Chaos Engineering -- Chapter 12: Imposter Syndrome -- Chapter 13: Selecting a Cloud Service Provider -- Chapter 14: Security Recommendations for your Cloud Environment -- Chapter 15: Conclusion -- Appendix A -- Appendix B.
    Contained By: Springer Nature eBook
    Subject: Cloud computing. -
    Online resource: https://doi.org/10.1007/978-1-4842-8236-6
    ISBN: 9781484282366
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9444379 電子資源 11.線上閱覽_V 電子書 EB QA76.585 .H33 2022 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login