|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_on1249475099 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
210501s2021 vau ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e rda
|e pn
|c EBLCP
|d LIV
|d YDX
|d OCLCO
|d OCLCF
|d OCLCQ
|d K6U
|d WAU
|d UKAHL
|d SFB
|d DEGRU
|d OCLCO
|d U3W
|
019 |
|
|
|a 1382318749
|a 1413761539
|
020 |
|
|
|a 9781683926832
|q (electronic book)
|
020 |
|
|
|a 1683926838
|q (electronic book)
|
020 |
|
|
|a 9781683926849
|q (electronic book)
|
020 |
|
|
|a 1683926846
|q (electronic book)
|
020 |
|
|
|a 1501517996
|q (electronic bk.)
|
020 |
|
|
|a 9781501517990
|q (electronic bk.)
|
035 |
|
|
|a (OCoLC)1249475099
|z (OCoLC)1382318749
|z (OCoLC)1413761539
|
041 |
|
|
|a eng
|
050 |
|
4 |
|a QA76.9.A25
|b .S66 2021
|
072 |
|
7 |
|a COM043050
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sood, Aditya K.,
|e author.
|
245 |
1 |
0 |
|a Empirical cloud security :
|b practical intelligence to evaluate risks and attacks /
|c Aditya K. Sood.
|
264 |
|
1 |
|a Dulles, Virginia :
|b Mercury Learning & Information,
|c [2021]
|
300 |
|
|
|a 1 online resource (xx, 443 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ProQuest Ebook Central, viewed August 29, 2022).
|
520 |
|
|
|a This book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. --
|c Edited summary from book.
|
505 |
0 |
|
|a 1: Cloud Architecture and Security Fundamentals -- 2: IAM for Authentication and Authorization -- 3: Cloud Infrastructure -- 4: Database and Storage Services -- 5: Design and Analysis of Cryptography Controls -- 6: Cloud Applications -- 7: Cloud Monitoring and Logging -- 8: Privacy in the Cloud -- 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments -- 10: Malicious Code in the Cloud -- 11: Threat Intelligence and Malware Protection in the Cloud -- Conclusion -- Appendices -- Index.
|
546 |
|
|
|a In English.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS / Security / Networking.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Sood, Aditya K.
|t Empirical cloud security.
|d Dulles, Virginia : Mercury Learning and Information, [2021]
|z 9781683926856
|w (DLC) 2021934304
|w (OCoLC)1263807568
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6577029
|z Texto completo
|
938 |
|
|
|a De Gruyter
|b DEGR
|n 9781683926849
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH41158334
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6577029
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 302258332
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 20343355
|
994 |
|
|
|a 92
|b IZTAP
|