|
|
|
|
LEADER |
00000cim a22000007i 4500 |
001 |
OR_on1313943129 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o h |
007 |
sz zunnnnnuneu |
007 |
cr nnannnuuuuu |
008 |
220504s2022 ctunnnn o i n eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d TEFOD
|
019 |
|
|
|a 1356970195
|
020 |
|
|
|a 9798765008096
|q (electronic audio bk.)
|
020 |
|
|
|a 9798765008089
|q (electronic audio bk.)
|
029 |
1 |
|
|a AU@
|b 000071968509
|
035 |
|
|
|a (OCoLC)1313943129
|z (OCoLC)1356970195
|
037 |
|
|
|a 9798765008096
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.585
|
082 |
0 |
4 |
|a 004.6782
|2 23/eng/20220504
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Coombs, Ted,
|e author.
|
245 |
1 |
0 |
|a Cloud security for dummies /
|c Ted Coombs.
|
246 |
3 |
0 |
|a Cloud security
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Old Saybrook, Connecticut] :
|b Tantor Media, Inc.,
|c 2022.
|
300 |
|
|
|a 1 online resource (1 audio file (16 hr., 24 min.))
|
306 |
|
|
|a 162400
|
336 |
|
|
|a spoken word
|b spw
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a audio file
|2 rdaft
|
490 |
1 |
|
|a For dummies
|
511 |
0 |
|
|a Read by Chris Reilly.
|
520 |
|
|
|a Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. This book offers step-by-step demonstrations of how to: - Establish effective security protocols for your cloud application, network, and infrastructure - Manage and use the security tools provided by different cloud vendors - Deliver security audits that reveal hidden flaws in your security setup As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard with the straightforward strategies discussed in this book.
|
588 |
0 |
|
|a Online resource; title from title details screen (O'Reilly, viewed May 4, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
655 |
|
4 |
|a Downloadable audio books.
|
655 |
|
7 |
|a Audiobooks.
|2 fast
|0 (OCoLC)fst01726208
|
655 |
|
7 |
|a Audiobooks.
|2 lcgft
|
700 |
1 |
|
|a Reilly, Chris,
|e narrator.
|
830 |
|
0 |
|a --For dummies.
|h Spoken word.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9798765008096/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|