Cloud attack vectors : building effective cyber-defense strategies to protect cloud resources /
Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus--it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resista...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | Haber, Morey J. (Autor), Chappell, Brian (Autor), Hills, Christopher (Security strategist) (Autor) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
Apress,
[2022]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Developing and Securing the Cloud.
por: Thuraisingham, Bhavani
Publicado: (2013) -
Building a Future-Proof Cloud Infrastructure : a Unified Architecture for Network, Security, and Storage Services /
por: Gai, Silvano
Publicado: (2020) -
Cloud security guidelines for IBM power systems /
por: Bücker, Axel
Publicado: (2015) -
Optimized cloud resource management and scheduling : theories and practice /
por: Tian, Wenhong
Publicado: (2015) -
Optimized cloud resource management and scheduling : theories and practice /
por: Tian, Wenhong
Publicado: (2015)