Cloud security for dummies:
Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure....
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, NJ
For Dummies
[2022]
|
Schriftenreihe: | For dummies
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119790464/?ar |
Zusammenfassung: | Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. This book offers step-by-step demonstrations of how to: Establish effective security protocols for your cloud application, network, and infrastructure Manage and use the security tools provided by different cloud vendors Deliver security audits that reveal hidden flaws in your security setup and ensure compliance with regulatory frameworks As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard this critical component of modern IT architecture with the straightforward strategies and hands-on techniques discussed in this book. |
Beschreibung: | Includes index. - Description based on print version record |
Umfang: | 1 Online-Ressource (384 Seiten) illustrations. |
ISBN: | 9781119790488 1119790484 9781119790471 1119790476 9781119790464 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-077856082 | ||
003 | DE-627-1 | ||
005 | 20240228121634.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220513s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781119790488 |c ePub ebook |9 978-1-119-79048-8 | ||
020 | |a 1119790484 |9 1-119-79048-4 | ||
020 | |a 9781119790471 |c ebk |9 978-1-119-79047-1 | ||
020 | |a 1119790476 |9 1-119-79047-6 | ||
020 | |a 9781119790464 |9 978-1-119-79046-4 | ||
035 | |a (DE-627-1)077856082 | ||
035 | |a (DE-599)KEP077856082 | ||
035 | |a (ORHE)9781119790464 | ||
035 | |a (DE-627-1)077856082 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 004.6782 |2 23 | |
100 | 1 | |a Coombs, Ted |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cloud security for dummies |c Ted Coombs |
246 | 3 | 3 | |a Cloud security |
264 | 1 | |a Hoboken, NJ |b For Dummies |c [2022] | |
264 | 4 | |c ©2022 | |
300 | |a 1 Online-Ressource (384 Seiten) |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a For dummies | |
500 | |a Includes index. - Description based on print version record | ||
520 | |a Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. This book offers step-by-step demonstrations of how to: Establish effective security protocols for your cloud application, network, and infrastructure Manage and use the security tools provided by different cloud vendors Deliver security audits that reveal hidden flaws in your security setup and ensure compliance with regulatory frameworks As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard this critical component of modern IT architecture with the straightforward strategies and hands-on techniques discussed in this book. | ||
650 | 0 | |a Cloud computing |x Security measures | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Infonuagique ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Instructional and educational works | |
650 | 4 | |a Instructional and educational works | |
650 | 4 | |a Matériel d'éducation et de formation | |
776 | 1 | |z 9781119790464 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119790464 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119790464/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-077856082 |
---|---|
_version_ | 1821494821806669824 |
adam_text | |
any_adam_object | |
author | Coombs, Ted |
author_facet | Coombs, Ted |
author_role | aut |
author_sort | Coombs, Ted |
author_variant | t c tc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)077856082 (DE-599)KEP077856082 (ORHE)9781119790464 |
dewey-full | 004.6782 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6782 |
dewey-search | 004.6782 |
dewey-sort | 14.6782 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03466cam a22006132 4500</leader><controlfield tag="001">ZDB-30-ORH-077856082</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121634.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220513s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119790488</subfield><subfield code="c">ePub ebook</subfield><subfield code="9">978-1-119-79048-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119790484</subfield><subfield code="9">1-119-79048-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119790471</subfield><subfield code="c">ebk</subfield><subfield code="9">978-1-119-79047-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119790476</subfield><subfield code="9">1-119-79047-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119790464</subfield><subfield code="9">978-1-119-79046-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)077856082</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP077856082</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119790464</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)077856082</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6782</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Coombs, Ted</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud security for dummies</subfield><subfield code="c">Ted Coombs</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Cloud security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">For Dummies</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (384 Seiten)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">For dummies</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Description based on print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. This book offers step-by-step demonstrations of how to: Establish effective security protocols for your cloud application, network, and infrastructure Manage and use the security tools provided by different cloud vendors Deliver security audits that reveal hidden flaws in your security setup and ensure compliance with regulatory frameworks As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard this critical component of modern IT architecture with the straightforward strategies and hands-on techniques discussed in this book.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional and educational works</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional and educational works</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Matériel d'éducation et de formation</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119790464</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119790464</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119790464/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-077856082 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:28Z |
institution | BVB |
isbn | 9781119790488 1119790484 9781119790471 1119790476 9781119790464 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (384 Seiten) illustrations. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | For Dummies |
record_format | marc |
series2 | For dummies |
spelling | Coombs, Ted VerfasserIn aut Cloud security for dummies Ted Coombs Cloud security Hoboken, NJ For Dummies [2022] ©2022 1 Online-Ressource (384 Seiten) illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier For dummies Includes index. - Description based on print version record Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. This book offers step-by-step demonstrations of how to: Establish effective security protocols for your cloud application, network, and infrastructure Manage and use the security tools provided by different cloud vendors Deliver security audits that reveal hidden flaws in your security setup and ensure compliance with regulatory frameworks As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard this critical component of modern IT architecture with the straightforward strategies and hands-on techniques discussed in this book. Cloud computing Security measures Computer networks Security measures Computer security Computer Security Infonuagique ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Instructional and educational works Matériel d'éducation et de formation 9781119790464 Erscheint auch als Druck-Ausgabe 9781119790464 |
spellingShingle | Coombs, Ted Cloud security for dummies Cloud computing Security measures Computer networks Security measures Computer security Computer Security Infonuagique ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Instructional and educational works Matériel d'éducation et de formation |
title | Cloud security for dummies |
title_alt | Cloud security |
title_auth | Cloud security for dummies |
title_exact_search | Cloud security for dummies |
title_full | Cloud security for dummies Ted Coombs |
title_fullStr | Cloud security for dummies Ted Coombs |
title_full_unstemmed | Cloud security for dummies Ted Coombs |
title_short | Cloud security for dummies |
title_sort | cloud security for dummies |
topic | Cloud computing Security measures Computer networks Security measures Computer security Computer Security Infonuagique ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Instructional and educational works Matériel d'éducation et de formation |
topic_facet | Cloud computing Security measures Computer networks Security measures Computer security Computer Security Infonuagique ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Instructional and educational works Matériel d'éducation et de formation |
work_keys_str_mv | AT coombsted cloudsecurityfordummies AT coombsted cloudsecurity |