Cloud security for dummies:
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that p...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Old Saybrook, Connecticut]
Tantor Media, Inc.
2022
|
Ausgabe: | [First edition]. |
Schriftenreihe: | For dummies
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9798765008096/?ar https://learning.oreilly.com/library/view/~/9798765008096/?ar |
Zusammenfassung: | Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. This book offers step-by-step demonstrations of how to: - Establish effective security protocols for your cloud application, network, and infrastructure - Manage and use the security tools provided by different cloud vendors - Deliver security audits that reveal hidden flaws in your security setup As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard with the straightforward strategies discussed in this book. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed May 4, 2022) |
Umfang: | 1 Online-Ressource (1 audio file (16 hr., 24 min.)) |
ISBN: | 9798765008096 9798765008089 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-078670357 | ||
003 | DE-627-1 | ||
005 | 20240228121655.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220609s2022 xx |||||o 00| ||eng c | ||
020 | |a 9798765008096 |c electronic audio bk. |9 979-8-7650-0809-6 | ||
020 | |a 9798765008089 |c electronic audio bk. |9 979-8-7650-0808-9 | ||
035 | |a (DE-627-1)078670357 | ||
035 | |a (DE-599)KEP078670357 | ||
035 | |a (ORHE)9798765008096 | ||
035 | |a (DE-627-1)078670357 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 004.6782 |2 23/eng/20220504 | |
100 | 1 | |a Coombs, Ted |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cloud security for dummies |c Ted Coombs |
246 | 3 | 3 | |a Cloud security |
250 | |a [First edition]. | ||
264 | 1 | |a [Old Saybrook, Connecticut] |b Tantor Media, Inc. |c 2022 | |
300 | |a 1 Online-Ressource (1 audio file (16 hr., 24 min.)) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a For dummies | |
500 | |a Online resource; title from title details screen (O'Reilly, viewed May 4, 2022) | ||
520 | |a Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. This book offers step-by-step demonstrations of how to: - Establish effective security protocols for your cloud application, network, and infrastructure - Manage and use the security tools provided by different cloud vendors - Deliver security audits that reveal hidden flaws in your security setup As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard with the straightforward strategies discussed in this book. | ||
650 | 0 | |a Cloud computing |x Security measures | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 4 | |a Infonuagique ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Downloadable audio books | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Livres audio | |
700 | 1 | |a Reilly, Chris |e ErzählerIn |4 nrt | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9798765008096/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/~/9798765008096/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-078670357 |
---|---|
_version_ | 1821494821121949696 |
adam_text | |
any_adam_object | |
author | Coombs, Ted |
author2 | Reilly, Chris |
author2_role | nrt |
author2_variant | c r cr |
author_facet | Coombs, Ted Reilly, Chris |
author_role | aut |
author_sort | Coombs, Ted |
author_variant | t c tc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)078670357 (DE-599)KEP078670357 (ORHE)9798765008096 |
dewey-full | 004.6782 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6782 |
dewey-search | 004.6782 |
dewey-sort | 14.6782 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03159cam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-078670357</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121655.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220609s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798765008096</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">979-8-7650-0809-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798765008089</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">979-8-7650-0808-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)078670357</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP078670357</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9798765008096</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)078670357</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6782</subfield><subfield code="2">23/eng/20220504</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Coombs, Ted</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud security for dummies</subfield><subfield code="c">Ted Coombs</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Cloud security</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Old Saybrook, Connecticut]</subfield><subfield code="b">Tantor Media, Inc.</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 audio file (16 hr., 24 min.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">For dummies</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed May 4, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. This book offers step-by-step demonstrations of how to: - Establish effective security protocols for your cloud application, network, and infrastructure - Manage and use the security tools provided by different cloud vendors - Deliver security audits that reveal hidden flaws in your security setup As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard with the straightforward strategies discussed in this book.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Downloadable audio books</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reilly, Chris</subfield><subfield code="e">ErzählerIn</subfield><subfield code="4">nrt</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9798765008096/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/~/9798765008096/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-078670357 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:28Z |
institution | BVB |
isbn | 9798765008096 9798765008089 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 audio file (16 hr., 24 min.)) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Tantor Media, Inc. |
record_format | marc |
series2 | For dummies |
spelling | Coombs, Ted VerfasserIn aut Cloud security for dummies Ted Coombs Cloud security [First edition]. [Old Saybrook, Connecticut] Tantor Media, Inc. 2022 1 Online-Ressource (1 audio file (16 hr., 24 min.)) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier For dummies Online resource; title from title details screen (O'Reilly, viewed May 4, 2022) Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. This book offers step-by-step demonstrations of how to: - Establish effective security protocols for your cloud application, network, and infrastructure - Manage and use the security tools provided by different cloud vendors - Deliver security audits that reveal hidden flaws in your security setup As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard with the straightforward strategies discussed in this book. Cloud computing Security measures Computer networks Security measures Computer security Infonuagique ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Downloadable audio books Audiobooks Livres audio Reilly, Chris ErzählerIn nrt |
spellingShingle | Coombs, Ted Cloud security for dummies Cloud computing Security measures Computer networks Security measures Computer security Infonuagique ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Downloadable audio books Audiobooks Livres audio |
title | Cloud security for dummies |
title_alt | Cloud security |
title_auth | Cloud security for dummies |
title_exact_search | Cloud security for dummies |
title_full | Cloud security for dummies Ted Coombs |
title_fullStr | Cloud security for dummies Ted Coombs |
title_full_unstemmed | Cloud security for dummies Ted Coombs |
title_short | Cloud security for dummies |
title_sort | cloud security for dummies |
topic | Cloud computing Security measures Computer networks Security measures Computer security Infonuagique ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Downloadable audio books Audiobooks Livres audio |
topic_facet | Cloud computing Security measures Computer networks Security measures Computer security Infonuagique ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Downloadable audio books Audiobooks Livres audio |
work_keys_str_mv | AT coombsted cloudsecurityfordummies AT reillychris cloudsecurityfordummies AT coombsted cloudsecurity AT reillychris cloudsecurity |