Follow us

  



MERCURY LEARNING and INFORMATION provides print and digital content in the areas of science and medicine, technology and computing, engineering, and mathematics (STEM disciplines) designed for the professional/reference, trade, library, higher education, career school, and online training markets. We embrace both traditional and innovative publishing models designed to accommodate the needs of the intended audience by using the appropriate delivery methods.

Empirical Cloud Security Book CoverEmpirical Cloud Security

Aditya K. Sood

ISBN: 9781683926856
Pub Date:  March 2021
Specs: 7 x 9   Paperback
Pages: 450
Price: $54.95

    

This book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combat threats, attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hand-on assessment techniques based on real-world studies, and concluding with recommendations including best practices.

FEATURES

BRIEF TOC

1: Cloud Architecture and Security Fundamentals. 2: IAM for Authentication and Authorization. 3: Cloud Infrastructure. 4: Database and Storage Services. 5: Design and Analysis of Cryptography Controls. 6: Cloud Applications. 7: Cloud Monitoring and Logging. 8: Privacy in the Cloud. 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments. 10: Malicious Code in the Cloud. 11. Threat Intelligence and Malware Protection in the Cloud. Conclusion. Appendices. Index.

ABOUT THE AUTHOR

Aditya K Sood (PhD) is a cybersecurity practitioner with more than 13 years of experience, providing strategic leadership in the field of information security and infrastructure. During his career, he has worked with cross-functional teams, management, and customers to create the best-of-breed information security experience. His articles have appeared in magazines and journals, including IEEE, Elsevier, Crosstalk, ISACA, Virus Bulletin, and USENIX, and he is the author of Targeted Cyber Attacks (Syngress).