Empirical Cloud Security

Practical Intelligence to Evaluate Risks and Attacks

Paperback
April 2021
9781683926856
More details
  • Publisher
    Mercury Learning and Information
  • Published
    14th April
  • ISBN 9781683926856
  • Language English
  • Pages 450 pp.
  • Size 7" x 9"
$54.95
E-Book (ePub)
April 2021
9781683926832
More details
  • Publisher
    Mercury Learning and Information
  • Published
    15th April
  • ISBN 9781683926832
  • Language English
  • Pages 450 pp.
  • Size 7" x 9"
$39.95
Lib E-Book

Library E-Books

We have signed up with three aggregators who resell networkable e-book editions of our titles to academic libraries. These aggregators offer a variety of plans to libraries, such as simultaneous access by multiple library patrons, and access to portions of titles at a fraction of list price under what is commonly referred to as a “patron-driven demand” model.

These editions, priced at par with simultaneous hardcover editions of our titles, are not available direct from Stylus, but only from the following aggregators:

  • Ebook Library, a service of Ebooks Corporation Ltd. of Australia
  • ebrary, based in Palo Alto, a subsidiary of ProQuest
  • EBSCO / netLibrary, Alabama

as well as through the following wholesalers: The Yankee Book Peddler subsidiary of Baker & Taylor, Inc.

April 2021
9781683926849
More details
  • Publisher
    Mercury Learning and Information
  • Published
    15th April
  • ISBN 9781683926849
  • Language English
  • Pages 450 pp.
  • Size 7" x 9"
$154.95

This book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combat threats, attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hand-on assessment techniques based on real-world studies, and concluding with recommendations including best practices.

FEATURES:

  • Includes practical strategies for assessing the security and privacy of your cloud infrastructure and applications
  • Covers topics such as cloud architecture and security fundamentals, database and storage security, data privacy, security and risk assessments, controls related to continuous monitoring, and more
  • Presents several case studies revealing how threat actors abuse and exploit cloud environments to spread malware

1: Cloud Architecture and Security Fundamentals
2: IAM for Authentication and Authorization
3: Cloud Infrastructure
4: Database and Storage Services
5: Design and Analysis of Cryptography Controls
6: Cloud Applications
7: Cloud Monitoring and Logging
8: Privacy in the Cloud
9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments
10: Malicious Code in the Cloud
11: Threat Intelligence and Malware Protection in the Cloud
Conclusion
Appendices
Index

Aditya K. Sood, PhD

Aditya K. Sood (PhD) is a cybersecurity practitioner with more than 13 years of experience working with cross-functional teams, management, and customers to create the best-of-breed information security experience. His articles have appeared in magazines and journals, including IEEE, Elsevier, ISACA, Virus Bulletin, and USENIX, and he is the author of Targeted Cyber Attacks (Syngress). He has presented his research at industry leading security conferences such as BlackHat, DEFCON, Virus Bulletin, and others.

Cloud Security; Cybersecurity; Developer Ops; Distributed Ops