Learning Resource and Development

Cloud security handbook : (Record no. 30511)

MARC details
000 -LEADER
fixed length control field 04390nam a2200289 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CSPC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250917112324.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250916s2022 -uk 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781800569195
040 ## - CATALOGING SOURCE
Transcribing agency CSPC
Original cataloging agency CSPC
Language of cataloging eng
Description conventions rda
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.585
Item number .E887 2022
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6782
Item number Es883c
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Estrin, Eyal,
Relator term author.
245 10 - TITLE STATEMENT
Title Cloud security handbook :
Remainder of title find out how to effectively secure cloud environments using AWS, azure, and GCP /
Statement of responsibility, etc. Eyal Estrin.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Birmingham, UK :
Name of producer, publisher, distributor, manufacturer Packt Publishing,
Date of production, publication, distribution, manufacture, or copyright notice 2022.
300 ## - PHYSICAL DESCRIPTION
Extent xx, 434 pages ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Section 1: Securing infrastructure cloud services -- Introduction to cloud security -- Securing compute services -- Securing storage services -- Securing networking services -- Section 2: Deep dive into IAM, auditing, and encryption -- Effective strategies to implement IAM solutions -- Monitoring and auditing your cloud environments -- Applying encryption in cloud services -- Section 3: Threats and compliance management -- Understanding common security threats to cloud services -- Handling compliance and regulation -- Engaging with cloud providers -- Section 4: Advanced use of cloud services -- Managing hybrid clouds -- Managing multi-cloud environments -- Security in large-scale environments.
520 ## - SUMMARY, ETC.
Summary, etc. "A comprehensive reference guide to securing the basic building blocks of cloud services, with actual examples for leveraging Azure, AWS, and GCP built-in services and capabilities Key Features Discover practical techniques for implementing cloud security Learn how to secure your data and core cloud infrastructure to suit your business needs Implement encryption, detect cloud threats and misconfiguration, and achieve compliance in the cloud Book Description Securing resources in the cloud is challenging, given that each provider has different mechanisms and processes. Cloud Security Handbook helps you to understand how to embed security best practices in each of the infrastructure building blocks that exist in public clouds. This book will enable information security and cloud engineers to recognize the risks involved in public cloud and find out how to implement security controls as they design, build, and maintain environments in the cloud. You'll begin by learning about the shared responsibility model, cloud service models, and cloud deployment models, before getting to grips with the fundamentals of compute, storage, networking, identity management, encryption, and more. Next, you'll explore common threats and discover how to stay in compliance in cloud environments. As you make progress, you'll implement security in small-scale cloud environments through to production-ready large-scale environments, including hybrid clouds and multi-cloud environments. This book not only focuses on cloud services in general, but it also provides actual examples for using AWS, Azure, and GCP built-in services and capabilities. By the end of this cloud security book, you'll have gained a solid understanding of how to implement security in cloud environments effectively. What you will learn Secure compute, storage, and networking services in the cloud Get to grips with identity management in the cloud Audit and monitor cloud services from a security point of view Identify common threats and implement encryption solutions in cloud services Maintain security and compliance in the cloud Implement security in hybrid and multi-cloud environments Design and maintain security in a large-scale cloud environment Who this book is for This book is for IT or information security personnel taking their first steps in the public cloud or migrating existing environments to the cloud. Cloud engineers, cloud architects, or cloud security professionals maintaining production environments in the cloud will also benefit from this book. Prior experience of deploying virtual machines, using storage services, and networking will help you to get the most out of this book."
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cloud computing
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Suppress in OPAC No
Koha item type Books
Classification part 004.6782
Item part Es883c
Call number prefix GRD
Call number suffix 2022
Edition 23
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main Library Main Library Graduate School Library 09/16/2025   GRD 004.6782 Es883c 2022 030181 09/16/2025 1-2 09/16/2025 Books
    Dewey Decimal Classification     Main Library Main Library Graduate School Library 09/16/2025   GRD 004.6782 Es883c 2022 030182 09/16/2025 2-2 09/16/2025 Books