Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Chapter 1. Introduction
Chapter 2. Cloud Computing
Chapter 3. Cloud Service Proviers
Chapter 4. Cloud Definitions
Chapter 5. Asset Manager
Chapter 6. Attack Vectors
Chapter 7. Mitigation Strategies
Chapter 8. Regulatory Compliance
Chapter 9. Architectures
Chapter 10. Swarm Intelligence
Chapter 11. Chaos Engineering
Chapter 12: Imposter Syndrome
Chapter 13: Selecting a Cloud Service Provider
Chapter 14: Security Recommendations for your Cloud Environment
Chapter 15: Conclusion
Appendix A
Appendix B.

Browse Subjects

Show more subjects...

Statistics

from
to
Export