Linked e-resources
Details
Table of Contents
Chapter 1. Introduction
Chapter 2. Cloud Computing
Chapter 3. Cloud Service Proviers
Chapter 4. Cloud Definitions
Chapter 5. Asset Manager
Chapter 6. Attack Vectors
Chapter 7. Mitigation Strategies
Chapter 8. Regulatory Compliance
Chapter 9. Architectures
Chapter 10. Swarm Intelligence
Chapter 11. Chaos Engineering
Chapter 12: Imposter Syndrome
Chapter 13: Selecting a Cloud Service Provider
Chapter 14: Security Recommendations for your Cloud Environment
Chapter 15: Conclusion
Appendix A
Appendix B.
Chapter 2. Cloud Computing
Chapter 3. Cloud Service Proviers
Chapter 4. Cloud Definitions
Chapter 5. Asset Manager
Chapter 6. Attack Vectors
Chapter 7. Mitigation Strategies
Chapter 8. Regulatory Compliance
Chapter 9. Architectures
Chapter 10. Swarm Intelligence
Chapter 11. Chaos Engineering
Chapter 12: Imposter Syndrome
Chapter 13: Selecting a Cloud Service Provider
Chapter 14: Security Recommendations for your Cloud Environment
Chapter 15: Conclusion
Appendix A
Appendix B.