Linked e-resources
Details
Table of Contents
Chapter 1: Introduction: Dimensions of cloud security
Chapter 2: Identity and Access Management with Azure Active Directory
Chapter 3: Network Security Patterns
Chapter 4: Infrastructure Security Patterns
Chapter 5: Application and Data Security Patterns
Chapter 6: Security Processes
Chapter 7: Automated Security Monitoring
Chapter 8: Creating a Security Culture.
Chapter 2: Identity and Access Management with Azure Active Directory
Chapter 3: Network Security Patterns
Chapter 4: Infrastructure Security Patterns
Chapter 5: Application and Data Security Patterns
Chapter 6: Security Processes
Chapter 7: Automated Security Monitoring
Chapter 8: Creating a Security Culture.