Get Free Shipping on orders over $79
Cloud Security : Attacks, Techniques, Tools, and Challenges - Preeti Mishra

Cloud Security

Attacks, Techniques, Tools, and Challenges

By: Preeti Mishra, Emmanuel S Pilli, R C Joshi

eText | 27 December 2021 | Edition Number 1

At a Glance

eText


$108.89

or 4 interest-free payments of $27.22 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm, it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity.

Cloud Security: Attacks, Techniques, Tools, and Challenges, provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures, and all those who are curious in the field of cloud security

The book offers comprehensive coverage of the most essential topics, including:

  • Basic fundamentals of Cloud Computing
  • Cloud security concepts, vulnerabilities, security standards and reference models
  • Cloud security goals, key issues and privacy requirements
  • Threat model, detailed taxonomy of cloud attacks, Attack feature analysis - case study
  • A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS)
  • Attack and security tools, LibVMI - case study
  • Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI)
  • Container security: threat model, attacks and defense systems

This book is intended for both academic and professional audience. It could also be used as a textbook, for a semester course at undergraduate and post graduate level in Computer Science, Information Technology, Information Security, and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners, cloud security team, and the cloud security auditor as well. To get the most out of this book, the reader should have a working knowledge of various operating system environments, hypervisors, cloud computing fundamentals, programming languages like Python and a working knowledge of security tools.

?

?

?

on
Desktop
Tablet
Mobile

Other Editions and Formats

Paperback

Published: 4th October 2024

More in Computer Science

Amazon.com : Get Big Fast - Robert Spector

eBOOK

AI-Powered Search - Trey Grainger

eBOOK