|
|
|||
|
||||
OverviewFull Product DetailsAuthor: David ClintonPublisher: John Wiley & Sons Inc Imprint: Sybex Inc.,U.S. Dimensions: Width: 18.50cm , Height: 1.50cm , Length: 23.40cm Weight: 0.295kg ISBN: 9781394196531ISBN 10: 1394196539 Pages: 208 Publication Date: 08 June 2023 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In stock We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsIntroduction xiii Assessment Test xvii Chapter 1 Using Digital Resources Responsibly 1 Chapter 2 What Are Vulnerabilities and Threats? 17 Chapter 3 Controlling Access to Your Assets 37 Chapter 4 Controlling Network Connections 63 Chapter 5 Encrypting Your Data at Rest 85 Chapter 6 Encrypting Your Moving Data 97 Chapter 7 Risk Assessment 113 Chapter 8 Configuring System Backups and Monitoring 127 Chapter 9 Resource Isolation Design Patterns 143 Appendix Answers to Review Questions 155 Index 167ReviewsAuthor InformationABOUT THE AUTHOR DAVID CLINTON is a Linux server administrator with experience working in IT infrastructure in academic and enterprise environments. He is the co-author of AWS Certified Solutions Architect Study Guide: Associate (SAA-C03) Exam, Fourth Edition and AWS Certified Cloud Practitioner Study Guide: Foundational (CLF-C01) Exam. Tab Content 6Author Website:Countries AvailableAll regions |