|
![]() |
|||
|
||||
OverviewToday, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets. Full Product DetailsAuthor: Ravi Das , Preston de GuisePublisher: Taylor & Francis Ltd Imprint: Auerbach Weight: 0.439kg ISBN: 9781032475615ISBN 10: 1032475617 Pages: 318 Publication Date: 21 January 2023 Audience: Professional and scholarly , Professional & Vocational Replaced By: 9781032605401 Format: Paperback Publisher's Status: Out of Print Availability: Manufactured on demand ![]() Table of ContentsIntroduction to the Cloud Computing Environment. Amazon Web Services. Threats and Risks to Cloud Infrastructure and Risk Mitigation Strategies. Cloud Data Protection. Conclusinons.ReviewsAuthor InformationRavi Das has been an Information Technology professional for over 20 years. His vast experience includes software configuration management, database administration and IT security, with a specialization in biometrics. He has written and published two books through CRC Press and is currently working on his third. His accomplishments also include a comprehensive online training book for the CSA + exam. Ravi holds an M.S. in Agribusiness Economics (International Trade) from Southern Illinois University, and an MBA (MIS/Computer Science) from Bowling Green State University. He is a Business Development Specialist/Technical Writer for BN.Net, Inc., a leading technical communications firm based in Greater Chicago. Preston de Guise has been working with data recovery products for his entire career – designing, implementing and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data recovery, but the management and procedural aspects too. Tab Content 6Author Website:Countries AvailableAll regions |