May 2018
Intermediate to advanced
378 pages
10h 14m
English
The most critical threats to cloud-based applications have been enumerated by the Cloud Security Alliance. Referred to as the Treacherous Twelve, a secure cloud solution must protect all applications and processes against these attack vectors. Refer to https://downloads.cloudsecurityalliance.org/assets/research/top-threats/Treacherous-12_Cloud-Computing_Top-Threats.pdf for a detailed description of each of these critical threats.
Read now
Unlock full access