Chapter 15Cloud Computing and the Internet of Things
It is becoming harder to find businesses today that are not using some form of cloud service. This may be as simple as using a cloud provider for email, or it could be they have multiple web applications they have deployed into a cloud environment using cloud-native application designs. Because the infrastructure is moving to cloud providers, attacks are also moving to these environments. Cloud service providers are also enabling ...
Get CEH v11 Certified Ethical Hacker Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.