CHAPTER 22
Cloud Security
Cloud Computing Reference Architecture
22.3 Cloud Security Risks and Countermeasures
Weak Identity, Credential, and Access Management
Abuse and Nefarious Use of Cloud Services
Shared Technology Vulnerabilities
22.4 Cloud Security As A Service
22.5 An Open-Source Cloud Security Module
LEARNING OBJECTIVES
After studying this chapter, you should be able to: ...
Get Cryptography and Network Security Principles and Practice, 8th Edition - Pearson now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.