Cloud Security


Practical Cloud Security: A Guide for Secure Design and Deployment
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
Securing DevOps: Security in the Cloud
Hands-On AWS Penetration Testing with Kali Linux: Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
Securing the Cloud: Cloud Computer Security Techniques and Tactics
Distributed Systems: Principles and Paradigms
Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications
Security as Code: DevSecOps Patterns with AWS
Learning DevSecOps
Kubernetes Security and Observability: A Holistic Approach to Securing Containers and Cloud Native Applications
AWS Penetration Testing: Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap
Container Security: Fundamental Technology Concepts that Protect Containerized Applications
The CloudSec Engineer
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Five interconnecting rings for the “Faster, higher, stronger” of Cloud Computing System. The “Cloud Computing Rings” represent: Performance, Resilience, Data Sovereignty, Interoperability and Reversibility of a successfully integrated Cloud System.
Ludmila Morozova-Bussva

With Cloud Computing, it is no longer a question of If, but rather When and How.
Ludmila Morozova-Bussva

More quotes...