Cloud Security


Practical Cloud Security: A Guide for Secure Design and Deployment
Container Security: Fundamental Technology Concepts that Protect Containerized Applications
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
Securing DevOps: Security in the Cloud
Hands-On AWS Penetration Testing with Kali Linux: Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
Kubernetes: Up & Running
Aws Solutions Architect Associate Sg (Aws Certified Solutions Architect Official: Associate Exam)
Securing the Cloud: Cloud Computer Security Techniques and Tactics
Kubernetes in Action: Deploying and managing containers and cloud-native applications
Linux Pocket Guide
Seeking SRE: Conversations about Running Production Systems at Scale
Jenkins 2: Up and Running: Evolve Your Deployment Pipeline for Next Generation Automation
Cloud Native Infrastructure: Patterns for Scalable Infrastructure and Applications in a Dynamic Environment
Practical Monitoring
With Cloud Computing, it is no longer a question of If, but rather When and How. Offering the transformative power of connected systems, cloud computing technologies - cloud systems - enable alignment of the digital transformation and cybersecurity ambitions with the corporate strategy of an enterprise.
Ludmila Morozova-Bussva

With Cloud Computing, it is no longer a question of If, but rather When and How.
Ludmila Morozova-Bussva

More quotes...