BOOKS - NETWORK TECHNOLOGIES - Cloud Security Concepts, Methodologies, Tools, and App...
Cloud Security Concepts, Methodologies, Tools, and Applications (Critical Explorations) - Information Resources Management Association 2019 EPUB IGI Global BOOKS NETWORK TECHNOLOGIES
ECO~57 kg CO²

3 TON

Views
96395

Telegram
 
Cloud Security Concepts, Methodologies, Tools, and Applications (Critical Explorations)
Author: Information Resources Management Association
Year: 2019
Pages: 2218
Format: EPUB
File size: 75.2 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Cloud Security For Dummies
Evolutionary Multi-Task Optimization: Foundations and Methodologies (Machine Learning: Foundations, Methodologies, and Applications)
Practical Cloud Security, 2nd Ed.
Cloud Native Application Security
OpenStack Cloud Security (+code)
Security for Cloud Native Applications
Cloud Security: Techniques and Applications
Penetration Testing A - Z Vulnerability Security and Tools
Data Security in Cloud Computing, Volume I
Deep Learning Approaches to Cloud Security
Practical Cloud Native Security with Falco
Cloud Computing Implementation, Management, and Security
Securing Your Cloud IBM Security for LinuxONE
Security, Privacy, and Digital Forensics in the Cloud
Security Management in Mobile Cloud Computing
Modern Principles, Practices, and Algorithms for Cloud Security
Policy as Code Improving Cloud Native Security
Security Designs for the Cloud, IoT, and Social Networking
Security Designs for the Cloud, IoT, and Social Networking
Policy as Code: Improving Cloud Native Security
Cloud Native Security Cookbook (Early Release)
Mobile Cloud Computing Models, Implementation, and Security
Handbook of Research on Security Considerations in Cloud Computing
Improving Security, Privacy, and Trust in Cloud Computing
Policy as Code Improving Cloud Native Security
Improving Security, Privacy, and Trust in Cloud Computing
Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow Concepts, Tools, and Techniques to Build Intelligent Systems Second Edition (Third Release)
Securing the Cloud Security Strategies for the Ubiquitous Data Center
CCSP Certified Cloud Security Professional All-in-One Exam Guide
Azure Penetration Testing: Advanced Strategies For Cloud Security
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide
Security and Privacy for Big Data, Cloud Computing and Applications
Hands-on Machine Learning with Scikit-Learn, Keras, and TensorFlow Concepts, Tools, and Techniques to Build Intelligent Systems Second Edition (Early Release)
Organized Complexity in Business: Understanding, Concepts and Tools (Future of Business and Finance)
Container Security Fundamental Technology Concepts that Protect Containerized Applications First Edition
Empirical Cloud Security Practical Intelligence to Evaluate Risks and Attacks
Hybridization of Blockchain and Cloud Computing: Overcoming Security Issues in IoT
Hybridization of Blockchain and Cloud Computing Overcoming Security Issues in IoT
Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies
Cyber Security in Parallel and Distributed Computing Concepts, Techniques, Applications and Case Studies