Home Page Icon
Home Page
Table of Contents for
Hybrid Cloud Security Patterns
Close
Hybrid Cloud Security Patterns
by Sreekanth Iyer, Dr. Nataraj Nagaratnam
Hybrid Cloud Security Patterns
Hybrid Cloud Security Patterns
Foreword
Contributors
About the author
About the reviewer
Preface
Part 1: Introduction to Cloud Security
Chapter 1: Opportunities and Challenges with Hybrid Multi-cloud Solutions
Chapter 2: Understanding Shared Responsibility Model for Cloud Security
Part 2: Identity and Access Management Patterns
Chapter 3: Cloud Identity and Access Management
Chapter 4: Implementing Identity and Access Management for Cloud Applications
Part 3: Infrastructure Security Patterns
Chapter 5: How to Secure Compute Infrastructure
Chapter 6: Implementing Network Isolation, Secure Connectivity, and Protection
Part 4: Data and Application Security Patterns
Chapter 7: Data Security Patterns
Chapter 8: Shift Left Security for DevOps
Part 5: Cloud Security Posture Management and Zero Trust Architecture
Chapter 9: Managing the Security Posture for Your Cloud Deployments
Chapter 10: Building Zero Trust Architecture with Hybrid Cloud Security Patterns
Index
Other Books You May Enjoy
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Hybrid Cloud Security Patterns
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset