Cloud Security For Dummies

  • 16h 24m 46s
  • Ted Coombs
  • Recorded Books, Inc.
  • 2022

Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data.

Using the practical techniques discussed in Cloud Security for Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world.

This book offers step-by-step demonstrations of how to:

  • Establish effective security protocols for your cloud application, network, and infrastructure
  • Manage and use the security tools provided by different cloud vendors
  • Deliver security audits that reveal hidden flaws in your security setup

As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard with the straightforward strategies discussed in this book.

About the Author

Ted Coombs is a direct descendant of King Edward of England, a former world record holder for most miles roller skated in a day, and a longtime technology guru and author. He’s written over a dozen technology books on a wide array of topics ranging from database programming to building an internet site. Along the way he helped create early artificial intelligence tools and served as cybersecurity professional focused on computer forensics.

In this Audiobook

  • Introduction
  • Chapter 1 - Clouds Aren’t Bulletproof
  • Chapter 2 - Getting Down to Business
  • Chapter 3 - Storing Data in the Cloud
  • Chapter 4 - Developing Secure Software
  • Chapter 5 - Restricting Access
  • Chapter 6 - Managing Cloud Resources
  • Chapter 7 - The Role of AIOps in Cloud Security
  • Chapter 8 - Implementing Zero Trust
  • Chapter 9 - Dealing with Hybrid Cloud Environments
  • Chapter 10 - Data Loss and Disaster Recovery
  • Chapter 11 - Using Cloud Security Services
  • Chapter 12 - When Things Go Wrong
  • Chapter 13 - Security Frameworks
  • Chapter 14 - Security Consortiums
  • Chapter 15 - Ten Steps to Better Cloud Security
  • Chapter 16 - Cloud Security Solutions



Rating 4.7 of 41 users Rating 4.7 of 41 users (41)
Rating 4.6 of 60 users Rating 4.6 of 60 users (60)