Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources
- 5h 53m
- Brian Chappell, Christopher Hills, Morey J. Haber
Cloud Attack Vectors details the risks associated with cloud deployments, the techniques threat actors leverage, the empirically-tested defensive measures organizations should adopt, and shows how to improve detection of malicious activity.
YOU MIGHT ALSO LIKE