Books on the topic 'Cloud Security Posture Management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Cloud Security Posture Management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Abbadi, Imad M. Cloud Management and Security. John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118817087.
Full textRittinghouse, John W. Cloud computing: Implementation, management, and security. CRC Press, 2010.
Find full textRittinghouse, John W. Cloud computing: Implementation, management, and security. CRC Press, 2010.
Find full textF, Ransome James, ed. Cloud computing: Implementation, management, and security. CRC Press, 2010.
Find full textLoske, André. IT Security Risk Management in the Context of Cloud Computing. Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-11340-7.
Full textUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, ed. Information technology reform: Progress made but future cloud computing efforts should be better planned : report to the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, United States Senate. U.S. Govt. Accountability Office, 2012.
Find full textUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. Innovating with less: Examining efforts to reform information technology spending : hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, second session, May 24, 2012. U.S. G.P.O., 2012.
Find full textNomani, Qamar, Julie Davila, and Rehman Khan. Mastering Cloud Security Posture Management: Secure Multi-Cloud Infrastructure Across AWS, Azure, and Google Cloud Using Proven Techniques. Packt Publishing, Limited, 2024.
Find full textNomani, Qamar, Julie Davila, and Rehman Khan. Mastering Cloud Security Posture Management: Secure Multi-Cloud Infrastructure Across AWS, Azure, and Google Cloud Using Proven Techniques. de Gruyter GmbH, Walter, 2024.
Find full textAbbadi, Imad M. Cloud Management and Security. Wiley & Sons, Incorporated, John, 2014.
Find full textAbbadi, Imad M. Cloud Management and Security. Wiley & Sons, Incorporated, John, 2014.
Find full textWorkman, Michael. Information Security Management + Cloud Labs. Jones & Bartlett Learning, LLC, 2021.
Find full textSmelyansky, R. L., ред. «Modern Network Technologies — 2024» (MoNeTeС): The Fifth International Science and Technology Conference: Proceedings. Moscow University Press, 2024. https://doi.org/10.55959/msu012160-5-2024.
Full textRittinghouse, John W., and James F. Ransome. Cloud Computing: Implementation, Management, and Security. Taylor & Francis Group, 2017.
Find full textRittinghouse, John W., and James F. Ransome. Cloud Computing: Implementation, Management, and Security. Taylor & Francis Group, 2017.
Find full textRittinghouse, John W., and James F. Ransome. Cloud Computing: Implementation, Management, and Security. Taylor & Francis Group, 2017.
Find full textRittinghouse, John W. Cloud Computing: Implementation, Management, and Security. Taylor & Francis Group, 2009.
Find full textRittinghouse, John W., and James F. Ransome. Cloud Computing: Implementation, Management, and Security. Taylor & Francis Group, 2017.
Find full textMicrosoft Defender for Cloud Cookbook: Protect Multicloud and Hybrid Cloud Environments, Manage Compliance and Strengthen Security Posture. Packt Publishing, Limited, 2022.
Find full textStaff, University of Washington, and Barbara Endicott-Popovsky. International Conference on Cloud Security Management: Iccsm 2013. Academic Conferences and Publishing Limited, 2013.
Find full textAnderson, Kerry Ann. Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture. Auerbach Publishers, Incorporated, 2014.
Find full textAnderson, Kerry Ann. Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture. Auerbach Publishers, Incorporated, 2017.
Find full textKo, Ryan, and Raymond Choo. Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Elsevier Science & Technology Books, 2015.
Find full textCloud Security Ecosystem: Technical, Legal, Business and Management Issues. Elsevier Science & Technology Books, 2015.
Find full textGupta, Brij B. Cloud Security: Concepts, Applications and Perspectives. Taylor & Francis Group, 2021.
Find full textCloud Security: Concepts, Applications and Perspectives. Taylor & Francis Group, 2021.
Find full textGupta, Brij B. Cloud Security: Concepts, Applications and Perspectives. Taylor & Francis Group, 2021.
Find full textAnderson, Kerry Ann. Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture. Auerbach Publishers, Incorporated, 2014.
Find full textAnderson, Kerry Ann. Frugal Ciso: Using Innovation and Smart Approaches to Maximize Your Security Posture. Taylor & Francis Group, 2014.
Find full textAnderson, Kerry Ann. Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture. Auerbach Publishers, Incorporated, 2014.
Find full textAnderson, Kerry Ann. Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture. Auerbach Publishers, Incorporated, 2014.
Find full textEnabling the new era of cloud computing: Data security, transfer, and management. Information Science Reference, 2014.
Find full textPearson, Siani, and George Yee. Privacy and Security for Cloud Computing. Springer, 2014.
Find full textThe frugal CISO: Using innovation and smart approaches to maximize your security posture. CRC Press, 2014.
Find full textAckermann, Tobias. IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing. Springer Gabler. in Springer Fachmedien Wiesbaden GmbH, 2012.
Find full textIt Security Risk Management In The Context Of Cloud Computing Perceived It Security Risks In The Context Of Cloud Computing. Springer-Verlag Berlin and Heidelberg GmbH &, 2013.
Find full textLynn, Theo. Data Privacy and Trust in Cloud Computing: Building trust in the cloud through assurance and accountability. Springer Nature, 2021.
Find full textWerff, Lisa Van Der, John Mooney, Grace Fox, and Theo Lynn. Data Privacy and Trust in Cloud Computing: Building Trust in the Cloud Through Assurance and Accountability. Springer International Publishing AG, 2020.
Find full textLoske, André. IT Security Risk Management in the Context of Cloud Computing: Towards an Understanding of the Key Role of Providers’ IT Security Risk Perceptions. Springer Vieweg, 2015.
Find full textLoske, André. IT Security Risk Management in the Context of Cloud Computing: Towards an Understanding of the Key Role of Providers' IT Security Risk Perceptions. Springer Vieweg. in Springer Fachmedien Wiesbaden GmbH, 2015.
Find full textMessier, Ric. Collaboration with Cloud Computing: Security, Social Media, and Unified Communications. Elsevier Science & Technology Books, 2014.
Find full textManaging Risk And Security In Outsourcing It Services Onshore Offshore And The Cloud. Auerbach Publications, 2012.
Find full textOkta Administration : up and Running: Implement Enterprise-Grade Identity and Access Management for on-premises and Cloud Apps. Packt Publishing, Limited, 2020.
Find full text