Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200553 i 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr unu|||||||| 
008    180126s2017    enka    o     000 0 eng d 
019    1019883071 
020    9781788298513 
020    1788298519 
020    1788299558 
020    9781788299558 
029 1  CHNEW|b000982131 
029 1  CHVBK|b507667913 
029 1  GBVCP|b1014940206 
035    (OCoLC)1020496765|z(OCoLC)1019883071 
037    CL0500000934|bSafari Books Online 
040    UMI|beng|erda|epn|cUMI|dSTF|dCHVBK|dOCLCO|dTOH|dCEF|dYDX
       |dOCLCF|dKSU|dDEBBG|dG3B|dS9I|dC6I|dUAB|dAU@|dOCLCA|dVLY
       |dOCLCQ|dOCLCO|dOCLCQ|dOCLCO 
049    INap 
082 04 004.6782 
082 04 004.6782|223 
099    Ebook O'Reilly for Public Libraries 
100 1  Vora, Zeal,|eauthor. 
245 10 Enterprise cloud security and governance :|befficiently 
       set data protection and privacy principles /|cZeal Vora.
       |h[O'Reilly electronic resource] 
264  1 Birmingham, UK :|bPackt Publishing,|c2017. 
300    1 online resource (1 volume) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    data file 
520 8  Annotation|bBuild a resilient cloud architecture to tackle
       data disasters with ease Key Features Gain a firm grasp of
       Cloud data security and governance, irrespective of your 
       Cloud platform Practical examples to ensure you secure 
       your Cloud environment efficiently A step-by-step guide 
       that will teach you the unique techniques and 
       methodologies of Cloud data governance Book Description 
       Modern day businesses and enterprises are moving to the 
       Cloud, to improve efficiency and speed, achieve 
       flexibility and cost effectiveness, and for on-demand 
       Cloud services. However, enterprise Cloud security remains
       a major concern because migrating to the public Cloud 
       requires transferring some control over organizational 
       assets to the Cloud provider. There are chances these 
       assets can be mismanaged and therefore, as a Cloud 
       security professional, you need to be armed with 
       techniques to help businesses minimize the risks and 
       misuse of business data. The book starts with the basics 
       of Cloud security and offers an understanding of various 
       policies, governance, and compliance challenges in Cloud. 
       This helps you build a strong foundation before you dive 
       deep into understanding what it takes to design a secured 
       network infrastructure and a well-architected application 
       using various security services in the Cloud environment. 
       Automating security tasks, such as Server Hardening with 
       Ansible, and other automation services, such as Monit, 
       will monitor other security daemons and take the necessary
       action in case these security daemons are stopped 
       maliciously. In short, this book has everything you need 
       to secure your Cloud environment with. It is your ticket 
       to obtain industry-adopted best practices for developing a
       secure, highly available, and fault-tolerant architecture 
       for organizations. What you will learn Configure your 
       firewall and Network ACL Protect your system against DDOS 
       and application-level attacks Explore cryptography and 
       data security for your cloud Get to grips with 
       configuration management tools to automate your security 
       tasks Perform vulnerability scanning with the help of the 
       standard tools in the industry Learn about central log 
       managementWho this book is for If you are a Cloud security
       professional who wants to ensure Cloud security and data 
       governance irrespective of the environment, then this book
       is for you. Basic understanding of working on any Cloud 
       platforms is beneficial. 
588 0  Online resource; title from title page (Safari, viewed 
       January 25, 2018). 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Cloud computing|xSecurity measures. 
650  0 Computer networks|xSecurity measures. 
650  0 Client/server computing|xSecurity measures. 
650  6 Infonuagique|xSécurité|xMesures. 
650  6 Réseaux d'ordinateurs|xSécurité|xMesures. 
650  6 Architecture client-serveur (Informatique)|xSécurité
       |xMesures. 
650  7 Computer networks|xSecurity measures|2fast 
650  7 Cloud Computing|2gnd 
650  7 Internet|2gnd 
650  7 Sicherheit|2gnd 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781788299558/?ar
       |zAvailalbe on O'Reilly for Public Libraries 
938    YBP Library Services|bYANK|n15087227 
994    92|bJFN