1: Cloud Architecture and Security Fundamentals 2: IAM for Authentication and Authorization 3: Cloud Infrastructure 4: Database and Storage Services 5: Design and Analysis of Cryptography Controls 6: Cloud Applications 7: Cloud Monitoring and Logging 8: Privacy in the Cloud 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments 10: Malicious Code in the Cloud 11: Threat Intelligence and Malware Protection in the Cloud Conclusion Appendices Index
Sood Aditya K. :
Aditya K. Sood (PhD) is a cybersecurity practitioner with more than 13 years of experience working with cross-functional teams, management, and customers to create the best-of-breed information security experience. His articles have appeared in magazines and journals, including IEEE, Elsevier, ISACA, Virus Bulletin, and USENIX, and he is the author of Targeted Cyber Attacks (Syngress). He has presented his research at industry leading security conferences such as BlackHat, DEFCON, Virus Bulletin, and others.