|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Build a resilient cloud architecture to tackle data disasters with
ease About This Book * Gain a firm grasp of Cloud data security and
governance, irrespective of your Cloud platform * Practical
examples to ensure you secure your Cloud environment efficiently *
A step-by-step guide that will teach you the unique techniques and
methodologies of Cloud data governance Who This Book Is For If you
are a cloud security professional who wants to ensure cloud
security and data governance no matter the environment, then this
book is for you. A basic understanding of working on any cloud
platform would be beneficial. What You Will Learn * Configure your
firewall and Network ACL * Protect your system against DDOS and
application-level attacks * Explore cryptography and data security
for your cloud * Get to grips with configuration management tools
to automate your security tasks * Perform vulnerability scanning
with the help of the standard tools in the industry * Learn about
central log management In Detail Modern day businesses and
enterprises are moving to the Cloud, to improve efficiency and
speed, achieve flexibility and cost effectiveness, and for
on-demand Cloud services. However, enterprise Cloud security
remains a major concern because migrating to the public Cloud
requires transferring some control over organizational assets to
the Cloud provider. There are chances these assets can be
mismanaged and therefore, as a Cloud security professional, you
need to be armed with techniques to help businesses minimize the
risks and misuse of business data. The book starts with the basics
of Cloud security and offers an understanding of various policies,
governance, and compliance challenges in Cloud. This helps you
build a strong foundation before you dive deep into understanding
what it takes to design a secured network infrastructure and a
well-architected application using various security services in the
Cloud environment. Automating security tasks, such as Server
Hardening with Ansible, and other automation services, such as
Monit, will monitor other security daemons and take the necessary
action in case these security daemons are stopped maliciously. In
short, this book has everything you need to secure your Cloud
environment with. It is your ticket to obtain industry-adopted best
practices for developing a secure, highly available, and
fault-tolerant architecture for organizations. Style and approach
This book follows a step-by-step, practical approach to secure your
applications and data when they are located remotely.
Audio Content Security: Attack Analysis on Audio Watermarking
describes research using a common audio watermarking method for
four different genres of music, also providing the results of many
test attacks to determine the robustness of the watermarking in the
face of those attacks. The results of this study can be used for
further studies and to establish the need to have a particular way
of audio watermarking for each particular group of songs, each with
different characteristics. An additional aspect of this study tests
and analyzes two parameters of audio host file and watermark on a
specific evaluation method (PSNR) for audio watermarking.
|
You may like...
On Thin Ice
Leading Cybersecurity Experts
Hardcover
R678
Discovery Miles 6 780
|