Fishpond Gift Vouchers - Let them choose!

Shop over a million Toys in our Huge New Range

Securing Cloud and Mobility


Product Description
Product Details

Table of Contents

Rethinking IT and Security. Tectonic Shifts. The Evolving Threat Landscape. Deconstructing Cloud Security. The Cloud Dialogues. Securing Private Cloud Computing. Segmentation and the Private Cloud. Orchestration and Cloud Management. Encryption Services. Threat Intelligence. Identity Management for Private Clouds. Securing Public Clouds. Enterprise Cloud Governance. The Cursory Cloud Use Review. In-Depth Cloud Assessment. Third-Party Cloud Assessment. Securing Mobile. Mobile Security Infrastructure. The Mobile Client Itself. Connecting to Enterprise and Third-Party Applications from Mobile Devices. Creating Secure Mobile Applications.

About the Author

Lim, Ian; Coolidge, E. Coleen ; Hourani, Paul

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
People also searched for
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Securing Cloud and Mobility: A Practitioner's Guide on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond Retail Limited.
Back to top