
Vendor Profile
Shoeisha Co., Ltd.
Address | 5 Funamachi Shinjuku-ku Tokyo, JAPAN ZIP:160-0006 |
---|---|
Representative Name | Kaoru Usui |
Annual Revenue | closed |
No. of Employees | 185 |
Web Site URL |
SD item code:13833797
Detail | Price & Quantity | ||
---|---|---|---|
S1 |
Yuji Oshima, Yuta Kakimi, Takahiro Kanemitsu, Kohei Kaba, Masahiro Kudo, Yohei Konishi, Ryo Shirahama, Kazuki Hirata, Junpei Yano, Yasuhiro Yamada, Shun Yoshie (Author)
![]()
大島 悠司、垣見 宥太、金光 高宏、蒲 晃平、工藤 匡浩、小西 陽平、白濱 亮、平田 一樹、矢野 純平、山田 康博、吉江 瞬 (著)
(190710)
JAN:9784798190716
|
(190710)
JAN:9784798190716
Wholesale Price: Members Only
1 pc /set
In Stock
|
Shipping Date |
---|
About 1 week
|
Dimensions |
---|
Format:B5
Number of pages:544 |
Specifications |
---|
Country of manufacture: Japan
Material / component: Format:Book (paper)
Year of manufacture: 2025
Product tag: None
|
Description
For us, security is a top priority. This book explains security challenges and countermeasures in a multi-cloud environment. In today's world where cloud utilization is at the core of IT systems, a multi-cloud strategy that combines multiple cloud services such as AWS, Azure, Google Cloud, and OCI is an effective way to avoid the risk of dependency on a single cloud and to ensure business continuity. However, despite its convenience, security has become more complex and requires more advanced management. This book is a textbook that provides comprehensive explanations of security issues in such multi-cloud environments, from the basics to practical implementation, covering the four major cloud services. *Features of this book *Correspondence to the four major clouds: Comprehensive explanation of security design and operation for the four major clouds. *Aggregation of practical knowledge: Provides practical and strategic approaches and best practices by professionals familiar with each cloud *Formative coverage: Systematically covers the entire picture of complex multi-cloud security, from fundamentals to applications *Topics covered in this book *Security Principles and Design Philosophy: Multi-layered defense, zero-trust model *IAM and Access Management: Unified Identity, Multi-factor Authentication (MFA) *Network Security: VPC Design, Firewalls *Data Protection and Compliance: Encryption, Data Loss Prevention (DLP), Privacy Regulations *Application *IaC Security: DevSecOps, Secure Coding *Operations and Auditing: Log Management, Threat Intelligence, SIEM, Incident Response, Various Security Frameworks *Generated AI Security: AI risk and guardrail capabilities, latest trends *Book Table of Contents Chapter1 Introduction to Multi-Cloud Security Chapter2 Cloud Concepts, Architecture, and Design Chapter3 Cloud Platform and Infrastructure Security Chapter4 Cloud Application Security Chapter5 Cloud Data Security Chapter6 Cloud Security Operations Chapter7 Regulatory, Audit, Risk, and Compliance Chapter8 Generative AI Security in the Cloud Chapter9 Market Trends in Third-Party Multi-Cloud Security Chapter10 Summary of this book and future perspectives |
More
Shipping Method | Estimated Arrival |
---|---|
Sea Mail | From Nov.5th 2025 to Jan.7th 2026 |
Air Mail | From Oct.20th 2025 to Oct.22nd 2025 |
EMS | From Oct.17th 2025 to Oct.22nd 2025 |
Pantos Express | From Oct.21st 2025 to Oct.24th 2025 |
DHL | From Oct.17th 2025 to Oct.21st 2025 |
UPS | From Oct.17th 2025 to Oct.21st 2025 |
FedEx | From Oct.17th 2025 to Oct.21st 2025 |
Some trading conditions may be applicable only in Japan.
This product (book) is subject to the Resale Price Maintenance Program. The law allows the manufacturer (publisher) to specify the sales price. We ask that your company also adhere to the resale price specified by us. In the unlikely event that you fail to do so, we may terminate the transaction. Thank you very much for your understanding and cooperation.
|
Other items from this category:
This book explains security challenges and countermeasures in a multi-cloud environment.
In today's world where cloud utilization is at the core of IT systems, a multi-cloud strategy that combines multiple cloud services such as AWS, Azure, Google Cloud, and OCI is an effective way to avoid the risk of dependency on a single cloud and to ensure business continuity.
However, despite its convenience, security has become more complex and requires more advanced management.
This book is a textbook that provides comprehensive explanations of security issues in such multi-cloud environments, from the basics to practical implementation, covering the four major cloud services.
*Features of this book
*Correspondence to the four major clouds: Comprehensive explanation of security design and operation for the four major clouds.
*Aggregation of practical knowledge: Provides practical and strategic approaches and best practices by professionals familiar with each cloud
*Formative coverage: Systematically covers the entire picture of complex multi-cloud security, from fundamentals to applications
*Topics covered in this book
*Security Principles and Design Philosophy: Multi-layered defense, zero-trust model
*IAM and Access Management: Unified Identity, Multi-factor Authentication (MFA)
*Network Security: VPC Design, Firewalls
*Data Protection and Compliance: Encryption, Data Loss Prevention (DLP), Privacy Regulations
*Application *IaC Security: DevSecOps, Secure Coding
*Operations and Auditing: Log Management, Threat Intelligence, SIEM, Incident Response, Various Security Frameworks
*Generated AI Security: AI risk and guardrail capabilities, latest trends
*Book Table of Contents
Chapter1 Introduction to Multi-Cloud Security
Chapter2 Cloud Concepts, Architecture, and Design
Chapter3 Cloud Platform and Infrastructure Security
Chapter4 Cloud Application Security
Chapter5 Cloud Data Security
Chapter6 Cloud Security Operations
Chapter7 Regulatory, Audit, Risk, and Compliance
Chapter8 Generative AI Security in the Cloud
Chapter9 Market Trends in Third-Party Multi-Cloud Security
Chapter10 Summary of this book and future perspectives