BOOKS - Cloud Computing Concepts, Technology, Security, and Architecture, Second Edit...
Cloud Computing Concepts, Technology, Security, and Architecture, Second Edition (Final) - Thomas Erl, Eric Barcelo Monroy 2024 EPUB Pearson BOOKS
ECO~23 kg CO²

2 TON

Views
242082

 
Cloud Computing Concepts, Technology, Security, and Architecture, Second Edition (Final)
Author: Thomas Erl, Eric Barcelo Monroy
Year: 2024
Pages: 608
Format: EPUB
File size: 35.3 MB
Language: ENG



''

You may also be interested in:

Ultimate AWS Certified Cloud Practitioner|s Exam Guide Master the Concepts, Services, Security, and Architectural Best Practices of AWS, EC2, S3, and RDS, and Crack AWS CLF-C02 Certification
CompTIA Cloud+ Guide to Cloud Computing
Ultimate AWS Certified Cloud Practitioner|s Exam Guide: Master the Concepts, Services, Security, and Architectural Best Practices of AWS, EC2, S3, and … AWS CLF-C02 Certification (English Editio
Artificial Intelligence and Computing Logic: Cognitive Technology for AI Business Analytics (Innovation Management and Computing)
Advancement of Data Processing Methods for Artificial and Computing Intelligence (River Publishers Series in Computing and Information Science and Technology)
Cloud Native Application Protection Platforms A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
Cloud Native Application Protection Platforms A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
Cloud Native Security Cookbook Recipes for a Secure Cloud
Integration of Cloud Computing with Internet of Things Foundations, Analytics and Applications (Advances in Learning Analytics for Intelligent Cloud-IoT Systems)
Mastering Cloud Storage Navigating cloud solutions, data security, and cost optimization for seamless digital transformation
Mastering Cloud Storage Navigating cloud solutions, data security, and cost optimization for seamless digital transformation
Nature-inspired Optimization Algorithms and Soft Computing: Methods, technology and applications for IoTs, smart cities, healthcare and industrial automation (Computing and Networks)
Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles
Security Architecture for Hybrid Cloud A Practical Method for Designing Security Using Zero Trust Principles
Security Architecture for Hybrid Cloud A Practical Method for Designing Security Using Zero Trust Principles
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide: Become an expert and get Google Cloud certified with this practitioner|s guide
Cloud Technologies An Overview of Cloud Computing Technologies for Managers
Mastering Multi-Cloud Paradigm for Enterprises Transform Enterprise IT with Multi-Cloud Strategies Using Azure, AWS, and GCP for Optimizing Resources, Enhancing Security and Disaster Recovery
Mastering Multi-Cloud Paradigm for Enterprises Transform Enterprise IT with Multi-Cloud Strategies Using Azure, AWS, and GCP for Optimizing Resources, Enhancing Security and Disaster Recovery
Intelligence and Information Policy for National Security: Key Terms and Concepts (Security and Professional Intelligence Education Series)
Cloud Computing With C#
Cloud Computing With C#
Cloud Computing
Google Cloud Platform (GCP) Professional Cloud Network Engineer Certification Companion: Learn and Apply Network Design Concepts to Prepare for the Exam (Certification Study Companion Series)
Soft Computing Concepts and Techniques
Blockchain for International Security: The Potential of Distributed Ledger Technology for Nonproliferation and Export Controls (Advanced Sciences and Technologies for Security Applications)
The Cloud Computing Guidebook
Encyclopedia of Cloud Computing
Cloud Computing An Introduction
Cloud Computing Basics
Assured Cloud Computing
Cloud Computing Networking
Mastering Cloud Computing
Cloud Computing World
Managing Cloud Native Data on Kubernetes Architecting Cloud Native Data Services Using Open Source Technology (Final)
Secure Edge Computing for IoT Master Security Protocols, Device Management, Data Encryption, and Privacy Strategies to Innovate Solutions for Edge Computing in IoT
Secure Edge Computing for IoT Master Security Protocols, Device Management, Data Encryption, and Privacy Strategies to Innovate Solutions for Edge Computing in IoT
Ultimate Splunk for Cybersecurity Practical Strategies for SIEM Using Splunk|s Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security
Ultimate Splunk for Cybersecurity Practical Strategies for SIEM Using Splunk|s Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security
Fog Computing Concepts, Frameworks, and Applications