Oracle cloud infrastructure (OCI) security handbook: A practical guide for OCI security (Record no. 358333)

MARC details
000 -LEADER
fixed length control field 01929nam a22002177a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520153507.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789365891621
040 ## - CATALOGING SOURCE
Transcribing agency AACR-II
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.2 MIR
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Miryala, Naresh Kumar
9 (RLIN) 10786
245 ## - TITLE STATEMENT
Title Oracle cloud infrastructure (OCI) security handbook: A practical guide for OCI security
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New Delhi
Name of publisher, distributor, etc. BPB Publications
Date of publication, distribution, etc. 2025
300 ## - PHYSICAL DESCRIPTION
Extent 331 p.
520 ## - SUMMARY, ETC.
Summary, etc. Oracle Cloud Infrastructure (OCI) Security Handbook is the ultimate guide for safeguarding your mission-critical resources and data on OCI. In the world of a cloud-first approach, it is essential to understand the security risks and how to protect the sensitive data and resources in the cloud using different tools and technologies. The book covers all the aspects of security, considering all the layers of the Oracle Cloud.<br/><br/>This book is a detailed guide to securing OCI environments, focusing on best practices and practical strategies. It covers key security areas like identity and access management (IAM) with role-based controls, multi-factor authentication, and identity federation. Network security is addressed through Virtual Cloud Networks (VCNs), firewalls, and load balancers. Compute, storage, and database security topics include encryption, SQL injection prevention, and advanced database protection tools. The book also explores web and API security, vulnerability scanning, monitoring, compliance, and automation using tools like Terraform.<br/><br/>By the end of this journey, you will be well-equipped to confidently secure your OCI environment. This invaluable resource helps you become highly skilled in OCI Security, safeguarding your valuable cloud assets for years to come.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cloud Infrastructure
9 (RLIN) 10787
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Database Fortification
9 (RLIN) 10788
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Budagam, Dinesh Kumar
9 (RLIN) 10789
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Date last seen Total Checkouts Full call number Barcode Cost, replacement price Price effective from Koha item type Lost status Source of classification or shelving scheme Damaged status Not for loan Withdrawn status Home library Current library Date acquired
2025-05-20   005.2 MIR 178546 999.00 2025-05-20 Books Not Missing Dewey Decimal Classification Not Damaged     Gandhi Smriti Library Gandhi Smriti Library 2025-05-20

Powered by Koha