Securing the cloud : cloud computer security techniques and tactics / Vic J.R. Winkler.
Material type:
TextPublication details: Waltham, MA : Syngress/Elsevier, 2011.Description: 290 p. ; 24 cmISBN: - 9781597495929
- 005.8 22
| Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Main library General Stacks | 005.8 / WI.S 2011 (Browse shelf(Opens below)) | 1 | Available | 011653 |
Browsing Main library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| 005.8 / WH.M 2008 Management of information security / | 005.8 / WH.M 2008 Management of information security / | 005.8 / WH.M 2009 Principles of information security / | 005.8 / WI.S 2011 Securing the cloud : | 005.8 / WO.S 2012 Security metrics : | 005.8 / WY.A 2007 The art of software security testing : | 005.8 / XI.W 2007 Wireless network security / |
Includes bibliographical references and index.
Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud.
As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology.
1
There are no comments on this title.