Securing the Cloud: Cloud Computer Security Techniques and Tacticsby Vic (J.R.) Winkler
Pub. Date: 05/13/2011
Publisher: Elsevier Science
As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility,/i>… See more details below
As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology.
- Named The 2011 Best Identity Management Book by InfoSec Reviews
- Provides a sturdy and stable framework to secure your piece of the cloud, consideringalternate approaches such as private vs. public clouds, SaaS vs. IaaS,and loss of control and lack of trust
- Discusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recovery
- Details the benefits of moving to the cloud-solving for limited availability of space, power, and storage
- Elsevier Science
- Publication date:
- Sales rank:
- Product dimensions:
- 9.00(w) x 7.62(h) x 0.82(d)
Table of Contents
Introduction Chapter 1. Introduction to Cloud Computing and Security Chapter 2. Cloud Computing Architecture Chapter 3. Security Concerns, Risk Issues, and Legal Aspects Chapter 4. Securing the Cloud: Architecture Chapter 5. Securing the Cloud: Data Security Chapter 6. Securing the Cloud: Key Strategies and Best Practices Chapter 7. Security Criteria: Building an Internal Cloud Chapter 8. Security Criteria: Selecting an External Cloud Provider Chapter 9. Evaluating Cloud Security: An Information Security Framework Chapter 10. Operating a Cloud
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >
Great suspense and cliffhanger! You should upload this to Wattpad.
This book gave me a really good understanding of what cloud computing is, what the security concerns are and how to deal with them. It is clear and well written, and gave me a god understanding of technical areas that I knew very little about. What I liked the most were the chapters on cloud security architecture and cloud operations. These are areas I would probably never work in, but now I have an appreciation for what architects and operations personnel face.