gogogo
Syndetics cover image
Image from Syndetics

Securing the cloud [electronic book] : cloud computer security techniques and tactics / J.R. "Vic" Winkler.

By: Contributor(s): Material type: TextTextPublication details: Burlington, MA : Elsevier, 2011.ISBN:
  • 1597495921 (electronic bk.)
  • 9781597495929 (electronic bk.)
Subject(s): Genre/Form: Online resources:
Contents:
Introduction Chapter 1: Introduction to Cloud Computing and Security Chapter 2: Cloud Computing Architecture Chapter 3: Security Concerns, Risk Issues, and Legal Aspects Chapter 4: Securing the Cloud: Architecture Chapter 5: Securing the Cloud: Data Security Chapter 6: Securing the Cloud: Key Strategies and Best Practices Chapter 7: Security Criteria: Building an Internal Cloud Chapter 8: Security Criteria: Selecting an External Cloud Provider Chapter 9: Evaluating Cloud Security: An Information Security Framework Chapter 10: Operating a Cloud.
Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud.
Summary: As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power and storage.
No physical items for this record

Enhanced descriptions from Syndetics:

Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. The cloud offers flexibility, adaptability, scalability, and in the case of security - resilience. Securing the Cloud explains how to make the move to the cloud, detailing the strengths and weaknesses of securing a company's information with different cloud approaches. It offers a clear and concise framework to secure a business' assets while making the most of this new technology.

This book considers alternate approaches for securing a piece of the cloud, such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust. It discusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recovery. It also describes the benefits of moving to the cloud - solving for limited availability of space, power, and storage.

This book will appeal to network and security IT staff and management responsible for design, implementation and management of IT structures from admins to CSOs, CTOs, CIOs and CISOs.

Includes bibliographical references and index.

Introduction Chapter 1: Introduction to Cloud Computing and Security Chapter 2: Cloud Computing Architecture Chapter 3: Security Concerns, Risk Issues, and Legal Aspects Chapter 4: Securing the Cloud: Architecture Chapter 5: Securing the Cloud: Data Security Chapter 6: Securing the Cloud: Key Strategies and Best Practices Chapter 7: Security Criteria: Building an Internal Cloud Chapter 8: Security Criteria: Selecting an External Cloud Provider Chapter 9: Evaluating Cloud Security: An Information Security Framework Chapter 10: Operating a Cloud.

Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud.

As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power and storage.

Electronic reproduction. Amsterdam : Elsevier Science & Technology, 2011. Mode of access: World Wide Web. System requirements: Web browser. Title from title screen (viewed on May 10, 2011). Access may be restricted to users at subscribing institutions.

Table of contents provided by Syndetics

  • Introduction
  • Chapter 1 Introduction to Cloud Computing and Security
  • Chapter 2 Cloud Computing Architecture
  • Chapter 3 Security Concerns, Risk Issues, and Legal Aspects
  • Chapter 4 Securing the Cloud: Architecture
  • Chapter 5 Securing the Cloud: Data Security
  • Chapter 6 Securing the Cloud: Key Strategies and Best Practices
  • Chapter 7 Security Criteria: Building an Internal Cloud
  • Chapter 8 Security Criteria: Selecting an External Cloud Provider
  • Chapter 9 Evaluating Cloud Security: An Information Security Framework
  • Chapter 10 Operating a Cloud

Author notes provided by Syndetics

Vic (J.R.) Winkler is a Senior Associate at Booz Allen Hamilton, providing technical consultation to U.S. Government clients. He is a published InfoSec and cyber security researcher as well as an expert in intrusion/anomaly detection.

Powered by Koha