Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Person/Organisation
Schlagwörter
  • 1
    Online-Ressource
    Online-Ressource
    [Place of publication not identified] :KIT Scientific Publishing,
    UID:
    almahu_9949507811002882
    Umfang: 1 online resource (271 pages).
    Serie: Wissenschaftliche Berichte des Institutes für Fördertechnik und Logistiksysteme der Universität Karlsruhe (TH)
    Weitere Ausg.: ISBN 1000005203
    Sprache: Deutsch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Boca Raton :CRC Press,
    UID:
    almahu_9949384428202882
    Umfang: 1 online resource (ccxxxii, 22 pages)
    Ausgabe: First edition.
    ISBN: 9780367259433 , 0367259435 , 9781000005202 , 1000005208 , 9781000018554 , 1000018555 , 9781000012033 , 1000012034
    Inhalt: This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains where and how to store data and what should be avoided at all costs. It presents the views and insight of the leading experts on the state of cloud computing security and its future. It also provides no-nonsense info on cloud security technologies and models. Securing the Cloud: Security Strategies for the Ubiquitous Data Center takes the position that cloud security is an extension of recognized, established security principles into cloud-based deployments. It explores how those principles can be put into practice to protect cloud-based infrastructure and data, traditional infrastructure, and hybrid architectures combining cloud and on-premises infrastructure. Cloud computing is evolving so rapidly that regulations and technology have not necessarily been able to keep pace. IT professionals are frequently left to force fit pre-existing solutions onto new infrastructure and architectures for which they may be very poor fits. This book looks at how those "square peg/round hole" solutions are implemented and explains ways in which the pegs, the holes, or both may be adjusted for a more perfect fit
    Anmerkung: "An Auerbach Book." , Dedication Contents Preface Acknowledgments About the Authors Chapter 1 Introduction Chapter 2 We Need a New Model for Security Chapter 3 The Basics of IT Security: From Mainframe to Cloud Chapter 4 The Basics of Security Failure Chapter 5 The Basics of Fitting Security to Situation Chapter 6 Defining the Cloud to Protect Chapter 7 Infrastructure as a Service Chapter 8 Platform as a Service (PaaS) Chapter 9 Software as a Service Chapter 10 Virtual Desktop Infrastructure Chapter 11 Understand Your Cloud Type Chapter 12 Public Cloud Chapter 13 Private Cloud Chapter 14 Hybrid Cloud Chapter 15 Working with Your Cloud Provider Chapter 16 Protecting the Perimeter Chapter 17 Protecting the Contents Chapter 18 Protecting the Infrastructure Chapter 19 Tie the Cloud Using an Internal Management Framework Chapter 20 Closing Comments Index
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 1000005283?
Meinten Sie 1000015203?
Meinten Sie 1000050203?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz