Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Person/Organisation
Keywords
  • 1
    UID:
    almahu_9949384428202882
    Format: 1 online resource (ccxxxii, 22 pages)
    Edition: First edition.
    ISBN: 9780367259433 , 0367259435 , 9781000005202 , 1000005208 , 9781000018554 , 1000018555 , 9781000012033 , 1000012034
    Content: This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains where and how to store data and what should be avoided at all costs. It presents the views and insight of the leading experts on the state of cloud computing security and its future. It also provides no-nonsense info on cloud security technologies and models. Securing the Cloud: Security Strategies for the Ubiquitous Data Center takes the position that cloud security is an extension of recognized, established security principles into cloud-based deployments. It explores how those principles can be put into practice to protect cloud-based infrastructure and data, traditional infrastructure, and hybrid architectures combining cloud and on-premises infrastructure. Cloud computing is evolving so rapidly that regulations and technology have not necessarily been able to keep pace. IT professionals are frequently left to force fit pre-existing solutions onto new infrastructure and architectures for which they may be very poor fits. This book looks at how those "square peg/round hole" solutions are implemented and explains ways in which the pegs, the holes, or both may be adjusted for a more perfect fit
    Note: "An Auerbach Book." , Dedication Contents Preface Acknowledgments About the Authors Chapter 1 Introduction Chapter 2 We Need a New Model for Security Chapter 3 The Basics of IT Security: From Mainframe to Cloud Chapter 4 The Basics of Security Failure Chapter 5 The Basics of Fitting Security to Situation Chapter 6 Defining the Cloud to Protect Chapter 7 Infrastructure as a Service Chapter 8 Platform as a Service (PaaS) Chapter 9 Software as a Service Chapter 10 Virtual Desktop Infrastructure Chapter 11 Understand Your Cloud Type Chapter 12 Public Cloud Chapter 13 Private Cloud Chapter 14 Hybrid Cloud Chapter 15 Working with Your Cloud Provider Chapter 16 Protecting the Perimeter Chapter 17 Protecting the Contents Chapter 18 Protecting the Infrastructure Chapter 19 Tie the Cloud Using an Internal Management Framework Chapter 20 Closing Comments Index
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 1000012234?
Did you mean 1000012934?
Did you mean 1000012434?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages