Cloud security and privacy
By: Mather, Tim.
Contributor(s): Kumaraswamy, Subra | Latif, Shahed.
Publisher: Mumbai 2009Description: xvii,312+23 p. | Binding - Paperback |.ISBN: 978-81-8404-815-5.Subject(s): Computer EngineeringDDC classification: 5.8 Summary: You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. --Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability --Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services --Discover which security management frameworks and standards are relevant for the cloud --Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models --Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider --Examine security delivered as a service-a different facet of cloud security Table of Contents Chapter 1 Introduction Chapter 2 What Is Cloud Computing? Chapter 3 Infrastructure Security Chapter 4 Data Security and Storage Chapter 5 Identity and Access Management Chapter 6 Security Management in the Cloud Chapter 7 Privacy Chapter 8 Audit and Compliance Chapter 9 Examples of Cloud Service Providers Chapter 10 Security-As-a-[Cloud] Service Chapter 11 The Impact of Cloud Computing on the Role of Corporate IT Chapter 12 Conclusion, and the Future of the Cloud Appendix SAS 70 Report Content Example Appendix Sys Trust Report Content Example Appendix Open Security Architecture for Cloud Computing ColophonItem type | Current location | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
Text Books | School of Engineering & Technology Reference Section | Reference | 005.8 MAT/KUM (Browse shelf) | Not For Loan | E10223 | ||
Text Books | School of Engineering & Technology General Stacks | Circulation | 005.8 MAT/KUM (Browse shelf) | Available | E10224 |
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure.
Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking.
--Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability
--Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services
--Discover which security management frameworks and standards are relevant for the cloud
--Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models
--Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider
--Examine security delivered as a service-a different facet of cloud security
Table of Contents
Chapter 1 Introduction
Chapter 2 What Is Cloud Computing?
Chapter 3 Infrastructure Security
Chapter 4 Data Security and Storage
Chapter 5 Identity and Access Management
Chapter 6 Security Management in the Cloud
Chapter 7 Privacy
Chapter 8 Audit and Compliance
Chapter 9 Examples of Cloud Service Providers
Chapter 10 Security-As-a-[Cloud] Service
Chapter 11 The Impact of Cloud Computing on the Role of Corporate IT
Chapter 12 Conclusion, and the Future of the Cloud
Appendix SAS 70 Report Content Example
Appendix Sys Trust Report Content Example
Appendix Open Security Architecture for Cloud Computing Colophon
There are no comments for this item.