Securing the cloud :: cloud computer security techniques and tactics /
As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your pe...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA :
Elsevier,
2011.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power and storage. |
Beschreibung: | 1 online resource (1 online resource) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781597495929 1597495921 9781597495936 159749593X |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn722800241 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 110512s2011 mau ob 001 0 eng d | ||
040 | |a OPELS |b eng |e pn |c OPELS |d CDX |d OCLCQ |d N$T |d YDXCP |d E7B |d OCLCQ |d DKDLA |d TEF |d DEBSZ |d OCLCQ |d TEFOD |d OCLCF |d TEFOD |d OCLCQ |d ICA |d AGLDB |d OCLCA |d UUM |d U3W |d MNI |d OCLCQ |d VTS |d INT |d OCLCQ |d WYU |d OCLCQ |d STF |d AUD |d LEAUB |d C6I |d EBLCP |d UBY |d COCUF |d K6U |d CNNOR |d Z5A |d ZCU |d MERUC |d D6H |d ICG |d AU@ |d DKC |d SFB |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO | ||
019 | |a 721194746 |a 726757691 |a 768975514 | ||
020 | |a 9781597495929 |q (electronic bk.) | ||
020 | |a 1597495921 |q (electronic bk.) | ||
020 | |a 9781597495936 |q (electronic bk.) | ||
020 | |a 159749593X |q (electronic bk.) | ||
035 | |a (OCoLC)722800241 |z (OCoLC)721194746 |z (OCoLC)726757691 |z (OCoLC)768975514 | ||
037 | |a 2BD7DD6D-6FAA-4976-89DB-8C8A85250313 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.585 |b .W56 2011eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Winkler, J. R. |q (Joachim R.) |1 https://id.oclc.org/worldcat/entity/E39PCjvYttHw6HdwMdKjVtxT6q |0 http://id.loc.gov/authorities/names/n2011028876 | |
245 | 1 | 0 | |a Securing the cloud : |b cloud computer security techniques and tactics / |c J.R. "Vic" Winkler. |
260 | |a Burlington, MA : |b Elsevier, |c 2011. | ||
300 | |a 1 online resource (1 online resource) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power and storage. | ||
505 | 0 | |a Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud. | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Cloud computing. |0 http://id.loc.gov/authorities/subjects/sh2008004883 | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Infonuagique. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Cloud computing |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
758 | |i has work: |a Securing the cloud (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFVtTVQyJDYy9wJrfJCgjC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Winkler, J.R. (Joachim R.). |t Securing the cloud. |d Burlington, MA : Elsevier, 2011 |z 9781597495929 |w (DLC) 2011012004 |w (OCoLC)660546140 |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365857 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365857 |3 Volltext | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597495929 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597495929 |3 Volltext | |
938 | |a Coutts Information Services |b COUT |n 17857024 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL686827 | ||
938 | |a ebrary |b EBRY |n ebr10467735 | ||
938 | |a EBSCOhost |b EBSC |n 365857 | ||
938 | |a YBP Library Services |b YANK |n 5049400 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn722800241 |
---|---|
_version_ | 1813903401314942978 |
adam_text | |
any_adam_object | |
author | Winkler, J. R. (Joachim R.) |
author_GND | http://id.loc.gov/authorities/names/n2011028876 |
author_facet | Winkler, J. R. (Joachim R.) |
author_role | |
author_sort | Winkler, J. R. |
author_variant | j r w jr jrw |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 .W56 2011eb |
callnumber-search | QA76.585 .W56 2011eb |
callnumber-sort | QA 276.585 W56 42011EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud. |
ctrlnum | (OCoLC)722800241 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04851cam a2200661 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn722800241</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">110512s2011 mau ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">CDX</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKDLA</subfield><subfield code="d">TEF</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCF</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ICA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCA</subfield><subfield code="d">UUM</subfield><subfield code="d">U3W</subfield><subfield code="d">MNI</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">AUD</subfield><subfield code="d">LEAUB</subfield><subfield code="d">C6I</subfield><subfield code="d">EBLCP</subfield><subfield code="d">UBY</subfield><subfield code="d">COCUF</subfield><subfield code="d">K6U</subfield><subfield code="d">CNNOR</subfield><subfield code="d">Z5A</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">D6H</subfield><subfield code="d">ICG</subfield><subfield code="d">AU@</subfield><subfield code="d">DKC</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">721194746</subfield><subfield code="a">726757691</subfield><subfield code="a">768975514</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495929</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495921</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495936</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749593X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)722800241</subfield><subfield code="z">(OCoLC)721194746</subfield><subfield code="z">(OCoLC)726757691</subfield><subfield code="z">(OCoLC)768975514</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">2BD7DD6D-6FAA-4976-89DB-8C8A85250313</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield><subfield code="b">.W56 2011eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Winkler, J. R.</subfield><subfield code="q">(Joachim R.)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjvYttHw6HdwMdKjVtxT6q</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2011028876</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing the cloud :</subfield><subfield code="b">cloud computer security techniques and tactics /</subfield><subfield code="c">J.R. "Vic" Winkler.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Burlington, MA :</subfield><subfield code="b">Elsevier,</subfield><subfield code="c">2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power and storage.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2008004883</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Infonuagique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cloud computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Securing the cloud (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFVtTVQyJDYy9wJrfJCgjC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Winkler, J.R. (Joachim R.).</subfield><subfield code="t">Securing the cloud.</subfield><subfield code="d">Burlington, MA : Elsevier, 2011</subfield><subfield code="z">9781597495929</subfield><subfield code="w">(DLC) 2011012004</subfield><subfield code="w">(OCoLC)660546140</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365857</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365857</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597495929</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597495929</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">17857024</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL686827</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10467735</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">365857</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">5049400</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn722800241 |
illustrated | Not Illustrated |
indexdate | 2024-10-25T16:18:05Z |
institution | BVB |
isbn | 9781597495929 1597495921 9781597495936 159749593X |
language | English |
oclc_num | 722800241 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (1 online resource) |
psigel | ZDB-4-EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Elsevier, |
record_format | marc |
spelling | Winkler, J. R. (Joachim R.) https://id.oclc.org/worldcat/entity/E39PCjvYttHw6HdwMdKjVtxT6q http://id.loc.gov/authorities/names/n2011028876 Securing the cloud : cloud computer security techniques and tactics / J.R. "Vic" Winkler. Burlington, MA : Elsevier, 2011. 1 online resource (1 online resource) text txt rdacontent computer c rdamedia online resource cr rdacarrier As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power and storage. Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud. Includes bibliographical references and index. Print version record. Cloud computing. http://id.loc.gov/authorities/subjects/sh2008004883 Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Infonuagique. Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Cloud computing fast Computer networks Security measures fast Computer security fast has work: Securing the cloud (Text) https://id.oclc.org/worldcat/entity/E39PCFVtTVQyJDYy9wJrfJCgjC https://id.oclc.org/worldcat/ontology/hasWork Print version: Winkler, J.R. (Joachim R.). Securing the cloud. Burlington, MA : Elsevier, 2011 9781597495929 (DLC) 2011012004 (OCoLC)660546140 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365857 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365857 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597495929 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597495929 Volltext |
spellingShingle | Winkler, J. R. (Joachim R.) Securing the cloud : cloud computer security techniques and tactics / Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud. Cloud computing. http://id.loc.gov/authorities/subjects/sh2008004883 Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Infonuagique. Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Cloud computing fast Computer networks Security measures fast Computer security fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2008004883 http://id.loc.gov/authorities/subjects/sh94001277 |
title | Securing the cloud : cloud computer security techniques and tactics / |
title_auth | Securing the cloud : cloud computer security techniques and tactics / |
title_exact_search | Securing the cloud : cloud computer security techniques and tactics / |
title_full | Securing the cloud : cloud computer security techniques and tactics / J.R. "Vic" Winkler. |
title_fullStr | Securing the cloud : cloud computer security techniques and tactics / J.R. "Vic" Winkler. |
title_full_unstemmed | Securing the cloud : cloud computer security techniques and tactics / J.R. "Vic" Winkler. |
title_short | Securing the cloud : |
title_sort | securing the cloud cloud computer security techniques and tactics |
title_sub | cloud computer security techniques and tactics / |
topic | Cloud computing. http://id.loc.gov/authorities/subjects/sh2008004883 Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Infonuagique. Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Cloud computing fast Computer networks Security measures fast Computer security fast |
topic_facet | Cloud computing. Computer security. Computer networks Security measures. Infonuagique. Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Cloud computing Computer networks Security measures Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365857 https://www.sciencedirect.com/science/book/9781597495929 |
work_keys_str_mv | AT winklerjr securingthecloudcloudcomputersecuritytechniquesandtactics |