Cloud Computing :: Assessing the Risks.
Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing.
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely :
IT Governance Publishing,
2012.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing. |
Beschreibung: | 1 online resource (297 pages) |
ISBN: | 9781849283601 1849283605 9781628700114 1628700114 9781849283618 1849283613 |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-ocn799769042 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 120716s2012 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d B24X7 |d N15 |d OCLCO |d COO |d OCLCQ |d YDXCP |d N$T |d UMI |d OCLCO |d OCLCQ |d IAD |d KNOVL |d DEBSZ |d OCLCF |d JSTOR |d KNOVL |d OCLCQ |d KNOVL |d OCLCQ |d AGLDB |d Z5A |d LIV |d MERUC |d OCLCQ |d EZ9 |d IYU |d IOG |d VNS |d VTS |d CEF |d OCLCQ |d XC$ |d LVT |d UAB |d STF |d M8D |d UKAHL |d OCLCQ |d VT2 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d DEGRU |d YWS | ||
019 | |a 857306735 | ||
020 | |a 9781849283601 |q (electronic bk.) | ||
020 | |a 1849283605 |q (electronic bk.) | ||
020 | |a 9781628700114 |q (electronic bk.) | ||
020 | |a 1628700114 |q (electronic bk.) | ||
020 | |a 9781849283618 | ||
020 | |a 1849283613 | ||
020 | |z 1849283591 | ||
020 | |z 9781849283595 | ||
035 | |a (OCoLC)799769042 |z (OCoLC)857306735 | ||
037 | |a CL0500000268 |b Safari Books Online | ||
037 | |a 22573/ctt4k5ppf |b JSTOR | ||
050 | 4 | |a HF5548.37 .C384 2012 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM060080 |2 bisacsh | |
072 | 7 | |a COM000000 |2 bisacsh | |
082 | 7 | |a 005.8 | |
049 | |a MAIN | ||
100 | 1 | |a Carstensen, Jared. |0 http://id.loc.gov/authorities/names/nb2013002899 | |
245 | 1 | 0 | |a Cloud Computing : |b Assessing the Risks. |
260 | |a Ely : |b IT Governance Publishing, |c 2012. | ||
300 | |a 1 online resource (297 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three. | |
505 | 8 | |a Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism. | |
505 | 8 | |a The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility. | |
505 | 8 | |a Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work. | |
505 | 8 | |a Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing. | |
520 | |a Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Cloud computing. |0 http://id.loc.gov/authorities/subjects/sh2008004883 | |
650 | 0 | |a Web services. |0 http://id.loc.gov/authorities/subjects/sh2003001435 | |
650 | 6 | |a Infonuagique. | |
650 | 6 | |a Services Web. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Web |x General. |2 bisacsh | |
650 | 7 | |a Cloud computing |2 fast | |
650 | 7 | |a Web services |2 fast | |
653 | |a Cloud computing. | ||
653 | |a Cloud. | ||
653 | |a Risk assessment. | ||
653 | |a business continuity. | ||
653 | |a cloud security. | ||
653 | |a cloud services. | ||
653 | |a compliance. | ||
653 | |a disaster recovery. | ||
700 | 1 | |a Morgenthal, JP. | |
700 | 1 | |a Golden, Bernard. | |
758 | |i has work: |a Cloud computing (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGjPYPcxp8Dx8Rm9BWqhHC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Carstensen, Jared. |t Cloud Computing : Assessing the Risks. |d Ely : IT Governance Publishing, ©2012 |z 9781849283595 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=571554 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH36161592 | ||
938 | |a De Gruyter |b DEGR |n 9781849283601 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26183768 | ||
938 | |a Books 24x7 |b B247 |n bks00047045 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL918802 | ||
938 | |a EBSCOhost |b EBSC |n 571554 | ||
938 | |a YBP Library Services |b YANK |n 9241861 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-ocn799769042 |
---|---|
_version_ | 1816796904875360256 |
adam_text | |
any_adam_object | |
author | Carstensen, Jared |
author2 | Morgenthal, JP Golden, Bernard |
author2_role | |
author2_variant | j m jm b g bg |
author_GND | http://id.loc.gov/authorities/names/nb2013002899 |
author_facet | Carstensen, Jared Morgenthal, JP Golden, Bernard |
author_role | |
author_sort | Carstensen, Jared |
author_variant | j c jc |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.37 .C384 2012 |
callnumber-search | HF5548.37 .C384 2012 |
callnumber-sort | HF 45548.37 C384 42012 |
callnumber-subject | HF - Commerce |
collection | ZDB-4-EBU |
contents | What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three. Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism. The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility. Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work. Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing. |
ctrlnum | (OCoLC)799769042 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06528cam a2200889Mi 4500</leader><controlfield tag="001">ZDB-4-EBU-ocn799769042</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">120716s2012 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">B24X7</subfield><subfield code="d">N15</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">N$T</subfield><subfield code="d">UMI</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IAD</subfield><subfield code="d">KNOVL</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">JSTOR</subfield><subfield code="d">KNOVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">KNOVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">Z5A</subfield><subfield code="d">LIV</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EZ9</subfield><subfield code="d">IYU</subfield><subfield code="d">IOG</subfield><subfield code="d">VNS</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">XC$</subfield><subfield code="d">LVT</subfield><subfield code="d">UAB</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">DEGRU</subfield><subfield code="d">YWS</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">857306735</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283601</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283605</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781628700114</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1628700114</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283618</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283613</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1849283591</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849283595</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)799769042</subfield><subfield code="z">(OCoLC)857306735</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000268</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt4k5ppf</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HF5548.37 .C384 2012</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM060080</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carstensen, Jared.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2013002899</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud Computing :</subfield><subfield code="b">Assessing the Risks.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Ely :</subfield><subfield code="b">IT Governance Publishing,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (297 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2008004883</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web services.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2003001435</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Infonuagique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Services Web.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Web</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cloud computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web services</subfield><subfield code="2">fast</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud computing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Risk assessment.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">business continuity.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cloud security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cloud services.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">compliance.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">disaster recovery.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Morgenthal, JP.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Golden, Bernard.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cloud computing (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGjPYPcxp8Dx8Rm9BWqhHC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Carstensen, Jared.</subfield><subfield code="t">Cloud Computing : Assessing the Risks.</subfield><subfield code="d">Ely : IT Governance Publishing, ©2012</subfield><subfield code="z">9781849283595</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=571554</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH36161592</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9781849283601</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26183768</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00047045</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL918802</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">571554</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">9241861</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBU-ocn799769042 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:49:06Z |
institution | BVB |
isbn | 9781849283601 1849283605 9781628700114 1628700114 9781849283618 1849283613 |
language | English |
oclc_num | 799769042 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (297 pages) |
psigel | ZDB-4-EBU |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | IT Governance Publishing, |
record_format | marc |
spelling | Carstensen, Jared. http://id.loc.gov/authorities/names/nb2013002899 Cloud Computing : Assessing the Risks. Ely : IT Governance Publishing, 2012. 1 online resource (297 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three. Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism. The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility. Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work. Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing. Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing. Print version record. Cloud computing. http://id.loc.gov/authorities/subjects/sh2008004883 Web services. http://id.loc.gov/authorities/subjects/sh2003001435 Infonuagique. Services Web. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh COMPUTERS Web General. bisacsh Cloud computing fast Web services fast Cloud computing. Cloud. Risk assessment. business continuity. cloud security. cloud services. compliance. disaster recovery. Morgenthal, JP. Golden, Bernard. has work: Cloud computing (Text) https://id.oclc.org/worldcat/entity/E39PCGjPYPcxp8Dx8Rm9BWqhHC https://id.oclc.org/worldcat/ontology/hasWork Print version: Carstensen, Jared. Cloud Computing : Assessing the Risks. Ely : IT Governance Publishing, ©2012 9781849283595 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=571554 Volltext |
spellingShingle | Carstensen, Jared Cloud Computing : Assessing the Risks. What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three. Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism. The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility. Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work. Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing. Cloud computing. http://id.loc.gov/authorities/subjects/sh2008004883 Web services. http://id.loc.gov/authorities/subjects/sh2003001435 Infonuagique. Services Web. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh COMPUTERS Web General. bisacsh Cloud computing fast Web services fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2008004883 http://id.loc.gov/authorities/subjects/sh2003001435 |
title | Cloud Computing : Assessing the Risks. |
title_auth | Cloud Computing : Assessing the Risks. |
title_exact_search | Cloud Computing : Assessing the Risks. |
title_full | Cloud Computing : Assessing the Risks. |
title_fullStr | Cloud Computing : Assessing the Risks. |
title_full_unstemmed | Cloud Computing : Assessing the Risks. |
title_short | Cloud Computing : |
title_sort | cloud computing assessing the risks |
title_sub | Assessing the Risks. |
topic | Cloud computing. http://id.loc.gov/authorities/subjects/sh2008004883 Web services. http://id.loc.gov/authorities/subjects/sh2003001435 Infonuagique. Services Web. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh COMPUTERS Web General. bisacsh Cloud computing fast Web services fast |
topic_facet | Cloud computing. Web services. Infonuagique. Services Web. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. COMPUTERS Web General. Cloud computing Web services |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=571554 |
work_keys_str_mv | AT carstensenjared cloudcomputingassessingtherisks AT morgenthaljp cloudcomputingassessingtherisks AT goldenbernard cloudcomputingassessingtherisks |