|
" Cloud security and privacy / "
Tim Mather, Subra Kumaraswamy, and Shahed Latif.
Document Type
|
:
|
BL
|
Record Number
|
:
|
996426
|
Doc. No
|
:
|
b750796
|
Main Entry
|
:
|
Mather, Tim.
|
Title & Author
|
:
|
Cloud security and privacy /\ Tim Mather, Subra Kumaraswamy, and Shahed Latif.
|
Edition Statement
|
:
|
1st ed.
|
Publication Statement
|
:
|
Beijing ;Cambridge [Mass.] :: O'Reilly,, ©2009.
|
Series Statement
|
:
|
Theory in practice
|
Page. NO
|
:
|
xvii, 312 pages :: illustrations ;; 24 cm.
|
ISBN
|
:
|
0596802765
|
|
:
|
: 9780596802769
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references and index.
|
Contents
|
:
|
Introduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud.
|
Abstract
|
:
|
You may regard cloud computing as an ideal way for your company to control It costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for It staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (Iam) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security.
|
Subject
|
:
|
Cloud computing-- Security measures.
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Cloud Computing
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Computersicherheit
|
Subject
|
:
|
Délits informatiques.
|
Subject
|
:
|
Informatique en nuage.
|
Subject
|
:
|
Réseaux informatiques.
|
Subject
|
:
|
Sécurité informatique.
|
Subject
|
:
|
Sicherheitsmaßnahme
|
Subject
|
:
|
Sicherheitsmassnahme.
|
Subject
|
:
|
Technologies de l'information et de la communication.
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
TK5105.59.M38 2009
|
Added Entry
|
:
|
Kumaraswamy, Subra.
|
|
:
|
Latif, Shahed.
|
| |