Cargando…

Securing the cloud : cloud computer security techniques and tactics /

As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your pe...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Winkler, J. R. (Joachim R.)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Elsevier, 2011.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn722800241
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 110512s2011 mau ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d CDX  |d OCLCQ  |d N$T  |d YDXCP  |d E7B  |d OCLCQ  |d DKDLA  |d TEF  |d DEBSZ  |d OCLCQ  |d TEFOD  |d OCLCF  |d TEFOD  |d OCLCQ  |d ICA  |d AGLDB  |d OCLCA  |d UUM  |d U3W  |d MNI  |d OCLCQ  |d VTS  |d INT  |d OCLCQ  |d WYU  |d OCLCQ  |d STF  |d AUD  |d LEAUB  |d C6I  |d EBLCP  |d UBY  |d COCUF  |d K6U  |d CNNOR  |d Z5A  |d ZCU  |d MERUC  |d D6H  |d ICG  |d AU@  |d DKC  |d SFB  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 721194746  |a 726757691  |a 768975514 
020 |a 9781597495929  |q (electronic bk.) 
020 |a 1597495921  |q (electronic bk.) 
020 |a 9781597495936  |q (electronic bk.) 
020 |a 159749593X  |q (electronic bk.) 
029 1 |a AU@  |b 000048824893 
029 1 |a AU@  |b 000059305782 
029 1 |a CHNEW  |b 001010107 
029 1 |a DEBBG  |b BV039829370 
029 1 |a DEBBG  |b BV042314270 
029 1 |a DEBBG  |b BV044153573 
029 1 |a DEBSZ  |b 36007863X 
029 1 |a DEBSZ  |b 372695582 
029 1 |a DEBSZ  |b 430979436 
029 1 |a DEBSZ  |b 481266801 
029 1 |a NZ1  |b 15189609 
029 1 |a NZ1  |b 15952545 
035 |a (OCoLC)722800241  |z (OCoLC)721194746  |z (OCoLC)726757691  |z (OCoLC)768975514 
037 |a 2BD7DD6D-6FAA-4976-89DB-8C8A85250313  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.585  |b .W56 2011eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Winkler, J. R.  |q (Joachim R.) 
245 1 0 |a Securing the cloud :  |b cloud computer security techniques and tactics /  |c J.R. "Vic" Winkler. 
260 |a Burlington, MA :  |b Elsevier,  |c 2011. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power and storage. 
505 0 |a Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud. 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Cloud computing. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Infonuagique. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Cloud computing  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
776 0 8 |i Print version:  |a Winkler, J.R. (Joachim R.).  |t Securing the cloud.  |d Burlington, MA : Elsevier, 2011  |z 9781597495929  |w (DLC) 2011012004  |w (OCoLC)660546140 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365857  |z Texto completo 
938 |a Coutts Information Services  |b COUT  |n 17857024 
938 |a EBL - Ebook Library  |b EBLB  |n EBL686827 
938 |a ebrary  |b EBRY  |n ebr10467735 
938 |a EBSCOhost  |b EBSC  |n 365857 
938 |a YBP Library Services  |b YANK  |n 5049400 
994 |a 92  |b IZTAP