Cargando…

Data security in cloud computing. Volume ii /

This book covers not only information protection in cloud computing security and risk management, but also the plan, management, and in-depth implementation details needed to migrate existing applications to the cloud. Readers will have a greater comprehension of cloud engineering and the actions re...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: D'Agostino, Giulio (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, New York : Momentum Press, 2019.
Edición:First edition.
Colección:Computer engineering foundations currents and trajectories collection
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_on1096507390
003 OCoLC
005 20231017213018.0
006 m eo d
007 cr cn||||m|||a
008 190331s2019 nyu ob 001 0 eng d
040 |a NYMPP  |b eng  |e rda  |e pn  |c NYMPP  |d OCLCO  |d DKU  |d UKAHL  |d OCLCF  |d OCLCQ  |d N$T  |d YDXIT  |d K6U  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 1097252922 
020 |a 9781949449242  |q (electronic book) 
020 |a 1949449246  |q (electronic book) 
020 |z 1949449238  |q (paperback) 
020 |z 9781949449235  |q (paperback) 
035 |a (OCoLC)1096507390  |z (OCoLC)1097252922 
050 4 |a QA76.585  |b .D34 2019 
082 0 4 |a 004.67/82  |2 23 
049 |a UAMI 
100 1 |a D'Agostino, Giulio,  |e author. 
245 1 0 |a Data security in cloud computing.  |n Volume ii /  |c Giulio D'Agostino. 
250 |a First edition. 
264 1 |a New York, New York :  |b Momentum Press,  |c 2019. 
300 |a 1 online resource (135 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 isbdmedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 0 |a Computer engineering foundations currents and trajectories collection 
504 |a Includes bibliographical references. 
505 0 |a Chapter 7. Secure cloud architecture. 7.1. Governance and comprehensive risk analysis -- Chapter 8. Risk and trust assessment -- Chapter 9. Managing risk in the cloud -- 10.1. Improvements ; 10.2. Multilevel authentication ; 10.3. Encryption ; 10.4. Password administration ; 10.5. Distributed servers -- Chapter 11. Cloud security risk management. 11.1. Risk in the cloud ; 11.2. Indirect measurements and metrics ; 11.3. Definitions of risk ; 11.4. Risk and cloud. 11.4.1. Security risks not particular to cloud computing ; 11.4.2. Cloud-specific hazards ; 11.4.3. Safety SLA for cloud services -- Chapter 12. Infrastructure-as-a-service (IAAS). 12.1. Considerations ; 12.2. Network ; 12.3. Security implications ; 12.4. Storage ; 12.5. Databases ; 12.6. Control -- Chapter 13. Cryptographic key management for data protection. 13.1. Key management system design dhoices ; 13.2. Cloud key management challenges ; 13.3. Cloud key management strategies ; 13.3.1. Establish trust in crypto module ; 13.3.2. Use key splitting techniques -- Chapter 14. Managing legal compliance risk and personal data protection. 14.1. Digital agenda for Europe ; 14.2. Addressing legal compliance ; 14.2.1. Precontractual phase ; 14.2.2. Step 1: Precontractual phase ; 14.2.3. Risks and opportunities for your cloud service client ; 14.2.4. Outsourcing cloud services ; 14.2.5. Step 2: Major issues in entering a cloud service contract ; 14.2.6. Jurisdiction and applicable law ; 14.2.7. Privacy roles ; 14.2.8. Amendments to the contract ; 14.2.9. Data location and transfers of data ; 14.2.10. Processing of personal data by subcontractors ; 14.2.11. Data subjects' rights (intervenability) ; 14.2.12. Step 3: Exiting a cloud service contract: major issues ; 14.2.13. Lock-in and interoperability ; 14.2.14. Service-level agreements ; 14.2.15. Termination of the contract -- Chapter 15. Future directions in cloud computing security. 15.1. Categories. 
520 3 |a This book covers not only information protection in cloud computing security and risk management, but also the plan, management, and in-depth implementation details needed to migrate existing applications to the cloud. Readers will have a greater comprehension of cloud engineering and the actions required to rap- idly reap its benefits while at the same time lowering IT implementation risk. The book's content is ideal for users wanting to migrate to the cloud, IT professionals seeking an overview on cloud fundamentals, and computer science students who will build cloud solutions for testing purposes. 
588 0 |a Online resource; title from digital title page (viewed on March 20, 2020). 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Cloud computing. 
650 0 |a Cloud computing  |x Security measures. 
650 6 |a Infonuagique. 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 7 |a Cloud computing.  |2 fast  |0 (OCoLC)fst01745899 
653 |a Amazon Web Services 
653 |a API. 
653 |a Azure. 
653 |a BaaS. 
653 |a Cloud computing. 
653 |a Computer engineering and science. 
653 |a Google Cloud. 
653 |a Java. 
653 |a MySQL. 
653 |a Node.js. 
653 |a SaaS. 
653 |a SQL.=655 0  |a Electronic books 
776 0 8 |i Print version:  |z 9781949449235 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2034765  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH35970893 
938 |a EBSCOhost  |b EBSC  |n 2034765 
938 |a Momentum Press  |b NYMP  |n 9781949449242 
994 |a 92  |b IZTAP