Cloud Computing : Assessing the Risks.
Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Ely :
IT Governance Publishing,
2012.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | KNOVEL_ocn799769042 | ||
003 | OCoLC | ||
005 | 20231027140348.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 120716s2012 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d B24X7 |d N15 |d OCLCO |d COO |d OCLCQ |d YDXCP |d N$T |d UMI |d OCLCO |d OCLCQ |d IAD |d KNOVL |d DEBSZ |d OCLCF |d JSTOR |d KNOVL |d OCLCQ |d KNOVL |d OCLCQ |d AGLDB |d Z5A |d LIV |d MERUC |d OCLCQ |d EZ9 |d IYU |d IOG |d VNS |d VTS |d CEF |d OCLCQ |d XC$ |d LVT |d UAB |d STF |d M8D |d UKAHL |d OCLCQ |d VT2 |d OCLCO |d OCLCQ | ||
019 | |a 857306735 | ||
020 | |a 9781849283601 |q (electronic bk.) | ||
020 | |a 1849283605 |q (electronic bk.) | ||
020 | |a 9781628700114 |q (electronic bk.) | ||
020 | |a 1628700114 |q (electronic bk.) | ||
020 | |a 9781849283618 | ||
020 | |a 1849283613 | ||
020 | |z 1849283591 | ||
020 | |z 9781849283595 | ||
029 | 1 | |a AU@ |b 000052007537 | |
029 | 1 | |a DEBBG |b BV041431776 | |
029 | 1 | |a DEBBG |b BV042961220 | |
029 | 1 | |a DEBSZ |b 397311729 | |
029 | 1 | |a DEBSZ |b 398276404 | |
029 | 1 | |a DEBSZ |b 421257679 | |
029 | 1 | |a AU@ |b 000067109561 | |
035 | |a (OCoLC)799769042 |z (OCoLC)857306735 | ||
037 | |a CL0500000268 |b Safari Books Online | ||
037 | |a 22573/ctt4k5ppf |b JSTOR | ||
050 | 4 | |a HF5548.37 .C384 2012 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM060080 |2 bisacsh | |
072 | 7 | |a COM000000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |
049 | |a UAMI | ||
100 | 1 | |a Carstensen, Jared. | |
245 | 1 | 0 | |a Cloud Computing : |b Assessing the Risks. |
260 | |a Ely : |b IT Governance Publishing, |c 2012. | ||
300 | |a 1 online resource (297 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three. | |
505 | 8 | |a Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism. | |
505 | 8 | |a The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility. | |
505 | 8 | |a Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work. | |
505 | 8 | |a Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing. | |
520 | |a Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing. | ||
588 | 0 | |a Print version record. | |
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a JSTOR |b Books at JSTOR Evidence Based Acquisitions | ||
590 | |a JSTOR |b Books at JSTOR Demand Driven Acquisitions (DDA) | ||
590 | |a Knovel |b ACADEMIC - Optics & Photonics | ||
590 | |a Knovel |b ACADEMIC - Software Engineering | ||
590 | |a Knovel |b ACADEMIC - Nanotechnology | ||
650 | 0 | |a Cloud computing. | |
650 | 0 | |a Web services. | |
650 | 6 | |a Infonuagique. | |
650 | 6 | |a Services Web. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Web |x General. |2 bisacsh | |
650 | 7 | |a Cloud computing. |2 fast |0 (OCoLC)fst01745899 | |
650 | 7 | |a Web services. |2 fast |0 (OCoLC)fst01173242 | |
700 | 1 | |a Morgenthal, JP. | |
700 | 1 | |a Golden, Bernard. | |
776 | 0 | 8 | |i Print version: |a Carstensen, Jared. |t Cloud Computing : Assessing the Risks. |d Ely : IT Governance Publishing, ©2012 |z 9781849283595 |
856 | 4 | 0 | |u https://appknovel.uam.elogim.com/kn/resources/kpOSMAE011/toc |z Texto completo |
856 | 4 | 0 | |u https://appknovel.uam.elogim.com/kn/resources/kpCCAR0002/toc |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH26183768 | ||
938 | |a Books 24x7 |b B247 |n bks00047045 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL918802 | ||
938 | |a EBSCOhost |b EBSC |n 571554 | ||
938 | |a YBP Library Services |b YANK |n 9241861 | ||
994 | |a 92 |b IZTAP |