Cargando…

Federal cloud computing : the definitive guide for cloud service providers /

"In recent years 'cloud computing' has emerged as a model for providing IT infrastructure, resources and services that has the potential to drive significant value to organizations through increased IT efficiency, agility and innovation. However, Federal agencies who were early adopte...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Metheny, Matthew
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Elsevier/Syngress, 2012.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 KNOVEL_ocn823738965
003 OCoLC
005 20231027140348.0
006 m o d
007 cr cn|||||||||
008 120924s2012 ne a ob 001 0 eng d
010 |z  2012030642 
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d OCLCO  |d N$T  |d IDEBK  |d KNOVL  |d DEBBG  |d KNOVL  |d TEFOD  |d OCLCQ  |d TEFOD  |d OCLCQ  |d UKAHL  |d VT2  |d C6I  |d VLY  |d LOA  |d DST  |d AAA  |d OCLCQ  |d OCLCF 
019 |a 1103265444  |a 1162043340  |a 1202545148  |a 1230258209  |a 1240510183  |a 1295608495  |a 1300481828  |a 1303359181 
020 |a 9781597497398  |q (electronic bk.) 
020 |a 1597497398  |q (electronic bk.) 
020 |z 9781597497374  |q (pbk.) 
020 |a 1283852306 
020 |a 9781283852302 
020 |a 1597497371 
020 |a 9781597497374 
029 1 |a DEBBG  |b BV040677660 
035 |a (OCoLC)823738965  |z (OCoLC)1103265444  |z (OCoLC)1162043340  |z (OCoLC)1202545148  |z (OCoLC)1230258209  |z (OCoLC)1240510183  |z (OCoLC)1295608495  |z (OCoLC)1300481828  |z (OCoLC)1303359181 
037 |a 10E30923-C76F-4490-8BB2-02FC7FF86A38  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.585  |b .M48 2012eb 
072 7 |a COM  |x 060030  |2 bisacsh 
072 7 |a COM  |x 060080  |2 bisacsh 
082 0 4 |a 004.67/82  |2 23 
049 |a UAMI 
100 1 |a Metheny, Matthew. 
245 1 0 |a Federal cloud computing :  |b the definitive guide for cloud service providers /  |c Matthew Metheny. 
250 |a 1st ed. 
260 |a Amsterdam ;  |a Boston :  |b Elsevier/Syngress,  |c 2012. 
300 |a 1 online resource (xxi, 437 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
504 |a Includes bibliographical references and index. 
520 |a "In recent years 'cloud computing' has emerged as a model for providing IT infrastructure, resources and services that has the potential to drive significant value to organizations through increased IT efficiency, agility and innovation. However, Federal agencies who were early adopters of cloud computing have learned that there are many challenges and risks that must be addressed in order to realize these benefits"--  |c Provided by publisher. 
505 0 |a Ch. 1 Introduction to the Federal Cloud Computing Strategy -- Introduction -- A Historical View of Federal IT -- The Early Years and the Mainframe Era -- Shifting to Minicomputer -- Decentralization: The Microcomputer ("Personal Computer") -- Transitioning to Mobility -- Evolution of Federal IT Policy -- Cloud Computing: Drivers in Federal IT Transformation -- Drivers for Adoption -- Cloud Benefits -- Decision Framework for Cloud Migration -- Selecting Services to Move to the Cloud -- Provisioning Cloud Services Effectively -- Managing Services Rather Than Assets -- Summary -- ch. 2 Cloud Computing Standards -- Introduction -- Standards Development Primer -- Cloud Computing Standardization Drivers -- Federal Laws and Policy -- Adoption Barriers -- Identifying Standards for Federal Cloud Computing Adoption -- Standards Development Organizations (SDOs) and Other Community-Driven Organizations -- Standards Inventory -- Summary -- ch. 3 A Case for Open Source -- Introduction -- Open Source and the Federal Government -- OSS Adoption Challenges: Acquisition and Security -- Acquisition Challenges -- Security Challenges -- OSS and Federal Cloud Computing -- Summary -- ch. 4 Security and Privacy in Public Cloud Computing -- Introduction -- Security and Privacy in the Context of the Public Cloud -- Federal Privacy Laws and Policies -- Privacy Act of 1974 -- E-Government Act of 2002, Federal Information Security Management Act (FISMA) -- OMB Memorandum Policies -- Safeguarding Privacy Information -- Privacy Controls -- Data Breaches, Impacts, and Consequences -- Security and Privacy Issues -- Summary -- ch. 5 Applying the NIST Risk Management Framework -- Introduction to FISMA -- Purpose -- Role and Responsibilities -- Risk Management Framework Overview -- The Role of Risk Management -- The NIST RMF and the System Development Life Cycle -- NIST RMF Process -- Information System Categorization -- Security Control Selection -- Security Controls Implementation -- Security Controls Assessment -- Information System Authorization -- Security Controls Monitoring -- Summary -- ch. 6 Risk Management -- Introduction to Risk Management -- Federal Information Security Risk Management Practices -- Overview of Enterprise-Wide Risk Management -- Components of the NIST Risk Management Process -- Multi-Tiered Risk Management -- NIST Risk Management Process -- Framing Risk -- Risk Assessment -- Responding to Risk -- Monitoring Risk -- Comparing the NIST and ISO/IEC Risk Management Processes -- Summary -- ch. 7 Comparison of Federal and International Security Certification Standards -- Introduction -- Overview of Certification and Accreditation -- Evolution of the Federal C&A Processes -- Towards a Unified Approach to C&A -- NIST and ISO/IEC Information Security Standards -- Boundary and Scope Definition -- Security Policy -- Risk Management Strategy (Context) -- Risk Management Process -- Security Objectives and Controls -- Summary -- ch. 8 FedRAMP Primer -- Introduction to FedRAMP -- FedRAMP Policy Memo -- Primary Stakeholders -- FedRAMP Concept of Operations -- Operational Processes -- Third Party Assessment Organization Program -- Summary -- ch. 9 The FedRAMP Cloud Computing Security Requirements -- Security Control Selection Process -- Selecting the Security Control Baseline -- Tailoring and Supplementing Security Control Baseline -- FedRAMP Cloud Computing Overlay -- FedRAMP Cloud Computing Security Requirements -- Policy and Procedures -- Harmonizing FedRAMP Requirements -- Assurance of External Service Providers Compliance -- Approaches to Implementing FedRAMP Security Controls -- FedRAMP Security Control Requirements -- Summary -- ch. 10 Security Assessment and Authorization: Governance, Preparation, and Execution -- Introduction to the Security Assessment Process -- Governance in the Security Assessment -- Preparing for the Security Assessment -- Security Assessment Customer Responsibilities -- Security Assessment Provider Responsibilities -- Executing the Security Assessment Plan -- Summary -- ch. 11 Strategies for Continuous Monitoring -- Introduction to Continuous Monitoring -- Organizational Governance -- CM Strategy -- CM Program -- The Continuous Monitoring Process -- Defining a CM Strategy -- Implementing a CM Program -- Review and Update CM Strategy and Program -- Continuous Monitoring within FedRAMP -- Summary -- ch. 12 Cost-Effective Compliance Using Security Automation -- Introduction -- CM Reference Architectures -- Continuous Asset Evaluation, Situational Awareness, and Risk Scoring Reference Architecture -- CAESARS Framework Extension Reference Architecture -- Security Automation Standards and Specifications -- Security Content Automation Protocol -- Cybersecurity Information Exchange Framework -- Operational Visibility and Continuous Monitoring -- Summary -- ch. 13 A Case Study for Cloud Service Providers -- Case Study Scenario: "Healthcare Exchange" -- Applying the Risk Management Framework within FedRAMP -- Categorize Information System -- Select Security Controls -- Implement and Document Security Controls -- Assessing Security Controls -- Summary. 
590 |a Knovel  |b ACADEMIC - Software Engineering 
650 0 |a Cloud computing  |x Security measures. 
650 0 |a Web services  |x Government policy. 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 6 |a Services Web  |x Politique gouvernementale. 
650 7 |a COMPUTERS  |x Networking  |x Intranets & Extranets.  |2 bisacsh 
650 7 |a COMPUTERS  |x Web  |x General.  |2 bisacsh 
650 7 |a Cloud computing  |x Security measures.  |2 fast  |0 (OCoLC)fst02061555 
776 0 8 |i Print version:  |a Metheny, Matthew.  |t Federal cloud computing.  |b 1st ed.  |d Amsterdam ; Boston : Elsevier/Syngress, 2012  |w (DLC) 2012030642 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpFCCTDGCB/toc  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24926096 
938 |a ebrary  |b EBRY  |n ebr10629431 
938 |a EBSCOhost  |b EBSC  |n 485889 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis24345421 
994 |a 92  |b IZTAP