Photo 1/1

Galerie
Photo 1/1

Vous en avez un à vendre ?
Cloud Computing Security: Foundations and Challenges by John R Vacca: New
107,06 USD
Environ91,82 EUR
État :
Neuf
Livre neuf, n'ayant jamais été lu ni utilisé, en parfait état, sans pages manquantes ni endommagées. Consulter l'annonce du vendeur pour avoir plus de détails.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Livraison :
Gratuit Standard Shipping.
Lieu où se trouve l'objet : Sparks, Nevada, États-Unis
Délai de livraison :
Estimé entre le lun. 11 août et le ven. 15 août à 94104
Retours :
Retour sous 30 jours. L'acheteur paie les frais de retour. Si vous utilisez un bordereau d'affranchissement eBay, son coût sera déduit du montant de votre remboursement.
Paiements :
Achetez en toute confiance
Le vendeur assume l'entière responsabilité de cette annonce.
Numéro de l'objet eBay :403136393341
Dernière mise à jour le 20 avr. 2025 20:18:57 CEST. Afficher toutes les modificationsAfficher toutes les modifications
Caractéristiques de l'objet
- État
- Book Title
- Cloud Computing Security: Foundations and Challenges
- Publication Date
- 2016-08-19
- Pages
- 520
- ISBN
- 9781482260946
À propos de ce produit
Product Identifiers
Publisher
CRC Press LLC
ISBN-10
1482260948
ISBN-13
9781482260946
eBay Product ID (ePID)
219602335
Product Key Features
Number of Pages
492 Pages
Publication Name
Cloud Computing Security : Foundations and Challenges
Language
English
Publication Year
2016
Subject
Programming / Games, Cloud Computing, Security / General, Security / Networking, Computer Engineering
Type
Textbook
Subject Area
Computers
Format
Hardcover
Dimensions
Item Height
1.4 in
Item Weight
49.7 Oz
Item Length
11.1 in
Item Width
8.7 in
Additional Product Features
Intended Audience
College Audience
LCCN
2016-009645
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Introduction. Cloud Computing Essentials. Cloud Security Baselines. Software as a Service (SaaS). Infrastructure as a Service (Iaas). Platform as a Service (Paas). Desktop as a Service (DaaS). Software And Data Segregation Security. Risk Analysis and Division of Responsibility . Managing Risks in the Cloud. Dividing Operational Responsibility and Visibility. Retaining Information Security Accountability. Managing User Authentication and Authorization. Negotiating Security Requirements with Vendors. Identifying Needed Security Measures. Establishing a Service Level Agreement (SLA). Ensuring SLAs Meet Security Requirements. Securing the Cloud Infrastructure . Securing the Platform. Restricting Network Access through Security Groups. Configuring Platform-Specific User Access Control. Integrating Cloud Authentication/Authorization Systems. Compartmentalizing Access To Protect Data Confidentiality and Availability. Securing Data in Motion and Data at Rest. Identifying Your Security Perimeter. Cloud Access Control and Key Management. Cloud Computing Architecture and Security Concepts. Secure Cloud Architecture. Designing Resilient Cloud Architectures. Operating System and Network Security . Locking Down Cloud Servers . Scanning for and Patching Vulnerabilities. Controlling and Verifying Configuration Management. Leveraging Provider-Specific Security Options. Defining Security Groups To Control Access. Filtering Traffic by Port Number. Benefiting from the Provider's Built-In Security. Protecting Archived Data. Meeting Compliance Requirements. Managing Cloud Governance . Retaining Responsibility for the Accuracy of the Data. Verifying Integrity in Stored and Transmitted Data. Demonstrating Due Care and Due Diligence. Integrity Assurance for Data Outsourcing. Secure Computation Outsourcing. Integrity and Verifiable Computation. Independent Verification and Validation. Computation Over Encrypted Data. Trusted Computing Technology. Assuring Compliance with Government Certification and Accreditation Regulations . HIPAA. Sarbanes-Oxley. Data Protection Act. PCI DSS. Following Standards for Auditing Information Systems. Negotiating Third-Party Provider Audits. Preparing for Disaster Recovery . Implementing a Plan to Sustain Availability . Distributing Data Across the Cloud to Ensure Availability and Performance. Addressing Data Portability and Interoperability for a Change in Cloud Providers. Exploiting the Cloud for Disaster Recovery Options. Achieving Cost-Effective Recovery Time Objectives. Employing a Strategy of Redundancy to Better Resist DoS. Secure Data Management Within and Across Data Centers. Availability, Recovery and Auditing. Advanced Cloud Computing Security . Advanced Failure Detection and Prediction. Advanced Secure Mobile Cloud. Future Directions in Cloud Computing Security--Risks and Challenges. Cloud Computing with Advanced Security Services. Advanced Security Architectures for Cloud Computing. Appendices.
Synopsis
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide.
LC Classification Number
QA76.585.C5825 2017
Description de l'objet fournie par le vendeur
Informations sur le vendeur professionnel
À propos de ce vendeur
AlibrisBooks
98,6% d'évaluations positives•1,9 millions objets vendus
Inscrit comme vendeur professionnel
Évaluations du vendeur (514.163)
- r***l (174)- Évaluations laissées par l'acheteur.Dernier moisAchat vérifiéArrived quickly as advertised. Good Experience.
- 4***c (258)- Évaluations laissées par l'acheteur.Dernier moisAchat vérifiéas described
- 8***m (1321)- Évaluations laissées par l'acheteur.Dernier moisAchat vérifiéAs advertised. Fast shipping. A+