
- 238 pages
- English
- PDF
- Available on iOS & Android
About this book
Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today's enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks.
Key Features
⢠Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned
⢠Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies
⢠Provides insight into the interaction and cross-dependencies between industry business models and industry-specific cloud computing security requirements
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Foreword
- Extended Multimedia Content
- Introduction
- Chapter 1: Cloud User Perceptions
- Chapter 2: Economics of Cloud Computing
- Chapter 3: Process and Sources
- Chapter 4: Industry-Specific Findings
- Chapter 5: Cloud Computing
- Chapter 6: Cybersecurity
- Chapter 7: Cloud Computing Vulnerabilities
- Chapter 8: General Cybersecurity Threat by Industry
- Chapter 9: Application Security by Industry
- Chapter 10: Cloud Computing and Cybersecurity Education Challenges
- Chapter 11: Next-Generation Business Models and Strategies
- APPENDIX A: ONCLOUD TRAINING SECURITY OFFERINGS
- APPENDIX B: RELEVANT ARTICLES AND PUBLICATIONS
- APPENDIX C: CLOUD COMPUTING FOR THE BUSINESS OF GOVERNMENT
- APPENDIX D: IMPLEMENTATION OF CLOUD BROKERAGE
- APPENDIX E: THE WEB SERVICES AND SERVICE-ORIENTED ARCHITECTURE REVOLUTIONāUSING WEB SERVICES TO DELIVER
- APPENDIX F: SOFTWARE AS A SERVICE INFLECTION POINTāUSING CLOUD COMPUTING TO ACHIEVE BUSINESS AGILITY
- APPENDIX G: FITARA AND FedRAMPāACCELERATING FEDERAL CLOUD ADOPTION
- INDEX