
- 314 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. The cloud offers flexibility, adaptability, scalability, and in the case of security - resilience. Securing the Cloud explains how to make the move to the cloud, detailing the strengths and weaknesses of securing a company's information with different cloud approaches. It offers a clear and concise framework to secure a business' assets while making the most of this new technology.This book considers alternate approaches for securing a piece of the cloud, such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust. It discusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recovery. It also describes the benefits of moving to the cloud - solving for limited availability of space, power, and storage.This book will appeal to network and security IT staff and management responsible for design, implementation and management of IT structures from admins to CSOs, CTOs, CIOs and CISOs.- Named The 2011 Best Identity Management Book by InfoSec Reviews- Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust- Discusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recovery- Details the benefits of moving to the cloud-solving for limited availability of space, power, and storage
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover image
- Table of Contents
- Front Matter
- Copyright
- Dedication
- Acknowledgments
- About the Author
- About the Technical Editor
- Introduction
- Chapter 1. Introduction to Cloud Computing and Security
- Chapter 2. Cloud Computing Architecture
- Chapter 3. Security Concerns, Risk Issues, and Legal Aspects
- Chapter 4. Securing the Cloud: Architecture
- Chapter 5. Securing the Cloud: Data Security
- Chapter 6. Securing the Cloud: Key Strategies and Best Practices
- Chapter 7. Security Criteria: Building an Internal Cloud
- Chapter 8. Security Criteria: Selecting an External Cloud Provider
- Chapter 9. Evaluating Cloud Security: An Information Security Framework
- Chapter 10. Operating a Cloud
- Index