You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffersYou may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking.Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availabilityLearn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud servicesDiscover which security management frameworks and standards are relevant for the cloudUnderstand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing modelsLearn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to considerExamine security delivered as a service-a different facet of cloud security...
|Title||:||Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance|
|Number of Pages||:||338 Pages|
|Status||:||Available For Download|
|Last checked||:||21 Minutes ago!|
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance Reviews
Excellent for IT professionals, less so as a course text book.This is a well-informed book covering a developing area, which has clearly been written by people who know their business. It would be of considerable use to information technology professionals involved in migration to cloud-based services. However, I have specifically been considering it from the point of view of adoption for a level 3 undergraduate module on computer forensics and security, and in this regard it appears to be far less suitable, since most students would not have the industrial experience and expertise required to make proper use of the content.
A mixed bag wrt cloud computing and security. On the plus side, it covers the landscape in terms of issues and gives specific information for different service models (SaaS, PaaS, IaaS) and different deployment models (Public, Community, Private). On the negative side, reaches conclusions that are not, IMHO, always justified. Examples: Sensitive data must not be processed in a public cloud. Federated IdAM is the right approach for clouds. FISMA prohibits U. S. Federal government organizations form using anything other than private clouds.
the book give a good over view about the cloud Security and privacy, it also has a good introduction about the cloud definition and infrastructure .
Decent book, a lot of info.
shall be read before an outsourcing prestudies
This book explores the security aspect of Cloud computing and provides security recommendation for IaaS, PaaS and SaaS customers.