Cloud computing security : (Record no. 29996)

LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2016009645
INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781482260946
DEWEY DECIMAL CLASSIFICATION NUMBER
Call number 005.8
TITLE STATEMENT
Title Cloud computing security :
Subtitle foundations and challenges
Statement of responsibility, etc edited by John R. Vacca
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boca Raton :
Publisher CRC Press,
Date c2017.
PHYSICAL DESCRIPTION
Extent xxv, 492 p. :
Other Details ill. ;
Size 29 cm.
CONTENTS
Contents Introduction. Cloud Computing Essentials. Cloud Security Baselines. Software as a Service (SaaS). Infrastructure as a Service (Iaas). Platform as a Service (Paas). Desktop as a Service (DaaS). Software And Data Segregation Security. Risk Analysis and Division of Responsibility. Managing Risks in the Cloud. Dividing Operational Responsibility and Visibility. Retaining Information Security Accountability. Managing User Authentication and Authorization. Negotiating Security Requirements with Vendors. Identifying Needed Security Measures. Establishing a Service Level Agreement (SLA). Ensuring SLAs Meet Security Requirements. Securing the Cloud Infrastructure. Securing the Platform. Restricting Network Access through Security Groups. Configuring Platform-Specific User Access Control. Integrating Cloud Authentication/Authorization Systems. Compartmentalizing Access To Protect Data Confidentiality and Availability. Securing Data in Motion and Data at Rest. Identifying Your Security Perimeter. Cloud Access Control and Key Management. Cloud Computing Architecture and Security Concepts. Secure Cloud Architecture. Designing Resilient Cloud Architectures. Operating System and Network Security. Locking Down Cloud Servers. Scanning for and Patching Vulnerabilities. Controlling and Verifying Configuration Management. Leveraging Provider-Specific Security Options. Defining Security Groups To Control Access. Filtering Traffic by Port Number. Benefiting from the Provider's Built-In Security. Protecting Archived Data. Meeting Compliance Requirements. Managing Cloud Governance. Retaining Responsibility for the Accuracy of the Data. Verifying Integrity in Stored and Transmitted Data. Demonstrating Due Care and Due Diligence. Integrity Assurance for Data Outsourcing. Secure Computation Outsourcing. Integrity and Verifiable Computation. Independent Verification and Validation. Computation Over Encrypted Data. Trusted Computing Technology. Assuring Compliance with Government Certification and Accreditation Regulations. HIPAA. Sarbanes-Oxley. Data Protection Act. PCI DSS. Following Standards for Auditing Information Systems. Negotiating Third-Party Provider Audits. Preparing for Disaster Recovery. Implementing a Plan to Sustain Availability. Distributing Data Across the Cloud to Ensure Availability and Performance. Addressing Data Portability and Interoperability for a Change in Cloud Providers. Exploiting the Cloud for Disaster Recovery Options. Achieving Cost-Effective Recovery Time Objectives. Employing a Strategy of Redundancy to Better Resist DoS. Secure Data Management Within and Across Data Centers. Availability, Recovery and Auditing. Advanced Cloud Computing Security. Advanced Failure Detection and Prediction. Advanced Secure Mobile Cloud. Future Directions in Cloud Computing Security-Risks and Challenges. Cloud Computing with Advanced Security Services. Advanced Security Architectures for Cloud Computing. Appendices.
SUMMARY
Summary This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Cloud computing
General Security measures
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computer networks
General Security measures
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Data protection
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computer security
ADDED ENTRY
Name Vacca, John R.,
Dates 1947-
Role Edited by
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://uowd.box.com/s/txqrjlyxzuknfqfmikirkc6zqx0e9ip8
Public note Location Map
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 15326
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 2602
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 10592
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 641
ADDED ENTRY
-- 38577
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Checked out Date last seen Date last borrowed Cost, replacement price Price effective from Koha item type
        University of Wollongong in Dubai University of Wollongong in Dubai Main Collection 2016-11-23 MERIC 1 005.8 CL OU T0055051 2023-01-27 2023-01-13 2023-01-13 432.96 2017-01-26 REGULAR

Powered by Koha