Saturday, October 5, 2019

Cloud Security: A Comprehensive Guide to Secure Cloud Computing

File Size: 5.57 Mb

Cloud computing provides the capability to use computing and storage resources on a metered basis and reduce the investments in an organization’s computing infrastructure. The spawning and deletion of virtual machines running on physical hardware and being controlled by hypervisors is a cost-efficient and flexible computing paradigm.

In addition, the integration and widespread availability of large amounts of “sanitized’ information such as health care records can be of tremendous benefit to researchers and practitioners.

However, as with any technology, the full potential of the cloud cannot be achieved without understanding its capabilities, vulnerabilities, advantages, and trade-offs. This text provides insight into these areas and describes methods of achieving the maximum benefit from cloud computation with minimal risk.

Chapter 1: Cloud Computing Fundamentals
Chapter 2: Cloud Computing Architecture
Chapter 3: Cloud Computing Software Security Fundamentals
Chapter 4: Cloud Computing Risk Issues
Chapter 5: Cloud Computing Security Challenges
Chapter 6: Cloud Computing Security Architecture
Chapter 7: Cloud Computing Life Cycle Issues
Chapter 8: Useful Next Steps and Approaches
Glossary of Terms and Acronyms


Author Details
"Ronald L. Krutz" is a senior information system security consultant. He has over 30 years of experience in distributed computing systems, computer architectures, real-time systems, information assurance methodologies, and information security training.

"Russell Dean Vines" has been in the information systems industry for over 20 years, and has a unique ability to disseminate complex security issues to a wider audience, from CEOs to home Internet surfers.

Download Drive-1

You May Also Like These E-Books:-

No comments:

Post a Comment