Christmas Posting Dates
Cloud Security: A Comprehensive Guide to Secure Cloud Computing

Cloud Security: A Comprehensive Guide to Secure Cloud Computing

Paperback

By (author) Ronald L. Krutz, By (author) Russell Dean Vines, By (author) Glenn Brunette

$36.74
List price $53.25
You save $16.51 31% off

Free delivery worldwide
Available
Dispatched in 3 business days
When will my order arrive?

  • Publisher: John Wiley & Sons Ltd
  • Format: Paperback | 384 pages
  • Dimensions: 188mm x 234mm x 20mm | 540g
  • Publication date: 9 August 2010
  • Publication City/Country: Chichester
  • ISBN 10: 0470589876
  • ISBN 13: 9780470589878
  • Illustrations note: black & white tables, figures
  • Sales rank: 720,199

Product description

Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support. As the most current and complete guide to helping you find your way through a maze of security minefields, this book is mandatory reading if you are involved in any aspect of cloud computing. Coverage Includes: Cloud Computing Fundamentals Cloud Computing Architecture Cloud Computing Software Security Fundamentals Cloud Computing Risks Issues Cloud Computing Security Challenges Cloud Computing Security Architecture Cloud Computing Life Cycle Issues Useful Next Steps and Approaches

Other people who viewed this bought:

Showing items 1 to 10 of 10
Categories:

Author information

Ronald L. Krutz, PhD, is a senior information systems security consultant with more than 30 years of experience. He founded the CMRI Cybersecurity Center at Carnegie Mellon University. Russell Dean Vines is Chief Security Advisor for Gotham Technology Group, LLC, and has been an information systems security expert for over 25 years. They coauthored the bestselling CISSP Prep Guide.

Review quote

"This worthwhile addition to the growing library of cloud security books contains very helpful prescriptions for security policies and practices." ( Computing Reviews, January 2011)

Back cover copy

Secure your cloud to maximize its valueCloud computing is flexible, efficient, and cost-effective, but not without risks. To maximize its potential, you need to fully understand its vulnerabilities and how to offset them.This guide thoroughly examines cloud fundamentals, architecture, risks, and security principles. Two leadingsecurity experts detail critical approaches and solutions, helping you achieve the maximum return on cloud investments without compromising the safety of your information.Avoid leakage and unauthorized data access among virtual machines running on the same serverProperly handle sensitive informationPrevent release of critical data to law enforcement or government agencies without approval by the clientFollow compliance and regulatory requirementsDeal with system crashes or failuresProtect against hacker invasions into client applications hosted on the cloudImplement solid, robust security protectionManage interoperability that allows a client to easily move applications among different cloud providers and avoid "lock-in"

Table of contents

Foreword. Introduction. Chapter 1 Cloud Computing Fundamentals. Chapter 2 Cloud Computing Architecture. Chapter 3 Cloud Computing Software Security Fundamentals. Chapter 4 Cloud Computing Risks Issues. Chapter 5 Cloud Computing Security Challenges. Chapter 6 Cloud Computing Security Architecture. Chapter 7 Cloud Computing Life Cycle Issues. Chapter 8 Useful Next Steps and Approaches. Glossary of Terms and Acronyms. References. Index.