This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide.
Features
• Covers patching and configuration vulnerabilities of a cloud server
• Evaluates methods for data encryption and long-term storage in a cloud server
• Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations
John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA’s space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.
"synopsis" may belong to another edition of this title.
John Vacca is an information technology consultant and internationally-
known author of more than 600 articles in the areas of advanced
storage, computer security and aerospace technology. John was also
a conguration management specialist, computer specialist, and the
computer security ofcial (CSO) for NASA's space station program
(Freedom) and the International Space Station Program, from 1988
until his retirement from NASA in 1995.
"About this title" may belong to another edition of this title.
FREE shipping within United Kingdom
Destination, rates & speedsSeller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 41455057
Quantity: 9 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers. Seller Inventory # 41455057-5
Quantity: 2 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 41455057-n
Quantity: 9 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. 548. Seller Inventory # 379305438
Quantity: 3 available
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 2nd new edition. 640 pages. 10.75x8.50x1.25 inches. In Stock. Seller Inventory # __036756033X
Quantity: 1 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 41455057
Quantity: 10 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 548. Seller Inventory # 26384565761
Quantity: 4 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 41455057-n
Quantity: 10 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND pp. 548. Seller Inventory # 18384565771
Quantity: 4 available
Seller: moluna, Greven, Germany
Kartoniert / Broschiert. Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers . Seller Inventory # 395500279
Quantity: Over 20 available