Well–known security experts decipher the most challenging aspect of cloud computing–security
Cloud computing allows for both large and small organizations to have the opportunity to use Internet–based services so that they can reduce start–up costs, lower capital expenditures, use services on a pay–as–you–use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces.
The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support.
As the most current and complete guide to helping you find your way through a maze of security minefields, this book is mandatory reading if you are involved in any aspect of cloud computing.
Coverage Includes:
"synopsis" may belong to another edition of this title.
"This worthwhile addition to the growing library of cloud security books contains very helpful prescriptions for security policies and practices." ( Computing Reviews, January 2011)
Secure your cloud to maximize its value
Cloud computing is flexible, efficient, and cost–effective, but not without risks. To maximize its potential, you need to fully understand its vulnerabilities and how to offset them.
This guide thoroughly examines cloud fundamentals, architecture, risks, and security principles. Two leadingsecurity experts detail critical approaches and solutions, helping you achieve the maximum return on cloud investments without compromising the safety of your information.
Avoid leakage and unauthorized data access among virtual machines running on the same server
Properly handle sensitive information
Prevent release of critical data to law enforcement or government agencies without approval by the client
Follow compliance and regulatory requirements
Deal with system crashes or failures
Protect against hacker invasions into client applications hosted on the cloud
Implement solid, robust security protection
Manage interoperability that allows a client to easily move applications among different cloud providers and avoid "lock–in"
"About this title" may belong to another edition of this title.
£ 2.79 shipping within U.S.A.
Destination, rates & speedsSeller: HPB-Red, Dallas, TX, U.S.A.
paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_420433195
Quantity: 1 available
Seller: Goodwill of Silicon Valley, SAN JOSE, CA, U.S.A.
Condition: good. Supports Goodwill of Silicon Valley job training programs. The cover and pages are in Good condition! Any other included accessories are also in Good condition showing use. Use can include some highlighting and writing, page and cover creases as well as other types visible wear. Seller Inventory # GWSVV.0470589876.G
Quantity: 1 available