Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Mather, Tim.

Title Cloud security and privacy / Tim Mather, Subra Kumaraswamy, and Shahed Latif. [O'Reilly electronic resource]

Edition 1st ed.
Imprint Beijing ; Cambridge [Mass.] : O'Reilly, ©2009.
QR Code
Description 1 online resource (xvii, 312 pages) : illustrations
text file
Series Theory in practice
Theory in practice (Sebastopol, Calif.)
Bibliography Includes bibliographical references and index.
Contents Introduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud.
Summary You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security<p.
Subject Computer networks -- Security measures.
Cloud computing -- Security measures.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Infonuagique -- Sécurité -- Mesures.
Computer networks -- Security measures.
Cloud computing -- Security measures.
Réseaux informatiques.
Informatique en nuage.
Technologies de l'information et de la communication.
Sécurité informatique.
Délits informatiques.
Computer networks -- Security measures
Cloud Computing
Computersicherheit
Sicherheitsmassnahme.
Added Author Kumaraswamy, Subra.
Latif, Shahed.
Other Form: Print version: 9780596802769
ISBN 9781449391881 (electronic bk.)
1449391885 (electronic bk.)
9781449379513 (electronic bk.)
1449379516 (electronic bk.)
(pbk.)
(pbk.)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information