Securing Cloud Services
Autor Lee Newcombeen Limba Engleză Paperback – 26 mar 2020
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (2) | 320.49 lei 38-45 zile | |
Itgp – 30 iun 2012 | 320.49 lei 38-45 zile | |
Itgp – 26 mar 2020 | 364.42 lei 6-8 săpt. |
Preț: 364.42 lei
Preț vechi: 455.53 lei
-20% Nou
Puncte Express: 547
Preț estimativ în valută:
69.77€ • 72.66$ • 57.89£
69.77€ • 72.66$ • 57.89£
Carte tipărită la comandă
Livrare economică 14-28 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781787782051
ISBN-10: 1787782050
Pagini: 474
Dimensiuni: 140 x 216 x 25 mm
Greutate: 0.54 kg
Ediția:Two
Editura: Itgp
ISBN-10: 1787782050
Pagini: 474
Dimensiuni: 140 x 216 x 25 mm
Greutate: 0.54 kg
Ediția:Two
Editura: Itgp
Notă biografică
Lee Newcombe is an enterprise architect with commercial experience at numerous high-profile companies, including a retail bank, a systems integrator and one of the Big 4 consultancies. He has worked within various Cloud programmes and acted as the IT industry security expert during the early days of the UK Government's G-Cloud programme. Lee has been writing about, presenting on, and working with Cloud technologies since 2007, and is a named contributor to the Cloud Security Alliance guidance document.
Cuprins
Part One: Introduction Chapter 1: Introduction to Cloud Computing Chapter 2: Overview of existing Cloud Taxonomies and Models Service models Deployment models Jericho Forum(R) Cloud Cube model Chapter 3: The Security Balance Security benefits Potential pitfalls Chapter 4: Security Threats associated with Cloud Computing Cloud provider staff Image/application providers Competitors Crackers/hackers Insiders Governments Transport agents Identity providers Attribute providers Cloud management brokers Chapter 5: Privacy and Data Security Concerns Data protection issues Payment card industry issues Others Part Two: Pragmatic Cloud Security Chapter 6: Introduction to Security Architecture What is security architecture? What is a service? Architectural layers Advantages of security architecture Chapter 7: Application of Security Architecture to Cloud Computing Security reference model Security service descriptions Service levels and contracts Service models and the security reference model Conclusions Chapter 8: Security and the Cloud Existing guidance Common security services Cloud deployment models Chapter 9: Security and Infrastructure as a Service IaaS and the SRM Conclusion Chapter 10: Security and Platform as a Service PaaS and the SRM Conclusion Chapter 11: Security and Software as a Service Conclusion Part Three: Conclusion Chapter 12: Looking Ahead Overview Chapter 13: Conclusion and Summary Appendix A: SRM Security Service Assignments ITG Resources