Securing Cloud Services
Autor Lee Newcombeen Limba Engleză Paperback – 27 mar 2020
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (2) | 346.53 lei 38-44 zile | |
| Itgp – 27 mar 2020 | 356.48 lei 3-5 săpt. | |
| Itgp – 30 iun 2012 | 346.53 lei 38-44 zile |
Preț: 356.48 lei
Preț vechi: 445.60 lei
-20%
Puncte Express: 535
Preț estimativ în valută:
63.11€ • 73.49$ • 54.82£
63.11€ • 73.49$ • 54.82£
Carte disponibilă
Livrare economică 03-17 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781787782051
ISBN-10: 1787782050
Pagini: 474
Dimensiuni: 140 x 216 x 25 mm
Greutate: 0.54 kg
Ediția:Two
Editura: Itgp
ISBN-10: 1787782050
Pagini: 474
Dimensiuni: 140 x 216 x 25 mm
Greutate: 0.54 kg
Ediția:Two
Editura: Itgp
Notă biografică
Lee Newcombe is an enterprise architect with commercial experience at numerous high-profile companies, including a retail bank, a systems integrator and one of the Big 4 consultancies. He has worked within various Cloud programmes and acted as the IT industry security expert during the early days of the UK Government's G-Cloud programme. Lee has been writing about, presenting on, and working with Cloud technologies since 2007, and is a named contributor to the Cloud Security Alliance guidance document.
Cuprins
Part One: Introduction Chapter 1: Introduction to Cloud Computing Chapter 2: Overview of existing Cloud Taxonomies and Models Service models Deployment models Jericho Forum(R) Cloud Cube model Chapter 3: The Security Balance Security benefits Potential pitfalls Chapter 4: Security Threats associated with Cloud Computing Cloud provider staff Image/application providers Competitors Crackers/hackers Insiders Governments Transport agents Identity providers Attribute providers Cloud management brokers Chapter 5: Privacy and Data Security Concerns Data protection issues Payment card industry issues Others Part Two: Pragmatic Cloud Security Chapter 6: Introduction to Security Architecture What is security architecture? What is a service? Architectural layers Advantages of security architecture Chapter 7: Application of Security Architecture to Cloud Computing Security reference model Security service descriptions Service levels and contracts Service models and the security reference model Conclusions Chapter 8: Security and the Cloud Existing guidance Common security services Cloud deployment models Chapter 9: Security and Infrastructure as a Service IaaS and the SRM Conclusion Chapter 10: Security and Platform as a Service PaaS and the SRM Conclusion Chapter 11: Security and Software as a Service Conclusion Part Three: Conclusion Chapter 12: Looking Ahead Overview Chapter 13: Conclusion and Summary Appendix A: SRM Security Service Assignments ITG Resources