Cloud Computing : Assessing the Risks.

Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing.

Saved in:
Bibliographic Details
Main Author: Carstensen, Jared.
Other Authors: Morgenthal, JP., Golden, Bernard.
Format: eBook
Language: English
Published: Ely : IT Governance Publishing, 2012.
Subjects:
ISBN: 9781849283601
1849283605
9781628700114
1628700114
9781849283618
1849283613
1849283591
9781849283595
Physical Description: 1 online resource (297 pages)

Cover

Table of contents

LEADER 05304cam a2200505Mi 4500
001 kn-ocn799769042
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 120716s2012 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d B24X7  |d N15  |d OCLCO  |d COO  |d OCLCQ  |d YDXCP  |d N$T  |d UMI  |d OCLCO  |d OCLCQ  |d IAD  |d KNOVL  |d DEBSZ  |d OCLCF  |d JSTOR  |d KNOVL  |d OCLCQ  |d KNOVL  |d OCLCQ  |d AGLDB  |d Z5A  |d LIV  |d MERUC  |d OCLCQ  |d EZ9  |d IYU  |d IOG  |d VNS  |d VTS  |d CEF  |d OCLCQ  |d XC$  |d LVT  |d UAB  |d STF  |d M8D  |d UKAHL  |d OCLCQ  |d VT2  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d DEGRU  |d YWS 
020 |a 9781849283601  |q (electronic bk.) 
020 |a 1849283605  |q (electronic bk.) 
020 |a 9781628700114  |q (electronic bk.) 
020 |a 1628700114  |q (electronic bk.) 
020 |a 9781849283618 
020 |a 1849283613 
020 |z 1849283591 
020 |z 9781849283595 
035 |a (OCoLC)799769042  |z (OCoLC)857306735 
100 1 |a Carstensen, Jared. 
245 1 0 |a Cloud Computing :  |b Assessing the Risks. 
260 |a Ely :  |b IT Governance Publishing,  |c 2012. 
300 |a 1 online resource (297 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three. 
505 8 |a Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism. 
505 8 |a The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility. 
505 8 |a Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work. 
505 8 |a Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing. 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Cloud computing. 
650 0 |a Web services. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Morgenthal, JP. 
700 1 |a Golden, Bernard. 
776 0 8 |i Print version:  |a Carstensen, Jared.  |t Cloud Computing : Assessing the Risks.  |d Ely : IT Governance Publishing, ©2012  |z 9781849283595 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpCCAR0002/cloud-computing-assessing?kpromoter=marc  |y Full text 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpOSMAE011/optical-scattering-measurement?kpromoter=marc  |y Full text