Cloud Computing : Assessing the Risks.
Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing.
Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | eBook |
Language: | English |
Published: |
Ely :
IT Governance Publishing,
2012.
|
Subjects: | |
ISBN: | 9781849283601 1849283605 9781628700114 1628700114 9781849283618 1849283613 1849283591 9781849283595 |
Physical Description: | 1 online resource (297 pages) |
LEADER | 05304cam a2200505Mi 4500 | ||
---|---|---|---|
001 | kn-ocn799769042 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 120716s2012 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d B24X7 |d N15 |d OCLCO |d COO |d OCLCQ |d YDXCP |d N$T |d UMI |d OCLCO |d OCLCQ |d IAD |d KNOVL |d DEBSZ |d OCLCF |d JSTOR |d KNOVL |d OCLCQ |d KNOVL |d OCLCQ |d AGLDB |d Z5A |d LIV |d MERUC |d OCLCQ |d EZ9 |d IYU |d IOG |d VNS |d VTS |d CEF |d OCLCQ |d XC$ |d LVT |d UAB |d STF |d M8D |d UKAHL |d OCLCQ |d VT2 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d DEGRU |d YWS | ||
020 | |a 9781849283601 |q (electronic bk.) | ||
020 | |a 1849283605 |q (electronic bk.) | ||
020 | |a 9781628700114 |q (electronic bk.) | ||
020 | |a 1628700114 |q (electronic bk.) | ||
020 | |a 9781849283618 | ||
020 | |a 1849283613 | ||
020 | |z 1849283591 | ||
020 | |z 9781849283595 | ||
035 | |a (OCoLC)799769042 |z (OCoLC)857306735 | ||
100 | 1 | |a Carstensen, Jared. | |
245 | 1 | 0 | |a Cloud Computing : |b Assessing the Risks. |
260 | |a Ely : |b IT Governance Publishing, |c 2012. | ||
300 | |a 1 online resource (297 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three. | |
505 | 8 | |a Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism. | |
505 | 8 | |a The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility. | |
505 | 8 | |a Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work. | |
505 | 8 | |a Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing. | |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing. | ||
590 | |a Knovel |b Knovel (All titles) | ||
650 | 0 | |a Cloud computing. | |
650 | 0 | |a Web services. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Morgenthal, JP. | |
700 | 1 | |a Golden, Bernard. | |
776 | 0 | 8 | |i Print version: |a Carstensen, Jared. |t Cloud Computing : Assessing the Risks. |d Ely : IT Governance Publishing, ©2012 |z 9781849283595 |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpCCAR0002/cloud-computing-assessing?kpromoter=marc |y Full text |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpOSMAE011/optical-scattering-measurement?kpromoter=marc |y Full text |