Cloud Computing Security (eBook, ePUB)
Foundations and Challenges
Redaktion: Vacca, John R.
65,95 €
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
33 °P sammeln
65,95 €
Als Download kaufen
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
33 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
33 °P sammeln
Cloud Computing Security (eBook, ePUB)
Foundations and Challenges
Redaktion: Vacca, John R.
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Overview of cloud computing security technology and implementation. Explores practical solutions to a wide range of cloud computing security issues. Chapetrs by leading experts in the field address immediate and long-term challenges cloud computing security.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 20MB
Andere Kunden interessierten sich auch für
- Richard FoxInformation Technology (eBook, ePUB)78,95 €
- Prerna SharmaApplications of Cloud Computing (eBook, ePUB)49,95 €
- Preeti MishraCloud Security (eBook, ePUB)54,95 €
- Ke HuangDesign and Analysis of Cryptographic Algorithms in Blockchain (eBook, ePUB)46,95 €
- Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) (eBook, ePUB)51,95 €
- Chris ColbertTechnology is Dead (eBook, ePUB)25,95 €
- David L. OlsonDigitising Enterprise in an Information Age (eBook, ePUB)54,95 €
-
-
-
Overview of cloud computing security technology and implementation. Explores practical solutions to a wide range of cloud computing security issues. Chapetrs by leading experts in the field address immediate and long-term challenges cloud computing security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 548
- Erscheinungstermin: 9. November 2020
- Englisch
- ISBN-13: 9780429619649
- Artikelnr.: 60080113
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 548
- Erscheinungstermin: 9. November 2020
- Englisch
- ISBN-13: 9780429619649
- Artikelnr.: 60080113
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
John Vacca is an information technology consultant and internationally- known author of more than 600 articles in the areas of advanced storage, computer security and aerospace technology. John was also a conguration management specialist, computer specialist, and the computer security ofcial (CSO) for NASA's space station program (Freedom) and the International Space Station Program, from 1988 until his retirement from NASA in 1995.
Section I Introduction Chapter 1
Cloud Computing Essentials 3 Anna Squicciarini, Daniela Oliveira, and Dan Lin Chapter 2
An Overview of Cloud Computing 13 William Stallings Chapter 3
Cloud Security Baselines 31 Daniela Oliveira, Anna Squicciarini, and Dan Lin Chapter 4
Cloud Security, Privacy and Trust Baselines 45 Nikolaos Pitropakis, Sokratis Katsikas, and Costas Lambrinoudakis Chapter 5
Infrastructure as a Service (IaaS) 65 Mario Santana Section II Risk Analysis and Division of Responsibility Chapter 6
Risk and Trust As ess ment: Schemes for Cloud Services 73 Erdal Cayirci Chapter 7
Managing Risk in the Cloud 85 Michaela Iorga and Anil Karmel Chapter 8
Cloud Security Risk Management 95 Marco Cremonini Chapter 9
Secure Cloud Risk Management: Risk Mitigation Methods 115 Jim Harmening and Randall DeVitto Section III Securing the Cloud Infrastructure Chapter 10
Specification and Enforcement of Access Policies in Emerging Scenarios 129 Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati Chapter 11
Cryptographic Key Management for Data Protection 151 Sarbari Gupta Chapter 12
Cloud Security Access Control: Distributed Access Control 157 Jim Harmening and Randall DeVitto Chapter 13
Cloud Security Key Management: Cloud User Controls 167 Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun Chapter 14
Cloud Computing Security Ess entials and Architecture 195 Michaela Iorga and Anil Karmel Chapter 15
Cloud Computing Architecture and Security Concepts 213 Pramod Pandya and Riad Rahmo Chapter 16
Secure Cloud Architecture 225 Pramod Pandya Section IV Operating System and Network Security Chapter 17
Locking Down Cloud Servers 237 Thorsten Herre Chapter 18
Third-Party Providers Integrity Assurance for Data Outsourcing 255 Jiawei Yuan and Shucheng Yu Section V Meeting Compliance Requirements Chapter 19
Negotiating Cloud Security Requirements with Vendors 271 Daniel S. Soper Chapter 20
Managing Legal Compliance in the Cloud: Understanding Contractual and Personal Data Protection Requirements 283 Paolo Balboni Chapter 21
Integrity Assurance for Data Outsourcing 299 Reza Curtmola and Bo Chen Chapter 22
Secure Computation Outsourcing 311 Shams Zawoad and Ragib Hasan Chapter 23
Computation Over Encrypted Data 329 Feng-Hao Liu Chapter 24
Trusted Computing Technology 347 Felipe E. Medina Chapter 25
Technology for Trusted Cloud Security: Survey and Open Issues 357 Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini Chapter 26
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems 373 Ignazio Pedone, Daniele Canavese, and Antonio Lioy Chapter 27
Assuring Compliance with Government Certification and Accreditation Regulations 387 Sarbari Gupta Chapter 28
Government Certification, Accreditation, Regulations, and Compliance Risks 395 Thorsten Herre Section VI Preparing for Disaster Recovery Chapter 29
Simplifying Secure Cloud Computing Environments with Cloud Data Centers 411 Thorsten Herre Chapter 30
Availability, Recovery, and Auditing across Data Centers 425 Reza Curtmola and Bo Chen Section VII Advanced Cloud Computing Security Chapter 31
Advanced Security Architecture for Cloud Computing 443 Albert Caballero Chapter 32
Side-Channel Attacks and Defenses on Cloud Traffic 463 Wen Ming Liu and Lingyu Wang Chapter 33
Clouds Are Evil 477 John Strand Chapter 34
Future Directions in Cloud Computing Security: Risks and Challenges 489 Mohammad Kamrul Islam and Rasib Khan
Cloud Computing Essentials 3 Anna Squicciarini, Daniela Oliveira, and Dan Lin Chapter 2
An Overview of Cloud Computing 13 William Stallings Chapter 3
Cloud Security Baselines 31 Daniela Oliveira, Anna Squicciarini, and Dan Lin Chapter 4
Cloud Security, Privacy and Trust Baselines 45 Nikolaos Pitropakis, Sokratis Katsikas, and Costas Lambrinoudakis Chapter 5
Infrastructure as a Service (IaaS) 65 Mario Santana Section II Risk Analysis and Division of Responsibility Chapter 6
Risk and Trust As ess ment: Schemes for Cloud Services 73 Erdal Cayirci Chapter 7
Managing Risk in the Cloud 85 Michaela Iorga and Anil Karmel Chapter 8
Cloud Security Risk Management 95 Marco Cremonini Chapter 9
Secure Cloud Risk Management: Risk Mitigation Methods 115 Jim Harmening and Randall DeVitto Section III Securing the Cloud Infrastructure Chapter 10
Specification and Enforcement of Access Policies in Emerging Scenarios 129 Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati Chapter 11
Cryptographic Key Management for Data Protection 151 Sarbari Gupta Chapter 12
Cloud Security Access Control: Distributed Access Control 157 Jim Harmening and Randall DeVitto Chapter 13
Cloud Security Key Management: Cloud User Controls 167 Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun Chapter 14
Cloud Computing Security Ess entials and Architecture 195 Michaela Iorga and Anil Karmel Chapter 15
Cloud Computing Architecture and Security Concepts 213 Pramod Pandya and Riad Rahmo Chapter 16
Secure Cloud Architecture 225 Pramod Pandya Section IV Operating System and Network Security Chapter 17
Locking Down Cloud Servers 237 Thorsten Herre Chapter 18
Third-Party Providers Integrity Assurance for Data Outsourcing 255 Jiawei Yuan and Shucheng Yu Section V Meeting Compliance Requirements Chapter 19
Negotiating Cloud Security Requirements with Vendors 271 Daniel S. Soper Chapter 20
Managing Legal Compliance in the Cloud: Understanding Contractual and Personal Data Protection Requirements 283 Paolo Balboni Chapter 21
Integrity Assurance for Data Outsourcing 299 Reza Curtmola and Bo Chen Chapter 22
Secure Computation Outsourcing 311 Shams Zawoad and Ragib Hasan Chapter 23
Computation Over Encrypted Data 329 Feng-Hao Liu Chapter 24
Trusted Computing Technology 347 Felipe E. Medina Chapter 25
Technology for Trusted Cloud Security: Survey and Open Issues 357 Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini Chapter 26
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems 373 Ignazio Pedone, Daniele Canavese, and Antonio Lioy Chapter 27
Assuring Compliance with Government Certification and Accreditation Regulations 387 Sarbari Gupta Chapter 28
Government Certification, Accreditation, Regulations, and Compliance Risks 395 Thorsten Herre Section VI Preparing for Disaster Recovery Chapter 29
Simplifying Secure Cloud Computing Environments with Cloud Data Centers 411 Thorsten Herre Chapter 30
Availability, Recovery, and Auditing across Data Centers 425 Reza Curtmola and Bo Chen Section VII Advanced Cloud Computing Security Chapter 31
Advanced Security Architecture for Cloud Computing 443 Albert Caballero Chapter 32
Side-Channel Attacks and Defenses on Cloud Traffic 463 Wen Ming Liu and Lingyu Wang Chapter 33
Clouds Are Evil 477 John Strand Chapter 34
Future Directions in Cloud Computing Security: Risks and Challenges 489 Mohammad Kamrul Islam and Rasib Khan
Section I Introduction Chapter 1
Cloud Computing Essentials 3 Anna Squicciarini, Daniela Oliveira, and Dan Lin Chapter 2
An Overview of Cloud Computing 13 William Stallings Chapter 3
Cloud Security Baselines 31 Daniela Oliveira, Anna Squicciarini, and Dan Lin Chapter 4
Cloud Security, Privacy and Trust Baselines 45 Nikolaos Pitropakis, Sokratis Katsikas, and Costas Lambrinoudakis Chapter 5
Infrastructure as a Service (IaaS) 65 Mario Santana Section II Risk Analysis and Division of Responsibility Chapter 6
Risk and Trust As ess ment: Schemes for Cloud Services 73 Erdal Cayirci Chapter 7
Managing Risk in the Cloud 85 Michaela Iorga and Anil Karmel Chapter 8
Cloud Security Risk Management 95 Marco Cremonini Chapter 9
Secure Cloud Risk Management: Risk Mitigation Methods 115 Jim Harmening and Randall DeVitto Section III Securing the Cloud Infrastructure Chapter 10
Specification and Enforcement of Access Policies in Emerging Scenarios 129 Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati Chapter 11
Cryptographic Key Management for Data Protection 151 Sarbari Gupta Chapter 12
Cloud Security Access Control: Distributed Access Control 157 Jim Harmening and Randall DeVitto Chapter 13
Cloud Security Key Management: Cloud User Controls 167 Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun Chapter 14
Cloud Computing Security Ess entials and Architecture 195 Michaela Iorga and Anil Karmel Chapter 15
Cloud Computing Architecture and Security Concepts 213 Pramod Pandya and Riad Rahmo Chapter 16
Secure Cloud Architecture 225 Pramod Pandya Section IV Operating System and Network Security Chapter 17
Locking Down Cloud Servers 237 Thorsten Herre Chapter 18
Third-Party Providers Integrity Assurance for Data Outsourcing 255 Jiawei Yuan and Shucheng Yu Section V Meeting Compliance Requirements Chapter 19
Negotiating Cloud Security Requirements with Vendors 271 Daniel S. Soper Chapter 20
Managing Legal Compliance in the Cloud: Understanding Contractual and Personal Data Protection Requirements 283 Paolo Balboni Chapter 21
Integrity Assurance for Data Outsourcing 299 Reza Curtmola and Bo Chen Chapter 22
Secure Computation Outsourcing 311 Shams Zawoad and Ragib Hasan Chapter 23
Computation Over Encrypted Data 329 Feng-Hao Liu Chapter 24
Trusted Computing Technology 347 Felipe E. Medina Chapter 25
Technology for Trusted Cloud Security: Survey and Open Issues 357 Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini Chapter 26
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems 373 Ignazio Pedone, Daniele Canavese, and Antonio Lioy Chapter 27
Assuring Compliance with Government Certification and Accreditation Regulations 387 Sarbari Gupta Chapter 28
Government Certification, Accreditation, Regulations, and Compliance Risks 395 Thorsten Herre Section VI Preparing for Disaster Recovery Chapter 29
Simplifying Secure Cloud Computing Environments with Cloud Data Centers 411 Thorsten Herre Chapter 30
Availability, Recovery, and Auditing across Data Centers 425 Reza Curtmola and Bo Chen Section VII Advanced Cloud Computing Security Chapter 31
Advanced Security Architecture for Cloud Computing 443 Albert Caballero Chapter 32
Side-Channel Attacks and Defenses on Cloud Traffic 463 Wen Ming Liu and Lingyu Wang Chapter 33
Clouds Are Evil 477 John Strand Chapter 34
Future Directions in Cloud Computing Security: Risks and Challenges 489 Mohammad Kamrul Islam and Rasib Khan
Cloud Computing Essentials 3 Anna Squicciarini, Daniela Oliveira, and Dan Lin Chapter 2
An Overview of Cloud Computing 13 William Stallings Chapter 3
Cloud Security Baselines 31 Daniela Oliveira, Anna Squicciarini, and Dan Lin Chapter 4
Cloud Security, Privacy and Trust Baselines 45 Nikolaos Pitropakis, Sokratis Katsikas, and Costas Lambrinoudakis Chapter 5
Infrastructure as a Service (IaaS) 65 Mario Santana Section II Risk Analysis and Division of Responsibility Chapter 6
Risk and Trust As ess ment: Schemes for Cloud Services 73 Erdal Cayirci Chapter 7
Managing Risk in the Cloud 85 Michaela Iorga and Anil Karmel Chapter 8
Cloud Security Risk Management 95 Marco Cremonini Chapter 9
Secure Cloud Risk Management: Risk Mitigation Methods 115 Jim Harmening and Randall DeVitto Section III Securing the Cloud Infrastructure Chapter 10
Specification and Enforcement of Access Policies in Emerging Scenarios 129 Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati Chapter 11
Cryptographic Key Management for Data Protection 151 Sarbari Gupta Chapter 12
Cloud Security Access Control: Distributed Access Control 157 Jim Harmening and Randall DeVitto Chapter 13
Cloud Security Key Management: Cloud User Controls 167 Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun Chapter 14
Cloud Computing Security Ess entials and Architecture 195 Michaela Iorga and Anil Karmel Chapter 15
Cloud Computing Architecture and Security Concepts 213 Pramod Pandya and Riad Rahmo Chapter 16
Secure Cloud Architecture 225 Pramod Pandya Section IV Operating System and Network Security Chapter 17
Locking Down Cloud Servers 237 Thorsten Herre Chapter 18
Third-Party Providers Integrity Assurance for Data Outsourcing 255 Jiawei Yuan and Shucheng Yu Section V Meeting Compliance Requirements Chapter 19
Negotiating Cloud Security Requirements with Vendors 271 Daniel S. Soper Chapter 20
Managing Legal Compliance in the Cloud: Understanding Contractual and Personal Data Protection Requirements 283 Paolo Balboni Chapter 21
Integrity Assurance for Data Outsourcing 299 Reza Curtmola and Bo Chen Chapter 22
Secure Computation Outsourcing 311 Shams Zawoad and Ragib Hasan Chapter 23
Computation Over Encrypted Data 329 Feng-Hao Liu Chapter 24
Trusted Computing Technology 347 Felipe E. Medina Chapter 25
Technology for Trusted Cloud Security: Survey and Open Issues 357 Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini Chapter 26
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems 373 Ignazio Pedone, Daniele Canavese, and Antonio Lioy Chapter 27
Assuring Compliance with Government Certification and Accreditation Regulations 387 Sarbari Gupta Chapter 28
Government Certification, Accreditation, Regulations, and Compliance Risks 395 Thorsten Herre Section VI Preparing for Disaster Recovery Chapter 29
Simplifying Secure Cloud Computing Environments with Cloud Data Centers 411 Thorsten Herre Chapter 30
Availability, Recovery, and Auditing across Data Centers 425 Reza Curtmola and Bo Chen Section VII Advanced Cloud Computing Security Chapter 31
Advanced Security Architecture for Cloud Computing 443 Albert Caballero Chapter 32
Side-Channel Attacks and Defenses on Cloud Traffic 463 Wen Ming Liu and Lingyu Wang Chapter 33
Clouds Are Evil 477 John Strand Chapter 34
Future Directions in Cloud Computing Security: Risks and Challenges 489 Mohammad Kamrul Islam and Rasib Khan