Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Cloud Computing Security: Foundations and Challenges

Cloud Computing Security: Foundations and Challenges

Great Research Book in Cloud Computing Security: Foundations and Challenges

Author(s) Name:  John R. Vacca

About the Book:

   This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide.

Table of Contents

  • Introduction
  •   Cloud Computing Essentials
      Cloud Security Baselines
      Software as a Service (SaaS)
       Infrastructure as a Service (Iaas).
  • Risk Analysis and Division of Responsibility
  •   Managing Risks in the Cloud
       Dividing Operational Responsibility and Visibility
      Retaining Information Security Accountability
      anaging User Authentication and Authorization
      Negotiating Security Requirements with Vendors
      Establishing a Service Level Agreement (SLA)
  • Securing the Cloud Infrastructure
  •   Securing the Platform
      Restricting Network Access through Security Groups
       Configuring Platform-Specific User Access Control
      Integrating Cloud Authentication/Authorization Systems.
      Compartmentalizing Access To Protect Data Confidentiality and Availability
      Securing Data in Motion and Data at Rest
      Identifying Your Security Perimeter
  • Operating System and Network Security
  •   Locking Down Cloud Servers
      Scanning for and Patching Vulnerabilities
      Controlling and Verifying Configuration Management
  • Meeting Compliance Requirements
  •   Managing Cloud Governance
      Retaining Responsibility for the Accuracy of the Data
      Verifying Integrity in Stored and Transmitted Data
      Assuring Compliance with Government Certification and Accreditation Regulations
      Following Standards for Auditing Information Systems
  • Preparing for Disaster Recovery
  •   Implementing a Plan to Sustain Availability
      Distributing Data Across the Cloud to Ensure Availability and Performance
      Addressing Data Portability and Interoperability for a Change in Cloud Providers
      Exploiting the Cloud for Disaster Recovery Options

    ISBN:  9781482260946

    Publisher:  CRC Press

    Year of Publication:  2016

    Book Link:  Home Page Url