Cloud computing is flexible, efficient, and cost-effective, but not without risks. To maximize its potential, you need to fully understand its vulnerabilities and how to offset them.
This guide thoroughly examines cloud fundamentals, architecture, risks, and security principles. Two leading security experts detail critical approaches and solutions, helping you achieve the maximum return on cloud investments without compromising the safety of your information.
-Avoid leakage and unauthorized data access among virtual machines running on the same server
-Properly handle sensitive information
-Prevent release of critical data to law enforcement or government agencies without approval by the client
-Follow compliance and regulatory requirements
-Deal with system crashes or failures
-Protect against hacker invasions into client applications hosted on the cloud
-Implement solid, robust security protection
-Manage interoperability that allows a client to easily move applications among different cloud providers and avoid "lock-in"
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Ronald L. Krutz, PhD, is a senior information systems security consultant with more than 30 years of experience. He founded the CMRI Cybersecurity Center at Carnegie Mellon University.
Russell Dean Vines is Chief Security Advisor for Gotham Technology Group, LLC, and has been an information systems security expert for over 25 years. They coauthored the bestselling CISSP Prep Guide.
Ronald L. Krutz, PhD, is a senior information systems security consultant with more than 30 years of experience. He founded the CMRI Cybersecurity Center at Carnegie Mellon University.
Russell Dean Vines is Chief Security Advisor for Gotham Technology Group, LLC, and has been an information systems security expert for over 25 years. They coauthored the bestselling CISSP Prep Guide.
Secure your cloud to maximize its value
Cloud computing is flexible, efficient, and cost-effective, but not without risks. To maximize its potential, you need to fully understand its vulnerabilities and how to offset them.
This guide thoroughly examines cloud fundamentals, architecture, risks, and security principles. Two leadingsecurity experts detail critical approaches and solutions, helping you achieve the maximum return on cloud investments without compromising the safety of your information.
Avoid leakage and unauthorized data access among virtual machines running on the same server
Properly handle sensitive information
Prevent release of critical data to law enforcement or government agencies without approval by the client
Follow compliance and regulatory requirements
Deal with system crashes or failures
Protect against hacker invasions into client applications hosted on the cloud
Implement solid, robust security protection
Manage interoperability that allows a client to easily move applications among different cloud providers and avoid "lock-in"
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 8,92 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiEUR 25,77 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: WeBuyBooks, Rossendale, LANCS, Regno Unito
Condizione: Very Good. Most items will be dispatched the same or the next working day. A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Codice articolo wbs9726551445
Quantità: 1 disponibili
Da: WorldofBooks, Goring-By-Sea, WS, Regno Unito
Paperback. Condizione: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Codice articolo GOR006270897
Quantità: 1 disponibili
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Very Good. 1st Edition. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo 9689740-6
Quantità: 1 disponibili
Da: SecondSale, Montgomery, IL, U.S.A.
Condizione: Acceptable. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Codice articolo 00064452425
Quantità: 1 disponibili
Da: Goodwill of Silicon Valley, SAN JOSE, CA, U.S.A.
Condizione: good. Supports Goodwill of Silicon Valley job training programs. The cover and pages are in Good condition! Any other included accessories are also in Good condition showing use. Use can include some highlighting and writing, page and cover creases as well as other types visible wear. Codice articolo GWSVV.0470589876.G
Quantità: 1 disponibili
Da: HPB-Red, Dallas, TX, U.S.A.
paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Codice articolo S_420433195
Quantità: 1 disponibili
Da: OM Books, Sevilla, SE, Spagna
Condizione: Usado - bueno. Codice articolo 9780470589878
Quantità: 1 disponibili
Da: Toscana Books, AUSTIN, TX, U.S.A.
Paperback. Condizione: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. Codice articolo Scanned0470589876
Quantità: 1 disponibili