TY - BOOK AU - Jr Franklin, Curtis. TI - Securing the Cloud: security strategies for the ubiquitous data center SN - 9781032475714 U1 - 005.8 JRF 2023 PY - 2023/// CY - AUERBACH PB - AUERBACH PUBLICATIONS, [S.l. KW - Cloud computing Security measures KW - Cloud Chapter KW - Security Failure KW - Security measures N1 - Chapter 1 Introduction Chapter 2 We Need a New Model for Security Chapter 3 The Basics of IT Security: From Mainframe to Cloud Chapter 4 The Basics of Security Failure Chapter 5 The Basics of Fitting Security to Situation Chapter 6 Defining the Cloud to Protect Chapter 7 Infrastructure as a Service Chapter 8 Platform as a Service (PaaS)Chapter 9 Software as a Service Chapter 10 Virtual Desktop Infrastructure Chapter 11 Understand Your Cloud Type Chapter 12 Public Cloud Chapter 13 Private Cloud Chapter 14 Hybrid Cloud Chapter 15 Working with Your Cloud Provider Chapter 16 Protecting the Perimeter Chapter 17 Protecting the Contents Chapter 18 Protecting the Infrastructure Chapter 19 Tie the Cloud Using an Internal Management Framework Chapter 20 Closing Comments Index; Chapter 1 Introduction Chapter 2 We Need a New Model for Security Chapter 3 The Basics of IT Security: From Mainframe to Cloud Chapter 4 The Basics of Security Failure Chapter 5 The Basics of Fitting Security to Situation Chapter 6 Defining the Cloud to Protect Chapter 7 Infrastructure as a Service Chapter 8 Platform as a Service (PaaS)Chapter 9 Software as a Service Chapter 10 Virtual Desktop Infrastructure Chapter 11 Understand Your Cloud Type Chapter 12 Public Cloud Chapter 13 Private Cloud Chapter 14 Hybrid Cloud Chapter 15 Working with Your Cloud Provider Chapter 16 Protecting the Perimeter Chapter 17 Protecting the Contents Chapter 18 Protecting the Infrastructure Chapter 19 Tie the Cloud Using an Internal Management Framework Chapter 20 Closing Comments Index N2 - This book present the principles of cloud computing security. From a definition of terms to key issues for service contracts, it's a must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect traditional computing assets ER -