000 | 02537nam a22002537a 4500 | ||
---|---|---|---|
003 | OSt | ||
005 | 20240822114222.0 | ||
008 | 240813b |||||||| |||| 00| 0 eng d | ||
020 | _a9781032475714 | ||
040 | _cSIU | ||
082 | _a005.8 JRF 2023 | ||
100 | _aJr Franklin, Curtis. | ||
245 |
_aSecuring the Cloud : _bsecurity strategies for the ubiquitous data center |
||
260 |
_aAUERBACH _bAUERBACH PUBLICATIONS, [S.l. _c2023 |
||
300 | _a232 pages illustrations (black and white) ; 24 cm | ||
504 | _aChapter 1 Introduction Chapter 2 We Need a New Model for Security Chapter 3 The Basics of IT Security: From Mainframe to Cloud Chapter 4 The Basics of Security Failure Chapter 5 The Basics of Fitting Security to Situation Chapter 6 Defining the Cloud to Protect Chapter 7 Infrastructure as a Service Chapter 8 Platform as a Service (PaaS)Chapter 9 Software as a Service Chapter 10 Virtual Desktop Infrastructure Chapter 11 Understand Your Cloud Type Chapter 12 Public Cloud Chapter 13 Private Cloud Chapter 14 Hybrid Cloud Chapter 15 Working with Your Cloud Provider Chapter 16 Protecting the Perimeter Chapter 17 Protecting the Contents Chapter 18 Protecting the Infrastructure Chapter 19 Tie the Cloud Using an Internal Management Framework Chapter 20 Closing Comments Index | ||
505 | _aChapter 1 Introduction Chapter 2 We Need a New Model for Security Chapter 3 The Basics of IT Security: From Mainframe to Cloud Chapter 4 The Basics of Security Failure Chapter 5 The Basics of Fitting Security to Situation Chapter 6 Defining the Cloud to Protect Chapter 7 Infrastructure as a Service Chapter 8 Platform as a Service (PaaS)Chapter 9 Software as a Service Chapter 10 Virtual Desktop Infrastructure Chapter 11 Understand Your Cloud Type Chapter 12 Public Cloud Chapter 13 Private Cloud Chapter 14 Hybrid Cloud Chapter 15 Working with Your Cloud Provider Chapter 16 Protecting the Perimeter Chapter 17 Protecting the Contents Chapter 18 Protecting the Infrastructure Chapter 19 Tie the Cloud Using an Internal Management Framework Chapter 20 Closing Comments Index | ||
520 | _aThis book present the principles of cloud computing security. From a definition of terms to key issues for service contracts, it's a must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect traditional computing assets. | ||
650 | _xCloud computing Security measures | ||
650 | _xCloud Chapter | ||
650 | _xSecurity Failure | ||
650 | _xSecurity measures | ||
942 |
_2ddc _cBK _n0 |
||
999 |
_c233 _d233 |