Securing the cloud : security strategies for the ubiquitous data center
著者
書誌事項
Securing the cloud : security strategies for the ubiquitous data center
(An Auerbach book)
CRC Press, c2019
- : hardback
大学図書館所蔵 件 / 全1件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
Includes bibliographical references and index
内容説明・目次
内容説明
This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains where and how to store data and what should be avoided at all costs. It presents the views and insight of the leading experts on the state of cloud computing security and its future. It also provides no-nonsense info on cloud security technologies and models.
Securing the Cloud: Security Strategies for the Ubiquitous Data Center takes the position that cloud security is an extension of recognized, established security principles into cloud-based deployments. It explores how those principles can be put into practice to protect cloud-based infrastructure and data, traditional infrastructure, and hybrid architectures combining cloud and on-premises infrastructure.
Cloud computing is evolving so rapidly that regulations and technology have not necessarily been able to keep pace. IT professionals are frequently left to force fit pre-existing solutions onto new infrastructure and architectures for which they may be very poor fits. This book looks at how those "square peg/round hole" solutions are implemented and explains ways in which the pegs, the holes, or both may be adjusted for a more perfect fit.
目次
Dedication
Contents
Preface
Acknowledgments
About the Authors
Chapter 1 Introduction
Chapter 2 We Need a New Model for Security
Chapter 3 The Basics of IT Security: From Mainframe to Cloud
Chapter 4 The Basics of Security Failure
Chapter 5 The Basics of Fitting Security to Situation
Chapter 6 Defining the Cloud to Protect
Chapter 7 Infrastructure as a Service
Chapter 8 Platform as a Service (PaaS)
Chapter 9 Software as a Service
Chapter 10 Virtual Desktop Infrastructure
Chapter 11 Understand Your Cloud Type
Chapter 12 Public Cloud
Chapter 13 Private Cloud
Chapter 14 Hybrid Cloud
Chapter 15 Working with Your Cloud Provider
Chapter 16 Protecting the Perimeter
Chapter 17 Protecting the Contents
Chapter 18 Protecting the Infrastructure
Chapter 19 Tie the Cloud Using an Internal Management Framework
Chapter 20 Closing Comments
Index
「Nielsen BookData」 より