Cloud Security: A Comprehensive Guide to Secure Cloud Computing

  • 6h 23m
  • Ronald L. Krutz, Russell Dean Vines
  • John Wiley & Sons (US)
  • 2010

Well-known security experts decipher the most challenging aspect of cloud computing-security

Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces.

The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support.

As the most current and complete guide to helping you find your way through a maze of security minefields, this book is mandatory reading if you are involved in any aspect of cloud computing.

Coverage Includes:

  • Cloud Computing Fundamentals
  • Cloud Computing Architecture
  • Cloud Computing Software Security Fundamentals
  • Cloud Computing Risks Issues
  • Cloud Computing Security Challenges
  • Cloud Computing Security Architecture
  • Cloud Computing Life Cycle Issues
  • Useful Next Steps and Approaches

About the Authors

Ronald L. Krutz, PhD, is a senior information systems security consultant with more than 30 years of experience. He founded the CMRI Cybersecurity Center at Carnegie Mellon University.

Russell Dean Vines is Chief Security Advisor for Gotham Technology Group, LLC, and has been an information systems security expert for over 25 years. They coauthored the bestselling CISSP Prep Guide.

In this Book

  • Cloud Computing Fundamentals
  • Cloud Computing Architecture
  • Cloud Computing Software Security Fundamentals
  • Cloud Computing Risk Issues
  • Cloud Computing Security Challenges
  • Cloud Computing Security Architecture
  • Cloud Computing Life Cycle Issues
  • Useful Next Steps and Approaches

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.6 of 86 users Rating 4.6 of 86 users (86)