|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910958937103321 |
|
|
Autore |
Krutz Ronald L |
|
|
Titolo |
Cloud security : a comprehensive guide to secure cloud computing / / Ronald L. Krutz, Russell Dean Vines |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Indianapolis, Ind., : Wiley Pub., Inc., 2010 |
|
|
|
|
|
|
|
ISBN |
|
9786612756399 |
9780470938942 |
0470938943 |
9781282756397 |
1282756397 |
9780470921449 |
0470921447 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (387 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cloud computing - Security measures |
Computer security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
CLOUD SECURITY: A Comprehensive Guide to Secure Cloud Computing; Contents at a Glance; About the Authors; Contents; Foreword; Introduction; Chapter 1: Cloud Computing Fundamentals; Chapter 2: Cloud Computing Architecture; Chapter 3: Cloud Computing Software Security Fundamentals; Chapter 4: Cloud Computing Risk Issues; Chapter 5: Cloud Computing Security Challenges; Chapter 6: Cloud Computing Security Architecture; Chapter 7: Cloud Computing Life Cycle Issues; Chapter 8: Useful Next Steps and Approaches; Glossary of Terms and Acronyms; References; Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security |
|
|
|
|