01194oam 2200385zu 450 991087246330332120241212215305.0(CKB)1000000000022177(SSID)ssj0000454646(PQKBManifestationID)12211772(PQKBTitleCode)TC0000454646(PQKBWorkID)10398049(PQKB)11676314(EXLCZ)99100000000002217720160829d2003 uy engtxtccr2003 IEEE International Behavioral Modeling and Simulation Workshop[Place of publication not identified]I E E E2003Bibliographic Level Mode of Issuance: Monograph9780780381353 0780381351 Engineering & Applied SciencesHILCCComputer ScienceHILCCEngineering & Applied SciencesComputer Science003/.3IEEE Circuits and Systems Society.PQKBPROCEEDING99108724633033212003 IEEE International Behavioral Modeling and Simulation Workshop2511454UNINA02649nam 2200505 a 450 991100841380332120240912152901.097817877820751787782077(CKB)4100000011217303(CaSebORM)9781787782075(OCoLC)1197626951(OCoLC)on1197626951(MiAaPQ)EBC30365889(Au-PeEL)EBL30365889(Perlego)1389067(OCoLC)1492955464(Exl-AI)30365889(EXLCZ)99410000001121730320280420d2020 uy engurcn| |||||txtrdacontentcrdamediacrrdacarrierSecuring Cloud Services - A pragmatic approach, second edition /Newcombe, Lee2nd editionIT Governance Publishing,2020.1 online resource (453 pages)Includes bibliographical references.Cover -- Title -- Copyright -- Preface -- About the Author -- Acknowledgements -- Contents -- Part 1: Securing Cloud services – setting the scene -- Introduction -- Chapter 1: Introduction to Cloud computing -- Cloud computing -- Chapter 2: Overview of existing Cloud taxonomies and models -- Service models -- Deployment models -- Hybrid Cloud -- Chapter 3: The security balance -- Security benefits -- Data centre security -- Improved resilience -- Improved security patching -- Automation and DevSecOps -- Security expertise -- Knowledge sharing and situational awareness -- Improved information sharing mechanisms -- Renewal of security architecture and segmentation -- Potential pitfalls -- Availability -- Shadow IT -- Information leakage -- Lock-inGenerated by AI.Securing Cloud Services – A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Manage the risks associated with Cloud computing.Cloud computingSecurity measuresComputer securityWeb servicesSecurity measuresCloud computingSecurity measures.Computer security.Web servicesSecurity measures.Newcombe Lee1823577UMIUMIBOOK9911008413803321Securing Cloud Services - A pragmatic approach, second edition4394566UNINA