LEADER 00870nam0-2200289---450- 001 990008385300403321 005 20060927112346.0 035 $a000838530 035 $aFED01000838530 035 $a(Aleph)000838530FED01 035 $a000838530 100 $a20060927d1987----km-y0itay50------ba 101 0 $aeng 102 $aUS 105 $a--------001yy 200 1 $aUnited Nations codification of State responsability$fMarina Spinedi, Bruno Simma 210 $aNew York, London, Rome$cOceana Publications, Inc.$d1987 215 $aXI, 418 p.$d25 cm 700 1$aSpinedi,$bMarina$0280853 701 1$aSimma,$bBruno$f<1941- >$0248592 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990008385300403321 952 $aDI 5/870$b5399$fDEC 959 $aDEC 996 $aUnited Nations codification of State responsability$9724869 997 $aUNINA LEADER 05172nam 22007571 450 001 9911007084403321 005 20170814172108.0 010 $a9781628700114 010 $a1628700114 010 $a9781849283618 010 $a1849283613 010 $a9781299468498 010 $a1299468497 010 $a9781849283601 010 $a1849283605 035 $a(CKB)2670000000204364 035 $a(EBL)918802 035 $a(OCoLC)799769042 035 $a(SSID)ssj0000740695 035 $a(PQKBManifestationID)11422799 035 $a(PQKBTitleCode)TC0000740695 035 $a(PQKBWorkID)10701146 035 $a(PQKB)10202595 035 $a(MiAaPQ)EBC918802 035 $a(DE-B1597)680714 035 $a(DE-B1597)9781849283601 035 $a(OCoLC)857306735 035 $a(OCoLC)ocn857306735 035 $a(Perlego)5742 035 $a(CaSebORM)9781849283618 035 $a(EXLCZ)992670000000204364 100 $a20120716d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCloud computing $eassessing the risks /$fJared Carstensen, Bernard Golden, JP Morgenthal 205 $a1st edition 210 1$aEly, Cambridgeshire :$cIT Governance Publishing,$d2012. 215 $a1 online resource (297 p.) 300 $aDescription based upon print version of record. 311 08$a9781849283595 311 08$a1849283591 327 $aWhat others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three 327 $aCharacteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism 327 $aThe challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security - the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility 327 $aFacility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work 327 $aDealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing 327 $aIntrusion detection system/intrusion prevention system 330 $aCloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing. 606 $aCloud computing 606 $aWeb services 615 0$aCloud computing. 615 0$aWeb services. 676 $a005.8 700 $aCarstensen$b Jared$01822073 701 $aGolden$b Bernard$01816033 701 $aMorgenthal$b JP$01822074 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911007084403321 996 $aCloud computing$94388138 997 $aUNINA