LEADER 04718 am 22007093u 450 001 996203277703316 005 20200706171416.0 010 $a1-4302-6146-3 024 7 $a10.1007/978-1-4302-6146-9 035 $a(CKB)3710000000094939 035 $a(DE-He213)978-1-4302-6146-9 035 $a(SSID)ssj0001187033 035 $a(PQKBManifestationID)11671260 035 $a(PQKBTitleCode)TC0001187033 035 $a(PQKBWorkID)11257645 035 $a(PQKB)10700272 035 $a(MiAaPQ)EBC3071473 035 $a(MiAaPQ)EBC6422525 035 $a(Au-PeEL)EBL6422525 035 $a(OCoLC)876598475 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/42527 035 $a(CaSebORM)9781430261452 035 $a(PPN)177820934 035 $a(EXLCZ)993710000000094939 100 $a20140329d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBuilding the Infrastructure for Cloud Security$b[electronic resource] $eA Solutions View /$fby Raghuram Yeluri, Enrique Castro-Leon 205 $a1st ed. 2014. 210 $cApress$d2014 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2014. 215 $a1 online resource (XXVI, 244 p. 95 illus.) 225 0 $aThe Expert's Voice in Internet Security 300 $aIncludes index. 300 $a"Selected for Intel's recommended reading list"--Cover. 311 $a1-4302-6145-5 320 $aIncludes bibliographical references and index. 330 $aFor cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can?t afford to ignore it!" ?Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed?but instead measured, attested, and limited according to least privilege principles." ?John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." ?Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation. 606 $aData protection 606 $aComputer security 606 $aData encryption (Computer science) 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aData protection. 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 14$aSecurity. 615 24$aSystems and Data Security. 615 24$aCryptology. 676 $a005.8 700 $aYeluri$b Raghuram$4aut$4http://id.loc.gov/vocabulary/relators/aut$0903804 702 $aCastro-Leon$b Enrique$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bUMI 801 1$bUMI 906 $aBOOK 912 $a996203277703316 996 $aBuilding the Infrastructure for Cloud Security$92020283 997 $aUNISA LEADER 01120nam0 22002891i 450 001 UON00231457 005 20231205103504.193 100 $a20030730d1981 |0itac50 ba 101 $aeng 102 $aGB 105 $a|||| ||||| 200 1 $aTheology and Philosophical Inquiry$ean introduction$fVincent Brummer 210 $aLondon$aThe Basingstoke$cThe Macmillan Press Ltd$d1981 215 $a306 p.$d22 cm. 606 $aEpistemologia$3UONC023402$2FI 606 $aOntologia$3UONC042267$2FI 606 $aRELIGIONE E FILOSOFIA$3UONC025630$2FI 620 $aGB$dLondon$3UONL003044 676 $a121$cGnoseologia (teoria della conoscenza)$v21 700 1$aBRUMMER$bVincent$3UONV140305$0687188 712 $aMacmillan & Co.$3UONV247335$4650 801 $aIT$bSOL$c20250606$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00231457 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI FS 02618 $eSI LO 18100 5 996 $aTheology and Philosophical Inquiry$91272722 997 $aUNIOR