Building the Infrastructure for Cloud Security Building the Infrastructure for Cloud Security

Building the Infrastructure for Cloud Security

A Solutions View

    • 5.0 • 2개의 평가

출판사 설명

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical
applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:
Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.
"A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc.

" Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc.

"Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation

장르
컴퓨터 및 인터넷
출시일
2014년
3월 29일
언어
EN
영어
길이
270
페이지
출판사
Apress
판매자
Springer Nature B.V.
크기
10.5
MB
Destination CISSP Destination CISSP
2024년
IBM Security Solutions Architecture for Network, Server and Endpoint IBM Security Solutions Architecture for Network, Server and Endpoint
2011년
Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601)
2021년
CompTIA Security+ SY0-601 Exam Cram CompTIA Security+ SY0-601 Exam Cram
2020년
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
2021년
The Official (ISC)2 CISSP CBK Reference The Official (ISC)2 CISSP CBK Reference
2021년
Vulnerability Management in Cloud Vulnerability Management in Cloud
2014년
Cloud Security Starter Kit – Overview Cloud Security Starter Kit – Overview
2011년
Microsoft System Center Data Protection for the Hybrid Cloud Microsoft System Center Data Protection for the Hybrid Cloud
2015년
Cloud Computing Infrastructure on IBM Power Systems: Getting started with ISDM Cloud Computing Infrastructure on IBM Power Systems: Getting started with ISDM
2012년
Microsoft System Center Software Update Management Field Experience Microsoft System Center Software Update Management Field Experience
2015년
Hybrid Cloud Data and API Integration: Integrate Your Enterprise and Cloud with Bluemix Integration Services Hybrid Cloud Data and API Integration: Integrate Your Enterprise and Cloud with Bluemix Integration Services
2016년