Book by Krutz Ronald L Vines Russell Dean
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Well–known security experts decipher the most challenging aspect of cloud computing–security
Cloud computing allows for both large and small organizations to have the opportunity to use Internet–based services so that they can reduce start–up costs, lower capital expenditures, use services on a pay–as–you–use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces.
The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support.
As the most current and complete guide to helping you find your way through a maze of security minefields, this book is mandatory reading if you are involved in any aspect of cloud computing.
Coverage Includes:
Secure your cloud to maximize its value
Cloud computing is flexible, efficient, and cost–effective, but not without risks. To maximize its potential, you need to fully understand its vulnerabilities and how to offset them.
This guide thoroughly examines cloud fundamentals, architecture, risks, and security principles. Two leadingsecurity experts detail critical approaches and solutions, helping you achieve the maximum return on cloud investments without compromising the safety of your information.
Avoid leakage and unauthorized data access among virtual machines running on the same server
Properly handle sensitive information
Prevent release of critical data to law enforcement or government agencies without approval by the client
Follow compliance and regulatory requirements
Deal with system crashes or failures
Protect against hacker invasions into client applications hosted on the cloud
Implement solid, robust security protection
Manage interoperability that allows a client to easily move applications among different cloud providers and avoid "lock–in"
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 3,34 expédition vers Etats-Unis
Destinations, frais et délaisVendeur : HPB-Red, Dallas, TX, Etats-Unis
paperback. Etat : Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! N° de réf. du vendeur S_420433195
Quantité disponible : 1 disponible(s)
Vendeur : SecondSale, Montgomery, IL, Etats-Unis
Etat : Acceptable. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. N° de réf. du vendeur 00064452425
Quantité disponible : 1 disponible(s)
Vendeur : SecondSale, Montgomery, IL, Etats-Unis
Etat : Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. N° de réf. du vendeur 00061597056
Quantité disponible : 1 disponible(s)
Vendeur : Goodwill of Silicon Valley, SAN JOSE, CA, Etats-Unis
Etat : good. Supports Goodwill of Silicon Valley job training programs. The cover and pages are in Good condition! Any other included accessories are also in Good condition showing use. Use can include some highlighting and writing, page and cover creases as well as other types visible wear. N° de réf. du vendeur GWSVV.0470589876.G
Quantité disponible : 1 disponible(s)
Vendeur : OM Books, Sevilla, SE, Espagne
Etat : Usado - bueno. N° de réf. du vendeur 9780470589878
Quantité disponible : 1 disponible(s)