Cloud Computing Security: Foundations and Challenges, 2nd Edition
- Length: 522 pages
- Edition: 2
- Language: English
- Publisher: CRC Press
- Publication Date: 2020-11-09
- ISBN-10: 036756033X
- ISBN-13: 9780367560331
- Sales Rank: #643886 (See Top 100 Books)
This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide.
Features
- Covers patching and configuration vulnerabilities of a cloud server
- Evaluates methods for data encryption and long-term storage in a cloud server
- Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations
John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA’s space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.
Cover Half-Title Title Copyright Dedication Contents Foreword Preface Acknowledgments About the Editor Contributors SECTION I Introduction CHAPTER 1 CLOUD COMPUTING ESSENTIALS CHAPTER 2 AN OVERVIEW OF CLOUD COMPUTING CHAPTER 3 CLOUD SECURITY BASELINES CHAPTER 4 CLOUD SECURITY, PRIVACY AND TRUST BASELINES CHAPTER 5 INFRASTRUCTURE AS A SERVICE (IAAS) SECTION II Risk Analysis and Division of Responsibility CHAPTER 6 RISK AND TRUST ASSESSMENT: SCHEMES FOR CLOUD SERVICES CHAPTER 7 MANAGING RISK IN THE CLOUD CHAPTER 8 CLOUD SECURITY RISK MANAGEMENT CHAPTER 9 SECURE CLOUD RISK MANAGEMENT: RISK MITIGATION METHODS SECTION III Securing the Cloud Infrastructure CHAPTER 10 SPECIFICATION AND ENFORCEMENT OF ACCESS POLICIES IN EMERGING SCENARIOS CHAPTER 11 CRYPTOGRAPHIC KEY MANAGEMENT FOR DATA PROTECTION CHAPTER 12 CLOUD SECURITY ACCESS CONTROL: DISTRIBUTED ACCESS CONTROL CHAPTER 13 CLOUD SECURITY KEY MANAGEMENT: CLOUD USER CONTROLS CHAPTER 14 CLOUD COMPUTING SECURITY ESSENTIALS AND ARCHITECTURE CHAPTER 15 CLOUD COMPUTING ARCHITECTURE AND SECURITY CONCEPTS CHAPTER 16 SECURE CLOUD ARCHITECTURE SECTION IV Operating System and Network Security CHAPTER 17 LOCKING DOWN CLOUD SERVERS CHAPTER 18 THIRD-PARTY PROVIDERS INTEGRITY ASSURANCE FOR DATA OUTSOURCING SECTION V Meeting Compliance Requirements CHAPTER 19 NEGOTIATING CLOUD SECURITY REQUIREMENTS WITH VENDORS CHAPTER 20 MANAGING LEGAL COMPLIANCE IN THE CLOUD: UNDERSTANDING CONTRACTUAL AND PERSONAL DATA PROTECTION REQUIREMENTS CHAPTER 21 INTEGRITY ASSURANCE FOR DATA OUTSOURCING CHAPTER 22 SECURE COMPUTATION OUTSOURCING CHAPTER 23 COMPUTATION OVER ENCRYPTED DATA CHAPTER 24 TRUSTED COMPUTING TECHNOLOGY CHAPTER 25 TECHNOLOGY FOR TRUSTED CLOUD SECURITY: SURVEY AND OPEN ISSUES CHAPTER 26 TRUSTED COMPUTING TECHNOLOGY AND PROPOSALS FOR RESOLVING CLOUD COMPUTING SECURITY PROBLEMS CHAPTER 27 ASSURING COMPLIANCE WITH GOVERNMENT CERTIFICATION AND ACCREDITATION REGULATIONS CHAPTER 28 GOVERNMENT CERTIFICATION, ACCREDITATION, REGULATIONS, AND COMPLIANCE RISKS SECTION VI Preparing for Disaster Recovery CHAPTER 29 SIMPLIFYING SECURE CLOUD COMPUTING ENVIRONMENTS WITH CLOUD DATA CENTERS CHAPTER 30 AVAILABILITY, RECOVERY, AND AUDITING ACROSS DATA CENTERS SECTION VII Advanced Cloud Computing Security CHAPTER 31 ADVANCED SECURITY ARCHITECTURE FOR CLOUD COMPUTING CHAPTER 32 SIDE-CHANNEL ATTACKS AND DEFENSES ON CLOUD TRAFFIC CHAPTER 33 CLOUDS ARE EVIL CHAPTER 34 FUTURE DIRECTIONS IN CLOUD COMPUTING SECURITY: RISKS AND CHALLENGES SECTION VIII Appendices APPENDIX A: LIST OF TOP CLOUD COMPUTING SECURITY IMPLEMENTATION AND DEPLOYMENT COMPANIES APPENDIX B: LIST OF CLOUD COMPUTING SECURITY PRODUCTS AND SERVICES INDEX
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.