Securing the Cloud
portes grátis
Securing the Cloud
Security Strategies for the Ubiquitous Data Center
Franklin Jr., Curtis; Chee, Brian
Taylor & Francis Ltd
01/2023
254
Mole
Inglês
9781032475714
15 a 20 dias
470
Descrição não disponível.
Dedication
Contents
Preface
Acknowledgments
About the Authors
Chapter 1 Introduction
Chapter 2 We Need a New Model for Security
Chapter 3 The Basics of IT Security: From Mainframe to Cloud
Chapter 4 The Basics of Security Failure
Chapter 5 The Basics of Fitting Security to Situation
Chapter 6 Defining the Cloud to Protect
Chapter 7 Infrastructure as a Service
Chapter 8 Platform as a Service (PaaS)
Chapter 9 Software as a Service
Chapter 10 Virtual Desktop Infrastructure
Chapter 11 Understand Your Cloud Type
Chapter 12 Public Cloud
Chapter 13 Private Cloud
Chapter 14 Hybrid Cloud
Chapter 15 Working with Your Cloud Provider
Chapter 16 Protecting the Perimeter
Chapter 17 Protecting the Contents
Chapter 18 Protecting the Infrastructure
Chapter 19 Tie the Cloud Using an Internal Management Framework
Chapter 20 Closing Comments
Index
Contents
Preface
Acknowledgments
About the Authors
Chapter 1 Introduction
Chapter 2 We Need a New Model for Security
Chapter 3 The Basics of IT Security: From Mainframe to Cloud
Chapter 4 The Basics of Security Failure
Chapter 5 The Basics of Fitting Security to Situation
Chapter 6 Defining the Cloud to Protect
Chapter 7 Infrastructure as a Service
Chapter 8 Platform as a Service (PaaS)
Chapter 9 Software as a Service
Chapter 10 Virtual Desktop Infrastructure
Chapter 11 Understand Your Cloud Type
Chapter 12 Public Cloud
Chapter 13 Private Cloud
Chapter 14 Hybrid Cloud
Chapter 15 Working with Your Cloud Provider
Chapter 16 Protecting the Perimeter
Chapter 17 Protecting the Contents
Chapter 18 Protecting the Infrastructure
Chapter 19 Tie the Cloud Using an Internal Management Framework
Chapter 20 Closing Comments
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Smart Phones;SECURITY BASICS;Demarcation Lines;SECURITY BY THE CLOUD;Virtual Machine;Tie the cloud using an internal management framework;SDN;The Basics of IT Security from Mainframe to Cloud;Cloud Computing;The Basics of Fitting Security to Situation;Virtual Switch;cloud-based deployments;Private Clouds;ubiquitous data center;Public Cloud;cloud-based infrastructure;Virtual Desktop Infrastructure;cloud computing security;Sensitive Information;cloud security technologies;Address Spaces;Cloud Server;Cloud Security;Virtual Desktop;Cloud Provider;Public Cloud Infrastructure;Id;LDAP;Card Industry Data Security Standard;Payment Card Industry Data Security;Tcp;Cloud Vendor;RDP;Hybrid Clouds;Pci DSS
Dedication
Contents
Preface
Acknowledgments
About the Authors
Chapter 1 Introduction
Chapter 2 We Need a New Model for Security
Chapter 3 The Basics of IT Security: From Mainframe to Cloud
Chapter 4 The Basics of Security Failure
Chapter 5 The Basics of Fitting Security to Situation
Chapter 6 Defining the Cloud to Protect
Chapter 7 Infrastructure as a Service
Chapter 8 Platform as a Service (PaaS)
Chapter 9 Software as a Service
Chapter 10 Virtual Desktop Infrastructure
Chapter 11 Understand Your Cloud Type
Chapter 12 Public Cloud
Chapter 13 Private Cloud
Chapter 14 Hybrid Cloud
Chapter 15 Working with Your Cloud Provider
Chapter 16 Protecting the Perimeter
Chapter 17 Protecting the Contents
Chapter 18 Protecting the Infrastructure
Chapter 19 Tie the Cloud Using an Internal Management Framework
Chapter 20 Closing Comments
Index
Contents
Preface
Acknowledgments
About the Authors
Chapter 1 Introduction
Chapter 2 We Need a New Model for Security
Chapter 3 The Basics of IT Security: From Mainframe to Cloud
Chapter 4 The Basics of Security Failure
Chapter 5 The Basics of Fitting Security to Situation
Chapter 6 Defining the Cloud to Protect
Chapter 7 Infrastructure as a Service
Chapter 8 Platform as a Service (PaaS)
Chapter 9 Software as a Service
Chapter 10 Virtual Desktop Infrastructure
Chapter 11 Understand Your Cloud Type
Chapter 12 Public Cloud
Chapter 13 Private Cloud
Chapter 14 Hybrid Cloud
Chapter 15 Working with Your Cloud Provider
Chapter 16 Protecting the Perimeter
Chapter 17 Protecting the Contents
Chapter 18 Protecting the Infrastructure
Chapter 19 Tie the Cloud Using an Internal Management Framework
Chapter 20 Closing Comments
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Smart Phones;SECURITY BASICS;Demarcation Lines;SECURITY BY THE CLOUD;Virtual Machine;Tie the cloud using an internal management framework;SDN;The Basics of IT Security from Mainframe to Cloud;Cloud Computing;The Basics of Fitting Security to Situation;Virtual Switch;cloud-based deployments;Private Clouds;ubiquitous data center;Public Cloud;cloud-based infrastructure;Virtual Desktop Infrastructure;cloud computing security;Sensitive Information;cloud security technologies;Address Spaces;Cloud Server;Cloud Security;Virtual Desktop;Cloud Provider;Public Cloud Infrastructure;Id;LDAP;Card Industry Data Security Standard;Payment Card Industry Data Security;Tcp;Cloud Vendor;RDP;Hybrid Clouds;Pci DSS