Securing the cloud cloud computer security techniques and tactics /
I tiakina i:
| Kaituhi matua: | |
|---|---|
| Kaituhi rangatōpū: | |
| Ētahi atu kaituhi: | |
| Hōputu: | Tāhiko īPukapuka |
| Reo: | Ingarihi |
| I whakaputaina: |
Amsterdam :
Elsevier,
2011.
|
| Rangatū: | Syngress
|
| Ngā marau: | |
| Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
| Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Rārangi ihirangi:
- Introduction to cloud computing and security
- Cloud computing architecture
- Security concerns, risk issues, and legal aspects
- Securing the cloud, architecture
- Securing the cloud, data security
- Securing the cloud, key strategies and best practices
- Security criteria, building an internal cloud
- Security criteria, selecting an external cloud provider
- Evaluating cloud security, an information security framework
- Operating a cloud.