Securing the cloud cloud computer security techniques and tactics /

I tiakina i:
Ngā taipitopito rārangi puna kōrero
Kaituhi matua: Winkler, J. R. (Joachim R.)
Kaituhi rangatōpū: ebrary, Inc
Ētahi atu kaituhi: Meine, Bill
Hōputu: Tāhiko īPukapuka
Reo:Ingarihi
I whakaputaina: Amsterdam : Elsevier, 2011.
Rangatū:Syngress
Ngā marau:
Urunga tuihono:An electronic book accessible through the World Wide Web; click to view
Ngā Tūtohu: Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
Rārangi ihirangi:
  • Introduction to cloud computing and security
  • Cloud computing architecture
  • Security concerns, risk issues, and legal aspects
  • Securing the cloud, architecture
  • Securing the cloud, data security
  • Securing the cloud, key strategies and best practices
  • Security criteria, building an internal cloud
  • Security criteria, selecting an external cloud provider
  • Evaluating cloud security, an information security framework
  • Operating a cloud.