Securing the cloud cloud computer security techniques and tactics /
I tiakina i:
Kaituhi matua: | |
---|---|
Kaituhi rangatōpū: | |
Ētahi atu kaituhi: | |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Amsterdam :
Elsevier,
2011.
|
Rangatū: | Syngress
|
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Rārangi ihirangi:
- Introduction to cloud computing and security
- Cloud computing architecture
- Security concerns, risk issues, and legal aspects
- Securing the cloud, architecture
- Securing the cloud, data security
- Securing the cloud, key strategies and best practices
- Security criteria, building an internal cloud
- Security criteria, selecting an external cloud provider
- Evaluating cloud security, an information security framework
- Operating a cloud.