Muutke küpsiste eelistusi

E-raamat: Data Security in Cloud Computing, Volume I

  • Formaat - EPUB+DRM
  • Hind: 25,12 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud.

Cloud computing has already been adopted by many organizations and people because of its advantages of economy, reliability, scalability and guaranteed quality of service amongst others. Readers will learn specifics about software as a service (Saas), platform as a service (Paas), infrastructure as a service (IaaS), server and desktop virtualization, and much more.

Readers will have a greater comprehension of cloud engineering and the actions required to rapidly reap its benefits while at the same time lowering IT implementation risk. The book’s content is ideal for users wanting to migrate to the cloud, IT professionals seeking an overview on cloud fundamentals, and computer science students who will build cloud solutions for testing purposes.

List of Figures
xiii
List of Tables
xv
List of Abbreviations
xvii
Acknowledgments xix
Introduction xxi
Chapter 1 Cloud Computing Essentials
1(10)
1.1 Infrastructure--as--a--Service
4(1)
1.2 Platform--as--a--Service
4(1)
1.3 Software--as--a--Service
5(1)
1.4 Deployment Designs
5(6)
Chapter 2 Overview of Cloud Computing
11(22)
2.1 Essential Characteristics
12(1)
2.2 Cloud Services
13(2)
2.3 Platform--as--a--Service and IaaS
15(1)
2.4 Additional Cloud Services
16(1)
2.5 XaaS (Anything--as--a--Service)
17(2)
2.6 Public Cloud
19(1)
2.7 Personal Cloud
20(1)
2.8 Community Cloud
20(1)
2.9 Hybrid
20(4)
2.10 Cloud Provider Architectural Components
24(1)
2.11 ITU--T Cloud Computing Reference Architecture
25(4)
2.11.1 Cloud Computing "Actors"
25(2)
2.11.2 Layered Architecture
27(2)
2.12 Network Requirements for Cloud Computing
29(4)
Chapter 3 Cloud Security Baselines
33(20)
3.1 Fundamentals
33(1)
3.2 Program Layer
34(9)
3.3 Other Potential Reasons for Data Leakage from the Cloud
43(2)
3.4 Privacy and Security in Multiclouds
45(2)
3.5 Cloud Accountability
47(6)
Chapter 4 Cloud Computing Architecture
53(22)
4.1 Hardware Customers
55(15)
4.1.1 Thick Clients
55(1)
4.1.2 Thin Clients
55(1)
4.1.3 Smartphones
56(1)
4.1.4 Software Customers
56(1)
4.1.5 Thick or Thin or Smart?
56(2)
4.1.6 Thin or Web--applications Customers
58(1)
4.1.7 Smart Customers
58(8)
4.1.8 Personal Cloud
66(1)
4.1.9 Virtual Private Cloud
67(3)
4.2 Cloud--storage Prerequisites
70(1)
4.3 Cloud OS Prerequisites
70(1)
4.4 Memory Prerequisites
70(1)
4.5 CPU Prerequisites
71(1)
4.6 Software Prerequisites
71(4)
Chapter 5 Cloud Computing Security Essentials
75(28)
5.1 Cloud Computing Definition
76(5)
5.2 Cloud Computing Security Essentials
81(5)
5.3 Dividing Operational Responsibilities
86(3)
5.4 User--data Boundary
89(5)
5.5 Ecosystem Orchestration Boundary
94(2)
5.6 Deployment Boundary
96(2)
5.7 Defining Your Root of Trust
98(1)
5.8 Managing User Authentication and Authorization
99(4)
Chapter 6 Cloud Security
103(18)
6.1 The State of Cloud Security
103(1)
6.2 Understanding the Threats
104(2)
6.3 Classification and Countermeasures
106(4)
6.3.1 Recruitment and Host Threats
107(1)
6.3.2 Network Breaks
108(1)
6.3.3 Lock--in
109(1)
6.4 Compliance Issues
110(1)
6.5 Infrastructure Modifications
110(1)
6.6 Data Processing
111(1)
6.7 Administrative and Assets
111(1)
6.8 DoS
111(1)
6.9 Service Provider
112(1)
6.10 Information Interception
112(1)
6.11 Clients' Negligence and Cloud Security
113(1)
6.12 Reduction of Governance
113(1)
6.13 Common Risks
114(1)
6.14 Encryption Keys
114(1)
6.15 Service Engine Presence
114(7)
About the Author 121(2)
Index 123
Giulio D'Agostino is a system administrator, author, and technologist with more than 20 years of experience in the cloud computing, software as a service, and publishing. Previously worked for Google, Apple, Hewlett Packard, and Salesforce.com, Giulio has lectured at the Technical University of DenmarkDTU, Web Summit 2016/2017 and is currently a system administrator for a software as a service and cloud-based provider company LogMeIn Inc.