Muutke küpsiste eelistusi

Elements of Cloud Computing Security: A Survey of Key Practicalities 1st ed. 2016 [Pehme köide]

  • Formaat: Paperback / softback, 55 pages, kõrgus x laius: 235x155 mm, kaal: 1182 g, 7 Illustrations, black and white; XI, 55 p. 7 illus., 1 Paperback / softback
  • Sari: SpringerBriefs in Computer Science
  • Ilmumisaeg: 25-Jul-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319414100
  • ISBN-13: 9783319414102
Teised raamatud teemal:
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 55 pages, kõrgus x laius: 235x155 mm, kaal: 1182 g, 7 Illustrations, black and white; XI, 55 p. 7 illus., 1 Paperback / softback
  • Sari: SpringerBriefs in Computer Science
  • Ilmumisaeg: 25-Jul-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319414100
  • ISBN-13: 9783319414102
Teised raamatud teemal:
This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.

What is the Cloud?About Cloud SecuritySecurity Threats in Cloud ComputingSecurity Attacks in Cloud ComputingGeneral Cloud Security Recommendations
1 What is the Cloud?
1(14)
1.1 Introduction
1(1)
1.2 History of Cloud Computing
2(1)
1.3 How Does the Cloud Work?
3(6)
1.3.1 Virtualization
3(2)
1.3.2 Clustering
5(1)
1.3.3 Grid Computing
6(1)
1.3.4 Cloud Architecture
7(1)
1.3.5 Cloud Operation
8(1)
1.4 Cloud Service Models
9(2)
1.4.1 Infrastructure-as-a-Service
9(1)
1.4.2 Platform-as-a-Service
10(1)
1.4.3 Software-as-a-Service
10(1)
1.5 Cloud Deployment Models
11(1)
1.6 Why Choose the Cloud?
12(3)
References
13(2)
2 About Cloud Security
15(10)
2.1 Introduction
15(2)
2.2 Why Is Cloud Security Different?
17(1)
2.3 Famous Attacks on Cloud
18(7)
2.3.1 History of Denial of Service Attacks on the Cloud
18(2)
2.3.2 Other Attacks
20(2)
References
22(3)
3 Security Threats in Cloud Computing
25(16)
3.1 Introduction
25(1)
3.2 Data Breaches
25(2)
3.3 Data Loss
27(1)
3.4 Account or Service Hijacking
28(1)
3.5 Insecure Interfaces and APIs
29(1)
3.6 Threats to Availability
30(1)
3.7 Malicious Insiders
31(1)
3.8 Abuse of Cloud Service
32(1)
3.9 Insufficient Due Diligence
33(1)
3.10 Shared Technology Vulnerabilities
34(1)
3.11 Other Threats
35(6)
References
37(4)
4 Security Attacks in Cloud Computing
41(10)
4.1 Introduction
41(1)
4.2 Denial of Service Attacks
41(3)
4.3 Attacks on Hypervisor
44(1)
4.4 Resource Freeing Attacks
45(1)
4.5 Side-Channel Attacks
46(1)
4.6 Attacks on Confidentiality
47(1)
4.7 Other Attacks
48(3)
References
48(3)
5 General Cloud Security Recommendations
51(4)
5.1 Introduction
51(1)
5.2 General Security Recommendations
52(3)
References
54(1)
Index 55