Muutke küpsiste eelistusi

E-raamat: Elements of Cloud Computing Security: A Survey of Key Practicalities

  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.

What is the Cloud?About Cloud SecuritySecurity Threats in Cloud ComputingSecurity Attacks in Cloud ComputingGeneral Cloud Security Recommendations
1 What is the Cloud?
1(14)
1.1 Introduction
1(1)
1.2 History of Cloud Computing
2(1)
1.3 How Does the Cloud Work?
3(6)
1.3.1 Virtualization
3(2)
1.3.2 Clustering
5(1)
1.3.3 Grid Computing
6(1)
1.3.4 Cloud Architecture
7(1)
1.3.5 Cloud Operation
8(1)
1.4 Cloud Service Models
9(2)
1.4.1 Infrastructure-as-a-Service
9(1)
1.4.2 Platform-as-a-Service
10(1)
1.4.3 Software-as-a-Service
10(1)
1.5 Cloud Deployment Models
11(1)
1.6 Why Choose the Cloud?
12(3)
References
13(2)
2 About Cloud Security
15(10)
2.1 Introduction
15(2)
2.2 Why Is Cloud Security Different?
17(1)
2.3 Famous Attacks on Cloud
18(7)
2.3.1 History of Denial of Service Attacks on the Cloud
18(2)
2.3.2 Other Attacks
20(2)
References
22(3)
3 Security Threats in Cloud Computing
25(16)
3.1 Introduction
25(1)
3.2 Data Breaches
25(2)
3.3 Data Loss
27(1)
3.4 Account or Service Hijacking
28(1)
3.5 Insecure Interfaces and APIs
29(1)
3.6 Threats to Availability
30(1)
3.7 Malicious Insiders
31(1)
3.8 Abuse of Cloud Service
32(1)
3.9 Insufficient Due Diligence
33(1)
3.10 Shared Technology Vulnerabilities
34(1)
3.11 Other Threats
35(6)
References
37(4)
4 Security Attacks in Cloud Computing
41(10)
4.1 Introduction
41(1)
4.2 Denial of Service Attacks
41(3)
4.3 Attacks on Hypervisor
44(1)
4.4 Resource Freeing Attacks
45(1)
4.5 Side-Channel Attacks
46(1)
4.6 Attacks on Confidentiality
47(1)
4.7 Other Attacks
48(3)
References
48(3)
5 General Cloud Security Recommendations
51(4)
5.1 Introduction
51(1)
5.2 General Security Recommendations
52(3)
References
54(1)
Index 55