Muutke küpsiste eelistusi

E-raamat: Security Engineering for Cloud Computing: Approaches and Tools

Edited by , Edited by , Edited by , Edited by
  • Formaat: PDF+DRM
  • Ilmumisaeg: 30-Sep-2012
  • Kirjastus: Idea Group,U.S.
  • Keel: eng
  • ISBN-13: 9781466621268
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 240,82 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 30-Sep-2012
  • Kirjastus: Idea Group,U.S.
  • Keel: eng
  • ISBN-13: 9781466621268
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

"This book provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications"--

Exploring approaches to security in cloud computing services, computer scientists and software engineers in Spain, elsewhere in Europe, and the Americas cover cloud architecture and patterns; risks and vulnerabilities; and hardware security, secure storage, and policy management. Among their topics are dynamic security properties monitoring architecture for cloud computing, three misuse patterns, a software tool to support risk analysis about what should or should not go into the cloud, a goal-driven risk management approach to support security and privacy analysis of cloud-based systems, and securing cloud storage. Annotation ©2012 Book News, Inc., Portland, OR (booknews.com)
Foreword x
Preface xii
Section 1 Cloud Architecture and Patterns
Chapter 1 Dynamic Security Properties Monitoring Architecture for Cloud Computing
1(18)
Antonio Mana
Antonio Munoz
Javier Gonzalez
Chapter 2 The SeCA Model
19(17)
Thijs Baars
Marco Spruit
Chapter 3 Three Misuse Patterns for Cloud Computing
36(19)
Keiko Hashizume
Nobukazu Yoshioka
Eduardo B. Fernandez
Section 2 Risks and Vulnerabilities in Cloud Computing
Chapter 4 Security Risks in Cloud Computing: An Analysis of the Main Vulnerabilities
55(17)
Belen Cruz Zapata
Jose Luis Fernandez Aleman
Chapter 5 A Software Tool to Support Risks Analysis about what Should or Should Not go to the Cloud
72(25)
S. Miguel Torrealba
P. Mireya Morales
Jose M. Campos
S. Marina Meza
Chapter 6 A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System
97(26)
Shareeful Islam
Haralambos Mouratidis
Edgar R. Weippl
Chapter 7 Real Time Risk Management in Cloud Computation
123(24)
Kashif Kifayat
Thar Baker Shamsa
Michael Mackay
Madjid Merabti
Qi Shi
Section 3 Hardware Security and Secure Storage and Policy Management in Cloud
Chapter 8 Hardware-Based Security for Ensuring Data Privacy in the Cloud
147(24)
Wassim Itani
Ayman Kayssi
Ali Chehab
Chapter 9 Securing Cloud Storage
171(20)
Jacques Jorda
Chapter 10 Policy Management in Cloud: Challenges and Approaches
191(21)
Hassan Takabi
James B. D. Joshi
Compilation of References 212(14)
About the Contributors 226(7)
Index 233