My Account Log in

3 options

Data security in cloud computing. Volume I / Giulio D'Agostino.

EBSCOhost Academic eBook Collection (North America) Available online

View online

EBSCOhost eBook Community College Collection Available online

View online

Ebook Central College Complete Available online

View online
Format:
Book
Author/Creator:
D'Agostino, Giulio, author.
Series:
Computer Engineering Foundations, Currents, and Trajectories Collection
Standardized Title:
Data security in cloud computing
Language:
English
Subjects (All):
Cloud computing--Security measures.
Cloud computing.
Physical Description:
1 online resource (153 pages).
Edition:
1st ed.
Place of Publication:
New York : Momentum Press Engineering, 2019.
Summary:
This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud. Cloud computing has already been adopted by many organizations and people because of its advantages of economy, reliability, scalability and guaranteed quality of service amongst others. Readers will learn specifics about software as a service (Saas), platform as a service (Paas), infrastructure as a service (IaaS), server and desktop virtualization, and much more. Readers will have a greater comprehension of cloud engineering and the actions required to rapidly reap its benefits while at the same time lowering IT implementation risk. The book's content is ideal for users wanting to migrate to the cloud, IT professionals seeking an overview on cloud fundamentals, and computer science students who will build cloud solutions for testing purposes.
Contents:
Cover
DATA SECURITY IN CLOUD COMPUTING, VOLUME I
Contents
List of Figures
List of Tables
List of Abbreviations
Acknowledgments
Introduction
Chapter 1: Cloud Computing Essentials
1.1. Infrastructure-as-a-Service
1.2. Platform-as-a-Service
1.3. Software-as-a-Service
1.4. Deployment Designs
Chapter 2: Overview of Cloud Computing
2.1. Essential Characteristics
2.2. Cloud Services
2.3. Platform-as-a-Service and IaaS
2.4. Additional Cloud Services
2.5. XaaS (Anything-as-a-Service)
2.6. Public Cloud
2.7. Personal Cloud
2.8. Community Cloud
2.9. Hybrid
2.10. Cloud Provider Architectural Components
2.11. ITU-T Cloud Computing Reference Architecture
2.11.1. Cloud Computing "Actors"
2.11.2. Layered Architecture
Chapter 3: Cloud Security Baselines
3.1. Fundamentals
3.2. Program Layer
3.3. Other Potential Reasons for Data Leakage from the Cloud
3.4. Privacy and Security in Multiclouds
3.5. Cloud Accountability
Chapter 4: Cloud Computing Architecture
4.1. Hardware Customers
4.1.1. Thick Clients
4.1.2. Thin Clients
4.1.3. Smartphones
4.1.4. Software Customers
4.1.5. Thick or Thin . . . or Smart?
4.1.6. Thin or Web-applications Customers
4.1.7. Smart Customers
4.1.8. Personal Cloud
4.1.9. Virtual Private Cloud
4.2. Cloud-storage Prerequisites
4.3. Cloud OS Prerequisites
4.4. Memory Prerequisites
4.5. CPU Prerequisites
4.6. Software Prerequisites
Chapter 5: Cloud Computing Security Essentials
5.1. Cloud Computing Definition
5.2. Cloud Computing Security Essentials
5.3. Dividing Operational Responsibilities
5.4. User-data Boundary
5.5. Ecosystem Orchestration Boundary
5.6. Deployment Boundary
5.7. Defining Your Root of Trust
5.8. Managing User Authentication and Authorization.
Chapter 6: Cloud Security
6.1. The State of Cloud Security
6.2. Understanding the Threats
6.3. Classification and Countermeasures
6.3.1. Recruitment and Host Threats
6.3.2. Network Breaks
6.3.3. Lock-in
6.4. Compliance Issues
6.5. Infrastructure Modifications
6.6. Data Processing
6.7. Administrative and Assets
6.8. DoS
6.9. Service Provider
6.10. Information Interception
6.11. Clients' Negligence and Cloud Security
6.12. Reduction of Governance
6.13. Common Risks
6.14. Encryption Keys
6.15. Service Engine Presence
About the author
Index
Ad page
Back Cover.
Notes:
Includes index.
Description based on print version record.
ISBN:
9781949449006
1949449009

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account