Building the Infrastructure for Cloud Security A Solutions View /

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book hig...

Full description

Saved in:
Bibliographic Details
Main Authors: Yeluri, Raghuram (Author), Castro-Leon, Enrique (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Berkeley, CA : Apress : Imprint: Apress, 2014.
Edition:1st ed. 2014.
Subjects:
Online Access:Link to Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4302-6146-9
003 DE-He213
005 20220124155848.0
007 cr nn 008mamaa
008 140329s2014 xxu| s |||| 0|eng d
020 |a 9781430261469  |9 978-1-4302-6146-9 
024 7 |a 10.1007/978-1-4302-6146-9  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Yeluri, Raghuram.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Building the Infrastructure for Cloud Security  |h [electronic resource] :  |b A Solutions View /  |c by Raghuram Yeluri, Enrique Castro-Leon. 
250 |a 1st ed. 2014. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2014. 
300 |a XXVI, 244 p. 95 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
506 0 |a Open Access 
520 |a For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can't afford to ignore it!" -Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed-but instead measured, attested, and limited according to least privilege principles." -John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." -Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation. 
650 0 |a Data protection. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 1 4 |a Data and Information Security. 
650 2 4 |a Cryptology. 
700 1 |a Castro-Leon, Enrique.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781430261452 
776 0 8 |i Printed edition:  |z 9781430261476 
856 4 0 |u https://doi.org/10.1007/978-1-4302-6146-9  |z Link to Metadata 
912 |a ZDB-2-CWD 
912 |a ZDB-2-SXPC 
912 |a ZDB-2-SOB 
950 |a Professional and Applied Computing (SpringerNature-12059) 
950 |a Professional and Applied Computing (R0) (SpringerNature-43716)