Geen Kindle-apparaat vereist. Download een van de gratis Kindle-apps om Kindle-boeken te lezen op je smartphone, tablet en computer.

  • Apple
    Apple
  • Android
    Android
  • Windows Phone
    Windows Phone
  • Click here to download from Amazon appstore
    Android

Als je de gratis app wilt ontvangen, moet je je mobiele telefoonnummer invoeren.

kcpAppSendButton

Koopopties

Kindle-prijs: EUR 0,00
inclusief btw

Deze aanbiedingen worden op dit artikel toegepast:

Sommige promoties kunnen worden gecombineerd; anderen komen niet in aanmerking om te worden gecombineerd met andere aanbiedingen. Voor meer informatie, zie de voorwaarden die zijn gekoppeld aan deze promoties.

Laat het op je Kindle of een ander apparaat leveren

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security) (English Edition) van [Yeluri, Raghuram, Castro-Leon, Enrique]
Kindle-app advertentie

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security) (English Edition) 1st ed. Edition, Kindle-editie

4,2 van 5 sterren 15 beoordelingen

Alle indelingen en edities bekijken Andere indelingen en edities verbergen
Amazon-prijs
Nieuw vanaf Tweedehands vanaf
Kindle-editie
EUR 0,00

Lengte: 244 pagina's Verbeterd lettertype: Ingeschakeld Bladeren: Ingeschakeld
Taal: Engels

Productbeschrijving

Productbeschrijving

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:

  • Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
  • Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
  • OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
  • A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

"A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc.

" Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc.

"Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation

Samenvatting

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:

  • Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
  • Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
  • OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
  • A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

"A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can't afford to ignore it!" --Vince Lubsey, Vice President, Product Development, Virtustream Inc.

" Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed--but instead measured, attested, and limited according to least privilege principles." --John Skinner, Vice President, HyTrust Inc.

"Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." --Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation


Productgegevens

  • Editie: Kindle-editie
  • Bestandsgrootte: 9322 KB
  • Printlengte: 244 pagina's
  • Uitgever: Apress; 1st ed. editie (29 maart 2014)
  • Verkocht door: Amazon Media EU S.à r.l.
  • Taal: Engels
  • ASIN: B0787V2W1P
  • Tekst-naar-spraak: Ingeschakeld
  • X-Ray:
  • Word Wise: Niet ingeschakeld
  • Verbeterd lettertype: Ingeschakeld
  • Klantenrecensies: Schrijf als eerste een recensie over dit item
  • Plaats op Amazon-bestsellerlijst: #10.857 Gratis op Kindle Store (Top 100 gratis in Kindle Store bekijken)
click to open popover

Nog geen klantenrecensies

5 sterren (0%) 0%
4 sterren (0%) 0%
3 sterren (0%) 0%
2 sterren (0%) 0%
1 ster (0%) 0%


Nuttigste klantenrecensies op Amazon.com

Amazon.com: 4,1 van 5 sterren 12 recensies
Raghavendra
4,0 van 5 sterren Good overview and in depth security architecture
2 oktober 2014 - Gepubliceerd op Amazon.com
Geverifieerde aankoop
10 mensen vonden dit nuttig
Sheryl A Gudenschwager
5,0 van 5 sterren A lot of useful information!
27 augustus 2015 - Gepubliceerd op Amazon.com
Geverifieerde aankoop
Jim
3,0 van 5 sterren Okay, but better books are out there
27 september 2015 - Gepubliceerd op Amazon.com
Geverifieerde aankoop
Balaji
3,0 van 5 sterren Three Stars
10 juli 2015 - Gepubliceerd op Amazon.com
Geverifieerde aankoop
Freddie B
3,0 van 5 sterren Three Stars
17 maart 2015 - Gepubliceerd op Amazon.com
Geverifieerde aankoop