Within this Book Full site

Metrics

Views
842

Filter my results

ISBN of the Book

Material or Process Book or Chapter Title Author or Editor Publication dates

Cloud Computing Security

Foundations and Challenges

Edited by: John R. Vacca

Print publication date:  September  2016
Online publication date:  September  2016

Print ISBN: 9781482260946
eBook ISBN: 9781315372112
Adobe ISBN:

10.1201/9781315372112
 Cite  Marc Record

Book description

This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide.

Table of contents

Chapter  1:  Cloud Computing Essentials Download PDF
Chapter  2:  Overview of Cloud Computing Download PDF
Chapter  3:  Cloud Security Baselines Download PDF
Chapter  4:  Cloud Security, Privacy, and Trust Baselines Download PDF
Chapter  5:  Infrastructure as a Service (IaaS) Download PDF
Chapter  6:  Risk and Trust Assessment Download PDF
Chapter  7:  Managing Risk in the Cloud Download PDF
Chapter  8:  Cloud Security Risk Management Download PDF
Chapter  9:  Secure Cloud Risk Management Download PDF
Chapter  10:  Specification and Enforcement of Access Policies in Emerging Scenarios Download PDF
Chapter  11:  Cryptographic Key Management for Data Protection Download PDF
Chapter  12:  Cloud Security Access Control Download PDF
Chapter  13:  Cloud Security Key Management Download PDF
Chapter  14:  Cloud Computing Security Essentials and Architecture Download PDF
Chapter  15:  Cloud Computing Architecture and Security Concepts Download PDF
Chapter  16:  Secure Cloud Architecture Download PDF
Chapter  17:  Locking Down Cloud Servers Download PDF
Chapter  18:  Third-Party Providers Integrity Assurance for Data Outsourcing Download PDF
Chapter  19:  Negotiating Cloud Security Requirements with Vendors Download PDF
Chapter  20:  Managing Legal Compliance Risk in the Cloud and Negotiating Personal Data Protection Requirements with Vendors Download PDF
Chapter  21:  Integrity Assurance for Data Outsourcing Download PDF
Chapter  22:  Secure Computation Outsourcing Download PDF
Chapter  23:  Computation Over Encrypted Data Download PDF
Chapter  24:  Trusted Computing Technology Download PDF
Chapter  25:  Computing Technology for Trusted Cloud Security Download PDF
Chapter  26:  Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems Download PDF
Chapter  27:  Assuring Compliance with Government Certification and Accreditation Regulations Download PDF
Chapter  28:  Government Certification, Accreditation, Regulations, and Compliance Risks Download PDF
Chapter  29:  Simplifying Secure Cloud Computing Environments with Cloud Data Centers Download PDF
Chapter  30:  Availability, Recovery, and Auditing across Data Centers Download PDF
Chapter  31:  Advanced Security Architectures for Cloud Computing Download PDF
Chapter  32:  Side-Channel Attacks and Defenses on Cloud Traffic Download PDF
Chapter  33:  Clouds Are Evil Download PDF
Chapter  34:  Future Directions in Cloud Computing Security Download PDF
prelims Download PDF
Search for more...

Back to top

Use of cookies on this website

We are using cookies to provide statistics that help us give you the best experience of our site. You can find out more in our Privacy Policy. By continuing to use the site you are agreeing to our use of cookies.