Skip to content
You are not logged in |Login  
     
Limit search to available items
20 results found. Sorted by relevance | date | title .
Record:   Prev Next
Resources
Bestseller
BestsellerE-book
Author D'Agostino, Giulio, author.

Title Data security in cloud computing. Volume ii / Giulio D'Agostino.

Publication Info. New York, New York : Momentum Press, 2019.

Item Status

Edition First edition.
Description 1 online resource (135 pages).
Physical Medium polychrome
Description text file
Series Computer engineering foundations currents and trajectories collection
Bibliography Includes bibliographical references.
Contents Chapter 7. Secure cloud architecture. 7.1. Governance and comprehensive risk analysis -- Chapter 8. Risk and trust assessment -- Chapter 9. Managing risk in the cloud -- 10.1. Improvements ; 10.2. Multilevel authentication ; 10.3. Encryption ; 10.4. Password administration ; 10.5. Distributed servers -- Chapter 11. Cloud security risk management. 11.1. Risk in the cloud ; 11.2. Indirect measurements and metrics ; 11.3. Definitions of risk ; 11.4. Risk and cloud. 11.4.1. Security risks not particular to cloud computing ; 11.4.2. Cloud-specific hazards ; 11.4.3. Safety SLA for cloud services -- Chapter 12. Infrastructure-as-a-service (IAAS). 12.1. Considerations ; 12.2. Network ; 12.3. Security implications ; 12.4. Storage ; 12.5. Databases ; 12.6. Control -- Chapter 13. Cryptographic key management for data protection. 13.1. Key management system design dhoices ; 13.2. Cloud key management challenges ; 13.3. Cloud key management strategies ; 13.3.1. Establish trust in crypto module ; 13.3.2. Use key splitting techniques -- Chapter 14. Managing legal compliance risk and personal data protection. 14.1. Digital agenda for Europe ; 14.2. Addressing legal compliance ; 14.2.1. Precontractual phase ; 14.2.2. Step 1: Precontractual phase ; 14.2.3. Risks and opportunities for your cloud service client ; 14.2.4. Outsourcing cloud services ; 14.2.5. Step 2: Major issues in entering a cloud service contract ; 14.2.6. Jurisdiction and applicable law ; 14.2.7. Privacy roles ; 14.2.8. Amendments to the contract ; 14.2.9. Data location and transfers of data ; 14.2.10. Processing of personal data by subcontractors ; 14.2.11. Data subjects' rights (intervenability) ; 14.2.12. Step 3: Exiting a cloud service contract: major issues ; 14.2.13. Lock-in and interoperability ; 14.2.14. Service-level agreements ; 14.2.15. Termination of the contract -- Chapter 15. Future directions in cloud computing security. 15.1. Categories.
Summary This book covers not only information protection in cloud computing security and risk management, but also the plan, management, and in-depth implementation details needed to migrate existing applications to the cloud. Readers will have a greater comprehension of cloud engineering and the actions required to rap- idly reap its benefits while at the same time lowering IT implementation risk. The book's content is ideal for users wanting to migrate to the cloud, IT professionals seeking an overview on cloud fundamentals, and computer science students who will build cloud solutions for testing purposes.
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject Cloud computing.
Cloud computing.
Cloud computing -- Security measures.
Cloud computing -- Security measures.
Indexed Term Amazon Web Services
API.
Azure.
BaaS.
Cloud computing.
Computer engineering and science.
Google Cloud.
Java.
MySQL.
Node.js.
SaaS.
SQL.=655 0 Electronic books
Genre/Form Electronic books.
Other Form: Print version: 9781949449235
ISBN 1949449238 paperback
9781949449235 paperback
9781949449242 electronic book
1949449246 electronic book