LiveZilla Live Chat Software
Importitall
Register/Login Login Contact UsContacts BlogBlog
Cart Items : 0 | Cart Total : R0
USA Categories
Site Security
Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications > 1430261455
  1. Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
    Image(s) provided for illustrative purposes and may differ from the actual product
  2. Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

    [1430261455]
    Delivery: 10-20 Working Days
    Customer Ratings (13 reviews)
    Price R1070.00

     pinterest 
Additional Information

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:

  • Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
  • Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
  • OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
  • A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

"A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc.

" Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc.

"Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation

Similar Products

Cloud Computing: Concepts, Technology & Architecture (The Prentice Hall Service Technology Series from Thomas Erl)Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS)Cloud Computing Protected: Security Assessment HandbookNetwork Security with OpenSSLSecuring the Cloud: Cloud Computer Security Techniques and TacticsDocker: Up & Running: Shipping Reliable Containers in ProductionBig Data: Principles and best practices of scalable realtime data systemsBulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web ApplicationsVirtualization Security: Protecting Virtualized EnvironmentsOpenStack Cloud Computing: Architecture Guide
Specifications

Country
USA
Binding
Paperback
EAN
9781430261452
Edition
1st ed.
IsAdultProduct
ISBN
1430261455
Label
Apress
Manufacturer
Apress
NumberOfItems
1
NumberOfPages
244
PublicationDate
2014-03-27
Publisher
Apress
ReleaseDate
2014-03-31
Studio
Apress
Most Helpful Customer Reviews

Found it good as a beginner, covering security architecture in detail and the solution components. hardware trust security and network security concepts are covered with practical examples. Found it difficult to correlate the information security covered in chapter 8 and 9 with the previous chapters...
Thank You
Despite other reviews, I did not find this a good read. It is stong on the Intel way. But for a decent overview of cloud security, there are plenty of other good books out there. I would skip this.
Please Note

The authorised South African distributor of this product is under no obligation to honour the manufacture's guarantees/warranties or to provide after-sales service.

Please note that this item is imported from the USA, and is designed to be used in the USA. In addition, if the unit is powered it will come with a US plug and an adapter/transformer may be required. Please click here for more information on power requirements, or check with us if you are unsure or need any assistance!

Please also note that certain items cannot be imported, these include Alcohol, Animals, Batteries, Flammable Materials, Currency, Food, Furs, Chemicals, Explosives, Medications, Plants, Seeds, Supplements, Pressurized Cans, Tactical Equipment, Vitamins, Weaponry and Weaponry Accessories. In these cases, the item and information is displayed for reference purposes only. If you are not sure if we are permitted to bring an item, please send us an e-mail with a link to the item to confirm.

Please also ensure that you are ordering the correct item for your particular application as returns to the USA are costly. Product reviews are also provided for most of our items, which can give you a good idea for possible things to look out for and the quality of the item. By clicking Add to Cart, you are confirming that the item is correct and you accept the conditions listed here.