Import It All
Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications
Cloud Computing Protected: Security Assessment Handbook

Cloud Computing Protected: Security Assessment Handbook

Product ID: 26265732 Condition: New

Sold Out

Product Description

Cloud Computing Protected: Security Assessment Handbook

  • Used Book in Good Condition

Cloud Computing Protected describes the most important security challenges that organizations face as they seek to adopt public cloud services and implement their own cloud-based infrastructure. <div></div><br><div>There is no question that these emerging technologies introduce new risks:</div><div><span>»</span><span> </span>Virtualization hinders monitoring and can lead to server sprawl.</div><div><span>»</span><span> </span>Multi-tenancy exposes risks of data leakage to co-tenants.</div><div><span>»</span><span> </span>Outsourcing reduces both control and visibility over services and data.</div><div><span>»</span><span> </span>Internet service delivery increases the exposure of valuable information assets.</div><div><span>»</span><span> </span>Ambiguity in jurisdiction and national regulations complicates regulatory compliance.</div><div><span>»</span><span> </span>Lack of standardization can lead to a lock-in binding customers to their providers. </div><br><div></div><div>Fortunately, there are also many security benefits that customers can enjoy as they implement cloud services:</div><div></div><div><span>»</span><span> </span>Highly specialized providers have the economy of scale to invest in best-in-class tools and expertise.</div><div><span>»</span><span> </span>Contractual terms can clearly define the function and scope of critical services.</div><div><span>»</span><span> </span>Public services receive unprecedented scrutiny from the collective worldwide community.</div><div><span>»</span><span> </span>It is possible to achieve unlimited levels of redundancy by subscribing to multiple providers.</div><div><span>»</span><span> </span>The global reach of the Internet and security specialists facilitates early alerts and drives consistent policy enforcement. </div><div></div><br><div>This book looks at these and other areas where the advent of cloud computing has the opportunity to influence security risks, safeguards and processes.</div>

Technical Specifications

Country
USA
Brand
Recursive Press
Manufacturer
Recursive, Limited
Binding
Paperback
ItemPartNumber
RKC2010925994
UnitCount
1
EANs
9780956355621

You might also like

Back to top