ZeroCold Posted May 2, 2011 Report Posted May 2, 2011 Securing the CloudCloud Computer Security Techniques and TacticsPDF 6.9mb | 2011 | Vic (J.R.) WinklerBOOK DESCRIPTIONAs companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology.KEY FEATURESProvides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trustDiscusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recoveryDetails the benefits of moving to the cloud-solving for limited availability of space, power and storageAUTHOR INFORMATIONVic (J.R.) Winkler is a Senior Associate at Booz Allen Hamilton, providing technical consultation to U.S. Government clients. He is a published InfoSec and cyber security researcher as well as an expert in intrusion/anomaly detection. At Sun Microsystems, Vic served as the Chief Technologist for Security for the Sun Public Cloud. He was also Chairman of the Board for the Sun Security Technology Ambassador program (presales security engineers). In 2010, he became a member of the Advisory Board for StratuScape (a Silicon Valley startup). Vic's background includes positions as an R&D principal investigator at Planning Research Corporation (PRC), where he was the lead designer and Program Manager for a trusted B1 UNIX OS. At PRC, he also conceived of and built one of the first network/host Intrusion Detection Systems (IDS). Vic has over 30 years' experience in InfoSec/cyber security, cloud computing, systems and applications engineering, IT operations and management. He has numerous technical conference publications, and as a visiting cyber security expert, Vic was the author of the Information Security policy for the Government of Malaysia.TABLE OF CONTENTSSecuring the Cloud: Cloud Computer Security Techniques and TacticsCopyrightDedicationAcknowledgmentsAbout the AuthorAbout the Technical EditorIntroductionBook AudienceTerminologyRisk, Perception of Risk and Cloud ComputingCloud Computing as a Tectonic ShiftStructure of the BookChapters in This BookChapter 1: Introduction to Cloud Computing and SecurityChapter 2: Cloud Computing ArchitectureChapter 3: Security Concerns, Risk Issues, and Legal AspectsChapter 4: Securing the Cloud: ArchitectureChapter 5: Securing the Cloud: Data SecurityChapter 6: Securing the Cloud: Key Strategies and Best PracticesChapter 7: Security Criteria: Building an Internal CloudChapter 8: Security Criteria: Selecting an External Cloud ProviderChapter 9: Evaluating Cloud Security: An Information Security FrameworkChapter 10: Operating a CloudDOWNLOADhttp://www.multiupload.com/GKQWL7KHEE Quote
iommi Posted December 13, 2015 Report Posted December 13, 2015 Hi, can someone please upload this ebook again? I really need this one.thks a lot Quote
ZeroCold Posted December 15, 2015 Author Report Posted December 15, 2015 Check it here: http://www.asecib.ase.ro/cc/carti/Securing%20the%20Cloud%20[2011].pdf Quote