Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)


For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:

  • Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
  • Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
  • OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
  • A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

"A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc.

" Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc.

"Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation

What you’ll learn

  • Usage models, hardware and software technology components to enable trusted clouds.
  • Through solution architecture and descriptions, you will see how to build and enable trusted cloud infrastructure.

Who this book is for

This book will influence Infrastructure, Application and solution architects along with CTOs and CIOs and make them aware of Cloud Security and how to approach it with real-world examples and case studies.

Table of Contents

Chapter 1: Cloud Computing Basics

Chapter 2: The Trusted Cloud: Addressing Security and Compliance

Chapter 3: Platform Boot Integrity: Foundation for Trusted Compute Pools

Chapter 4: Attestation: Proving Trustability

Chapter 5: Boundary Control in the Cloud: Geo-Tagging and Asset Tagging

Chapter 6: Network Security in the Cloud

Chapter 7: Identity Management and Control for Clouds

Chapter 8: Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud

Chapter 9: A Reference Design for Secure Cloud Bursting

(HTML tags aren't allowed.)

Nonprofit Essentials: The Capital Campaign
Nonprofit Essentials: The Capital Campaign
A thorough and practical overview of the process of planning and managing a capital campaign
"I have not come across a better book on the overall strategy and techniques necessary for the planning and implementation of a capital campaign. Ms. Walker covers all of the bases in a clear and concise manner that will benefit many
Java Programming 10-Minute Solutions
Java Programming 10-Minute Solutions

The problems encountered by a beginning Java programmer are many—and mostly minor.

The problems you encounter as an experienced Java programmer are far fewer—and far more serious.

Java Programming 10-Minute Solutions provides direct solutions to the thorny...

Illustrator CS4 Digital Classroom
Illustrator CS4 Digital Classroom
Illustrator CS4 Digital Classroom is like having a personal instructor guiding readers through each lesson, while they work at their own pace. This book includes 11 self-paced lessons that let readers discover essential skills and explore new features and capabilities of Adobe Illustrator CS4. Every lesson is presented in full color with...

Real-Time Graphics Rendering Engine (Advanced Topics in Science and Technology in China)
Real-Time Graphics Rendering Engine (Advanced Topics in Science and Technology in China)

"Real-Time Graphics Rendering Engine" reveals the software architecture of the modern real-time 3D graphics rendering engine and the relevant technologies based on the authors’ experience developing this high-performance, real-time system. The relevant knowledge about real-time graphics rendering such as the rendering...

Urban Regeneration Management: International Perspectives (Routledge Advances in Management and Business Studies)
Urban Regeneration Management: International Perspectives (Routledge Advances in Management and Business Studies)

This book was born out of the need to ‘capture’ the experience and understanding of the regeneration management process that is neither UK centric nor centred exclusively on urban areas. Written by experts working in the USA, Holland, Greece, Jamaica, Turkey, Spain, Trinidad and the Czech Republic, this book seeks to locate the issue...

Brain Tattoos: Creating Unique Brands That Stick in Your Customers' Minds
Brain Tattoos: Creating Unique Brands That Stick in Your Customers' Minds
Effective branding depends on the ability to leave a lasting (and positive) impression in the mind of the audience. This how-to book is packed with tools that help readers identify their brand's purpose, personality, promise, and point of difference.

A solid brand leaves a positive impression in the customer’s mind, but the...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy