Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

Buy

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:

  • Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
  • Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
  • OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
  • A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

"A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc.

" Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc.

"Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation

What you’ll learn

  • Usage models, hardware and software technology components to enable trusted clouds.
  • Through solution architecture and descriptions, you will see how to build and enable trusted cloud infrastructure.

Who this book is for

This book will influence Infrastructure, Application and solution architects along with CTOs and CIOs and make them aware of Cloud Security and how to approach it with real-world examples and case studies.

Table of Contents

Chapter 1: Cloud Computing Basics

Chapter 2: The Trusted Cloud: Addressing Security and Compliance

Chapter 3: Platform Boot Integrity: Foundation for Trusted Compute Pools

Chapter 4: Attestation: Proving Trustability

Chapter 5: Boundary Control in the Cloud: Geo-Tagging and Asset Tagging

Chapter 6: Network Security in the Cloud

Chapter 7: Identity Management and Control for Clouds

Chapter 8: Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud

Chapter 9: A Reference Design for Secure Cloud Bursting

(HTML tags aren't allowed.)

Schaum's Outline of Visual Basic
Schaum's Outline of Visual Basic
Master the fundamentals of Visual Basic with Schaum's­­the high-performance study guide. It will help you cut study time, hone problem-solving skills, and achieve your personal best on exams and projects!

Students love Schaum's Outlines because they produce results. Each year, hundreds of thousands of students improve their test scores...

Object-Oriented Programming with ABAP Objects
Object-Oriented Programming with ABAP Objects

There's more to ABAP than procedural programming. If you're ready to leap into the world of object-oriented programming (OOP) and ABAP Objects or are already there and just need a refresher then this is the book you've been looking for. Thanks to explanations of basic concepts, practical examples, and updates for AS ABAP 7.4,...

Honor Your Anger: How Transforming Your Anger Style Can Change Your Life
Honor Your Anger: How Transforming Your Anger Style Can Change Your Life

"This book made me angry! Why couldn’t Ms. Engel have written it years ago when it would have helped me through difficult times? Honor Your Anger is a clearly written, insightful look at a topic that concerns everyone. You can indeed learn to understand and manage your anger, and this book will show you how."
--Robert
...


Modern X86 Assembly Language Programming: 32-bit, 64-bit, SSE, and AVX
Modern X86 Assembly Language Programming: 32-bit, 64-bit, SSE, and AVX

Modern X86 Assembly Language Programming shows the fundamentals of x86 assembly language programming. It focuses on the aspects of the x86 instruction set that are most relevant to application software development. The book's structure and sample code are designed to help the reader quickly understand x86...

Encyclopedia Of Haunted Places: Ghostly Locales From Around The World
Encyclopedia Of Haunted Places: Ghostly Locales From Around The World
The Encyclopedia of Haunted Places is the first directory to be written by dozens of the world's leading paranormal investigators. Research notes, location background, first-hand accounts, and many anomalous photographs featuring ghostly manifestations comprise the hundreds of haunted listings in this directory. For years, paranormal investigative...
Building OpenSocial Apps: A Field Guide to Working with the MySpace Platform
Building OpenSocial Apps: A Field Guide to Working with the MySpace Platform

The authors did a great job covering the various ins and outs of OpenSocial, and especially the specific MySpace quirks. If you are a new social networking application developer or even someone who just wants to write better OpenSocial Apps, then this book has what you are looking for

©2019 LearnIT (support@pdfchm.net) - Privacy Policy