Processing ......
FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
 
Building the Infrastructure for Cloud Security: A Solutions View
Top Free Computer Networking Books 🌠 - 100% Free or Open Source!
  • Title Building the Infrastructure for Cloud Security: A Solutions View
  • Author(s) Raghu Yeluri, Enrique Castro-Leon
  • Publisher: Apress; 1st ed. edition (March 27, 2014); eBook (Open Access Edition)
  • License(s): CC BY 4.0
  • Paperback: 244 pages
  • eBook PDF and ePub
  • Language: English
  • ISBN-10/ASIN: 1430261455
  • ISBN-13: 978-1430261452 (Print) 978-1430261469 (Online)
  • Share This:  

Book Description

This book provides a comprehensive look at the various facets of cloud security – infrastructure, network, services, Compliance and users. It will provide real world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a security perspective.

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security.

The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

  1. Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
  2. Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
  3. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
  4. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.
About the Authors
  • Raghu Yeluri is a Principal Engineer and lead Security Solutions Architect in the Data Center & Cloud Products Group at Intel Corporation with focus on virtualization and cloud security usages, solution architectures and technology initiatives.
Reviews, Ratings, and Recommendations: Related Book Categories: Read and Download Links: Similar Books:
  • Security as Code: DevSecOps Patterns with AWS (BK Das, et al.)

    It demonstrates how to use this methodology to secure any application and infrastructure you want to deploy. You'll learn how to create a secure containerized application with Kubernetes using CI/CD tooling from AWS and open source providers.

  • Hacking Kubernetes: Threat-Driven Analysis and Defense

    It begins with a vanilla Kubernetes installation with built-in defaults, then examines an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system.

  • Security of Ubiquitous Computing Systems (Gildas Avoine, et al)

    It is to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework that lies along four axes: cryptographic models, cryptanalysis of building blocks, security engineering, and security assessment.

  • Building Secure and Reliable Systems: Best Practices

    Security is crucial to the design and operation of scalable systems in production. Experts from Google share best practices to help your organization design scalable and reliable systems that are fundamentally secure.

  • Security Concepts (Subspacefield)

    This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.

  • Rational Cybersecurity for Business (Daniel Blum)

    This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience.

  • Cloud Computing - Architecture and Applications (Jaydip Sena)

    This book presents some critical applications in cloud frameworks along with some innovation design of algorithms and architecture for deployment in cloud environment. It establishes concrete, academic coverage with a focus on structure and solutions.

  • Cloud Design Patterns: Architecture Guidance for Cloud Apps

    This guide demonstrates design patterns that can help you to solve the problems you might encounter in many different areas of cloud application development. The patterns are grouped into categories.

  • Web Application Security: Exploitation and Countermeasures

    This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. It introduces three pillars of web application security: recon, offense, and defense.

Book Categories
:
Other Categories
Resources and Links