000 05829cam a2200613K 4500
001 9780429055126
003 FlBoTFG
005 20220724194512.0
006 m o d
007 cr |n|||||||||
008 200907s2021 flu ob 001 0 eng d
040 _aOCoLC-P
_beng
_cOCoLC-P
020 _a9780429621796
_q(electronic bk.)
020 _a0429621795
_q(electronic bk.)
020 _a9780429055126
_q(electronic bk.)
020 _a0429055129
_q(electronic bk.)
020 _a9780429617492
_q(electronic bk. : Mobipocket)
020 _a0429617496
_q(electronic bk. : Mobipocket)
020 _a9780429619649
_q(electronic bk. : EPUB)
020 _a0429619642
_q(electronic bk. : EPUB)
020 _z0367658402
020 _z9780367658403
020 _z036756033X
020 _z9780367560331
035 _a(OCoLC)1193069843
_z(OCoLC)1193127054
035 _a(OCoLC-P)1193069843
050 4 _aQA76.585
072 7 _aCOM
_x012040
_2bisacsh
072 7 _aCOM
_x032000
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aUB
_2bicssc
082 0 4 _a005.8
_223
245 0 0 _aCloud computing security
_h[electronic resource] :
_bfoundations and challenges /
_cedited by John R. Vacca.
250 _aSecond edition.
260 _aBoca Raton, FL :
_bCRC Press, Taylor & Francis Group,
_c2021.
300 _a1 online resource.
505 0 _aCover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Foreword -- Preface -- Acknowledgments -- About the Editor -- Contributors -- Section I Introduction -- Chapter 1 Cloud Computing Essentials -- 1.1 Introduction to Cloud Computing -- 1.2 Characteristics of Cloud Computing -- 1.3 Cloud Computing Models -- 1.3.1 Service Models -- 1.3.1.1 Infrastructure-as-a-Service -- 1.3.1.2 Platform-as-a-Service -- 1.3.1.3 Software-as-a-Service -- 1.3.2 Deployment Models -- 1.4 Cloud Services and Technologies -- 1.5 Research Challenges -- 1.6 Summary -- Further Reading
505 8 _a2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature
505 8 _a3.3.4.3 Hashing -- 3.3.5 Virtualization Security -- 3.4 Privacy and Security in Cloud Storage Services -- 3.4.1 Cloud Data Protection Models -- 3.4.2 Enforcing Access Control Policies in the Cloud -- 3.4.3 Other Possible Causes of Data Leakage in the Cloud -- 3.5 Privacy and Security in Multiclouds -- 3.5.1 Desired Security and Privacy Properties in Multiclouds -- 3.5.2 Ensuring Security, Privacy, and Reliability in Multiclouds -- 3.6 Cloud Accountability -- 3.7 Summary -- References -- Chapter 4 Cloud Security, Privacy and Trust Baselines -- 4.1 Introduction -- 4.2 Understanding the Threats
505 8 _a4.3 Classification and Countermeasures -- 4.3.1 Infrastructure and Host Threats -- 4.3.1.1 Natural Disasters That Can Harm Critical Infrastructure -- 4.3.1.2 Unauthorized Physical Access to Facilities or Equipment -- 4.3.1.3 Deficient Training/Negligence of Employees -- 4.3.1.4 Dumpster Diving -- 4.3.1.5 Password Guessing -- 4.3.1.6 Unauthorized Access to Data or Information Technology Systems -- 4.3.1.7 Compromise of Operational Security Logs -- 4.3.1.8 Network Breaks -- 4.3.1.9 Privilege Escalation -- 4.3.1.10 Insecure or Ineffective Data Deletion -- 4.3.1.11 Malicious Scanning or Observation
520 _aThis handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features Covers patching and configuration vulnerabilities of a cloud server Evaluates methods for data encryption and long-term storage in a cloud server Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aCloud computing
_xSecurity measures.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aData protection.
650 0 _aComputer security.
650 7 _aCOMPUTERS / Computer Graphics / Game Programming & Design
_2bisacsh
650 7 _aCOMPUTERS / Information Technology
_2bisacsh
650 7 _aCOMPUTERS / Security / General
_2bisacsh
700 1 _aVacca, John R.,
_eeditor.
856 4 0 _3Read Online
_uhttps://www.taylorfrancis.com/books/9780429055126
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 _2lcc
_cEBK
999 _c18362
_d18362