Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

Buy

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:

  • Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
  • Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
  • OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
  • A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

"A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc.

" Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc.

"Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation

What you’ll learn

  • Usage models, hardware and software technology components to enable trusted clouds.
  • Through solution architecture and descriptions, you will see how to build and enable trusted cloud infrastructure.

Who this book is for

This book will influence Infrastructure, Application and solution architects along with CTOs and CIOs and make them aware of Cloud Security and how to approach it with real-world examples and case studies.

Table of Contents

Chapter 1: Cloud Computing Basics

Chapter 2: The Trusted Cloud: Addressing Security and Compliance

Chapter 3: Platform Boot Integrity: Foundation for Trusted Compute Pools

Chapter 4: Attestation: Proving Trustability

Chapter 5: Boundary Control in the Cloud: Geo-Tagging and Asset Tagging

Chapter 6: Network Security in the Cloud

Chapter 7: Identity Management and Control for Clouds

Chapter 8: Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud

Chapter 9: A Reference Design for Secure Cloud Bursting

(HTML tags aren't allowed.)

XPath Essentials
XPath Essentials
This book is a learn-by-doing book. It is for anybody who needs to start using XPath today. Throughout the chapters of this book, you will be shown example after example of working code that uses XPath. As you work through the text and the examples, I think you will find code that you can adapt or extend to your own needs and purposes. Because the...
Monte Carlo and Quasi-Monte Carlo Methods 2012 (Springer Proceedings in Mathematics & Statistics)
Monte Carlo and Quasi-Monte Carlo Methods 2012 (Springer Proceedings in Mathematics & Statistics)

This book represents the refereed proceedings of the Tenth International Conference on Monte Carlo and Quasi-Monte Carlo Methods in Scientific Computing that was held at the University of New South Wales (Australia) in February 2012. These biennial conferences are major events for Monte Carlo and the premiere event for quasi-Monte Carlo...

Interactive Segmentation Techniques: Algorithms and Performance Evaluation (SpringerBriefs in Electrical and Computer Engineering)
Interactive Segmentation Techniques: Algorithms and Performance Evaluation (SpringerBriefs in Electrical and Computer Engineering)

This book focuses on interactive segmentation techniques, which have been extensively studied in recent decades. Interactive segmentation emphasizes clear extraction of objects of interest, whose locations are roughly indicated by human interactions based on high level perception. This book will first introduce classic graph-cut segmentation...


Data Driven e-Science: Use Cases and Successful Applications of Distributed Computing Infrastructures (ISGC 2010)
Data Driven e-Science: Use Cases and Successful Applications of Distributed Computing Infrastructures (ISGC 2010)

ISGC 2010, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan, March, 2010. The 2010 symposium brought together prestigious scientists and engineers worldwide to exchange ideas, present challenges/solutions and to discuss new topics in the field of Grid Computing.

Data Driven e-Science: Use...

CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience
CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience

CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It...

Immunodominance
Immunodominance
The normal, intact immune system does not have equal probability of responding to every potential part of a protein. It has been known for more than 50 years that only parts of the protein that are “outside” are available for antibody binding. Yet, with the advent of Western blotting techniques, antibodies that react...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy