Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

Buy

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:

  • Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
  • Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
  • OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
  • A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

"A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc.

" Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc.

"Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation

What you’ll learn

  • Usage models, hardware and software technology components to enable trusted clouds.
  • Through solution architecture and descriptions, you will see how to build and enable trusted cloud infrastructure.

Who this book is for

This book will influence Infrastructure, Application and solution architects along with CTOs and CIOs and make them aware of Cloud Security and how to approach it with real-world examples and case studies.

Table of Contents

Chapter 1: Cloud Computing Basics

Chapter 2: The Trusted Cloud: Addressing Security and Compliance

Chapter 3: Platform Boot Integrity: Foundation for Trusted Compute Pools

Chapter 4: Attestation: Proving Trustability

Chapter 5: Boundary Control in the Cloud: Geo-Tagging and Asset Tagging

Chapter 6: Network Security in the Cloud

Chapter 7: Identity Management and Control for Clouds

Chapter 8: Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud

Chapter 9: A Reference Design for Secure Cloud Bursting

(HTML tags aren't allowed.)

A Workout in Computational Finance, with Website
A Workout in Computational Finance, with Website

A comprehensive introduction to various numerical methods used in computational finance today

Quantitative skills are a prerequisite for anyone working in finance or beginning a career in the field, as well as risk managers. A thorough grounding in numerical methods is necessary, as is the ability to assess their quality,...

From Access to SQL Server
From Access to SQL Server

This book covers what Access developers need to know about SQL Server, covering the two most common versions of both products: Microsoft Access 97 and 2000 and Microsoft SQL Server 6.5 and 7. The author offers his own tips and techniques based on practical hands-on experience. The resulting book teaches developers how to accomplish their goal...

Aiaa Aerospace Design Engineers Guide (Library of Flight Series)
Aiaa Aerospace Design Engineers Guide (Library of Flight Series)
If you have to choose what goes in your briefcase, choose this over your address book! -- Guy L. Gettle, JoyVer, Inc.

An indispensable reference for aerospace designers, analysts and students.

This fifth revised and enlarged edition of this classic, indispensable, and practical guide provides a condensed...


The Art of the Data Center: A Look Inside the World's Most Innovative and Compelling Computing Environments
The Art of the Data Center: A Look Inside the World's Most Innovative and Compelling Computing Environments

Today, data centers are the beating hearts of the companies they serve. Data centers process billions of Internet transactions every day. It's therefore critical for companies and IT organizations to understand the state-of-the-art in data center design. Narrow aspects - such as cooling, wiring, or power usage - are often the subject of...

Encyclopedia of Space Science & Technology 2 Volume Set
Encyclopedia of Space Science & Technology 2 Volume Set

A comprehensive resource on the past, present, and future of space technology

Researchers in optics, materials processing, and telecommunications require a reference that can provide a quick study of a number of basic topics in space science. The two-volume Encyclopedia of Space Science and Technology represents an ambitious
...

Inside the FDA: The Business and Politics Behind the Drugs We Take and the Food We Eat
Inside the FDA: The Business and Politics Behind the Drugs We Take and the Food We Eat
The Holiday Inn in Bethesda, Maryland, is an unassuming stucco building tucked sideways off a slow commercial street, across from a Pizza Hut, a gas station, and a mini-mart. You enter from the side driveway and climb up a wide, curving staircase to reach the Versailles II ballroom on the second floor.

On a sunny February morning in
...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy