Hello Reader
Books in your Cart

Cloud Security: A Comprehensive Guide to Secure Cloud Computing

Cloud Security: A Comprehensive Guide to Secure Cloud Computing
-15 % Out Of Stock

Advertisement

Subscribe to us!

Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Currently Unavailable
This Product is Out of Stock. We will update for the availability.
No. Of Views: 464
₹594
₹699
Reward Points: 1498
This book covers Cloud computing fundamentals, architectures, service delivery approaches, deployment models, software as a service, platform as a service, and security governance. Fulfilling its comprehensive promise, it also presents Cloud computing risk management, compliance and legal responsibilities of remotely stored and maintained data, life cycle management, interoperability, business continuity and disaster recovery planning from the perspective of the user and the Cloud provider, handling of incidents and remediation, application security, encryption issues, storage, virtualization mechanisms and vulnerabilities, and access control. This book is the most current and complete guide to helping readers wend their way through a maze of security minefields that are present in any ven..
Pustak Details
Sold ByWiley India Publication
AuthorRonald L. Krutz, Russell Dean Vines
ISBN-139788126528097
FormatPaperback
LanguageEnglish
Pages384 Pages
CategoryCOMPUTERS/SECURITY/GENERAL

Reviews

Write a review

Note: HTML is not translated!
Bad Good
Captcha

Book Description

This book covers Cloud computing fundamentals, architectures, service delivery approaches, deployment models, software as a service, platform as a service, and security governance. Fulfilling its comprehensive promise, it also presents Cloud computing risk management, compliance and legal responsibilities of remotely stored and maintained data, life cycle management, interoperability, business continuity and disaster recovery planning from the perspective of the user and the Cloud provider, handling of incidents and remediation, application security, encryption issues, storage, virtualization mechanisms and vulnerabilities, and access control. This book is the most current and complete guide to helping readers wend their way through a maze of security minefields that are present in any vendor's cloud computing technologies.
Raise your Query?
Let's help