This specific ISBN edition is currently not available.View all copies of this ISBN edition:
Cloud computing is transforming the way businesses buy IT services, offering immense potential financial benefits in today's economic environment. However, before companies take full advantage of the cloud, they must address profound and legitimate security concerns. Cloud Computing Security is the first book that helps decision-makers and technology professionals clarify the real security issues associated with cloud deployments, and systematically address each of these challenges. Leading enterprise and cloud security experts Kunjal Trivedi and Keith Pasley thoroughly review the entire IT service security life cycle, offering best practice solutions for each phase. In Part I, they identify the changes associated with cloud computing deployments, together with corresponding security issues. In Part II, they present systematic security solutions for architecture, design, deployment, and operations. Next, they address crucial demand-side drivers for security, and present a complete case study based on an organization with 50,000+ employees. Coverage includes: * How "old security thinking" must change in cloud environments * Managing risks and knowing "where the buck stops" * Addressing crucial compliance and legal issues * Building a security-driven cloud computing architecture * Leveraging emerging cloud computing security frameworks * Implementing best practices for secure cloud computing operations and more
"synopsis" may belong to another edition of this title.
Kunjal Trivedi, (CISSP, CCIE) has architected, designed, and helped to operate some of Cisco's largest enterprise and service provider customer networks. He is now helping to shape Cisco's Managed Services vision and strategy for data centers, VPNs, and security. A widely respected expert, he presents at Cisco Live, APRICOT, and NIST, and authored [Read Me First]: Building or Buying VPNs. Keith Pasley, CISSP, CISA, ITIL, GIAC Systems Network Auditor, helps companies clarify compliance-related security requirements and map them to IT strategy. He has designed security architectures and implemented security strategies in both government and commercial sectors.
"About this title" may belong to another edition of this title.
(No Available Copies)
If you know the book but cannot find it on AbeBooks, we can automatically search for it on your behalf as new inventory is added. If it is added to AbeBooks by one of our member booksellers, we will notify you!Create a Want